Network Simulation Traffic engineering study case. European MUM 2015 Prague / Czech Republic Wardner Maia
|
|
|
- Aleesha Skinner
- 10 years ago
- Views:
Transcription
1 Network Simulation Traffic engineering study case European MUM 2015 Prague / Czech Republic Wardner Maia
2 Copyright Notice (Aviso sobre direitos autorais) English: This material is an effort intended to improve the level of knowledge of professionals that work with Mikrotik RouterOS and should be used solely for self-study purposes. Digital copies and/or any printed material contained in this presentation or derived from it are property of MD Brasil TI & Telecom and cannot be used for any kind of training, presentation or workshop, even non-commercial ones. Reproduction of any part or picture requires previous written authorization of MD Brasil. For information about how to obtain such authorization, please contact Portuguese: Este material é um esforço que visa aprimorar o grau de conhecimento de profissionais que trabalham com Mikrotik RouterOS e deve ser usado apenas com objetivos de auto estudo. Cópias digitais e/ou materiais impressos com conteúdo desta apresentação ou dela derivados são de propriedade a MD Brasil TI & Telecom a não podem ser usados para qualquer tipo de treinamento, apresentação ou seminário, mesmo os de finalidades não comerciais. A reprodução de qualquer parte ou figura requer prévia autorização por escrito da MD Brasil. Para informações sobre como obter esta autorização, por favor contate [email protected]. 2
3 Introduction Wardner Maia Electronic and Telecommunications Engineer; Internet Service Provider since 1995; Training Business since 2002; Certified Mikrotik Trainer since 2007; MD Brasil IT & Telecom CTO; Member of the board of directors of LACNIC. 3
4 Introduction MD Brasil IT & Telecom Internet Access Provider in São Paulo state - Brazil; Telecom equipment manufacturer and integrator; Mikrotik Training Center since 2007; Consulting services worldwide
5 Previous Participations on European MUMs Wireless Security (2008 Krakow/PL) Wireless Security for OLPC project (2009 Prague/CZ) Layer 2 Security (2010 Wroclaw/PL) Routing Security (2011 Budapest/HU) IPv6 Security ( Warsaw/PL) BGP Filtering (2013 Zagreb/CR) MPLS VPNs Security (2014 Venice/IT) 5
6 Network Simulation 6
7 Subject and goals Subject Network Simulation with focus on Mikrotik RouterOS Goals To share our experience with the use of GNS3 To foster the use of simulators as a prediction and learning tool To present a clear tutorial on how to install and use it. 7
8 Previous Work from other Trainers Previous work on installation and use of GNS3: - Indonesia Rofik Fauzi GNS3 on Windows, and Qemu as RouterOS emulator - USA 2014 Rick Frei GNS3 on Windows, and VirtualBox as RouterOS emulator 8
9 Network Simulators There are many Network Simulators for several platforms an purposes: Cloonix, Core, Imunes, Marionnet, Mininet, Netkit, Psimulator, VirtualSquare, GNS3, etc; The link below is an excellent guide to some Open Source Network simulators: 9
10 Agenda Motivations and General Talking about Network Simulators Installing all the stuff necessary to simulate any type of IP network; Creating a Simple and a Base Project and interacting with them; A real case demonstration Traffic Engineering Scenario; Final considerations, conclusions and download links. 6 10
11 Agenda Motivations and General Talking about Network Simulators Installing all the stuff necessary to simulate any type of IP network; Creating a Simple and a Base Project and interacting with them; A real case demonstration Traffic Engineering Scenario; Final considerations, conclusions and download links. 4 11
12 Motivations We do love REAL Routers, but 12
13 Motivation Presentation about BGP Filtering in Zagreb (2013): (5 routers) Internet IXP Transit Operator AS2 AS1 Transit Operator 2 Your AS md Transit Client To simulate the scenario 5 real routers were used, cables, power supplies, etc. 13
14 Motivation Presentation about MPLS Security in Venice (2014): (9 routers) md With a simulator, no physical router, no cables, no power supply no pain Several questions asking about the tool used for the presentation. 14
