Scaling the Internet with LISP
|
|
- Karin Henderson
- 8 years ago
- Views:
Transcription
1 Scaling the Internet with LISP Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve (Belgium) 1
2 Scaling the Internet with LISP Issues with the current Internet architecture Separating Identifiers from Locators Locator-Identifier Separation Protocol (LISP) 2
3 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
4 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
5 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables CID works well pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
6 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables CID works well Growth is back pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
7 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables Internet bubble CID works well Growth is back pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
8 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables Internet bubble CID works well Growth is back again! Growth is back pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
9 easons for the BGP growth Distribution of prefixes versus length /8 /9 - /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 - /32 4
10 easons for the BGP growth Why so many small prefixes? Allocation of IP prefixes to sites Initial solution chosen by IANA FCFS for all qualifying sites few constraints on which sites qualify for an IP prefix Once allocated, the prefix is owned by the site forever Solution introduced by Is after CID Two types of prefixes Provider Independent prefixes Given by Is to qualifying sites (basically ISPs paying their membership dues to the I) Owned by the site forever and can be globally announced Provider Aggregatable prefixes Given by ISPs from their own address block to customers Customers are expected to return their prefix to its owner if they change from ISP 5
11 Why do site prefer PI prefixes? Main reasons PI Sites own their prefix for eternity and can change of provider whenever they want PA prefixes cause a provider lock-in syndrome Changing the IP prefix used by a site is difficult IP addresses and prefixes are manually written in configurations files for routers DNS servers Firewalls DHCP servers printers voice and video equipment... Finding all the places where IP addresses and prefixes have been configured is difficult and error-prone With some care, it is possible to prepare an IPv6 site to ease a subsequent IP prefix renumbering, but unfortunately most configurations are not prepared for such a renumbering event 6
12 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS /17 2 A Provider AS123 I can reach / / /18 B I can reach /16 Global Internet Provider AS789 7
13 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS I can reach /16 A I can reach /16 and / /17 2 Provider AS / /18 B I can reach /16 Global Internet Provider AS789 7
14 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS I can reach /16 A I can reach /16 and / /17 2 Provider AS / /18 B I can reach /16 Global Internet Provider AS789 7
15 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS I can reach / /17 A I can reach /16 and / /17 2 Provider AS / /18 B I can reach /16 Global Internet Provider AS789 7
16 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS /17 2 I can reach / /17 A Provider I can reach AS /18 I can reach /16 and / / /18 I can reach / /18 B I can reach /16 Global Internet Provider AS789 7
17 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS /17 2 I can reach / /17 A Provider I can reach AS /18 I can reach /16 and / /17 and / / /18 I can reach / /18 B I can reach /16 and /18 Global Internet Provider AS789 7
18 easons for the BGP growth easons for the BGP growth Multihoming /16 2 I can reach /16 Provider AS /16 Provider AS789 I can reach /16 Global Internet 8
19 easons for the BGP growth easons for the BGP growth Multihoming Client : AS /16 2 Provider AS123 I can reach / /16 Provider AS789 I can reach /16 Global Internet 8
20 easons for the BGP growth easons for the BGP growth Multihoming Client : AS / /16 2 Provider AS123 I can reach / /16 Provider AS789 I can reach /16 Global Internet 8
21 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach / /23 Provider AS /16 Provider AS789 I can reach /16 Global Internet 8
22 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach / /23 I can reach /23 Provider AS /16 Provider AS789 I can reach /16 Global Internet 8
23 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach / /23 I can reach /23 Provider AS /16 Provider AS789 I can reach /16 and /23 Global Internet 8
24 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /23 Provider AS /16 Provider AS789 I can reach /16 and /23 Global Internet 8
25 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS / /16 2 Provider AS123 I can reach / /16 Provider AS789 I can reach /16 Internet 9
26 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach / /23 I can reach /24 Provider AS /16 I can reach /16 Provider AS789 Internet 9
27 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /24 Provider AS /16 I can reach /16 and /24 Provider AS789 Internet 9
28 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /24 Provider AS /16 I can reach /16 and /24 Provider AS789 Internet 9
29 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /24 Provider AS /16 I can reach /16 and /24 Provider AS789 Internet 9
30 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS /23 1 I can reach /24 and / /16 Provider AS789 I can reach / /16 and /23 2 I can reach /16 Provider AS123 and /24 I can reach /16 and /24 Internet 9
