FINAL EXAM TUE 5/16 MRST 132 10:30 - 12.30 - open book/open notes - 25% of final grade - off campus students will receive exam by postal mail.

Slides:



Advertisements
Similar presentations
My Experience Writing an NSF NeTS FIND Proposal Nick Feamster Georgia Tech.
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
The Impact of Policy and Topology on Internet Routing Convergence NANOG 20 October 23, 2000 Abha Ahuja InterNap *In collaboration with.
Modeling Inter-Domain Routing Protocol Dynamics ISMA 2000 December 6, 2000 In collaboration with Abha, Ahuja, Roger Wattenhofer, Srinivasan Venkatachary,
IT’S HERE Bandwidth Technologies. Agenda Technologies for Bandwidth –Single Location DSL/Cable T1/Bonded T1 DS3/OC-N Ethernet Over Copper (EoC, EoFM)
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
Advanced Networks 1. Delayed Internet Routing Convergence 2. The Impact of Internet Policy and Topology on Delayed Routing Convergence.
Delayed Internet Routing Convergence Craig Labovitz, Microsoft Research Abha Ahuja, University of Michigan Farnam Jahanian, University of Michigan Abhit.
1 Experimental Study of Internet Stability and Wide-Area Backbone Failure Craig Labovitz, Abha Ahuja Merit Network, Inc Presented by Changchun Zou.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Next Step In Signaling (NSIS) and Internet Routing Dynamics Charles Shen and Henning Columbia University in the City of New York Internet.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
NetQuest: A Flexible Framework for Internet Measurement Lili Qiu Joint work with Mike Dahlin, Harrick Vin, and Yin Zhang UT Austin.
(c) Anirban Banerjee, Winter 2005, CS-240, 2/1/2005. The Impact of Internet Policy and Topology on Delayed Routing convergence C. Labovitz, A. Ahuja, R.
Part III: Overlays, peer-to-peer
Delayed Internet Routing Convergence Craig Labovitz, Abha Ahuja, Abhijit Bose, Farham Jahanian Presented By Harpal Singh Bassali.
Dynamics of Hot-Potato Routing in IP Networks Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Routing.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
1 Understanding Route Redistribution ICNP 2007 October 17 th, 2007 Franck Le, Geoffrey G. Xie, Hui Zhang.
1 Autonomous Systems An autonomous system is a region of the Internet that is administered by a single entity. Examples of autonomous regions are: UVA’s.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
A Flexible Model for Resource Management in Virtual Private Networks Sanket Naik CS590F Fall 2000.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
© 2009 Cisco Systems, Inc. All rights reserved.ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Planning the Enterprise-to-ISP Connection.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
Network Sensitivity to Hot-Potato Disruptions Renata Teixeira (UC San Diego) with Aman Shaikh (AT&T), Tim Griffin(Intel),
Authors Renata Teixeira, Aman Shaikh and Jennifer Rexford(AT&T), Tim Griffin(Intel) Presenter : Farrukh Shahzad.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
CustomerSegment and workloads Your Datacenter Active Directory SharePoint SQL Server.
1 A Method to Manage the Corporate WAN Jim Martin Assistant Professor of Computer Science Clemson University
EMEA Partners XTM Network Training
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Mar 1, 2004 Multi-path Routing CSE 525 Course Presentation Dhanashri Kelkar Department of Computer Science and Engineering OGI School of Science and Engineering.
RON: Resilient Overlay Networks David Andersen, Hari Balakrishnan, Frans Kaashoek, Robert Morris MIT Laboratory for Computer Science
RON: Resilient Overlay Networks David Andersen, Hari Balakrishnan, Frans Kaashoek, Robert Morris MIT Laboratory for Computer Science
Yu-Liang Liu1 On the Bandwidth Management for Hose-Model VPN Service GRADUATE INSTITUTE OF INFORMATION MANAGEMENT NATIONAL TAIWAN UNIVERSITY.
Routing/Routed Protocols Part I. Routed Protocol Definition: Routed Protocol – used to transmit user data (packets) through an internetwork. Routed protocols.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
Resilient Overlay Networks By David Andersen, Hari Balakrishnan, Frans Kaashoek, and Robert Morris MIT RON Paper from ACM Oct Advanced Operating.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Static Call Admission Control and Dimensioning of Media Gateways in IP based Mobile Core Networks Mika.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
4.1.4 multi-homing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Presented By: Gavin Worden Leased Lines vs. Internet Based VPNs.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance Feng Wang 1, Zhuoqing Morley Mao 2 Jia Wang 3, Lixin Gao 1,
A survey of Internet routing reliability Presented by Kundan Singh IRT internal talk April 9, 2003.
COMPUTER NETWORKS CS610 Lecture-20 Hammad Khalid Khan.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
HIP-Based NAT Traversal in P2P-Environments
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Instructor Materials Chapter 1: LAN Design
Abha Ahuja InterNap Craig Labovitz Microsoft Research
Routing/Routed Protocols
AP Functional Requirement Initiatives for WLAN Broadcasting
Prepare Question Answers Exam Dumps - Dumps4Download.us
Presentation transcript:

FINAL EXAM TUE 5/16 MRST : open book/open notes - 25% of final grade - off campus students will receive exam by postal mail

A FLEXIBLE MODEL FOR RESOURCE MANAGEMENT IN VIRTAL PRIVATE NETWORKS N.Duffield, P.Goyal …. Proc. of ACM SIGCOMM’99

What are Virtual Private Networks? Virtual network that allows secure association between end points Features -security -performance isolation -guaranteed bandwidth, loss, delay =>logically similar to a private leased line. A B

VPNs for Multiple Endpoints - Large customers => multiple end points - Users are unwilling to specify point-to-point bandwidth matrix. - No multiplexing gains.

VPNs with Multiple Endpoints Organizations with multiple branch offices need VPNs with multiple end points Customer Pipe Model Branch B Branch A Branch C service provider’s IP

VPNs with the Hose Model - customer-pipes - endpoints Branch B Branch A Branch CA in/out B in/out C in/out

Hose Model Advantages -Ease of specification -Flexibility -Multiplexing gain -Characterization -Statistical Multiplexing gains -Resizing

Implementation scenarios -Provisioned VPNs -Dynamically Resized VPNs -study workload -resize 1 B A 3 2 G F E D C

AN EXPERIMENTAL STUDY OF INTERNET ROUTING CONVERGENCE C.Labovitz, A Ahuja, A.Bose, F.Jahanian Proc. Of SIGCOM 2000, Stockholm, Sweden

Motivation -Study impact of path failures, failovers and repairs on inter-domain routing convergence -Telephone network: failover takes milliseconds -Internet: failover takes several minutes -Why does convergence take this long?

Methodology -Fault injection at probe points -Monitor (passively) major exchange points Collect data FI server AS Internet ISP6 ISP4 ISP3 BGP Upstream ISP BGP fault Upstream ISP Fault = routing failures, repairs, multihome failures

Key Results -BGP uses path vectors => eliminate count to infinite problem. BUT increases possibility of oscillations -Avg failover time  3 mm(15 min in some cases) -theoretical upper bound on convergence # of states explored O(e(n-1)!); n = #AS -Lower bound  ((n-3)*30)sec,O(n) states. -Reason interactions of protocol timers -Impact:loss rate increases by factor of 30, latency by factor of 4 -Minor implementation changes can reduce bounds