Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.

Slides:



Advertisements
Similar presentations
Internetworking II: MPLS, Security, and Traffic Engineering
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Professor Yashar Ganjali Department of Computer Science University of Toronto
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
CS 457 – Lecture 16 Global Internet - BGP Spring 2012.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
CS 4700 / CS 5700 Network Fundamentals Lecture 15: NAT (You Better Forward Those Ports) Revised 3/9/2013.
CSCI 4550/8556 Computer Networks Comer, Chapter 18: IP: Internet Protocol Addresses.
Overlay Networks Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
IP: The Internet Protocol
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Middleboxes and Tunneling Reading: Sect 8.5, 9.4.1, 4.5 COS 461: Computer Networks Spring 2011 Mike Freedman
15-441: Computer Networking Lecture 26: Networking Future.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
1 Overlay Networks Reading: 9.4 COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
1 Overlay Networks Reading: 9.4 COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Jennifer Rexford Teaching Assistant: Ioannis Avramopoulos.
IPv6 and Overlays EE122 Introduction to Communication Networks Discussion Section.
New Routing Architectures Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
Link-State Routing Reading: Sections 4.2 and COS 461: Computer Networks Spring 2011 Mike Freedman
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
IP ANYCAST and MULTICAST;
Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman Teaching Assistants: Wyatt.
Multipath Routing Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Stub.
1 CSCI 6433 Internet Protocols Class 7 Dave Roberts.
CS An Overlay Routing Scheme For Moving Large Files Su Zhang Kai Xu.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
Chapter 4, slide: 1 Chapter 4: Network Layer r Introduction r IP: Internet Protocol  IPv4 addressing  NAT  IPv6 r Routing algorithms  Link state 
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
OVERVIEW Lecture 6 Overlay Networks. 2 Focus at the application level.
Vytautas Valancius, Nick Feamster, Akihiro Nakao, and Jennifer Rexford.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
CIS679: Multicast and Multimedia (more) r Review of Last Lecture r More about Multicast.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 20 Omar Meqdadi Department of Computer Science and Software Engineering University.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
1 Overlay Networks. 2 Routing overlays –Experimental versions of IP (e.g., 6Bone) –Multicast (e.g., MBone and end-system multicast) –Robust routing (e.g.,
Peer-peer and Application-level Networking CS 218 Fall 2003 Multicast Overlays P2P applications Napster, Gnutella, Robust Overlay Networks Distributed.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 39 How Multicast IP and MBone Work.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
4: Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
SUBJECT NAME: COMPUTER NETWORKS –II SUBJECT CODE: 10CS63.
CS 3700 Networks and Distributed Systems
CIS 700-5: The Design and Implementation of Cloud Networks
Scaling the Network: The Internet Protocol
Managing Online Services
CPE 401/601 Computer Network Systems
COS 561: Advanced Computer Networks
Lecture 6 Overlay Networks
Scaling the Network: The Internet Protocol
Lecture 6 Overlay Networks
EE 122: Lecture 22 (Overlay Networks)
Presentation transcript:

Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford

Goals of Today’s Lecture r Motivations for overlay networks m Incremental deployment of new protocols m Customized routing and forwarding solutions r Overlays for partial deployments m 6Bone, Mbone, security, mobility, … r Resilient Overlay Network (RON) m Adaptive routing through intermediate node r Distributed Hash Table (DHT) m Overlay for look-up of pairs 2

Overlay Networks 3

4

5 Focus at the application level

IP Tunneling to Build Overlay Links r IP tunnel is a virtual point-to-point link m Illusion of a direct link between two separated nodes r Encapsulation of the packet inside an IP datagram m Node B sends a packet to node E m … containing another packet as the payload 6 A B E F tunnel Logical view: Physical view: A B E F

Tunnels Between End Hosts 7 A C B Src: A Dest: B Src: A Dest: B Src: A Dest: C Src: A Dest: B Src: C Dest: B

Overlay Networks r A logical network built on top of a physical network m Overlay links are tunnels through the underlying network r Many logical networks may coexist at once m Over the same underlying network m And providing its own particular service r Nodes are often end hosts m Acting as intermediate nodes that forward traffic m Providing a service, such as access to files r Who controls the nodes providing service? m The party providing the service m Distributed collection of end users 8