31 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS /23 1 I can reach /24 and / /16 Provider AS789 I can reach / /16 and /23 2 I can reach /16 Provider AS123 and /24 and /23 I can reach /16 and /24 and /23 Internet 9
32 Interdomain routing security Interdomain routing security Only Best Current Practices from network operators prevent a customer network from using BGP to announce the prefix of someone else Misconfigurations (fat fingers) are frequent 10
33 Issues with the current Internet architecture Limited size of IPv4 addressing space Weʼve seen this problem before and NAT, CID and IPv6 have been proposed... Evolution-Internet-Architecture/2008/ 11 Source O. Bonaventure,
34 Issues with the current Internet architecture Limited size of IPv4 addressing space Weʼve seen this problem before and NAT, CID and IPv6 have been proposed... Evolution-Internet-Architecture/2008/ 11 Source O. Bonaventure,
35 Scaling the Internet with LISP Issues with the current Internet architecture Separating Identifiers from Locators Locator-Identifier Separation Protocol (LISP) 12
36 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Applic. Transport Network DataLink Applic. Transport Network DataLink 13
37 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Applic. Transport Network DataLink Applic. Transport Network DataLink 13
38 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Applic. Transport Network DataLink Applic. Transport Network DataLink 13
39 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
40 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
41 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
42 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
43 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
44 Existing identifiers Loopback addresses are already used as identifiers, but only on routers / / / /
45 Existing identifiers Loopback addresses are already used as identifiers, but only on routers / / / / In contrast with endhost addresses and normal addresses on routers, loopback addresses are not tied to a particular physical interface a loopback address is always reachable provided that one of the routerʼs interfaces remains up loopback addresses are often used as identifiers this is only possible because the loopback addresses are directly advertised by the routing protocols 14
46 Principle of the Host-based solutions Transport layer IP routing sublayer 15
47 Principle of the Host-based solutions Transport layer Identifier : Id.A IP routing sublayer 15
48 Principle of the Host-based solutions Transport layer Identifier : Id.A IP routing sublayer Locators { Green.1, ed.2} 15
49 Principle of the Host-based solutions Transport layer Identifier : Id.A IP routing sublayer Locators { Green.1, ed.2} 15
50 Principle of the Host-based solutions Transport layer Identifier : Id.A Specific sublayer IP routing sublayer Locators { Green.1, ed.2} oles Translates the packets so that Transport layer always sees only the host identifier IP outing sublayer sees only locators Manages the set of locators Securely switches from one locator to another upon move or after link failure each host maintains some state 15
51 Principles of the Network-based solutions Transport layer IP routing sublayer 16
52 Principles of the Network-based solutions Hostʼs IP stack unchanged Each host has one stable IP address used as identifier not globally routed Transport layer Identifier : IPA IP routing sublayer 16
53 Principles of the Network-based solutions Hostʼs IP stack unchanged Each host has one stable IP address used as identifier not globally routed Transport layer Identifier : IPA IP routing sublayer Locators { IPGreen.A, IPed.A} 16
54 Principles of the Network-based solutions Hostʼs IP stack unchanged Each host has one stable IP address used as identifier not globally routed Transport layer Identifier : IPA IP routing sublayer Each edge router owns globally routed addresses used as locators Mapping mechanism is used to find locator associated to one identifier Packets from hosts are modified before being sent on Internet Locators { IPGreen.A, IPed.A} 16
55 Scaling the Internet with LISP Issues with the current Internet architecture Separating Identifiers from Locators Locator-Identifier Separation Protocol (LISP) 17
56 The Locator Identifier Separation Protocol Principles Define a router-based solution where current IP addresses are separated in two different spaces EndPoint Identifiers (EID) are used to identify endhosts. They are non-globally routable. Hosts in a given site are expected to use EIDs in the same prefix. outing Locators (LOC) are globally routable and are attach to routers A mapping mechanism allows to map an EndPoint Identifier onto the outing Locator(s) of the site router(s) outers encapsulate the packets received from hosts before sending them towards the destination LOC 18
57 LISP : design goals Main design goals Minimize required changes to Internet equire no hardware no software changes to endsystems (hosts) Be incrementally deployable equire no router hardware changes Minimize router software changes Avoid or minimize packet loss when EID-to-LOC mappings need to be performed 19
58 LISP : simple example AS /8 0100: DD:: Provider1 - AS /8 Provider2 - AS / : FF:: : FE::
59 LISP : simple example AS /8 0100: DD:: Provider1 - AS /8 Provider2 - AS / : FF::1234 S: 0100: FF::1234 D: 0100: FE:: : FE::
60 LISP : simple example AS /8 0100: DD:: Provider1 - AS /8 Provider2 - AS / S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
61 LISP : simple example Mapping System AS /8 Mapping request Where is 0100: DD: : DD::8765 Provider1 - AS /8 Provider2 - AS / S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
