Master Course Computer Networks IN2097

Similar documents
Master Course Computer Networks IN2097. You have now safely shutdown the Internet. Outline. Internet-Shutdown. Internet-Shutdown. Recall last lecture

Master Course Computer Networks IN2097

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097

Ethernet Switches (more)

Master Course Computer Networks IN2097

Hubs. Interconnecting LANs. Q: Why not just one big LAN?

Lecture 7. Network Layer. Network Layer 1-1

CPEG 514. Lecture 11 Asynchronous Transfer Mode (ATM) CPEG 514

Asynchronous Transfer Mode

Virtualization of networks

BROADBAND AND HIGH SPEED NETWORKS

Virtual Link Layer : Fundamentals of Computer Networks Bill Nace

Outline. Circuit Switching. Circuit Switching : Introduction to Telecommunication Networks Lectures 13: Virtual Things

Internetworking Part 1

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

Asynchronous Transfer Mode (ATM) ATM concepts

Virtualization. Stefan Schmid - 1

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

Bandwidth-on-Demand up to very high speeds. Variety of physical layers using optical fibre, copper, wireless. 3BA33 D.Lewis

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

Computer Networks. Instructor: Niklas Carlsson

Virtual Link Layer : Fundamentals of Computer Networks Bill Nace

WAN Technologies (to interconnect IP routers) Mario Baldi

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

Chapter 4 Network Layer

CSE 3214: Computer Network Protocols and Applications Network Layer

ATM Logical Connections: VCC. ATM Logical Connections: VPC

Master Course Computer Networks IN2097

Chapter 10. Circuits Switching and Packet Switching 10-1

Master Course Computer Networks IN2097

Chapter 5: The Data Link Layer

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

DigiPoints Volume 1. Leader Guide. Module 12 Asynchronous Transfer Mode. Summary. Outcomes. Objectives. Prerequisites

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

CMSC 332 Computer Networks Network Layer

Master Course Computer Networks IN2097

Digital Communication Networks

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Asynchronous. nous Transfer Mode. Networks: ATM 1

BROADBAND AND HIGH SPEED NETWORKS

Wireless Networks. Communication Networks

Lecture 16: Network Layer Overview, Internet Protocol

Key Network-Layer Functions

Telematics Chapter 7: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections

Chapter 5 Link Layer and LANs. 5: DataLink Layer 5-1

ATM Asynchronous Transfer Mode revisited

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode

1997, Scott F. Midkiff 1

Chapter 5 Link Layer and LANs. Chapter 5: The Data Link Layer. Link Layer. Our goals: understand principles behind data link layer services:

Lecture 03 Chapter 11 Asynchronous Transfer Mode

CSC 401 Data and Computer Communications Networks

Cell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets

Chapter 5 Link Layer and LANs

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14

Communication Networks

ATM Technology in Detail. Objectives. Presentation Outline

HW3 and Quiz. P14, P24, P26, P27, P28, P31, P37, P43, P46, P55, due at 3:00pm with both soft and hard copies, 11/11/2013 (Monday) TCP), 20 mins

Chapter 5 The Link Layer and LANs

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1

BROADBAND AND HIGH SPEED NETWORKS

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

Administrivia. Homework on class webpage If you are having problems following me in class (or doing the homework problems), please buy the textbook

Chapter 5 Link Layer and LANs

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

Fragmenting and Interleaving Real-Time and Nonreal-Time Packets

Master Course Computer Networks IN2097

Label Switching. The idea. Add a small label (sometimes called a tag ) on the front of a packet and route the packet based on the label. cs670.

This Lecture. BUS Computer Facilities Network Management X.25. X.25 Packet Switch. Wide Area Network (WAN) Technologies. X.

MPLS AToM Overview. Documentation Specifics. Feature Overview

Master Course Computer Networks IN2097

Chapter 5 The Link Layer and LANs

atm txbuff atm txbuff number no atm txbuff Syntax Description

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.

