Scalability Don McGregor Research Associate MOVES Institute

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2014.
NAT, firewalls and IPv6 Christian Huitema Architect, Windows Networking Microsoft Corporation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
Understanding Internet Protocol
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
OpenFlow overview Joint Techs Baton Rouge. Classic Ethernet Originally a true broadcast medium Each end-system network interface card (NIC) received every.
Guide to Network Defense and Countermeasures Second Edition
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
Negotiating Unsolicited Connections to a Service Listening Behind a Firewall Ben Stroud CS525 Spring 10.
IP Address 1. 2 Network layer r Network layer protocols in every host, router r Router examines IP address field in all IP datagrams passing through it.
The internet layer Skills: None IT concepts: layered protocols, the internet layer, IP protocol, router, dumb (“end-to- end,” “neutral”) networks This.
NAT Network Address Translation. NAT Links cisco.shtmlhttp:// cisco.shtml.
Networking Components Chad Benedict – LTEC
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
4: Addressing Working At A Small-to-Medium Business or ISP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
Network Address Translation (NAT)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
CS 5565 Network Architecture and Protocols
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter Two Application Layer Prepared by: Dr. Bahjat Qazzaz CS Dept. Sept
CS 3214 Computer Systems Godmar Back Lecture 24 Supplementary Material.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
NATs and UDP Victor Norman CS322 Spring NAPT Suppose we have a router doing NAT: half is the “public side”, IP address ; other half is.
Addressing IP v4 W.Lilakiatsakun. Anatomy of IPv4 (1) Dotted Decimal Address Network Address Host Address.
Copyright © 2012 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
An analysis of Skype protocol Presented by: Abdul Haleem.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Agenda Last class: Digitization Today: Network Hardware Typing
Network Layer4-1 Today Collect homework New homework: Ch4 #16,19,21-24,26,27,29,31 (half graded, as usual) Due Wednesday Oct 15 in class Final programming.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
WebRTC Don McGregor Research Associate MOVES Institute
Chapter 9: Multicast Sockets
CS 5565 Network Architecture and Protocols Godmar Back Lecture 14.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Process-to-Process Delivery:
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Supplementary Material
Supplementary Material
Simulation as a Service, Scalability, and Network Architectures
Introducing To Networking
Network Virtualization
Session 20 INST 346 Technologies, Infrastructure and Architecture
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

Scalability Don McGregor Research Associate MOVES Institute

Scalablility & Bandwidth Suppose we have one host sending out updates of its position There are five other hosts that want this information. How do we deal with this?

Scalability Option 1: send out the same data five times Bad; this means we use 5X the bandwidth and it takes 5X as much time to send. What happens if we have 1000 other hosts? What if each of those is also sending updates? The data sent by a single host scales linearly with the number of hosts; the total data on the network scales with the square of the number of participants This is a recipe for disaster

Broadcast Broadcast works only within one network. It uses a special IP number with the host portion set to all 1’s. Eg, This only works with UDP (why?) One copy of the data goes onto the network. Everyone who is listening receives it (Netmask defines the “host” and “network” portions)

Broadcast Note that broadcast works only on one network. You can’t scale this to internet- wide To use, simply set the destination address of Datagram Packets to the broadcast address

Multicast Multicast is a much more sophisticated version of broadcast. While broadcast is limited to one network, multicast can, if supported by routers, span multiple networks A multicast address is a special sort of IP in a particular range, While normal Ips are associated with a host, a multicast address is best thought of as a group alias

Multicast A host subscribes to a multicast address Another host sends a UDP packet to a multicast address Every host that is subscribed to that multicast address receives that packet Works just like broadcast on a single network On multiple networks, the packet is sent to other networks only if there is a host on that network that is subscribed

Multicast Multicast is a special type of UDP Use MulticastSocket, a subclass of DatagramSocket MulticastSocket socket = new MulticastSocket(4545); socket.joinGroup(aMulticastGroup); packet = new DatagramPacket(buffer, buffer.length, aMulticastGroup, port); Socket.send(packet);

Broadcast vs Multicast Which to choose? Always pick multicast. It does everything broadcast does, and can optionally span networks if router support is present For backwards compatibility and legacy reasons you often need to use broadcast

Multicast On a single network you don’t need any configuration to use multicast On a single network if you have fancy L3 switches you can use something called “IGMP snooping” to reduce extraneous traffic Very limited commercial deployment to the home; deployments, if any, are mostly within a single enterprise.

Client/Server Designs How should the participants talk to each other? – Peer-to-Peer: each host communicates directly with the other hosts – Client/Server: Each client talks to a server, and the server distributes information to peers. Peers to not directly talk to each other – Various hybrid solutions are also possible

P2P, C/S It’s perhaps a bit easier to do P2P in the military world – Often simulations run in one lab For assorted security reasons, C/S is the most popular today in commercial apps, widespread use of P2P in DoD apps State of the art commercial: C/S, UDP, TCP for content distribution, registration

P2P Most commercial customers are behind a NAT, and it is difficult to establish connections from outside to a host inside a NAT Firewalls prevent connections on unapproved ports You can’t trust content from the general public. In gaming, griefers will try to subvert others and the vendor In Defense applications you can get away with P2P because of the higher trust level and theoretical end-to- end control of network configuration

Assignment Send position updates via multicast