3-1 Design Principles Goals: r identify, study common architectural components, protocol mechanisms r what approaches do we find in network architectures?

Slides:



Advertisements
Similar presentations
MCT620 – Distributed Systems
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Network Layer Delivery Forwarding and Routing
Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Virtual Trunk Protocol
Multihoming and Multi-path Routing
Virtual Links: VLANs and Tunneling
Multihoming and Multi-path Routing
1 Hyades Command Routing Message flow and data translation.
Communicating over the Network
Database Systems: Design, Implementation, and Management
1 IP - The Internet Protocol Relates to Lab 2. A module on the Internet Protocol.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
1 Chapter One Introduction to Computer Networks and Data Communications.
Text has no relevant information
Chapter 1: Introduction to Scaling Networks
Networks: Introduction 1 CS4514 Computer Networks Term B06 Professor Bob Kinicki.
Local Area Networks - Internetworking
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
1 Wireless and Mobile Networks Part 2 November 25, 2008 Department of Electrical and Computer Engineering University of Western Ontario ECE 436a Networking:
1 Internet Protocol: Routing IP Datagrams D. E. Comer, “Internetworking with TCP/IP: Principles, Protocols and Architectures”, Ch. 8, Prentice Hall, 2000.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
1 Introduction to Network Layer Lesson 09 NETS2150/2850 School of Information Technologies.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
Global Analysis and Distributed Systems Software Architecture Lecture # 5-6.
Chapter 9: Subnetting IP Networks
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Connecting LANs, Backbone Networks, and Virtual LANs
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
11-1 Last time □ Distance vector link cost changes ♦ Count-to-infinity, poisoned reverse □ Hierarchical routing ♦ Autonomous Systems ♦ Inter-AS, Intra-AS.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IP over ATM Integrated Network Services Almerindo Graziano.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
5: DataLink Layer5-1 Asynchronous Transfer Mode: ATM r 1990’s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service.
5: DataLink Layer ATM. Trouble compiling the project code on Ubuntu: r If you get the error: h_addr not a member of struct hostent In the file.
1 ATM and MPLS ECS 152A. 2 Virtualization of networks Virtualization of resources: a powerful abstraction in systems engineering: r computing examples:
3-1 Part 1: Design Principles Goals: r identify, study common architectural components, protocol mechanisms r what approaches do we find in network architectures?
Lecture 8 Modeling & Simulation of Communication Networks.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
Chapter 4: Managing LAN Traffic
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 0 TCP/IP Overview.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Introduction 1 Lecture 26 Link Layer (PPP, Virtualization) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
5: DataLink Layer5-1 Point to Point Data Link Control r one sender, one receiver, one link: easier than broadcast link: m no Media Access Control m no.
Peer-peer and Application-level Networking CS 218 Fall 2003 Multicast Overlays P2P applications Napster, Gnutella, Robust Overlay Networks Distributed.
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
Computer Communication Networks
Virtualization of networks
A quick intro to networking
Scaling the Network: The Internet Protocol
Course Review 2015 Computer networks 赵振刚
Scaling the Network: The Internet Protocol
Hari Balakrishnan Hari Balakrishnan Computer Networks
Presentation transcript:

3-1 Design Principles Goals: r identify, study common architectural components, protocol mechanisms r what approaches do we find in network architectures? r synthesis: big picture design principles: r separation of data, control r hard state versus soft state ü randomization ü indirection r network virtualization: overlays r multiplexing r design for scale

3-2 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual memory, virtual devices m virtual machines: e.g., java m IBM VM os from 1960s/70s r layering of abstractions: dont sweat the details of the lower layer, only deal with lower layers abstractly

3-3 Examples r Connecting local heterogeneous networks r IP over ATM r Resilient overlay networks r VPN

3-4 The Internet: virturalizing local networks 1974: multiple unconnected networks m ARPAnet m data-over-cable networks m packet satellite network (Aloha) m packet radio network.. differing in: m addressing conventions m packet formats m error recovery m routing

3-5 Cerf & Kahn: Interconnecting two networks r …interconnection must preserve intact the internal operation of each network. r..the interface between networks must play a central role in the development of any network interconnection strategy. We give a special name to this interface that performs these functions and call it a GATEWAY. r.. prefer that the interface be as simple and reliable as possible, and deal primarily with passing data between networks that use different packet-switching strategies r …address formats is a problem between networks because the local network addresses of TCP's may vary substantially in format and size. A uniform internetwork TCP address space, understood by each GATEWAY and TCP, is essential to routing and delivery of internetwork packets. ARPAnet satellite net

3-6 Cerf & Kahn: Interconnecting two networks ARPAnet satellite net Gateway: r embed internetwork packets in local packet format or extract them r route (at internetwork level) to next gateway gateway Internetwork layer: r addressing: internetwork appears as a single, uniform entity, despite underlying local network heterogeneity r network of networks

3-7 Historical Aside: Proposed Internetwork packet in 1974: local header source address dest. address seq. # byte count flag field text checksum network TCP identifier 8 16

3-8 Cerf & Kahns Internetwork Architecture What is virtualized? r two layers of addressing: internetwork and local network r new layer makes everything homogeneous at internetwork layer r underlying local network technology (cable, satellite, 56K modem) is invisible at internetwork layer

3-9 IP-Over-ATM Classic IP only r 3 networks (e.g., LAN segments) r MAC (802.3) and IP addresses IP over ATM r replace network (e.g., LAN segment) with ATM network r ATM addresses, IP addresses ATM network Ethernet LANs Ethernet LANs

3-10 IP-Over-ATM AAL ATM phy Eth IP ATM phy ATM phy app transport IP AAL ATM phy app transport IP Eth phy

