1 Internet Access Bandwidth Management at The University of Pennsylvania Deke Kassabian, Sr. Tech. Director University of Pennsylvania & The MAGPI GigaPoP.

Slides:



Advertisements
Similar presentations
2006 © SWITCH 1 TNC'06 Panel Presentation Myths about costs of circuit vs. packet switching Simon Leinen.
Advertisements

Chapter 9: Access Control Lists
IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.
Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
WAN design ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering Department Kasetsart.
Router Architecture : Building high-performance routers Ian Pratt
1 Some QoS Deployment Issues Shumon Huque University of Pennsylvania MAGPI GigaPoP April 15th NSF/ITR Scalable QoS Workshop.
RIT Campus Data Network. General Network Statistics Over 23,000 wired outlets Over 14,500 active switched ethernet ports > 250 network closets > 1,000.
1 Circuit Switching in the Core OpenArch April 5 th 2003 Nick McKeown Professor of Electrical Engineering and Computer Science, Stanford University
UW Campus Network Upgrade Terry Gray Director, Networks & Distributed Computing University of Washington Oct 12, Internet2 Meeting.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Stanford University August 22, 2001 TCP Switching: Exposing Circuits to IP Pablo Molinero-Fernández Nick McKeown Stanford University.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
Campus Networking Best Practices Session 2: Layer 3 Dale Smith University of Oregon & NSRC
Networking Components Chad Benedict – LTEC
Agenda Network Infrastructures LCG Architecture Management
Company and Product Overview Company Overview Mission Provide core routing technologies and solutions for next generation carrier networks Founded 1996.
Networking Components Christopher Biles LTEC Assignment 3.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Network Components: Assignment Three
Bandwidth in the Local and Wide Area Network Monmouth County Vocational Schools / Advanced Networking Program X.25 ATM 56k SONET T1/T3 OC 192 Gigabit Megabit.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1 Lecture #5 Access Control Lists (ACLs) Asst.Prof. Dr.Anan Phonphoem Department of Computer Engineering, Faculty of Engineering, Kasetsart University,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
Access Control List (ACL)
Subnetting When an organization is given a block of class A, B, or C address, the first address in the block defines the network address. This address.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Delivering Circuit Services to Researchers: The HOPI Testbed Rick Summerhill Director, Network Research, Architecture, and Technologies, Internet2 Joint.
Access Control List ACL’s 5/26/ What Is an ACL? An ACL is a sequential collection of permit or deny statements that apply to addresses or upper-layer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Inter VLAN routing W.lilakiatsakun. What is inter VLAN routing.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
Chapter 7 Backbone Network. Announcements and Outline Announcements Outline Backbone Network Components  Switches, Routers, Gateways Backbone Network.
Networking in the Real World Presentation for CS520 Ed Drouillard, IT Services, University of Windsor January 23, 2004.
Campus Case Studies in Implementing Advanced Services Cas D’Angelo
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Network Components By Cameron Baker.
Scalable Bandwidth on Demand: A New Model for the Era of Entitlement? Educause Mid-Atlantic Regional Conference January 17, 2003 Gregory D. Palmer Jennifer.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
Internet Connection Types Connect to the Internet through: –modemmodem –local-area networklocal-area network –cable modemcable modem –Digital Subscriber.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Akhyari Nasir.  Router-on-a-stick is a type of router configuration in which a single physical interface routes traffic between.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
1 Internet Bandwidth Management at The University of Pennsylvania Deke Kassabian, Sr. Tech. Director University of Pennsylvania & The MAGPI GigaPoP October.
Stanford University TCP Switching: Exposing circuits in the Internet Pablo Molinero-Fernández Nick McKeown Stanford University.
© 2001 Caspian Networks, Inc. CONFIDENTIAL AND PROPRIETARY INFORMATION Internet Intelligence and Traffic Growth Lawrence G. Roberts Chairman & CTO Caspian.
The Internet2 Network and LHC Rick Summerhill Director Network Research, Architecture, and Technologies Internet2 Given by Rich Carlson LHC Meeting 25.
If we don’t subnet and use as our subnet mask then we use all of our IP addresses on one network. This is not an efficient use of our Class.
The Internet2 Network and LHC Rick Summerhill Director Network Research, Architecture, and Technologies Internet2 LHC Meeting 23 October 2006 FERMI Lab,
Inter VLAN routing Ferry Astika Saputra.
Lab A: Planning an Installation
NET 3710 WAN Data Networks.
Computer Data Security & Privacy
About PennNet Redundant Gigabit Ethernet Core
Access Control Lists CCNA 2 v3 – Module 11
Outline Network characteristics that affect security
Networking and Telecommunications
Presentation transcript:

1 Internet Access Bandwidth Management at The University of Pennsylvania Deke Kassabian, Sr. Tech. Director University of Pennsylvania & The MAGPI GigaPoP May 7, Internet2 Members Meeting Campus Bandwidth Management BoF

2 Large research university in Philadelphia, PA 22,000 students, 4,000 faculty, 10,000 staff 48,000 registered IP addresses 200 switched subnets Central routing between them and out to Internet and Internet2 University of Pennsylvania network

3 MAGPI Bld 1Bld 2Bld 3Res 1Res 2 Subnets Campus Core Routers Core Switches Campus Edge Routers GigaPoP

4 MAGPI GigaPoP  Operational since 1997  Two Locations  Penn Campus and a local carrier hotel  Interconnect via both SONET and GigE  External Connectivity-  Internet2 - OC-12c POS to Abilene  Commodity Internet  UUNET: OC-3  Cogent: Gigabit Ethernet  Yipes: Gigabit Ethernet (rate limited)

5 MAGPI GigaPoP  Subscribers currently include  Penn, Lehigh, Princeton  J&J Pharmaceuticals  some PA county school units  A few Penn and Princeton affiliates (don’t get Internet2 access)  Other area universities coming online during summer 2002

6

7 Problem Statement Very high outbound bandwidth demand to the Internet and Internet2 Demand profile for residential building networks very different from academic and admin building networks

8 Some alternatives considered Get more bandwidth Manage existing bandwidth Application-port limiting or blocking Alter priority for some networks Per-user bit “budgets” Hard rate limits at wallplate jack Hard rate limits at campus edge

9 Why not a QoS Appliance? Extra equipment - cost, complexity, reliability Tough to place in highly redundant network with lots of links Rather not mess with TCP

10 What we did… Used our Juniper edge routers to limit outbound bandwidth available based on source address.

11 Implementation (1 of 3) Bandwidth limits apply to IP address ranges. Outbound direction only. Inbound unrestricted. Using “firewall” filters on Juniper routers. No limits apply on campus in either direction– users have full line rate.

12 Implementation (2 of 3) Two levels of limits apply (1) Limits for each group of users (2) An overall limit that applies to total residential traffic

13 Implementation (3 of 3) Initial implementation 4 Mb for use by 256 users (IP addresses) Next step - 2 Mb for 64 users Next step 1 Mb for 16 users Next step 800k for 8 users Eventual goal: 400k per user (per IP address) 200 Mb total limit applies for 6000 users

14 Status 1,792 address ranges specified on each Juniper router Penn connects to MAGPI gigaPoP Each range includes exactly 8 IP addresses Each range gets 800 Kbps, with some burst capacity Halving the range doubles the number of filters. We’ll need 14,336 ranges (too many!) per router…. But Juniper promises some efficiencies in later JunOS that will ease this complexity. Limits today apply to both Internet-bound and Internet2-bound traffic.

15 End user reaction Initial concern that the fix would be worse than the problem Users agreed to participate in testing at each step, and to report results Most admit that performance for typical activities has improved Non-residential users see major improvements Nobody complains anymore

16 Next steps Continue to reduce the range of addresses in each bandwidth-limited group Redesign campus-to-gigaPoP connectivity to allow the limits to apply for commodity Internet only (leaving Internet2 alone)

17 Conclusion Penn’s bandwidth management approach works for today’s situation No extra hardware No staff time on changing rules Moving to finer grain control Exploring approaches to removing Internet2 from limits