Chapter 5. understand principles behind data link layer. layer technologies. Some terminology: hosts and routers are nodes communication channels that

Mission Critical MPLS in Utilities

COMP9332 Network Routing & Switching

Asynchronous Transfer Mode (ATM) Broadband ISDN (B-ISDN)

Network layer overview

Common Protocols. The grand finale. Telephone network protocols. Traditional digital transmission

Data Networks. Lecture 1: Introduction. September 4, 2008

Chapter 4: network layer

CSCD 433/533 Advanced Networks

Information and Communication Networks. Communication

MPLS MULTI PROTOCOL LABEL SWITCHING OVERVIEW OF MPLS, A TECHNOLOGY THAT COMBINES LAYER 3 ROUTING WITH LAYER 2 SWITCHING FOR OPTIMIZED NETWORK USAGE

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Chapter 3 Packet Switching

NETWORK PARADIGMS. Bandwidth (Mbps) ATM LANS Gigabit Ethernet ATM. Voice, Image, Video, Data. Fast Ethernet FDDI SMDS (DQDB)

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

CISC452 Telecommunications Systems. Lesson 6 Frame Relay and ATM

Transcription:

Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for Network Architectures and Services Institut für Informatik Technische Universität München http://www.net.in.tum.de

Outline Recall last lecture Project status Internet Strucuture Network virtualisation Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 2

Internet-Shutdown http://www.turnofftheinternet.com/ Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 3

Internet-Shutdown http://www.turnofftheinternet.com/shutdown.html You have now safely shutdown the Internet. Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 4

turnofftheinternet.com Registrant: Cockos Incorporated 245 8th Street San Francisco, CA 94103 Registrar: DOTSTER Created on: 10-SEP-00 Expires on: 10-SEP-13 Last Updated on: 18-JUN-10 Administrative, Technical Contact: Frankel, Justin Cockos Incorporated 245 8th Street San Francisco, CA 94103, US 707-726-2567 Domain servers in listed order: NS1.COCKOS.COM NS2.COCKOS.COM Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 5

turnofftheinternet.com About Cockos: We lovingly craft the software that we would want to use. Past Experience: The employees of Cockos have created and launched many fine products and technologies prior to joining Cockos, including Gnutella, K-Meleon, Kaillera, NSIS, SHOUTcast, and Winamp. Justin Frankel (born 1978) is an American computer programmer best known for his work on the Winamp media player application and for inventing the gnutella peer-to-peer network. He's also the founder of Cockos Incorporated which creates music production and development software such as the REAPER digital audio workstation, the NINJAM collaborative music tool and the Jesusonic expandable effects processor. In 2002, he was named to the MIT Technology Review TR100 as one of the top 100 innovators in the world under the age of 35.[1] source: wikipedia Christophe Thibault John Schwartz Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 6

Internet Emergency Control by Whitehouse http://news.cnet.com/8301-13578_3-10320096-38.html Bill would give president emergency control of Internet 28 August 2009 http://www.politechbot.com/docs/rockefeller.revised.cybersecurit y.draft.082709.pdf - in the event of an immediate threat to strategic national interests involving compromised Federal Government or United States critical infrastructure information system or network (A) may declare a cybersecurity emergency; and (B) may, if the President finds it necessary for the national defense and security, and in coordination with relevant industry sectors, direct the national response to the cyber threat and the timely restoration of the affected critical infrastructure information system or network; Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 7

Electronic Frontier Foundation, 28 August 2009 "The language has changed but it doesn't contain any real additional limits," EFF's Tien says. "It simply switches the more direct and obvious language they had originally to the more ambiguous (version)...the designation of what is a critical infrastructure system or network as far as I can tell has no specific process. There's no provision for any administrative process or review. That's where the problems seem to start. And then you have the amorphous powers that go along with it." Translation: If your company is deemed "critical," a new set of regulations kick in involving who you can hire, what information you must disclose, and when the government would exercise control over your computers or network. Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 8

Jena Longo, deputy communications director for the Senate Commerce Committee The president of the United States has always had the constitutional authority, and duty, to protect the American people and direct the national response to any emergency that threatens the security and safety of the United States. The Rockefeller-Snowe Cybersecurity bill makes it clear that the president's authority includes securing our national cyber infrastructure from attack. The section of the bill that addresses this issue, applies specifically to the national response to a severe attack or natural disaster. This particular legislative language is based on longstanding statutory authorities for wartime use of communications networks. To be very clear, the Rockefeller-Snowe bill will not empower a "government shutdown or takeover of the Internet" and any suggestion otherwise is misleading and false. The purpose of this language is to clarify how the president directs the public-private response to a crisis, secure our economy and safeguard our financial networks, protect the American people, their privacy and civil liberties, and coordinate the government's response. Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 9

Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Project: VMs

Project Infrastructure 32 Virtual Machines created, hosted and made accessible Instructions available in svn under pub/readme-vm.txt How to access your virtual machine You can log into your virtual machine using the OpenSSH private key named "id_rsa" in your team's SVN directory. If you're using OpenSSH type something like: ssh -i /path/to/mccn/team99/id_rsa root@mccn99.net.in.tum.de You have to replace "99" by your team number, obviously. If you prefer a different SSH implementation refer to its documentation on how to use OpenSSH private keys. How to install software on your virtual machine man 8 apt-get DNS The subdomain "t.mccn01.net.in.tum.de" is delegated to "mccn01.net.in.tum.de". The same goes for the other hosts. Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 11

Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 12

Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Network Architectures Link virtualization: ATM, MPLS

Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed networking 155Mbps to 622 Mbps and higher Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport of carry voice, video, data meeting timing/qos requirements of voice, video versus Internet best-effort model next generation telephony: technical roots in telephone world packet-switching (fixed length packets, called cells ) using virtual circuits, and label swapping Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 14

Datagram or VC network: why? Internet data exchange among computers elastic service, no strict timing requirements smart end systems (computers) can adapt, perform control, error recovery simple inside network, complexity at edge many link types different characteristics uniform service difficult ATM evolved from telephony human conversation: strict timing, reliability requirements need for guaranteed service dumb end systems telephones complexity inside network Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 15

ATM architecture AAL AAL ATM ATM ATM ATM physical physical physical physical end system switch switch end system adaptation layer: only at edge of ATM network data segmentation/reassembly roughly analogous to Internet transport layer ATM layer: network layer cell switching, routing physical layer Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 16

ATM: Network or Link layer? Vision: end-to-end transport: ATM from desktop to desktop ATM is a network technology Reality: used to connect IP backbone routers IP over ATM ATM as switched link layer, connecting IP routers IP network ATM network Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 17

ATM Adaptation Layer (AAL) ATM Adaptation Layer (AAL): adapts upper layers (IP or native ATM applications) to ATM layer below AAL present only in end systems, not in switches AAL layer segment (header/trailer fields, data) fragmented across multiple ATM cells analogy: TCP segment in many IP packets AAL AAL ATM ATM ATM ATM physical physical physical physical end system switch switch end system Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 18

ATM Adaptation Layer (AAL) [more] Different versions of AAL layers, depending on ATM service class: AAL1: for CBR (Constant Bit Rate) services, e.g. circuit emulation AAL2: for VBR (Variable Bit Rate) services, e.g., MPEG video AAL5: for data (e.g., IP datagrams) User data AAL PDU ATM cell Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 19

ATM Layer Service: transport cells across ATM network analogous to IP network layer very different services than IP network layer possible Quality of Service (QoS) Guarantees Network Architecture Service Model Bandwidth Guarantees? Loss Order Timing Congestion feedback Internet ATM ATM ATM ATM best effort CBR VBR ABR UBR none constant rate guaranteed rate guaranteed minimum none no yes yes no no no yes yes yes yes no yes yes no no no (inferred via loss) no congestion no congestion yes no Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 20

ATM Layer: Virtual Circuits VC transport: cells carried on VC from source to destination call setup, teardown for each call before data can flow addressing of destination e.g. by E.164 number each packet carries VC identifier (not destination ID) label swapping: VC identifier may change along path every switch on source-destination path maintains state for each passing connection link, switch resources (bandwidth, buffers) may be allocated to VC: to get circuit-like perf. Permanent VCs (PVCs) long lasting connections typically: permanent route between to IP routers Switched VCs (SVC): dynamically set up on per-call basis Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 21

ATM VCs Advantages of ATM VC approach: QoS performance guarantee for connection mapped to VC (bandwidth, delay, delay jitter) Drawbacks of ATM VC approach: Inefficient support of datagram traffic one PVC between each source/destination pair does not scale SVC introduces call setup latency, processing overhead for short lived connections Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 22

ATM Layer: ATM cell 5-byte ATM cell header 48-byte payload (Why?) small payload short cell-creation delay for digitized voice halfway between 32 and 64 (compromise!) Cell header Cell format Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 23

ATM cell header VCI: virtual channel ID may change from link to link through network PT: Payload type: RM (resource management) vs. data cell CLP: Cell Loss Priority bit CLP = 1 implies low priority cell, can be discarded if congestion HEC: Header Error Checksum cyclic redundancy check Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 24

Virtual Circuit Switching Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 25

Multiplexing of Variable vs. Fixed Size Packets Multiplexing of variable size packets ATM Multiplexing Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 26

ATM Identifiers ATM Cell Virtual Path Identifiers and Virtual Channel Identifiers (UNI: User-to-Network-Interface NNI: Network-to-Network-Interface) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 27