15 Applications of a Network Simulator Prediction Tool Network Simulator Teaching / Learning Tool 15
16 Applications of a Network Simulator As a Prediction Tool: Operators can anticipate how new implementations will work before deploying them in the real world ; Software versions updates can be tested before the real implementation avoiding problems; Interoperation with other Vendors can be tested and tuned without the need of the hardware; In consulting services making possible fast and low cost proof of concepts to customers. 16
17 Brazilian Army Network 41 CT (Region of Amazon rain forest) Success case Prediction Tool Existing Network: Network interconnecting several units, many in hard to reach locations. Scope of the work: Implementation of dynamic routing, IPSec encryption and QoS. Challenge: To make all implementations in a productions network without any interruption. 17
18 Applications of a Network Simulator As a Teaching / Learning Tool: Trainers can easily explain Protocols and complex scenarios without the need of lots of equipment; Students can have on their pockets all scenarios used in class and reproduce them by their own; On line trainings do not depend on physical hardware. Scenarios can be exported and sent to the students. 18
19 Success Case Teaching / Learning Tool MD Brasil Trainings Virtual environment simulating a real Internet for BGP Labs. Students connect with real routers to this network and can practice BGP filtering, traffic manipulation, etc as they are connected to the Internet; All MPLS Labs are now improved showing first what we want with some setups and after doing so in real routers In our 2015 roadmap several new labs, now possible with simulation 19
20 Who will Benefit? Trainers: Students: Operators: Can improve their methods of teaching; Can get more from a Training with scenarios memories and test their skills; Can use in their daily operations as a predicting and testing tool Mikrotik Community in general: Can share information and scenarios 20
21 Agenda Motivations and General Talking about Network Simulators Installing all the stuff necessary to simulate any type of IP network; Creating a Simple and a Base Project and interacting with them; A real case demonstration Traffic Engineering Scenario; Final considerations, conclusions and download links
22 Tools we ll use for Simulating Networks + + GNS3 Qemu Dude Ubuntu Gnome LTS 22
23 GNS3 GNS3: Originally developed with focus on Cisco; Uses Dynamips for emulating Cisco Routers; Offers support for emulation with other systems like Qemu and VirtualBox; 23
24 Qemu Qemu (Quick Emulator) is an open source software that can be used either as an emulator or a virtualization system; As an emulator, Qemu can run operating Systems in a regular PC Used as a Virtualization platform, Qemu runs the guest system directly on the host machine using KVM. Several architectures are supported, like Mips, ARM, PPC, x86, etc. 24
25 Qemu x VirtualBox Another possibility could be use VirtualBox instead of Qemu. According to our tests Qemu is faster and saves CPU resources. (see some tests at the end of this presentation) 25
26 The Dude Our good and old friend The Dude will be used only as a kind of front end to make things easier, specially for Mikrotik users community. It will allow: Make the maps more clean and friendly, hiding details not necessary for the studies; Direct access to the routers facilitating the configurations and visualizations; Mass upgrades and or downgrades of all devices, using Dude facilities. 26
27 Installing the Stuff 27
28 Installation Installation successful for Ubuntu-gnome LTS # all following commands should run as root sudo su # all the stuff at root directory will make things easier when sharing projects mkdir /GNS3 cd /GNS3 28
29 Installation on Ubuntu # preparing the dependencies: apt-get update apt-get install build-essential apt-get install libelf-dev apt-get install uuid-dev apt-get install libpcap-dev apt-get install python3-dev apt-get install python3-pyqt4 apt-get install python3-netifaces 29
30 Installation on Ubuntu # preparing the dependencies (cont.): apt-get install git apt-get install cmake apt-get install bison apt-get install flex # installing phyton and pip: wget -O get-pip.py python3 get-pip.py pip3 install pyzmq && pip3 install tornado 30
