INDIANAUNIVERSITYINDIANAUNIVERSITY Workstation-Based Traffic Shaping Presentation by Mark Meiss January 2002.

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

Building Fast, Flexible Virtual Networks on Commodity Hardware Nick Feamster Georgia Tech Trellis: A Platform for Building Flexible, Fast Virtual Networks.
MULTOPS A data-structure for bandwidth attack detection Thomer M. Gil Vrije Universiteit, Amsterdam, Netherlands MIT, Cambridge, MA, USA
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
1 13-Jun-15 S Ward Abingdon and Witney College LAN design CCNA Exploration Semester 3 Chapter 1.
Students:Gilad Goldman Lior Kamran Supervisor:Mony Orbach Network Sniffer.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
1 Network Packet Generator Characterization presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
Students:Gilad Goldman Lior Kamran Supervisor:Mony Orbach Mid-Semester Presentation Spring 2005 Network Sniffer.
Application of NetFPGA in Network Security Hao Chen 2/25/2011.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Poor Man’s Firewall A firewall that can be setup and implemented with a minimum amount of time and money.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
IP Addressing & Subnetting Made Easy. Part 1: Working with IP Addresses.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
Instructor & Todd Lammle
Association of Communications Engineers Corralling the Broadband Stampede May 7 – 9, 2012 Fort Worth, Texas.
4 September 2015 RE Meyers, Ms.Ed., CCAI CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
Technological and financial aspects of URAN project Dr. Vladimir Galagan Head deputy of URAN Technical Commitee.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
Groups 19 and 20. What is an IP address? o Web address of your house, on the internet o Every website also needs an IP address Current standard IPv4 o.
Chapter 3 How to build a network?. 2 Objectives What is a Network? IP Addresses Key Components of a Network (NIC) Factors in Designing a Network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
--Harish Reddy Vemula Distributed Denial of Service.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
1 LAN design- Chapter 1 CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino.
Access-Lists Securing Your Router and Protecting Your Network.
Jordan Howell Frank Geiger. Table of Contents  Question  Overview of example  Packets  OSI Model  Network Layer  Data Link Layer  Physical Layer.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
MB - NG MB-NG Meeting Dec 2001 R. Hughes-Jones Manchester MB – NG SuperJANET4 Development Network SuperJANET4 Production Network Leeds RAL / UKERNA RAL.
CS 447 Network & Data Communication QoS Implementation for the Internet IntServ and DiffServ Department of Computer Science Southern Illinois University.
LAN Switching Concepts. Overview Ethernet networks used to be built using repeaters. When the performance of these networks began to suffer because too.
ACCESS CONTROL LIST.
Network protocols –Nodes of a network must obey some rules if they want to communicate with each other. The set of rules is called network protocol. –The.
Dave Martin Vice President, Product Management
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Planning and Implementing a Basic SOHO Network using Network Segmentation COMP 316.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Chapter 5b.  Upon completion of this chapter, you should be able to:  Subnet an IPv4 address to make separate networks out of one address given  Use.
8/28/ Network Models - Lin 1 CPET/ECET Network Models Data Communications and Networking Fall 2004 Professor Paul I-Hai Lin Electrical and.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Wild Stuff ExtendedACLGeneralACLStandardACL Got the Right Number?
Release 16/7/2009 Internetworking Devices Chapter 10 Jetking Infotrain Ltd.
UDP : User Datagram Protocol 백 일 우
INDIANAUNIVERSITYINDIANAUNIVERSITY Tsunami File Transfer Protocol Presentation by ANML January 2003.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Pass Cisco Implementing Cisco IP Routing exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Cisco Implementing Cisco IP Routing.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Ip addressing & subnetting
Chapter Objectives In this chapter, you will learn:
Youngstown State University Cisco Regional Academy
Implementing Quality of Service (QoS)
Congestion Control, Quality of Service, and Internetworking
CT1303 LAN Rehab AlFallaj.
Network Concepts Devices
Informational Tutorial
Firewalls Routers, Switches, Hubs VPNs
EE 122: Lecture 18 (Differentiated Services)
A tool for locating QoS failures on an Internet path
Binit Mohanty Ketan Rajawat
MB – NG SuperJANET4 Development Network
SUPPORTING MULTIMEDIA COMMUNICATION OVER A GIGABIT ETHERNET NETWORK
Ip addressing & subnetting
IP Control Gateway (IPCG)
EE 122: Differentiated Services
NetFPGA - an open network development platform
Presentation transcript:

INDIANAUNIVERSITYINDIANAUNIVERSITY Workstation-Based Traffic Shaping Presentation by Mark Meiss January 2002

INDIANAUNIVERSITYINDIANAUNIVERSITY New peer-to-peer file sharing applications emerge regularly The need for traffic shaping is greater than ever How can we limit peer-to-peer traffic without starving out other traffic? Motivation

INDIANAUNIVERSITYINDIANAUNIVERSITY Problems with Shaping Many shapers rely on “application signatures” for shaping Often, a signature is just a port number Remember learning that port 6699 equals Napster?

INDIANAUNIVERSITYINDIANAUNIVERSITY The “Port 80” Effect As traffic shaping becomes more widespread, peer-to-peer applications will start tunneling through TCP port 80 The traffic we want to shape will become indistinguishable from other traffic Packet snooping is too difficult and isn’t likely to help in the long term

INDIANAUNIVERSITYINDIANAUNIVERSITY Our Proposal Shape traffic based on different factors: –Apparent amount of demanded bandwidth –Destination IP address Create a “notch filter” so that users of interactive applications suffer the least packet loss users shouldn’t notice the congestion

INDIANAUNIVERSITYINDIANAUNIVERSITY Our Proposal (cont.) Use BGP routes to classify data according to destination Don’t worry about port numbers or packet data at all Our claim: A good PC running an open- source OS can shape traffic at least 200,000 packets/sec

INDIANAUNIVERSITYINDIANAUNIVERSITY User-Based Model User-Based Mathematical Model of Network Activity

INDIANAUNIVERSITYINDIANAUNIVERSITY Sample Run: Bandwidth

INDIANAUNIVERSITYINDIANAUNIVERSITY Sample Run: Performance

INDIANAUNIVERSITYINDIANAUNIVERSITY Sample Run: User Effects

INDIANAUNIVERSITYINDIANAUNIVERSITY Sample Run: Zoom In

INDIANAUNIVERSITYINDIANAUNIVERSITY Implementation Development platform is Pentium III system with 64-bit 66MHz PCI slots, running Redhat Linux 7.2 Software platform is the “Click” Modular Router: –

INDIANAUNIVERSITYINDIANAUNIVERSITY What Next? Real-world testing in a few months Goal is to get as close to Gigabit line rate as possible Also working on benchmarking performance of Fast Ethernet and Gigabit NICs –Early results suggest large performance differences Feedback and suggestions for additional shaping parameters are welcome