Overlays for Incremental Deployment 9

Using Overlays to Evolve the Internet r Internet needs to evolve m IPv6 m Security m Mobility m Multicast r But, global change is hard m Coordination with many ASes m “Flag day” to deploy and enable the technology r Instead, better to incrementally deploy m And find ways to bridge deployment gaps 10

6Bone: Deploying IPv6 over IP4 11 A B E F IPv6 tunnel Logical view: Physical view: A B E F IPv6 C D IPv4 Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F data Src:B Dest: E A-to-B: IPv6 E-to-F: IPv6 B-to-C: IPv6 inside IPv4 B-to-C: IPv6 inside IPv4

Secure Communication Over Insecure Links r Encrypt packets at entry and decrypt at exit r Eavesdropper cannot snoop the data r … or determine the real source and destination 12

Communicating With Mobile Users r A mobile user changes locations frequently m So, the IP address of the machine changes often r The user wants applications to continue running m So, the change in IP address needs to be hidden r Solution: fixed gateway forwards packets m Gateway has a fixed IP address m … and keeps track of the mobile’s address changes 13 gateway

IP Multicast r Multicast m Delivering the same data to many receivers m Avoiding sending the same data many times r IP multicast m Special addressing, forwarding, and routing schemes m Pretty complicated stuff (see Section 4.4) 14 unicastmulticast

MBone: Multicast Backbone r A catch-22 for deploying multicast m Router vendors wouldn’t support IP multicast m … since they weren’t sure anyone would use it m And, since it didn’t exist, nobody was using it r Idea: software implementing multicast protocols m And unicast tunnels to traverse non-participants 15

Multicast Today r Mbone applications starting in early 1990s m Primarily video conferencing, but no longer operational r Still many challenges to deploying IP multicast m Security vulnerabilities, business models, … r Application-layer multicast is more prevalent m Tree of servers delivering the content m Collection of end hosts cooperating to delivery video r Some multicast within individual ASes m Financial sector: stock tickers m Within campuses or broadband networks: TV shows m Backbone networks: IPTV 16

Case Study: Resilient Overlay Networks 17

RON: Resilient Overlay Networks 18 Premise: by building application overlay network, can increase performance and reliability of routing Two-hop (application-level) Berkeley-to-Princeton route application-layer router Princeton Yale Berkeley UNR

RON Circumvents Policy Restrictions r IP routing depends on AS routing policies m But hosts may pick paths that circumvent policies 19 USLEC PU Patriot ISP me My home computer

RON Adapts to Network Conditions r Start experiencing bad performance m Then, start forwarding through intermediate host 20 A C B

RON Customizes to Applications r VoIP traffic: low-latency path r Bulk transfer: high-bandwidth path 21 A C B voice bulk transfer

How Does RON Work? r Keeping it small to avoid scaling problems m A few friends who want better service m Just for their communication with each other m E.g., VoIP, gaming, collaborative work, etc. r Send probes between each pair of hosts 22 A C B

How Does RON Work? r Exchange the results of the probes m Each host shares results with every other host m Essentially running a link-state protocol! m So, every host knows the performance properties r Forward through intermediate host when needed 23 A C B B

RON Works in Practice r Faster reaction to failure m RON reacts in a few seconds m BGP sometimes takes a few minutes r Single-hop indirect routing m No need to go through many intermediate hosts m One extra hop circumvents the problems r Better end-to-end paths m Circumventing routing policy restrictions m Sometimes the RON paths are actually shorter 24

RON Limited to Small Deployments r Extra latency through intermediate hops m Software delays for packet forwarding m Propagation delay across the access link r Overhead on the intermediate node m Imposing CPU and I/O load on the host m Consuming bandwidth on the access link r Overhead for probing the virtual links m Bandwidth consumed by frequent probes m Trade-off between probe overhead and detection speed r Possibility of causing instability m Moving traffic in response to poor performance m May lead to congestion on the new paths 25