ATM Virtual Connections Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 28

ATM Physical Layer Physical Medium Dependent (PMD) sublayer SONET/SDH: transmission frame structure (like a container carrying bits); bit synchronization; bandwidth partitions (TDM); several speeds: OC3 = 155.52 Mbps OC12 = 622.08 Mbps OC48 = 2.45 Gbps OC192 = 9.6 Gbps TI/T3: transmission frame structure (old telephone hierarchy): 1.5 Mbps/ 45 Mbps unstructured: just cells (busy/idle) transmission of idle cells when no data cells to send Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 29

IP-Over-ATM Classic IP only 3 networks (e.g., LAN segments) MAC (802.3) and IP addresses IP over ATM replace network (e.g., LAN segment) with ATM network ATM addresses, IP addresses ATM network Ethernet LANs Ethernet LANs Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 30

IP-Over-ATM app transport IP Eth phy Eth phy IP AAL ATM phy ATM phy ATM phy app transport IP AAL ATM phy Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 31

Datagram Journey in IP-over-ATM Network at Source Host: IP layer maps between IP, ATM destination address (using ARP) passes datagram to AAL5 AAL5 encapsulates data, segments cells, passes to ATM layer ATM network: moves cell along VC to destination at Destination Host: AAL5 reassembles cells into original datagram if CRC OK, datagram is passed to IP Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 32

IP-Over-ATM Issues: IP datagrams into ATM AAL5 PDUs from IP addresses to ATM addresses just like IP addresses to 802.3 MAC addresses! ARP server Ethernet LANs ATM network Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 33

Multiprotocol label switching (MPLS) initial goal: speed up IP forwarding by using fixed length label (instead of IP address) to do forwarding borrowing ideas from Virtual Circuit (VC) approach but IP datagram still keeps IP address! PPP or Ethernet header MPLS header IP header remainder of link-layer frame label Exp S TTL 20 3 1 5 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 34

MPLS capable routers a.k.a. label-switched router forwards packets to outgoing interface based only on label value (don t inspect IP address) MPLS forwarding table distinct from IP forwarding tables signaling protocol needed to set up forwarding Label Distribution Protocol (LDP) RSVP-TE forwarding possible along paths that IP alone would not allow (e.g., source-specific routing) MPLS supports traffic engineering must co-exist with IP-only routers Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 35

MPLS forwarding tables in out out label label dest interface 10 A 0 12 D 0 8 A 1 in out out label label dest interface 10 6 A 1 12 9 D 0 R6 R5 R4 0 R2 in out out label label dest interface 1 8 6 A 0 R3 0 0 1 D 0 A in out R1 out label label dest interface 6 - A 0 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 36

Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Virtual Private Networks

Virtual Private Networks (VPN) VPNs Networks perceived as being private networks by customers using them, but built over shared infrastructure owned by service provider (SP) Service provider infrastructure: backbone provider edge devices Customer: customer edge devices (communicating over shared backbone) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 38

VPN Reference Architecture customer edge device provider edge device Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 39

VPNs: Why? Privacy Security Works well with mobility (looks like you are always at home) Cost many forms of newer VPNs are cheaper than leased line VPNs ability to share at lower layers even though logically separate means lower cost exploit multiple paths, redundancy, fault-recovery in lower layers need isolation mechanisms to ensure resources shared appropriately Abstraction and manageability all machines with addresses that are in are trusted no matter where they are Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 40

VPN: logical view virtual private network customer edge device provider edge device Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 41

Leased-Line VPN customer sites interconnected via static virtual channels (e.g., ATM VCs), leased lines customer site connects to provider edge Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 42

Customer Premise VPN all VPN functions implemented by customer customer sites interconnected via tunnels tunnels typically encrypted Service provider treats VPN packets like all other packets Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 43

Variants of VPNs Leased-line VPN configuration costs and maintenance by service provider: long time to set up, manpower CPE-based VPN expertise by customer to acquire, configure, manage VPN Network-based VPN Customer routers connect to service provider routers Service provider routers maintain separate (independent) IP contexts for each VPN sites can use private addressing traffic from one VPN cannot be injected into another Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 44

Network-based Layer 3 VPNs multiple virtual routers in single provider edge device Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 45

Tunneling Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 46

MPLS-based VPN T-PE CE CE MPLS S-PE MPLS CE CE T-PE Terminating-PE MPLS Aggregation Network S-PE MPLS Backbone Network MPLS tunnel S-PE Switching-PE MPLS T-PE T-PE CE CE T-PE/S-PE MPLS Aggregation Networks CE Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2011/2012 47