31 Installation # stuff for i386 support dpkg --add-architecture i386 apt-get update apt-get install libc6:i386 apt-get install libstdc++6:i386 apt-get install libssl1.0.0:i386 ln -s /lib/i386-linux-gnu/libcrypto.so /lib/i386-linuxgnu/libcrypto.so.4 31
32 Installation # stuff for i386 support (cont.) wget tar xf iniparser-3.1.tar.gz cd iniparser/ makecp libiniparser* /usr/lib cp src/*.h /usr/include cd.. 32
33 Installation # Installing Dynamips git clone git://github.com/gns3/dynamips.git cd dynamips mkdir build cd build cmake.. make install cd ~/GNS3 33
34 Installation # Testing Dynamips maia@galago:/gns3$ sudo dynamips -H
35 Installation # Installing GNS3 wget unzip v1.2.3.zip cd gns3-server python3 setup.py install cd.. rm -r v1.2.3.zip 35
36 Installation # Installing GNS3 GUI wget unzip v1.2.3.zip cd gns3-gui-1.2.3/ python3 setup.py install cd.. rm -r v1.2.3.zip 36
37 Installation # Installing IOU get unzip master.zip cd iouyap-master/ make install cp iouyap /usr/local/bin/iouyap cd.. rm -r master.zip 37
38 Installation # Creating License file for Cisco pico CiscoKeyGen! /usr/bin/python print "*******************************************" print "Cisco IOU License Generator - Kal 2011, python port of 2006 C version" import os import socket import hashlib import struct 38
39 Installation # Creating License file for Cisco (cont.) # get the host id and host name to calculate the hostkey hostid=os.popen("hostid").read().strip() hostname = socket.gethostname() ioukey=int(hostid,16) for x in hostname: ioukey = ioukey + ord(x) print "hostid=" + hostid +", hostname="+ hostname + ", ioukey=" + hex(ioukey)[2:] 39
40 Installation # Creating License file for Cisco (cont.) # create the license using md5sum ioupad1='\x4b\x58\x21\x81\x56\x7b\x0d\xf3\x21\x43\x9b\x7e\xac\ x1d\xe6\x8a' ioupad2='\x80' + 39*'\0' md5input=ioupad1 + ioupad2 + struct.pack('!l', ioukey) + ioupad1 ioulicense=hashlib.md5(md5input).hexdigest()[:16] print "\nadd the following text to ~/.iourc:" print "[license]\n" + hostname + " = " + ioulicense + ";\n" print "You can disable the phone home feature with something like:" print " echo ' xml.cisco.com' >> /etc/hosts\n" 40
41 Installation # Give exec permissions and run it chmod +x CiscoKeyGen./CiscoKeyGen # Output # Output: 41
42 Installation # Add license to iourc.txt pico iourc.txt [license] galago = 866eb729771e8752; # Disable the phone feature echo ' xml.cisco.com' >> /etc/hosts 42
43 Installation # Install Qemu apt-get install qemu # Install The DUDE # If you don t have wine, install it and after the Dude sudo apt-get install wine dude.exe 43
44 Running GNS3 # Launch GNS3 as superuser Alt F2 44
45 Creating RouterOS image to GNS3 45
46 RouterOS Image # Create the RouterOS image with 256 Mbytes for Ubuntu. sudo qemu-img create f qcow2 RouterOS.img 256M Qemu supports several image types. qcow2 is more flexible and can be ported to other systems. We didn t see difference on performance when using the raw format. 46
47 RouterOS Image # Download the latest.iso image from Mikrotik to the same directory and install sudo quemu-system-x86_64 RouterOS.img cdrom mikrotik.6.27.iso 47
48 RouterOS Image # Install as usual and you ll have a RouterOS running over Qemu. 48
49 RouterOS Image # Licensing the image You can use the demo license without problems, but if you want to license the router, you can: Type each character of the license by hand or You can communicate via Winbox after binding your machine to the virtual environment (see further slides in this presentation). 49
50 RouterOS Image Even if you skip the licensing part, you can access direct your router anytime by typing the script below: # Licensing the image qemu-system-x86_64 -enable-kvm -m netdev tap,id=t0,ifname=tap0,script=no,downscript=no -device e1000,netdev=t0,id=nic0 <imagefile> 50
51 RouterOS Image # Licensing the image When you use the previous licensed image in a project, every time you create a new Router, interface ether0 (GNS3) will have the same MAC address. So, remember to reset the MAC to avoid problems: /interface Ethernet reset-mac-address interface=ether1 N.B. ether0 (GNS3) = ether1 (RouterOS) 51
