Scaling the Internet with LISP
|
|
|
- Karin Henderson
- 10 years ago
- Views:
Transcription
1 Scaling the Internet with LISP Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve (Belgium) 1
2 Scaling the Internet with LISP Issues with the current Internet architecture Separating Identifiers from Locators Locator-Identifier Separation Protocol (LISP) 2
3 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
4 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
5 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables CID works well pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
6 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables CID works well Growth is back pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
7 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables Internet bubble CID works well Growth is back pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
8 Issues with the current Internet architecture Interdomain routing scalability Growth of BGP routing tables Internet bubble CID works well Growth is back again! Growth is back pre-cid fast growth Evolution-Internet-Architecture/2008/ 3 Source : O. Bonaventure,
9 easons for the BGP growth Distribution of prefixes versus length /8 /9 - /15 /16 /17 /18 /19 /20 /21 /22 /23 /24 /25 - /32 4
10 easons for the BGP growth Why so many small prefixes? Allocation of IP prefixes to sites Initial solution chosen by IANA FCFS for all qualifying sites few constraints on which sites qualify for an IP prefix Once allocated, the prefix is owned by the site forever Solution introduced by Is after CID Two types of prefixes Provider Independent prefixes Given by Is to qualifying sites (basically ISPs paying their membership dues to the I) Owned by the site forever and can be globally announced Provider Aggregatable prefixes Given by ISPs from their own address block to customers Customers are expected to return their prefix to its owner if they change from ISP 5
11 Why do site prefer PI prefixes? Main reasons PI Sites own their prefix for eternity and can change of provider whenever they want PA prefixes cause a provider lock-in syndrome Changing the IP prefix used by a site is difficult IP addresses and prefixes are manually written in configurations files for routers DNS servers Firewalls DHCP servers printers voice and video equipment... Finding all the places where IP addresses and prefixes have been configured is difficult and error-prone With some care, it is possible to prepare an IPv6 site to ease a subsequent IP prefix renumbering, but unfortunately most configurations are not prepared for such a renumbering event 6
12 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS /17 2 A Provider AS123 I can reach / / /18 B I can reach /16 Global Internet Provider AS789 7
13 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS I can reach /16 A I can reach /16 and / /17 2 Provider AS / /18 B I can reach /16 Global Internet Provider AS789 7
14 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS I can reach /16 A I can reach /16 and / /17 2 Provider AS / /18 B I can reach /16 Global Internet Provider AS789 7
15 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS I can reach / /17 A I can reach /16 and / /17 2 Provider AS / /18 B I can reach /16 Global Internet Provider AS789 7
16 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS /17 2 I can reach / /17 A Provider I can reach AS /18 I can reach /16 and / / /18 I can reach / /18 B I can reach /16 Global Internet Provider AS789 7
17 easons for the BGP growth More are more network are internally fragmented Internet link is sometimes cheaper than normal link Client : AS /17 2 I can reach / /17 A Provider I can reach AS /18 I can reach /16 and / /17 and / / /18 I can reach / /18 B I can reach /16 and /18 Global Internet Provider AS789 7
18 easons for the BGP growth easons for the BGP growth Multihoming /16 2 I can reach /16 Provider AS /16 Provider AS789 I can reach /16 Global Internet 8
19 easons for the BGP growth easons for the BGP growth Multihoming Client : AS /16 2 Provider AS123 I can reach / /16 Provider AS789 I can reach /16 Global Internet 8
20 easons for the BGP growth easons for the BGP growth Multihoming Client : AS / /16 2 Provider AS123 I can reach / /16 Provider AS789 I can reach /16 Global Internet 8
21 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach / /23 Provider AS /16 Provider AS789 I can reach /16 Global Internet 8
22 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach / /23 I can reach /23 Provider AS /16 Provider AS789 I can reach /16 Global Internet 8
23 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach / /23 I can reach /23 Provider AS /16 Provider AS789 I can reach /16 and /23 Global Internet 8