62 LISP : simple example Mapping reply for 0100: DD::8765 LOC Mapping System LOC AS /8 Mapping request Where is 0100: DD: : DD::8765 Provider1 - AS /8 Provider2 - AS / S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
63 LISP : simple example AS /8 Provider1 - AS /8 Outer header S: D: Inner S: 0100: FF::1234 D: 0100: DD:: Provider2 - AS /8 0100: DD:: S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
64 LISP : Terminology AS / : DD::8765 Provider1 - AS /8 Provider2 - AS / : FF:: : FE::
65 LISP : Terminology AS / : DD::8765 Provider1 - AS /8 Provider2 - AS / Ingress Tunnel outer (IT) : A router which accepts a packet containing a single IP header. The router maps 1 the destination address of the 2packet to an LOC and prepends a LISP header before forwarding the encapsulated packet. 0100: FF:: : FE::
66 LISP : Terminology AS /8 Provider1 - AS / Provider2 - AS /8 0100: DD::8765 Egress Tunnel outer (ET) : A router which accepts a LISP encapsulated packet. The router strips the LISP header and forwards the packet based on the next header Ingress Tunnel outer (IT) : A router which accepts a packet containing a single IP header. The router maps 1 the destination address of the 2packet to an LOC and prepends a LISP header before forwarding the encapsulated packet. 0100: FF:: : FE::
67 LISP : Terminology EID-to-LOC Database : a globally distributed database that contains all know EID-prefix to LOC mappings. AS /8 Provider1 - AS / Provider2 - AS /8 0100: DD::8765 Egress Tunnel outer (ET) : A router which accepts a LISP encapsulated packet. The router strips the LISP header and forwards the packet based on the next header Ingress Tunnel outer (IT) : A router which accepts a packet containing a single IP header. The router maps 1 the destination address of the 2packet to an LOC and prepends a LISP header before forwarding the encapsulated packet. 0100: FF:: : FE::
68 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum Source outing Locator Destination outing Locator 22
69 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum Source outing Locator Destination outing Locator UDP Src port : xxxx Dst port : 4341 UDP Length UDP checksum 22
70 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP Source outing Locator Destination outing Locator Src port : xxxx Dst port : 4341 UDP Length UDP checksum Source port should be random Destination port set to
71 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP LISP header Src port : xxxx Dst port : 4341 UDP Length UDP checksum Locator reach bits S E es. Source outing Locator Destination outing Locator Nonce Source port should be random Destination port set to
72 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP LISP header Src port : xxxx Dst port : 4341 UDP Length UDP checksum Locator reach bits S E es. Source outing Locator Destination outing Locator Nonce Source port should be random Destination port set to 4341 Used to indicate which xt are up. 22
73 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP LISP header Src port : xxxx Dst port : 4341 UDP Length UDP checksum Locator reach bits S E es. Source outing Locator Destination outing Locator Nonce Source port should be random Destination port set to 4341 Used to indicate which xt are up. Used to validate some control messages 22
74 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum S: Solicit Map equest E: Echo equest UDP LISP header Src port : xxxx Dst port : 4341 UDP Length S E es. Source outing Locator Destination outing Locator UDP checksum Locator reach bits Nonce Source port should be random Destination port set to 4341 Used to indicate which xt are up. Used to validate some control messages 22
75 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum S: Solicit Map equest E: Echo equest UDP LISP header Inner packet Src port : xxxx Dst port : 4341 UDP Length S E es. Ver Tclass Source outing Locator Destination outing Locator Payload Length UDP checksum Locator reach bits Nonce Flow Label NxtHdr Hop Limit Source EndPoint Identifier (128 bits) Source port should be random Destination port set to 4341 Used to indicate which xt are up. Used to validate some control messages 22
76 LISP Mapping Possible models for the mapping mechanism Push model LISP ET routers receive from a protocol to be designed the mapping tables that they need to use to map EIDs onto LOCs Pull model LISP ET routers refresh their mapping table by querying the mapping mechanism each time they receive a packet whose mapping is unknown Hybrid models Push is used to place popular or important mappings on LISP ET routers and they query for the less important mappings 23
77 NED A Not-so-novel EID to LOC Database The only proposed push model Composed of 4 parts a network database format; a change distribution format; a database retrieval/bootstrapping method; a change distribution method Principles An authority computes the mapping database based on the stored registrations The database signed by the authority is stored on servers IT poll regularly the database servers to update their own mapping database 24
78 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Nonce Source-AFI IT-AFI Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
79 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message Number of records in map-request 1 Flags eserved ec.# Nonce Source-AFI IT-AFI Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
80 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Number of records in map-request andom in request, copied in reply Nonce Source-AFI IT-AFI Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
81 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
82 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data mask length of EID prefix 25