52 Inserting the image in GNS3 and creating a Base Project 52
53 Inserting RouterOS image in GNS3 53
54 Inserting RouterOS image in GNS3 VM name Memory Path to Qemu binary Number of adapters Path to RouterOS image 54
55 Using The Dude as a frontend to the virtual network 55
56 Using The Dude as a frontend Network maps can be customized direct in GNS3, but for RouterOS users, The Dude is sure much more friendly 56
57 Agenda Motivations and General Talking about Network Simulators Installing all the stuff necessary to simulate any type of IP network; Creating a Simple and a Base Project and interacting with them; A real case demonstration Traffic Engineering Scenario; Final considerations, conclusions and download links
58 Hands ON Creating a Simple Project 58
59 Creating a project Creating the devices 59
60 Creating a project Configuring the cloud (pseudo device for external connections) 60
61 Creating a project Making the links 61
62 Creating a project Starting the Router 62
63 Creating a project Important initial commands 63
64 Binding your machine to the virtual environment 64
65 Binding your machine to the virtual environment # Install utilities for configuring the Linux Ethernet bridge sudo apt-get install bridge-utils # Install utilities for user mode Linux sudo apt-get install uml-utilities 65
66 Binding your machine to the virtual environment # Type the below script and give it exec permissions #!/bin/bash sudo modprobe tun sudo tunctl -t tap0 sudo ifconfig tap promisc up sudo ifconfig wlan promisc up sudo brctl addbr br0 sudo brctl addif br0 tap0 sudo brctl addif br0 eth0brctl show sudo ifconfig br0 up sudo ifconfig br0 x.x.x.x/x (IP to communicate with all devices) 66
67 Binding your machine to the virtual environment # Check bridge and tap configuration 67
68 Hint: Make a Base Project To avoid repetition, create a base project fitted to your hardware capabilities and use it for all scenarios. 68
69 Hint: Make a Base Project To avoid overload your CPU you may consider delay the machine boots. (not working on version 1.2.3) 69
70 Agenda Motivations and General Talking about Network Simulators Installing all the stuff necessary to simulate any type of IP network; Creating a Simple and a Base Project and interacting with them; A real case demonstration Traffic Engineering Scenario; Final considerations, conclusions and download links
71 Hands ON Traffic Engineering Study Case 71
72 Some TE/MPLS Background Label Distribution: There are 3 methods for Label distribution: LDP Label Distribution Protocol LABEL DISTRIBUTION RSVP-TE Resource Reservation Protocol Traffic Engineering md BGP Border Gateway Protocol 72
73 Some TE/MPLS Background RSVP-TE (Resource Reservation Protocol Traffic Engineering) RSVP-TE is an extension of RSVP protocol and supports the reservation of resources across an IP Network; Applications running on IP end systems can use RSVP to indicate to other nodes the nature of the packet streams they want to receive. RSVP TE RSVP-TE generally allows the establishment of MPLS label switched paths (LSPs), taking into consideration network constraint parameters such as available bandwidth and explicit hops. 73
74 Some TE/MPLS Background Topology and naming Ingress (Egress) Router LSR Routers? Egress (Ingress) Router CE Router CE Router 74
75 Some TE/MPLS Background Ingress Router RSVP Path messages with the necessary parameters to the LSP; LSR Routers LSR Routers Propagate messages along the LSR RSVP Resv sent back reserving the resources for the tunnel in all routers; Egress Router 75
76 TE example In this example, we are doing the following things: OSPF operational in all routers; Tunnel established between Ingress and Egress routers using loopback interfaces to guarantee redundancy in case of link failure; Primary strict path administratively defined and secondary via OSPF 76
77 TE Scenario Example Although the path through R2 is shorter, we want for some reason that the tunnel our primary path goes through R5 and R TE-Tunnel Primary Path
78 TE Scenario Example Path through R2 will be secondary in case of link failure TE-Tunnel Secondary Path