24 easons for the BGP growth easons for the BGP growth Multihoming Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /23 Provider AS /16 Provider AS789 I can reach /16 and /23 Global Internet 8
25 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS / /16 2 Provider AS123 I can reach / /16 Provider AS789 I can reach /16 Internet 9
26 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach / /23 I can reach /24 Provider AS /16 I can reach /16 Provider AS789 Internet 9
27 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /24 Provider AS /16 I can reach /16 and /24 Provider AS789 Internet 9
28 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /24 Provider AS /16 I can reach /16 and /24 Provider AS789 Internet 9
29 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS I can reach / /16 2 I can reach /16 and / /23 I can reach /24 Provider AS /16 I can reach /16 and /24 Provider AS789 Internet 9
30 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS /23 1 I can reach /24 and / /16 Provider AS789 I can reach / /16 and /23 2 I can reach /16 Provider AS123 and /24 I can reach /16 and /24 Internet 9
31 easons for the BGP growth easons for the BGP growth Traffic engineering Client : AS /23 1 I can reach /24 and / /16 Provider AS789 I can reach / /16 and /23 2 I can reach /16 Provider AS123 and /24 and /23 I can reach /16 and /24 and /23 Internet 9
32 Interdomain routing security Interdomain routing security Only Best Current Practices from network operators prevent a customer network from using BGP to announce the prefix of someone else Misconfigurations (fat fingers) are frequent 10
33 Issues with the current Internet architecture Limited size of IPv4 addressing space Weʼve seen this problem before and NAT, CID and IPv6 have been proposed... Evolution-Internet-Architecture/2008/ 11 Source O. Bonaventure,
34 Issues with the current Internet architecture Limited size of IPv4 addressing space Weʼve seen this problem before and NAT, CID and IPv6 have been proposed... Evolution-Internet-Architecture/2008/ 11 Source O. Bonaventure,
35 Scaling the Internet with LISP Issues with the current Internet architecture Separating Identifiers from Locators Locator-Identifier Separation Protocol (LISP) 12
36 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Applic. Transport Network DataLink Applic. Transport Network DataLink 13
37 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Applic. Transport Network DataLink Applic. Transport Network DataLink 13
38 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Applic. Transport Network DataLink Applic. Transport Network DataLink 13
39 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
40 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
41 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
42 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
43 The complementary roles of IP addresses The IP addresses currently used by endhosts play two complementary roles Identifier role : the IP address identifies (with port) the endpoint of transport flows Locator role : the IP address indicates the paths used to reach the endhost these paths are updated by routing protocols after each topology change Applic. Transport Network DataLink Applic. Transport Network DataLink 13
44 Existing identifiers Loopback addresses are already used as identifiers, but only on routers / / / /
45 Existing identifiers Loopback addresses are already used as identifiers, but only on routers / / / / In contrast with endhost addresses and normal addresses on routers, loopback addresses are not tied to a particular physical interface a loopback address is always reachable provided that one of the routerʼs interfaces remains up loopback addresses are often used as identifiers this is only possible because the loopback addresses are directly advertised by the routing protocols 14
46 Principle of the Host-based solutions Transport layer IP routing sublayer 15
47 Principle of the Host-based solutions Transport layer Identifier : Id.A IP routing sublayer 15
48 Principle of the Host-based solutions Transport layer Identifier : Id.A IP routing sublayer Locators { Green.1, ed.2} 15
49 Principle of the Host-based solutions Transport layer Identifier : Id.A IP routing sublayer Locators { Green.1, ed.2} 15
50 Principle of the Host-based solutions Transport layer Identifier : Id.A Specific sublayer IP routing sublayer Locators { Green.1, ed.2} oles Translates the packets so that Transport layer always sees only the host identifier IP outing sublayer sees only locators Manages the set of locators Securely switches from one locator to another upon move or after link failure each host maintains some state 15