83 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data AFI of the requested mapping mask length of EID prefix 25
84 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data EID prefix for which the mapping is requested AFI of the requested mapping mask length of EID prefix 25
85 LISP mapping messages Map-reply message format sent over UDP E C O D 2 eserved ec.# Nonce ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
86 LISP mapping messages Copied from Mapequest Map-reply message format sent over UDP 2 eserved ec.# Nonce E C O D ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
87 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce E C O D ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
88 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides E C O D ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
89 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest E C O D 2 eserved ec.# Nonce ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not 26
90 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest E C O D 2 eserved ec.# Nonce ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not Priority : LOCs with lower priority are preferred. If several have same priority, load balance among them Weight : percentage of traffic to this LOC when load balancing is active 26
91 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce ecord TTL Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not Is record is reachable from responderʼs viewpoint? E C O D Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Priority : LOCs with lower priority are preferred. If several have same priority, load balance among them Weight : percentage of traffic to this LOC when load balancing is active 26
92 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce ecord TTL Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not Is record is reachable from responderʼs viewpoint? E C O D Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Priority : LOCs with lower priority are preferred. If several have same priority, load balance among them Weight : percentage of traffic to this LOC when load balancing is active Used for Multicast 26
93 How to control incoming traffic? LISP site can control incoming traffic with Weight and Priority A 0100: DD::8765/48 A primary, C backup Mapping for 0100:DD::/48 LOC , prio=1, weight=100 LOC , prio=99, weight=100 C
LISP-CONS A Mapping Database Service
A Mapping Database Service David Meyer, Dino Farinacci, Vince Fuller, Darrel Lewis, Scott Brim, Noel Chiappa October, 2007 http://www.1-4-5.net/~dmm/talks/nanog41/cons Agenda Brief Intro Design Considerations
More informationIMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2. A Thesis by.
IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2 A Thesis by Prithvi Manduva B.Tech, Progressive Engineering College, JNTU 2008 Submitted to the
More informationLISP-TREE: A DNS Hierarchy to Support the LISP Mapping System
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System Loránd Jakab, Albert Cabellos-Aparicio, Florin Coras, Damien Saucez and Olivier Bonaventure 1 Abstract During the last years several operators
More informationLISP Functional Overview
CHAPTER 2 This document assumes that the reader has prior knowledge of LISP and its network components. For detailed information on LISP components, their roles, operation and configuration, refer to http://www.cisco.com/go/lisp
More informationThe Benefits. Locator/ID Separation
INL: IP Networking Lab Université Catholique de Louvain The Benefits of Locator/ID Separation AGAVE: A lightweight Approach for Viable End-to-end IP-based QoS Services Joint Work: L. Iannone, O.Bonaventure,
More informationLISP & NERD: An application person s adventure in routing
LISP & NERD: An application person s adventure in routing Eliot Lear DIMACS Routing & Security Workshop Before we start The purpose of this talk: Not to push NERD NERD was an experiment to demonstrate
More informationHow To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationNetwork Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
More informationQuickTime and a decompressor are needed to see this picture. Dave Meyer & Dino Farinacci
QuickTime and a decompressor are needed to see this picture. LISP: An Architectural Solution to Multi-homing, Traffic Engineering, and Internet Route Scaling Dave Meyer & Dino Farinacci LISP Designers:
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationTypes of IPv4 addresses in Internet
Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May
More informationCIRA s experience in deploying IPv6
CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country
More informationIntroducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
More informationWe Are HERE! Subne\ng
TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design
More informationIP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
More informationMobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.
Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point
More information8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
More information19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationMultihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
More informationCisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
More informationFuture Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationIP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
More informationTechnology Brief IPv6 White Paper.
Technology Brief White Paper. Page 1 of 37 Table of Contents 1 Overview... 3 1.1 Background... 3 1.2 Advantages of... 5 2 Packet... 9 2.1 Basic Header... 9 2.1.1 Extension Headers... 11 2.1.2 ICMP Packet...
More informationNetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
More informationITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More information- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
More informationAPPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
More informationWireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationIP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets
Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13
More informationInterconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
More informationMPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
More informationIntroduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
More informationMPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
More informationIPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
More informationIPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
More informationDD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
More informationGetting started with IPv6 on Linux
Getting started with IPv6 on Linux Jake Edge LWN.net jake@lwn.net LinuxCon North America 19 August 2011 History and Motivation IPng project July 1994 IPv6 - RFC 2460 December 1998 IPv5 - Internet Stream
More informationHow will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements
More informationMobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
More informationLISP A Multi-Homing and Mobility Solution for ATN using IPv6
ACP-WG I / IP01 International Civil Aviation Organization 15 July 2014 INFORMATION PAPER AERONAUTICAL COMMUNICATIONS PANEL (ACP) SEVENTEENTH MEETING OF WORKING GROUP - I Montreal, Canada 15 16 July 2014
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationFor internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
More informationA Review of IPv6 Multihoming Solutions
A Review of IPv6 Multihoming Solutions Habib Naderi Department of Computer Science University of Auckland Auckland, New Zealand hnad002@aucklanduni.ac.nz Brian E. Carpenter Department of Computer Science
More informationRedundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy
More informationSimplify Your Route to the Internet:
Expert Reference Series of White Papers Simplify Your Route to the Internet: Three Advantages of Using LISP 1-800-COURSES www.globalknowledge.com Simplify Your Route to the Internet: Three Advantages of
More informationInterconnecting IPv6 Domains Using Tunnels
Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how
More informationChapter 13 Internet Protocol (IP)
Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution
More informationCisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
More informationNetwork-Based Protocol Innovations in Secure Encryption Environments
Network-Based Protocol Innovations in Secure Encryption Environments Using Locator/ID Separation Protocol (LISP) to Optimize Routing in IP Encryption Environments Craig Hill Distinguished Systems Engineer
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationIPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. Nalini.elkins@insidethestack.com Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationIntroduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
More informationIPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
More informationHow Routers Forward Packets
Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
More information- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
More informationCisco IOS NetFlow Version 9 Flow-Record Format
Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: February 007 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
More informationIntroduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
More informationUsing IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
More informationClaudio Jeker. RIPE 41 Meeting Amsterdam, 15. January 2002. oppermann@pipeline.ch. jeker@n-r-g.com. Using BGP topology information for DNS RR sorting
BGPDNS Using BGP topology information for DNS RR sorting a scalable way of multi-homing André Oppermann oppermann@pipeline.ch Claudio Jeker jeker@n-r-g.com RIPE 41 Meeting Amsterdam, 15. January 2002 What
More informationInternet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing
Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University
More informationPreserve IP Addresses During Data Center Migration
White Paper Preserve IP Addresses During Data Center Migration Configure Cisco Locator/ID Separation Protocol and Cisco ASR 1000 Series Aggregation Services Routers 2015 Cisco and/or its affiliates. All
More informationChapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
More informationIP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
More informationLecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
More informationProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
More informationIPv6 Advantages. www.compaq.com. Yanick Pouffary. Yanick.Pouffary@compaq.com
IPv6 Advantages Yanick Pouffary Yanick.Pouffary@compaq.com IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order
More informationOverview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
More informationInternet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationWAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
More informationEnterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,
More informationFirewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG pascal.raemy@asecus.ch Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
More informationInternetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
More informationPRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
More informationInternetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
More informationMobility Support in IPv6
Second Annual International Conference Mobile Computing and Networking (MobiCom'96), ye, New York, USA, November 1996. Mobility Support in IPv6 Charles E. Perkins & David B. Johnson 1 Presented By: Ajay
More informationInternet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks
Internet Peering, IPv6, and NATs Mike Freedman V22.0480-005 Networks Internet Peering Review: Routing Internet has a loose hierarchy of domains Hosts now local router Local routers know site routers Site
More informationRedundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2
More informationMPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
More informationTCP/IP Fundamentals. Edmund Lam IT Audit Manager University of California edmund.lam@ucop.edu 7/25/99 1
TCP/IP Fundamentals Edmund Lam IT Audit Manager University of California edmund.lam@ucop.edu 7/25/99 1 What we will discuss: TCP/IP related to OSI Layers History of TCP/IP and what is it? TCP/IP Structure
More informationEfficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
More informationIP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationIAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI
IAB IPv6 Multi-Homing BOF Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Multi-homing Problems Inbound to the destination traffic engineering is needed Current
More informationThis work is licensed under a Creative Commons License http://creativecommons.org/licenses/by-sa/2.0/. The updated versions of the slides may be
This work is licensed under a Creative Commons License http://creativecommons.org/licenses/by-sa/2.0/. The updated versions of the slides may be found on http:// totem.info.ucl.ac.be/ BG Outline Organization
More informationDEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
More informationOLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
More informationThe Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationImplementing Trust to Trust Using Customer Edge Switching. Raimo Kantola Aalto University Finland
Implementing Trust to Trust Using Customer Edge Switching Raimo Kantola Aalto University Finland 1 Agenda Big picture Identities Customer edge switching in operation Deployment and Challenges Conclusions
More information