Enterprise Networks Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101

Slides:



Advertisements
Similar presentations
UTC-N Overview of Campus Networks Design.
Advertisements

Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Mobility Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Implementing Inter-VLAN Routing
COS 461: Computer Networks
1 CCNA 3 v3.1 Module 5. 2 CCNA 3 Module 5 Switches/LAN Design.
Internet Routing (COS 598A) Today: Multi-Homing Jennifer Rexford Tuesdays/Thursdays 11:00am-12:20pm.
COS 461: Computer Networks
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Jennifer Rexford Princeton University MW 11:00am-12:20pm SDN Software Stack COS 597E: Software Defined Networking.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Networking Components Chad Benedict – LTEC
Mike Freedman Fall 2012 COS 561: Advanced Computer Networks Enterprise Configuration.
Connecting LANs, Backbone Networks, and Virtual LANs
Networking Components Christopher Biles LTEC Assignment 3.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Chapter 4: Managing LAN Traffic
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
Homework Assignment #1 1. Homework Assignment Part 1: LAN setup –All nodes are hosts (including middle nodes) –Each link is its own LAN, with its own.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
Floodless in SEATTLE : A Scalable Ethernet ArchiTecTure for Large Enterprises. Changhoon Kim, Matthew Caesar and Jenifer Rexford. Princeton University.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Campus Networking Best Practices Hervey Allen NSRC & University of Oregon Dale Smith University of Oregon & NSRC
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Day11 Devices/LAN/WAN. Network Devices Hub Switches Bridge Router Gateway.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Chapter 7 Backbone Network. Announcements and Outline Announcements Outline Backbone Network Components  Switches, Routers, Gateways Backbone Network.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
1 CSCD 433 Network Programming Fall 2011 Lecture 5 VLAN's.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Computer Networks. Internetworking Devices Network Interface Card (NIC) Repeaters HUB Bridge Switch Router.
Lecture 11: Switches Reading: Section 3.2 ? CMSC 23300/33300 Computer Networks
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Bridges and LAN Switches
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Networks and Security Great Demo
Network Processing Systems Design
Link Layer 5.1 Introduction and services
Planning and Troubleshooting Routing and Switching
Lab 2 – Hub/Switch Data Link Layer
MAC Addresses and ARP 32-bit IP address:
Chapter 4 Data Link Layer Switching
Lab 2 – Hub/Switch Data Link Layer
CS 457 – Lecture 8 Switching and Forwarding
IS3120 Network Communications Infrastructure
Virtual Local Area Network
Firewalls Routers, Switches, Hubs VPNs
NTHU CS5421 Cloud Computing
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Chapter 3 VLANs Chaffee County Academy
Presentation transcript:

Enterprise Networks Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101

Networking Case Studies 2 Data Center Backbone Enterprise Cellular Wireless

Simple Enterprise Design Single layer-two subnet – Hubs and switches – Gateway to the Internet – Single IP address block Local services – DHCP – DNS 3 S S S G S DHCP server DNS server Internet / /0

Limitations of Simple Design Ethernet scalability and performance Single ISP reliability and performance Limited IP address space Unwanted Internet traffic Privacy and isolation within the enterprise Detecting and preventing bad behavior from inside 4 S S S G S DHCP server DNS server Internet / /0

Beyond Ethernet Switching 5

Scalability Limitations of Ethernet Spanning tree – Paths that are longer than necessary – Bandwidth wasted for links not in the tree Forwarding tables – Bridge tables grow with number of hosts Broadcast traffic – ARP, DHCP, and broadcast applications Flooding – Frames sent to unknown destinations 6

Hybrid of Switches and Routers 7 R R R R Ethernet Bridging - Flat addressing - Self-learning - Flooding - Forwarding along a tree IP Routing - Hierarchical addressing - Subnet configuration - Host configuration - Forwarding along shortest paths R / / / /26 Internet