51 Principles of the Network-based solutions Transport layer IP routing sublayer 16
52 Principles of the Network-based solutions Hostʼs IP stack unchanged Each host has one stable IP address used as identifier not globally routed Transport layer Identifier : IPA IP routing sublayer 16
53 Principles of the Network-based solutions Hostʼs IP stack unchanged Each host has one stable IP address used as identifier not globally routed Transport layer Identifier : IPA IP routing sublayer Locators { IPGreen.A, IPed.A} 16
54 Principles of the Network-based solutions Hostʼs IP stack unchanged Each host has one stable IP address used as identifier not globally routed Transport layer Identifier : IPA IP routing sublayer Each edge router owns globally routed addresses used as locators Mapping mechanism is used to find locator associated to one identifier Packets from hosts are modified before being sent on Internet Locators { IPGreen.A, IPed.A} 16
55 Scaling the Internet with LISP Issues with the current Internet architecture Separating Identifiers from Locators Locator-Identifier Separation Protocol (LISP) 17
56 The Locator Identifier Separation Protocol Principles Define a router-based solution where current IP addresses are separated in two different spaces EndPoint Identifiers (EID) are used to identify endhosts. They are non-globally routable. Hosts in a given site are expected to use EIDs in the same prefix. outing Locators (LOC) are globally routable and are attach to routers A mapping mechanism allows to map an EndPoint Identifier onto the outing Locator(s) of the site router(s) outers encapsulate the packets received from hosts before sending them towards the destination LOC 18
57 LISP : design goals Main design goals Minimize required changes to Internet equire no hardware no software changes to endsystems (hosts) Be incrementally deployable equire no router hardware changes Minimize router software changes Avoid or minimize packet loss when EID-to-LOC mappings need to be performed 19
58 LISP : simple example AS /8 0100: DD:: Provider1 - AS /8 Provider2 - AS / : FF:: : FE::
59 LISP : simple example AS /8 0100: DD:: Provider1 - AS /8 Provider2 - AS / : FF::1234 S: 0100: FF::1234 D: 0100: FE:: : FE::
60 LISP : simple example AS /8 0100: DD:: Provider1 - AS /8 Provider2 - AS / S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
61 LISP : simple example Mapping System AS /8 Mapping request Where is 0100: DD: : DD::8765 Provider1 - AS /8 Provider2 - AS / S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
62 LISP : simple example Mapping reply for 0100: DD::8765 LOC Mapping System LOC AS /8 Mapping request Where is 0100: DD: : DD::8765 Provider1 - AS /8 Provider2 - AS / S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
63 LISP : simple example AS /8 Provider1 - AS /8 Outer header S: D: Inner S: 0100: FF::1234 D: 0100: DD:: Provider2 - AS /8 0100: DD:: S: 0100: FF::1234 D: 0100: DD:: : FF:: : FE::
64 LISP : Terminology AS / : DD::8765 Provider1 - AS /8 Provider2 - AS / : FF:: : FE::
65 LISP : Terminology AS / : DD::8765 Provider1 - AS /8 Provider2 - AS / Ingress Tunnel outer (IT) : A router which accepts a packet containing a single IP header. The router maps 1 the destination address of the 2packet to an LOC and prepends a LISP header before forwarding the encapsulated packet. 0100: FF:: : FE::
66 LISP : Terminology AS /8 Provider1 - AS / Provider2 - AS /8 0100: DD::8765 Egress Tunnel outer (ET) : A router which accepts a LISP encapsulated packet. The router strips the LISP header and forwards the packet based on the next header Ingress Tunnel outer (IT) : A router which accepts a packet containing a single IP header. The router maps 1 the destination address of the 2packet to an LOC and prepends a LISP header before forwarding the encapsulated packet. 0100: FF:: : FE::
67 LISP : Terminology EID-to-LOC Database : a globally distributed database that contains all know EID-prefix to LOC mappings. AS /8 Provider1 - AS / Provider2 - AS /8 0100: DD::8765 Egress Tunnel outer (ET) : A router which accepts a LISP encapsulated packet. The router strips the LISP header and forwards the packet based on the next header Ingress Tunnel outer (IT) : A router which accepts a packet containing a single IP header. The router maps 1 the destination address of the 2packet to an LOC and prepends a LISP header before forwarding the encapsulated packet. 0100: FF:: : FE::
68 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum Source outing Locator Destination outing Locator 22
69 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum Source outing Locator Destination outing Locator UDP Src port : xxxx Dst port : 4341 UDP Length UDP checksum 22
