Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008.

Slides:



Advertisements
Similar presentations
End-to-End Arguments in System Design
Advertisements

Virtual Links: VLANs and Tunneling
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
APNOMS03 1 A Resilient Path Management for BGP/MPLS VPN Jong T. Park School of Electrical Eng. And Computer Science Kyungpook National University
MPLS: The Magic Behind the Myths Grenville Armitage (author) Scott Crosby (presenter)
Identifying MPLS Applications
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Internetworking II: MPLS, Security, and Traffic Engineering
Internet Routing (COS 598A) Today: Multi-Protocol Label Switching Jennifer Rexford Tuesdays/Thursdays.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
Intro (continued) and Design Principles Nick Feamster CS 3251: Computer Networking I Spring 2013.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Provider Opportunities for Enterprise MPLS APRICOT 2006, Perth Matt.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
5: DataLink Layer5-1 Cerf & Kahn’s Internetwork Architecture What is virtualized? r two layers of addressing: internetwork and local network r new layer.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS and Traffic Engineering
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
CS Summer 2003 Lecture 13. CS Summer 2003 MP_REACH_NLRI Attribute The MP_REACH_NLRI attribute is encoded as shown below:
Introduction to MPLS and Traffic Engineering
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman Teaching Assistants: Wyatt.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
MPLS-based Virtual Private Networks Khalid Siddiqui CS 843 Research Paper Department of Computer Science Wichita State University Wichita, KS
COS 420 Day 16. Agenda Assignment 3 Corrected Poor results 1 C and 2 Ds Spring Break?? Assignment 4 Posted Chap Due April 6 Individual Project Presentations.
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Categorizing VPNs.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 CSCI 6433 Internet Protocols Class 7 Dave Roberts.
1 Multi-Protocol Label Switching (MPLS) presented by: chitralekha tamrakar (B.S.E.) divya krit tamrakar (B.S.E.) Rashmi shrivastava(B.S.E.) prakriti.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
J.H.Saltzer, D.P.Reed, C.C.Clark End-to-End Arguments in System Design Reading Group 19/11/03 Torsten Ackemann.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
M P L S. MPLS Overview MPLS or Multiprotocol label switching is a new network protocol that defined a mechanism for packet forwarding in network router.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
Multi-protocol Label Switching Jiang Wu Computer Science Seminar 5400.
FIRE – GENI collaboration workshop Sep 2015 Washington.
Transport Layer OSI Model. The transport layer is responsible for the segmentation and the delivery of a message from one process to another.
Brief Introduction to Juniper and its TE features Huang Jie [CSD-Team19]
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
MPLS and VPNs (David Andersen) (Nick Feamster) February 18, 2008.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Amit Mondal.
END-TO-END ARGUMENTS IN SYSTEM DESIGN J.H. Salter, D.P. Reed and D.D. Clark Presented by Sui-Yu Wang.
MPLS Label Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
MULTI-PROTOCOL LABEL SWITCHING Brandon Wagner. Lecture Outline  Precursor to MPLS  MPLS Definitions  The Forwarding Process  MPLS VPN  MPLS Traffic.
(Slide set by Norvald Stol/Steinar Bjørnstad
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
CS551: End to End Argument Saltzer88 Christos Papadopoulos (
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
MULTI-PROTOCOL LABEL SWITCHING By: By: YASHWANT.V YASHWANT.V ROLL NO:20 ROLL NO:20.
K. Salah1 Security Protocols in the Internet IPSec.
Multiprotocol Label Switching (MPLS) Routing algorithms provide support for performance goals – Distributed and dynamic React to congestion Load balance.
Multi-protocol Label Switching (MPLS) RFC 3031 MPLS provides new capabilities: QoS support Traffic engineering VPN Multiprotocol support.
Advanced Computer Networks
COMPUTER NETWORKS CS610 Lecture-21 Hammad Khalid Khan.
Chapter 4 Introduction to Network Layer
CS4470 Computer Networking Protocols
Chapter 4 Introduction to Network Layer
COMPUTER NETWORKS CS610 Lecture-29 Hammad Khalid Khan.
Presentation transcript:

Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008

Why Tunnel? Security –E.g., VPNs Flexibility –Topology –Protocol Bypassing local network engineers –Oppressive regimes: China, Pakistan, TS… Compatibility/Interoperability Dispersion/Logical grouping/Organization Reliability –Fast Reroute, Resilient Overlay Networks (Akamai SureRoute) Stability (“path pinning”) –E.g., for performance guarantees

MPLS Overview Main idea: Virtual circuit –Packets forwarded based only on circuit identifier Destination Source 1 Source 2 Router can forward traffic to the same destination on different interfaces/paths.

Circuit Abstraction: Label Swapping Label-switched paths (LSPs): Paths are “named” by the label at the path’s entry point At each hop, label determines: –Outgoing interface –New label to attach Label distribution protocol: responsible for disseminating signalling information A A 2D Tag Out New D

Layer 3 Virtual Private Networks Private communications over a public network A set of sites that are allowed to communicate with each other Defined by a set of administrative policies –determine both connectivity and QoS among sites –established by VPN customers –One way to implement: BGP/MPLS VPN mechanisms (RFC 2547)

Placement of Function “End to End Arguments in System Design” –One typically draws a box around the communication subsystemand defines an interface between it and the rest of the system –Once this boundary is defined, the question of where function should be placed is at the forefront The “End-to-End Argument” –Function can be completely implemented only with the help of the application –Dumb network, smart endpoints

Example: File Transfer Data could be corrupted or lost –In transit –At the receiver when read –In memory Where should the checks for correct transmission be performed? –E2E argument says that the application should be the one to perform these checks (e.g., at the application layer)

Examples of Applying E2E Delivery guarantees –Application may not only need to know that a message was received, but also that the receiver acted on the message Secure transmission of data –Network elements that transmit data must be trusted to securely manage keys, etc. –Authenticity of message must still be checked by application –Upshot: communicating subsystem does not need to provide management for all traffic

More Examples Duplicate message suppression –Where should duplicates be supressed? In-order message delivery