WAIL By: - Dave Plonka - Ana Bizarro Wisconsin Advanced Internet Laboratory - WAIL.

Slides:



Advertisements
Similar presentations
Chapter 1: Introduction to Scaling Networks
Advertisements

LAN Segmentation Virtual LAN (VLAN).
HetnetIP Ethernet BackHaul Configuration Automation Demo.
Virtual LANs.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Ver 1,12/09/2012Kode :CIJ 340,Jaringan Komputer Lanjut FASILKOM Routing Protocols and Concepts – Chapter 2 Static Routing CCNA.
2004 Cross-Platform Automated Regression Test Framework Ramkumar Ramalingam, Rispna Jain IBM Software Labs, India.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
Internet Measurement Initiatives in the Wisconsin Advanced Internet Lab Paul Barford Computer Science Department University of Wisconsin – Madison Spring,
Middleware for Building Adaptive Systems Via Configuration An SAIC Company S. Narain R. Vaidyanathan S. Moyer A. Shareef K. Parmeswaran Internet Architecture.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, Y. Richard Yang Laboratory of Networked Systems Yale University.
INE 3010Lab. National NSP Regional NSP Internet Exchange IX / NAP.
PIX Firewall. Stateful Packet Filter Runs on its own Operating System Assigning varying security levels to interfaces (0 – 100) Access Control Lists Extensive.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 1 WANs and Routers.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
Wei Hong January 16, 2003 Overview of the Generic Sensor Kit (GSK)
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
CPIT 470 Lab 2 Lab Instructor: Aisha Ehsan.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 5 WANs and Routers/ Introduction to Routers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Static Routing Routing Protocols and Concepts – Chapter 2.
IPv6 Deployment Plan The Global IPv6 Summit 2001.
Network Transition Matt Zekauskas Internet2 Community Design Workshop 15, 16 June 2006 Indianapolis, IN.
CCNA Journal Sample. Index Basic Ethernet Serial Router Rip.
Implementing Network Access Protection
Virtual Networking. Module Objectives By the end of this module participants will be able to: Understand the use of virtual LANs Create VLAN subinterfaces.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 1 WANs and Routers.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Guide to TCP/IP Fourth Edition Chapter 11: Deploying IPv6.
AANTS: Web-Based Tools for Cooperative Campus Network Administration Charles Thomas Dave Plonka AANTS Administration Team Division of Info. Tech. (DoIT)
Internet2 Performance Update Jeff W. Boote Senior Network Software Engineer Internet2.
© Synergon Informatika Rt., 1999 Chapter 12 Connecting Enterprises to an Internet Service Provider.
Module 4: Learning about Other Devices These Labs can be performed using the following topology or using the ones in the lab books: Creating a Network.
Cisco Discovery Protocol. CDP and Router Boot Up When a Cisco device boots up, CDP starts up automatically and allows the device to detect neighbor devices.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Metadata Management of Terabyte Datasets from an IP Backbone Network: Experience and Challenges Sue B. Moon and Timothy Roscoe.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
1 Network Measurement Summary ESCC, Feb Joe Metzger ESnet Engineering Group Lawrence Berkeley National Laboratory.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configuring and Testing Your Network Network Fundamentals – Chapter 11.
MPlane – an Intelligent Measurement Plane for Future Network and Application Management Grant Agreement n Heidelberg mPlane – Demo.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
1 Backbone Performance Comparison Jeff Boote, Internet2 Warren Matthews, Georgia Tech John Moore, MCNC.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Configuring and Testing Your Network Network Fundamentals.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
© 2002, Cisco Systems, Inc. All rights reserved..
Distributed Network Monitoring in the Wisconsin Advanced Internet Lab Paul Barford Computer Science Department University of Wisconsin – Madison Spring,
Network Troubleshooting CT NWT NameTP No. Gan Pei ShanTP Tan Ming FattTP Elamparithi A/L ThuraisamyTP Tan Ken SingTP
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.

Configuring Network Devices
IFIP-UNU ADVANCED COURSE ON NETWORKING AND SECURITY Module II-Wireless Communications Section 5 Access Points.
Implementing Network Access Protection
CCNA Configuration Journal Sample
Dev Test on Windows Azure Solution in a Box
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
Medium-Sized Switched Network Construction
Network layer devices combine multiple broadcast domains
Development & Evaluation of Network Test-beds
Net 412 (Practical Part) Networks and Communication Department LAB 1.
Implement Inter-VLAN Routing
Presentation transcript:

WAIL By: - Dave Plonka - Ana Bizarro Wisconsin Advanced Internet Laboratory - WAIL

WAILworks  Motivation  Challenges  Approach  Status WAIL - overview An extensible, consistent environment for conducting research in WAIL Scale, reconfigurability, instrumentation, access, etc. WAILworks – a multifaceted environment enabling research in WAIL Design and development of significant components on track for Summer ’03 completion

WAIL works Project Overview  Backbone  Front-end (scripts now, GUI later!)  Lab scheduling application (resource management for experiments)  Definition of scenarios (canonical topologies)  Automated configuration of network devices  Results repository (network database)

WAIL works Project Status  Backbone  Front-end (scripts now, GUI later!)  Lab scheduling application (resource management for experiments)  Definition of scenarios (canonical topologies)  Automated configuration of network devices  Results repository (network database)

WAIL - management Legend: 802.1Q trunk Lab-wide VLAN Mngmt VLAN Other Ethernet Serial WAILbone

WAIL works - scenarios Canonical Topologies  ISP  BGP  End-to-End  POP  Maximum Spaghetti  One-Off  Data Center

WAIL works – ISP scenario ISP Topology  Reproduce Internet 2 Backbone: Abilene Why ?  It is a national high performance backbone  Hardware information available  Routing architecture available  Ping and traceroute tools available  Router proxy available for ‘show’ commands  Log files available

WAIL works – ISP scenario  Abilene: Real-World Topology STTL SNVA LOSA DNVR HSTN ATLA WASH NYCM CLEV IPLSKSCY CHIN

WAIL works – ISP scenario Abilene Network in WAIL  Step-by-Step  Select a Topology (point in time)  Map Abilene Nodes to WAIL Routers  Assign Internet Numbers, Addresses  Basic Configuration  Routing Configuration  Automate Config Upload to the Routers  Test the Network  Validate – Quantify Differences with Real-World  Save Scenario to Repository

WAIL works – ISP scenario Abilene Network in WAIL  Progress  Select a Topology  Map Abilene Nodes to WAIL Routers  Assign Internet Numbers, Addresses  Basic Configuration  Routing Configuration  Automate Config Upload to the Routers  Test the Network  Validate - Quantify Differences with Real-World  Save Scenario to Repository

WAIL works – ISP scenario WAIL Abilene Legend: 802.1Q trunk Lab-wide VLAN Mngmt VLAN Other Ethernet Serial

WAIL works – ISP scenario Abilene Layer 2

WAIL works – ISP scenario Abilene Layer 2 and Layer 3

WAIL works Summary  WAILworks is the critical infrastructure for running experiments in WAIL (unique capability)  Design and development of each component is on track for Summer ’03 completion (Phase 1)  Future  External access  More GUI, visualization  Adapting aspects of WAILworks for operational use