70 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP Source outing Locator Destination outing Locator Src port : xxxx Dst port : 4341 UDP Length UDP checksum Source port should be random Destination port set to
71 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP LISP header Src port : xxxx Dst port : 4341 UDP Length UDP checksum Locator reach bits S E es. Source outing Locator Destination outing Locator Nonce Source port should be random Destination port set to
72 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP LISP header Src port : xxxx Dst port : 4341 UDP Length UDP checksum Locator reach bits S E es. Source outing Locator Destination outing Locator Nonce Source port should be random Destination port set to 4341 Used to indicate which xt are up. 22
73 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum UDP LISP header Src port : xxxx Dst port : 4341 UDP Length UDP checksum Locator reach bits S E es. Source outing Locator Destination outing Locator Nonce Source port should be random Destination port set to 4341 Used to indicate which xt are up. Used to validate some control messages 22
74 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum S: Solicit Map equest E: Echo equest UDP LISP header Src port : xxxx Dst port : 4341 UDP Length S E es. Source outing Locator Destination outing Locator UDP checksum Locator reach bits Nonce Source port should be random Destination port set to 4341 Used to indicate which xt are up. Used to validate some control messages 22
75 LISP data packet format 32 bits Ver IHL DS Total length Outer header Identification Flags Offset TTL Protocol Checksum S: Solicit Map equest E: Echo equest UDP LISP header Inner packet Src port : xxxx Dst port : 4341 UDP Length S E es. Ver Tclass Source outing Locator Destination outing Locator Payload Length UDP checksum Locator reach bits Nonce Flow Label NxtHdr Hop Limit Source EndPoint Identifier (128 bits) Source port should be random Destination port set to 4341 Used to indicate which xt are up. Used to validate some control messages 22
76 LISP Mapping Possible models for the mapping mechanism Push model LISP ET routers receive from a protocol to be designed the mapping tables that they need to use to map EIDs onto LOCs Pull model LISP ET routers refresh their mapping table by querying the mapping mechanism each time they receive a packet whose mapping is unknown Hybrid models Push is used to place popular or important mappings on LISP ET routers and they query for the less important mappings 23
77 NED A Not-so-novel EID to LOC Database The only proposed push model Composed of 4 parts a network database format; a change distribution format; a database retrieval/bootstrapping method; a change distribution method Principles An authority computes the mapping database based on the stored registrations The database signed by the authority is stored on servers IT poll regularly the database servers to update their own mapping database 24
78 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Nonce Source-AFI IT-AFI Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
79 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message Number of records in map-request 1 Flags eserved ec.# Nonce Source-AFI IT-AFI Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
80 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Number of records in map-request andom in request, copied in reply Nonce Source-AFI IT-AFI Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
81 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data 25
82 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data mask length of EID prefix 25
83 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data AFI of the requested mapping mask length of EID prefix 25
84 LISP mapping messages Sent over UDP destination port 4342 source port random Map-request message 1 Flags eserved ec.# Source-AFI Nonce IT-AFI Number of records in map-request andom in request, copied in reply LOC of the IT sending the map-request message Source-EID Address Originating IT LOC es. masklen AFI EID-prefix Mapping protocol data EID prefix for which the mapping is requested AFI of the requested mapping mask length of EID prefix 25
85 LISP mapping messages Map-reply message format sent over UDP E C O D 2 eserved ec.# Nonce ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
86 LISP mapping messages Copied from Mapequest Map-reply message format sent over UDP 2 eserved ec.# Nonce E C O D ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
87 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce E C O D ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
