15-441: Computer Networking Lecture 26: Networking Future.

Slides:



Advertisements
Similar presentations
Internet Indirection Infrastructure (i3 ) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002 Presented by:
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Internetworking II: MPLS, Security, and Traffic Engineering
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Distributed Denial of Service Attacks: Characterization and Defense Will Lefevers CS522 UCCS.
Application layer (continued) Week 4 – Lecture 2.
School of Information Technologies Internet Multicasting NETS3303/3603 Week 10.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
CSE331: Introduction to Networks and Security Lecture 14 Fall 2002.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Computer Networking Lecture 24 – Multicast.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
15-744: Computer Networking L-23 Security. L -23; © Srinivasan Seshan, Security Denial of service IPSec Firewalls Assigned reading [SWKA00]
Wolfgang EffelsbergUniversity of Mannheim1 Multicast IP Wolfgang Effelsberg University of Mannheim September 2001.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing and Routing Protocols Dynamic Routing Overview.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
End-to-end resource management in DiffServ Networks –DiffServ focuses on singal domain –Users want end-to-end services –No consensus at this time –Two.
Our Last Class!!  summary  what does the future look like?
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
CS 268: Overlay Networks: Introduction and Multicast Ion Stoica April 15-17, 2003.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
Static versus Dynamic Routes Static Route Uses a protocol route that a network administrators enters into the router Static Route Uses a protocol route.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Lecture 4: Sun: 23/4/1435 Distributed Operating Systems Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
MPLS Concepts Introducing Basic MPLS Concepts. Outline Overview What Are the Foundations of Traditional IP Routing? Basic MPLS Features Benefits of MPLS.
Network Layer (OSI and TCP/IP) Lecture 9, May 2, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
15-744: Computer Networking L-17 Security. L -17; © Srinivasan Seshan, Security Denial of service IPSec Firewalls Assigned reading [SWKA00]
Overlay Networks and Overlay Multicast May Definition  Network -defines addressing, routing, and service model for communication between hosts.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Challenges in the Next Generation Internet Xin Yuan Department of Computer Science Florida State University
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Chapter 5 The Network Layer.
15-744: Computer Networking
Overlay Networking Overview.
Dynamic Routing and OSPF
Lecture 6 Overlay Networks
588 Section 8 Neil Spring May 25, 1999.
Lecture 6 Overlay Networks
EE 122: Lecture 22 (Overlay Networks)
IP Multicast COSC /5/2019.
Presentation transcript:

15-441: Computer Networking Lecture 26: Networking Future

Lecture 26: Overview Learning From Failures Changes in Various Layers New Services What Do I Work On?

Lecture 26: Learning From Failures Past failures Multicast QoS MobileIP

Lecture 26: Why Did They Fail? Scalability problems Incremental deployment Interfacing with applications/Building useful services Debugging problems Conservative network administrators

Lecture 26: What Can We Learn? Avoid same pitfalls Clever techniques Fair queuing, announce/suppress protocols, tunneling/encapsulation, etc.

Lecture 26: Overview Learning From Failures Changes in Various Layers New Services What Do I Work On?

Lecture 26: Link Layer Optical links Multiple wavelengths on a single fiber (WDM) MPLS applied to wavelengths  MPλS No longer broadcast All optical networks No buffering!!  How does this affect other protocols Mobile/wireless links

Lecture 26: Overlay Routing Basic idea: Treat multiple hops through IP network as one hop in overlay network Run routing protocol on overlay nodes Why? For performance – can run more clever protocol on overlay For efficiency – can make core routers very simple For functionality – can provide new features such as multicast, active processing, IPv6

Lecture 26: IP Multicast Key Architectural Decision: Add support for multicast in IP layer Berkeley Gatech Stanford CMU

Lecture 26: Overlay Multicast Stanford Overlay Tree CMU Stan-LAN Stan-Modem Berk2 Gatech Berk1 Berkeley Gatech Stan-LAN Stan-Modem Berk1 Berk2 CMU

Lecture 26: Overlay Challenges “Routers” no longer have complete knowledge about link they are responsible for How do you build efficient overlay Probably don’t want all N 2 links – which links to create? Without direct knowledge of underlying topology how to know what’s nearby and what is efficient?

Lecture 26: Congestion Control Is AIMD the right choice for everyone? What are the requirements on choices  TCP- friendliness Non-linear controls Rate-based controls Fixing poor interaction with HTTP

Lecture 26: Denial of Service Objective of attack: make a service unusable, usually by overloading the server or network Example: SYN flooding attack Send SYN packets with bogus source address Server responds with SYNACK keeps state about TCP half-open connection Eventually server memory is exhausted with this state Solution: SYN cookies – make the SYNACK contents purely a function of SYN contents, therefore, it can be recomputed on reception of next ACK More recent attacks have used bandwidth floods How do we stop these?

Lecture 26: Bandwidth DoS Attacks Possible solutions Ingress filtering – examine packets to identify bogus source addresses Link testing – how routers either explicitly identify which hops are involved in attack or use controlled flooding and a network map to perturb attack traffic Logging – log packets at key routers and post-process to identify attacker’s path ICMP traceback – sample occasional packets and copy path info into special ICMP messages IP traceback

Lecture 26: Overview Learning From Failures Changes in Various Layers New Services What Do I Work On?

Lecture 26: Network Location Service Desirable to lookup performance between hosts Why? How to predict? Based on historical measurements Based on on-demand probing What exactly is performance? Bandwidth Delay Application response

Lecture 26: Services For Mobile Users Why? (Example) Mobile users are more likely to search for services near them Not well suited to administratively organized Internet systems Example Build a wide area service discovery that can support multiple search styles

Lecture 26: Overview Learning From Failures Changes in Various Layers New Services What Do I Work On?

Lecture 26: Three Project Areas Congestion Control Solving interaction between HTTP and TCP Using congestion control to implement QoS Mobile Networking Making protocols adapt to dynamic conditions Helping “ubiquitous” networks evolve Sensor networks Wide-Area Distributed Applications Tools to help developers build large distributed applications Overlay multicast