Reconciling Zero-conf with Efficiency in Enterprises

Slides:



Advertisements
Similar presentations
Interconnection: Switching and Bridging CS 4251: Computer Networking II Nick Feamster Fall 2008.
Advertisements

Shortest Path Bridging IEEE 802
Overlay Transport Virtualization (OTV)
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Introduction into VXLAN Russian IPv6 day June 6 th, 2012 Frank Laforsch Systems Engineer, EMEA
Mobility Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Revisiting Ethernet: Plug-and-play made scalable and efficient Changhoon Kim, and Jennifer Rexford Princeton University.
Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Chang Kim, and Jennifer Rexford Princeton.
Revisiting Ethernet: Plug-and-play made scalable and efficient Changhoon Kim and Jennifer Rexford Princeton University.
Projects Related to Coronet Jennifer Rexford Princeton University
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Tesseract A 4D Network Control Plane
Course 301 – Secured Network Deployment and IPSec VPN
COS 461: Computer Networks
Backbone Support for Host Mobility: A Joint ORBIT/VINI Experiment Jennifer Rexford Princeton University Joint work with the ORBIT team (Rutgers) and Andy.
A Scalable, Commodity Data Center Network Architecture.
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Chapter 4: Managing LAN Traffic
Hosting Virtual Networks on Commodity Hardware VINI Summer Camp.
Homework Assignment #1 1. Homework Assignment Part 1: LAN setup –All nodes are hosts (including middle nodes) –Each link is its own LAN, with its own.
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
Network Admin Course Plan Accede Institute Of Science & Technology.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
“Hashing Out” the Future of Enterprise and Data-Center Networks Jennifer Rexford Princeton University Joint with Changhoon.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Routing, VLANs and Network Segmentation. Nick Rowlett Technology Director – Sparta Schools Cisco Certified Network Administrator Microsoft Certified System.
Spanning Tree V1.2 Slide 1 of 1 Purpose:
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
1 Lecture, November 20, 2002 Message Delivery to Processes Internet Addressing Address resolution protocol (ARP) Dynamic host reconfiguration protocol.
VS (Virtual Subnet) draft-xu-virtual-subnet-03 Xiaohu Xu IETF 79, Beijing.
EVPN: Or how I learned to stop worrying and love the BGP
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
EVPN: Or how I learned to stop worrying and love the BGP Tom Dwyer, JNCIE-ENT #424 Clay Haynes, JNCIE-SEC # 69 JNCIE-ENT # 492.
Data Center Architectures
Computer Communication Networks
Multi Node Label Routing – A layer 2.5 routing protocol
Large-scale (Campus) Lan design (Part II)
Link Layer 5.1 Introduction and services
Routing Jennifer Rexford.
ETHANE: TAKING CONTROL OF THE ENTERPRISE
CS4470 Computer Networking Protocols
Revisiting Ethernet: Plug-and-play made scalable and efficient
MAC Addresses and ARP 32-bit IP address:
Chapter 4 Data Link Layer Switching
DCI using TRILL Kingston Smiler, Mohammed Umair, Shaji Ravindranathan,
TRILL MPLS-Based Ethernet VPN
IS3120 Network Communications Infrastructure
Hubs Hubs are essentially physical-layer repeaters:
CS 457 – Lecture 10 Internetworking and IP
An introduction to the organization of the Internet Lab
VL2: A Scalable and Flexible Data Center Network
Dr. Rocky K. C. Chang 23 February 2004
Internet Protocol, Version 6 (IPv6)
An introduction to the organization of the Internet Lab
Revisiting Ethernet: Plug-and-play made scalable and efficient
Other Routing Protocols
IS-IS VPLS for Data Center Network draft-xu-l2vpn-vpls-isis-02
Chapter 5 The Network Layer.
Mobile IP-2 CS441 – Mobile & Wireless Computing
Presentation transcript:

Reconciling Zero-conf with Efficiency in Enterprises Changhoon Kim and Jennifer Rexford Princeton University 1. State of the Art and Motivation Enterprise networks comprised of Ethernet-based IP subnets interconnected by routers Recent challenges Very large and highly populated Ethernet segments (e.g., campus-wide WLAN) Wide deployment of light bridges (e.g., wireless APs) Sometimes incapable of bridging, STP, VLAN, etc. Increasing demand of mobility Increasing complexity and inefficiency of IP address management (even with DHCP) Need for MAC-based access control Neither IP routing nor Ethernet bridging suffices Mechanisms Features Ethernet Bridging IP Routing Ease of Configuration Good Poor Mobility Addressing Optimality Path Optimality Load Distribution Tolerance to Loop Convergence Speed IEEE 802.1D Ethernet Bridging - Flat addressing - Self-learning - Flooding - STP C A IP Routing - Hierarchical addressing - Shortest path routing - Subnet configuration - Host configuration E B D Can’t we just take best parts of each? 2. Solution: SEIZE (Scalable and Efficient Zero-config Enterprise) Addressing and packet format: IEEE 802 Ethernet Mobility and minimal configuration via flat addressing Backward compatibility (including VLAN support) IP address provides external connectivity and application compatibility Core connectivity dissemination: Link-state protocol Efficient resource utilization via pair-wise shortest paths and load distribution Scalability Fast convergence End-host information dissemination: Consistent hash Scalability and stability via on-demand binding of host address and location Resistant to high churn rate O (1) look-up via link-state core 2.5 Delivery to x 3.2 Optimized tunneling directly from E to A y x C 1.1 Host discovery or active registration 2.1 Traffic to x A 2.4 Tunneling to egress node, A 1.2 Hashing (H(x) = B) 2.3 Hash-based routing to the relay node, B 2.2 Hashing (H(x) = B) E Link-state core Entire enterprise - A large single IP subnet (e.g., 10.1.0.0/16) 3.1 Notifying <x, A> to E B Network Node (MAC addr. = A) 1.3 Storing <x, A> at B D A 10.1.1.62 End-host (MAC addr. = x) x q p Control flow 10.1.2.17 Unique and location-independent IP addresses that do NOT belong to a specific subnet Data flow 10.1.3.45 3. Design Options 5. Prototyping and Evaluation Packet delivery mode Relayed or Direct Packet delivery mechanics Tunneling or Label swapping Label swapping borrows src MAC field to contain dst MAC End-host discovery “Discover-from-data” or Active registration ARP and DHCP Broadcasting or CHash-based proxy resolution Overloading DHCP for host discovery Intelligent broadcasting A sequence of unicasts along spanning tree Native Prototype Control plane XORP OSPF daemon Data plane Click EtherSwitch elements with some SEIZE extensions Overlay Prototype Wide-area virtual enterprises SIAS (SEIZE-In-A-Slice) Another VINI instance Data plane IP-encapsulated Ethernet frames Click EtherSwitch and IPRouter elements with SEIZE extensions Evaluation Modeling and analyzing host information caching behavior Simulation with ns-click Emulation on Emulab or PlanetLab Intra-enterprise/campus traffic dumps (just headers) are welcome! Click XORP IS-IS/OSPF SEIZE Switch CHash Rings HostInfo Store LS msgs Host info. query and registration msgs Data frames 4. Further Applications Load sensitive routing E.g., Selective application of VLB (Valiant Load Balancing) Service mobility Relay node masks hand off Src MAC-based reachability control Path obfuscation or anonymization Topology does not reveal actual data paths