Limitations of Hybrid Design No plug-and-play and mobility between subnets Need consistency between IP addressing & routing 8 R R R R R / / / /26 Internet

Virtual Local Area Networks 9

Early Days of Ethernet LANs Thick cables snaked through cable ducts – Every computer they passed was plugged in All people in adjacent offices on the same LAN – Whether they belonged together or not Users grouped based on physical layout – Rather than organizational structure Security, privacy, and scalability limitations… 10

Today’s Ethernet LANs Changes introduced by hubs and switches – Every office connected to central wiring closets – Often multiple LANs (k hubs) connected by switches – Flexibility in mapping offices to different LANs Can group by organizational structure – Better privacy: snooping in promiscuous mode – Separate IP addresses: one IP subnet per LAN – Better security: access control at IP routers – Better load management: isolate broadcast/flooding 11

12 People Move, and Roles Change Organizational changes are frequent – E.g., faculty office becomes a grad-student office – E.g., graduate student becomes a faculty member Physical rewiring is a major pain – Requires unplugging the cable from one port – … and plugging it into another – … and hoping the cable is long enough to reach Would like to “rewire” the building in software – The resulting concept is a Virtual LAN (VLAN)

13 Example: Two Virtual LANs Red VLAN and Orange VLAN Switches forward traffic as needed R O RORO R R R OOO RORRR O O O

14 Making VLANs Work Changing the Ethernet header – Adding a field for a VLAN tag – Implemented on the bridges/switches – … but can still interoperate with old Ethernet cards Bridges/switches trunk links – Saying which VLANs are accessible via which interfaces Approaches to mapping access links to VLANs – Each interface has a VLAN color – Each MAC address has a VLAN color

Uses of VLANs (See the Survey Paper) Scoping broadcast traffic Simplifying access control policies Decentralizing network management Enabling host mobility 15

Problem: Limited Granularity Limited number of VLANs – Placing multiple groups in the same VLAN – Reusing limited VLAN Limited number of hosts per VLAN – Divide a large group into multiple VLANs One VLAN per access port – Supporting VLANs on the end host – Supporting multiple groups at the router 16

Problem: Complex Configuration Host address assignment – Wasting IP addresses – Complex host address assignment Spanning tree computation – Limitation of automated trunk configuration – Enabling extra links to survive failures – Distributing load over the root bridges 17 Open question: can we do better than VLANs?

Multiple Internet Connections 18

Motivation for Multi-Homing Benefits of multi-homing – Extra reliability, e.g., survive single ISP failure – Financial leverage through competition – Better performance by selecting better path – Gaming the 95 th -percentile billing model 19 ISP 1ISP /24

Multi-Homing Without BGP Inbound Traffic Ask each ISP to originate the IP prefix … to rest of the Internet Outbound Traffic One ISP as a primary, the other as a backup Or simple load balancing of all traffic 20 ISP 1 ISP /24

Multi-Homing With BGP Inbound traffic – Originate the prefix to both providers – Do not allow traffic from one ISP to another Outbound traffic – Select the “best” route for each remote prefix – Define BGP policies based on load, performance, cost 21 ISP 1 ISP /24 BGP sessions “Intelligent route control” or “multi-homed traffic engineering”.

Interconnecting Multiple Enterprise Sites 22

Challenges Challenges of interconnecting multiple sites – Performance – Reliability – Security – Privacy Solutions – Connecting via the Internet using secure tunnels – Virtual Private Network (VPN) service – Dedicated backbone between sites 23

Connecting Via the Internet Each site connects to the Internet – Encrypted tunnel between each pair of sites – Packet filtering to block unwanted traffic – But, no performance or reliability guarantees 24 Internet Site 2 Site 3 Site 1

Virtual Private Network (VPN) Each site connects to a common VPN provider – Provider allows each site to announce IP prefixes – Separate routing/forwarding table for each customer – Performance guarantees 25 VPN Provider Site 2 Site 3 Site 1