79 TE Scenario Configuration OSPF stuff All routers have basic OSPF configuration, with MPLS TE Area and TE router ID configured 79
80 TE Scenario Configurations Primary and Secondary Paths Primary path will use strict routes pointing to all IP addresses the flow goes through. Secondary Path is configured to use OSPF routes. 80
81 TE Scenario Configuration Interface TE parameters R1 is ingress and R3 egress. 10 Mbps is reserved with a margin of 5%. 81
82 TE Scenario Configurations Redundancy in action This is the primary path established. Look at the explicit route and recorded route 82
83 TE Scenario Configurations Redundancy in action If primary path fails, secondary is used and primary is on hold until primary is up again. State passes through trying to establish and finally primary is established again. 83
84 TE Scenario Configurations Routes and Route Policy Below an example of policy, where all traffic sent to network /24 (or marked with the same mark) will be limited. Other traffic will follow OSPF routes 84
85 TE Scenario Configurations Testing routing and limitation Secondary Primary 85
86 Agenda Motivations and General Talking about Network Simulators Installing all the stuff necessary to simulate any type of IP network; Creating a Simple and a Base Project and interacting with them; A real case demonstration Traffic Engineering Scenario; Final considerations, references and download links
87 Issues and Limitations GNS3 Unfortunately we cannot simulate and predict all practical situations because of hardware specific things, like: Wireless capabilities; Switching features; Problems related to interface negotiation, MTU issues; etc. Also software installation (Qemu and GNS3) could be tricky for some users depending on operating system, hardware and other dependencies not satisfied. Trainings using simulators should be planned in advance to avoid delays. 87
88 Live CD/USB To circumvent issues related to installation we have developed an.iso image that can be run as a Live USB or a Live CD; At the time of this writing, the current version of this image is using Ubuntu LTS 32 bit and GNS Downloads can be made at MD Brasil Web site: Feedbacks are welcome: [email protected] 88
89 References
90 Thanks to Many Thanks to Sergio Souza who helped a lot with debugging the installations and who exchange with me a lot of projects; Tom Smyth and Patrik Schaub for commercial cooperation and technical information exchange; Jaromir Cihák for the usual hospitality here in Prague and for the efforts in the routed world project. 90
91 Download Page Presentation and related material can be obtained in the URL: ISO image USB installer RouterOS image for Qemu Windows Installation (Portuguese) 91
92 Extra Slides 92
93 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 93
94 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 94
95 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 95
96 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 96
97 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 97
98 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 98
99 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 99
100 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 100
101 Extra Slides VirtualBox x Qemu Qemu x VirtualBox 101
102 Děkuji
BGP Filtering with RouterOS
BGP Filtering with RouterOS External Connectivity Strategies for Multi- Homed ISP s, connected to an IXP Environment and providing transit services European MUM 2013 - Zagreb / Croatia Wardner Maia Copyright
MPLS VPNs Security. md1402151341. Implementations with Mikrotik RouterOS European MUM 2014 - Venice / Italy Wardner Maia
MPLS VPNs Security md1402151341 Implementations with Mikrotik RouterOS European MUM 2014 - Venice / Italy Wardner Maia Copyright Notice (Aviso sobre direitos autorais) English: This material is an effort
MIKROTIK NETWORK SIMULATOR
MIKROTIK NETWORK SIMULATOR PRESENTED BY ROFIQ FAUZI MUM Nov 2013 - Indonesia ABOUT ROFIQ FAUZI 2 Using MikroTik (v.2.97) since 2005, as Network Engineer at WISP. 2007, Network & Wireless Engineer at INDOSAT
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012