3-11 IP View of the world ATM network IP network

3-12 Classical IP-over ATM [RFC 1577] A B C D E R1 R2 LIS: logical IP subnet r end systems in same LIS have same IP network addr r LIS looks like a LAN r ATM net divided into multiple LIS r Intra-LIS communication via direct ATM connections m How to go from IP addr to ATM addr: ATMARP resolves IP addr to ATM addr (similar to ARP) LIS 1 LIS 2 LIS 3

3-13 Classical IP-over ATM [RFC 1577] A B C D E R1 R2 Inter-LIS communication: r source, dest. in different LIS r each LIS looks like a LAN r hop-by hop forwarding: m A-R1-R2-E LIS 1 LIS 2 LIS 3

3-14 NHRP (next hop resolution protocol) [RFC 2332] r source/dest. not in same LIS: ATMARP can not provide ATM dest. address r NHRP: resolve IP-to-ATM address of remote dest. m client queries local NHRP server m NHRP server routes NHRP request to next NHRP server m destination NHRP returns dest ATM address back through NHRP server chain (like routed DNS) r source can send directly to dest. using provided ATM address A B C D E NHRP server, S 1 LIS 1 LIS 2 LIS 3 NHRP server, S 2 NHRP server, S 3 ARP over multiple hops

3-15 IP-over-ATM: why? r because its there- use ATM network as a link-layer to connect IP routers r can manage traffic more carefully in ATM network (e.g., rate-limit source/dest pairs, provide CBR service) r leave IP untouched – leverage the fact that many users have IP addresses already

3-16 Resilient Overlay Networks Overlay network: r applications, running at various sites as nodes on an application-level network r create logical links (e.g., TCP or UDP connections) pairwise between each other r each logical link: multiple physical links, routing defined by native Internet routing

3-17 Overlay network

3-18 Overlay network Focus at the application level

3-19 Internet Routing r BGP defines routes between stub networks UCLA Noho.net Berkeley.net UMass.net Internet 2 Mediaone C&W

3-20 Internet Routing r BGP defines routes between stub networks UCLA Noho.net Berkeley.net UMass.net Internet 2 Mediaone C&W Noho-to-UMass

3-21 Internet Routing r BGP defines routes between stub networks UCLA Noho.net Berkeley.net UMass.net Internet 2 Mediaone C&W Noho-to-Berkeley

3-22 Internet Routing UCLA Noho.net Berkeley.net UMass.net Internet 2 Mediaone C&W Noho-to-Berkeley Congestion or failure: Noho to Berkely BGP- determined route may not change (or will change slowly)

3-23 Internet Routing UCLA Noho.net Berkeley.net UMass.net Internet 2 Mediaone C&W Noho-to-Berkeley Noho to UMass to Berkeley r route not visible or available via BGP! r MediaOne cant route to Berkeley via Internet2 Congestion or failure: Noho to Berkely BGP- determined route may not change (or will change slowly)

3-24 RON: Resilient Overlay Networks Premise: by building application overlay network, can increase performance, reliability of routing Two-hop (application-level) noho-to-Berkeley route application-layer router Virtualize the Internet! Layer 7 routing!

3-25 RON Experiments r measure loss, latency, and throughput with and without RON r 13 hosts in the US and Europe r 3 days of measurements from data collected in March 2001 r 30-minute average loss rates m A 30 minute outage is very serious! r Note: Experiments done with No- Internet2-for-commercial-use policy

3-26 An order-of-magnitude fewer failures % % % % % % RON Worse No Change RON Better Loss Rate 30-minute average loss rates 6,825 path hours represented here 12 path hours of essentially complete outage 76 path hours of TCP outage RON routed around all of these! One indirection hop provides almost all the benefit! 6,825 path hours represented here 12 path hours of essentially complete outage 76 path hours of TCP outage RON routed around all of these! One indirection hop provides almost all the benefit!

3-27 RON Research Issues how to design overlay networks? Measurement and self-configuration Fast fail-over Sophisticated metrics application-sensitive (e.g., delay versus throughput) path selection effect of RON on underlying network If everyone does RON, are we better off? Interacting levels of control (network- and application-layer routing

3-28 Virtual Private Networks (VPN) r SP infrastructure: m backbone m provider edge devices r Customer: m customer edge devices (communicating over shared backbone) Networks perceived as being private networks by customers using them, but built over shared infrastructure owned by service provider (SP) VPNs

3-29 VPN reference architecture customer edge device provider edge device

3-30 VPN: logical view customer edge device provider edge device virtual private network

3-31 Leased-line VPN customer sites interconnected via static virtual channels (e.g., ATM VCs), leased lines customer site connects to provider edge

3-32 Customer premise VPN customer sites interconnected via tunnels tunnels encrypted typically SP treats VPN packets like all other packets All VPN functions implemented by customer

3-33 Drawbacks r Leased-line VPN: configuration costs, maintainence by SP: long time, much manpower r CPE-based VPN: expertise by customer to acquire, configure, manage VPN Network-based VPN r customers routers connect to SP routers r SP routers maintain separate (independent) IP contexts for each VPN m sites can use private addressing m traffic from one vpn can not be injected into another

3-34 Network-based Layer 3 VPNs multiple virtual routers in single provider edge device

3-35 Tunneling

3-36 VPNs: why? r privacy r security r works well with mobility (looks like you are always at home) r cost: many forms of newer VPNs are cheaper than leased line VPNs m ability to share at lower layers even though logically separate means lower cost m exploit multiple paths, redundancy, fault-recovery in lower layers m Need isolation mechanisms to ensure resources shared appropriately r abstraction and manageability: all machines with addresses that are in are trusted no matter where they are