Middleboxes 26

Enterprise Internet Connection Multiple middleboxes – Intrusion prevention system – Network address translator – Firewall – Traffic shaper Handling bad internal users – Filtering IP packets with spoofed source IP addresses – Logging which MAC address has each IP address 27 Internet R M M M link

Internal Middleboxes Network divided into regions – E.g., departments within a campus – E.g., public computers (servers, WiFi) vs. private Network divided by roles – E.g., human resources vs. engineering – E.g., faculty vs. students Sometimes physically separate networks – E.g., ATM machines, campus safety, media streaming 28

Princeton Campus Network

Internet Connections Two commercial ISPs: Comcast and WindStream Two research networks: ESnet and Internet2 Non-profits: McCarter Theater, Princeton Public Library, and Princeton Regional Schools 30 vgate1 WindStream (full routes) 1 Gbps Comcast (full routes) 1 Gbps Princeton Campus 1 Gbps ESnet 1 Gbps MAGPI/Internet2

Princeton Public Internet Traffic Traffic volumes over the past week – Green: traffic from the Internet – Blue: traffic to the Internet 31

Three Internal Networks Campus Data Network – Connects dorms, academic and administrative buildings, campus WiFi, etc. Princeton Private Network – Environmental systems, power, security cameras, building locks VoIP Network – VoIP phones in data center, chemistry, neuroscience, Forrestal campus, and all new construction – Separate for disaster recovery & traffic management 32

Campus Data Network 33 vgate1 gigasw4 gigasw2 gigagate1 Internet Dormnet Applications Data Center Academic, administrative RIP routing

Data Center (Forrestal Campus) 40,000 square feet with 1800 computers Multiple tiers of backup power Minimizes energy for cooling and power 34

Virtual Private Network (VPN) Online campus resources – E.g., some Princeton University library resources – Not available from outside of campus External resources with Princeton subscription – E.g., digital libraries from ACM and IEEE – Accessible from a Princeton IP address Princeton VPN service (vpn.princeton.edu) – Secure network connection layered over IP network – … connects you to an internal Princeton machine 35

Aruba WiFi Access Points Adaptive radio management – Automatically assigns channel and power settings – Channel load balancing to distribute clients – Coverage hole detection 36

WiFi Anecdote (puwireless) Single large VLAN – Enabling seamless mobility on campus Limited address space – 16K or 32K IP addresses – 3 hour DHCP leases Frequently a large number of users – Several thousand to up to 10,000 – … may soon run low on IP addresses 37

WiFi Anecdote (puwireless), Continued Bug in Android and IOS smart phones – Don’t release DHCP lease on IP addresses – Offloads ARP processing to the chipset, to avoid waking up sleeping device on ARP requests – … but DHCP timeout is handled by the processor So, can have IP address collisions – DHCP lease expires, but the phone doesn’t know – DHCP server gives the IP address to someone else – … and both devices respond to ARP requests! 38 renewing-lease-keeps-using-IP-address html

WiFi Anecdote (puwireless), Continued Working with Google and Apple on the problem Longer-term solution – Move to larger, private address block ( /8) – Use network address translation (NAT) to communicate with the public Internet Benefits – Avoids running out of IP addresses – Introduces long delay before reusing an address – Seems like a good solution, right? 39

WiFi Anecdote (puwireless), Continued Solution makes troubleshooting harder – Public IP addresses shared by many users – … due to network address translation Example: DMCA violations – Student downloads copyrighted material on WiFi – Company comes to Princeton to complain Given IP address, can OIT identify the student? – With NAT, cannot pinpoint a unique MAC address – … without much more detailed (flow-level) logs 40

Conclusions Enterprise networks – Campuses and companies – Access to local services and the Internet Challenges – IP address limitations – Hybrid switch and routed network – Load balancing over upstream ISPs – Protecting users and the Internet from each other Next time: data-center networks 41