MikroTik RouterOS Workshop Load Balancing Best Practice Warsaw MUM Europe 2012 MikroTik 2012 About Me Jānis Meģis, MikroTik Jānis (Tehnical, Trainer, NOT Sales) Support & Training Engineer for almost 8
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
Introduction to Virtualization & KVM
Introduction to Virtualization & KVM By Zahra Moezkarimi ICT Research Institute Software Platform Laboratory Outline Virtualization History Overview Advantages and Limitations Types of virtualization Virtualization
Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
MPLS Network Design & Monitoring
Slide 1 MPLS Network Design & Monitoring Slide 2 What Is MPLS Traffic Engineering? Traffic Control -Unexpected Incidences -Fiber Cut -Delay Network Optimization Efficient Use of Network Resources Topology
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.
TCP Labs WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.2015 Hands-on session We ll explore practical aspects of TCP Checking the effect
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide
Cloud.com CloudStack Community Edition 2.1 Beta Installation Guide July 2010 1 Specifications are subject to change without notice. The Cloud.com logo, Cloud.com, Hypervisor Attached Storage, HAS, Hypervisor
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
NETWORK EMULATION AND NETKIT
NETWORK EMULATION AND NETKIT Gestão e Segurança de Redes / Gestão de Redes e Serviços LERC / MEIC- T 2013/14 Artur M. Arsénio & Miguel P. Correia CLASS OBJECTIVES To understand what is meant by network
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
CDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: [email protected]) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**
Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)
netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description [email protected] http://www.kaksonetworks.it/ A lab showing
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
A New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University [email protected] ABSTRACT This paper
The Tor VM Project. Installing the Build Environment & Building Tor VM. Copyright 2008 - The Tor Project, Inc. Authors: Martin Peck and Kyle Williams
The Tor VM Project Installing the Build Environment & Building Tor VM Authors: Martin Peck and Kyle Williams Table of Contents 1. Introduction and disclaimer 2. Creating the virtualization build environment
Creating a DUO MFA Service in AWS
Amazon AWS is a cloud based development environment with a goal to provide many options to companies wishing to leverage the power and convenience of cloud computing within their organisation. In 2013
Virtualization For Network Testing & Staff Training
Virtualization For Network Testing & Staff Training Virtualization Technologies They are everywhere By abstracting functionality away from hardware we gain Improved capacity usage Lower power consumption
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Copyright 2008 Link Technologies,Inc. A Proud Vendor Member of the
THE WHAT AND WHY ABOUT A Proud Vendor Member of the 1 What Is this about? 2 What is Mikrotik? What DOES it DO for ME! What is it s Purpose! What is the BIG DEAL? Why should I care? Does it help my bottom
Information Security Training. Assignment 1 Networking
Information Security Training Assignment 1 Networking By Justin C. Klein Keane September 28, 2012 Assignment 1 For this assignment you will utilize several networking utilities
HW (Fat001) TPM. Figure 1. Computing Node
1. Overview Two major components exist in our current prototype systems: the management node, including the Cloud Controller, Cluster Controller, Walrus and EBS, and the computing node, i.e. the Node Controller
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
IP networks Introduction to laboratory
IP networks Introduction to laboratory Piotr Pacyna, Katarzyna Kosek-Szott, Szymon Szott Working environment Laboratory exercises are based on netkit (www.netkit.org), a virtualization system, which allows
Version Author(s) E-mail Web Description
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Netkit The poor man s system for experimenting computer networking Version Author(s) E-mail Web
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
Bridgewalling - Using Netfilter in Bridge Mode
Bridgewalling - Using Netfilter in Bridge Mode Ralf Spenneberg, [email protected] Revision : 1.5 Abstract Firewalling using packet filters is usually performed by a router. The packet filtering software
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
The Book of GNS3 2015 by Jason C. Neumann
7 Device Nodes, Live SwiTChes, and the Internet In this chapter, I ll demonstrate how GNS3 device nodes are used with Cisco IOS routers. GNS3 provides a Hub node and various Switch nodes, including an
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
Network Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID
Network Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID Contents Introduction Types of Virtualization Network Virtualization OS Virtualization OS Level Virtualization Some Virtualization
How To Install Openstack On Ubuntu 14.04 (Amd64)
Getting Started with HP Helion OpenStack Using the Virtual Cloud Installation Method 1 What is OpenStack Cloud Software? A series of interrelated projects that control pools of compute, storage, and networking
Create bridges, add ports, show bridge and port statistics, status, as well as the OVS database
1 Introduction This document provides instructions on how to configure Pica8 s open switches to work in various application scenarios This document assumes the reader with minimal to no knowledge of the
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider
Platform as a Service and Container Clouds
John Rofrano Senior Technical Staff Member, Cloud Automation Services, IBM Research [email protected] or [email protected] Platform as a Service and Container Clouds using IBM Bluemix and Docker for Cloud
Open Source Network: Software-Defined Networking (SDN) and OpenFlow
Open Source Network: Software-Defined Networking (SDN) and OpenFlow Insop Song, Ericsson LinuxCon North America, Aug. 2012, San Diego CA Objectives Overview of OpenFlow Overview of Software Defined Networking
IP, Ethernet and MPLS
IP, Ethernet and MPLS Networks Resource and Fault Management Andre Perez ISTE WILEY Table of Contents Preface xi Chapter 1. Network Operation 1 1.1. Basic concepts 1 1.1.1. Layered structure 1 1.1.2. LANs
How to Create, Setup, and Configure an Ubuntu Router with a Transparent Proxy.
In this tutorial I am going to explain how to setup a home router with transparent proxy using Linux Ubuntu and Virtualbox. Before we begin to delve into the heart of installing software and typing in
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Procedure to Create and Duplicate Master LiveUSB Stick
Procedure to Create and Duplicate Master LiveUSB Stick A. Creating a Master LiveUSB stick using 64 GB USB Flash Drive 1. Formatting USB stick having Linux partition (skip this step if you are using a new
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
IPv6 Fundamentals, Design, and Deployment
IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
APPLICATION NOTE. How to build pylon applications for ARM
APPLICATION NOTE Version: 01 Language: 000 (English) Release Date: 31 January 2014 Application Note Table of Contents 1 Introduction... 2 2 Steps... 2 1 Introduction This document explains how pylon applications
AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0
Course Outline AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0 Module 1: MPLS Features Lesson 1: Describing Basic MPLS Concepts Provide an overview of MPLS forwarding, features,
Network Architecture Validated designs utilizing MikroTik in the Data Center
1-855-MIKROTIK Network Architecture Validated designs utilizing MikroTik in the Data Center P R E S E N T E D B Y: K E V I N M Y E R S, N E T W O R K A R C H I T E C T / M A N AG I N G PA R T NER I P A
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
How Linux kernel enables MidoNet s overlay networks for virtualized environments. LinuxTag Berlin, May 2014
How Linux kernel enables MidoNet s overlay networks for virtualized environments. LinuxTag Berlin, May 2014 About Me: Pino de Candia At Midokura since late 2010: Joined as a Software Engineer Managed the
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
BFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