88 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides E C O D ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data 26
89 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest E C O D 2 eserved ec.# Nonce ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not 26
90 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest E C O D 2 eserved ec.# Nonce ecord TTL Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not Priority : LOCs with lower priority are preferred. If several have same priority, load balance among them Weight : percentage of traffic to this LOC when load balancing is active 26
91 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce ecord TTL Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not Is record is reachable from responderʼs viewpoint? E C O D Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Priority : LOCs with lower priority are preferred. If several have same priority, load balance among them Weight : percentage of traffic to this LOC when load balancing is active 26
92 LISP mapping messages Map-reply message format sent over UDP Number of records in map-reply Copied from Mapequest 2 eserved ec.# Nonce ecord TTL Lifetime of record ( min. ) 0: remove from cache 0xffffffff: receiver decides Authoritative or not Is record is reachable from responderʼs viewpoint? E C O D Loc. # masklen A eserved eserved EID - AFI EID prefix Prio Weight MPrio MWeight Unused flags Loc-AFI Locator Mapping protocol data Priority : LOCs with lower priority are preferred. If several have same priority, load balance among them Weight : percentage of traffic to this LOC when load balancing is active Used for Multicast 26
93 How to control incoming traffic? LISP site can control incoming traffic with Weight and Priority A 0100: DD::8765/48 A primary, C backup Mapping for 0100:DD::/48 LOC , prio=1, weight=100 LOC , prio=99, weight=100 C
94 How to control incoming traffic? LISP site can control incoming traffic with Weight and Priority A 0100: DD::8765/48 A primary, C backup Mapping for 0100:DD::/48 LOC , prio=1, weight=100 LOC , prio=99, weight=100 C A 30%, C 70% Mapping for 0100:DD::/48 LOC , prio=1, weight=30 LOC , prio=1, weight=70 LISP IT will load balance layer 4 flows by using hash as in ECMP 27
95 Pull-based mapping systems LISP-ALT Built with an overlay composed of GE tunnels between LISP xts with BGP Solution implemented by Cisco and chosen by LISP WG LISP-DHT Mapping information is stored in a distributed hash table that is queried by ITs LISP-CONS New mapping protocol proposed earlier in WG... 28
96 LISP ALT A mapping mechanism that relies on an alternate topology to distribute mapping requests to mapping servers LISP IT routers sending mapping request messages to ALT routers ALT routers forward those mapping messages between themselves on an overlay topology built by using GE tunnels 29
97 LISP ALT (2) A2 EID: /16 A4 A5 A1 A3 A9 EID: /16 EID: /16 30
98 LISP ALT (2) A2 is authoritative for EID prefix /16 A2 EID: /16 A4 A5 A1 A3 A9 EID: /16 EID: /16 30
99 LISP ALT (2) A2 is authoritative for EID prefix /16 A2 BGP /16 via A2 EID: /16 A4 A5 A1 BGP /16 via A1 A3 A9 EID: /16 EID: /16 30
100 LISP ALT (2) A2 is authoritative for EID prefix /16 A4 aggregates and advertises /8 over ALT overlay EID: /16 A2 BGP /16 via A2 A5 A4 BGP /8 via A4 A1 BGP /16 via A1 A3 A9 EID: /16 EID: /16 30
101 LISP ALT (2) A2 is authoritative for EID prefix /16 A4 aggregates and advertises /8 over ALT overlay EID: /16 A2 BGP /16 via A2 A5 A4 BGP /8 via A4 EID: /16 A1 BGP /16 via A1 A3 BGP /0 via A3 A9 EID: /16 30
102 LISP - ALT : Example A2 EID: /16 A4 A5 A1 1 A3 A9 9 EID: /16 EID: /16 31
103 LISP - ALT : Example A2 EID: /16 A4 A5 A1 1 A3 A9 9 EID: /16 Src: Dst: EID: /16 31
104 LISP - ALT : Example A2 EID: /16 A4 A5 A1 1 Map request From ? A3 A9 9 EID: /16 Src: Dst: EID: /16 31
105 LISP - ALT : Example A2 EID: /16 A4 A5 EID: /16 A1 1 Src: Dst: A3 Map request From ? A9 9 EID: /16 31
106 LISP - ALT : Example A2 EID: /16 A4 A5 Src: 9 Dst:1 Map reply /16:9 EID: /16 A1 1 Src: Dst: A3 Map request From ? A9 9 EID: /16 31
107 LISP - ALT : Example A2 EID: /16 A4 A5 EID: /16 A1 1 Src: 9 Dst:1 Map reply /16:9 Src: Dst: A3 Map request From ? A9 9 EID: /16 31
108 LISP - ALT : Example A2 EID: /16 1 inserts /16=9 in its cache EID: /16 A1 1 Src: 9 Dst:1 Map reply /16:9 Src: Dst: A4 A3 A5 Map request From ? A9 9 EID: /16 31
109 LISP - ALT : Example EID: /16 1 inserts /16=9 in its cache EID: /16 A1 1 A2 Src: 9 Dst:1 Map reply /16:9 Src: Dst: A4 A3 A5 Map request From ? A9 9 EID: /16 The first packet can be sent over ALT topology with mapping request to reduce its delay 31
110 Issues with ALT Complex system with tunnels, BGP protocol (no discussion about policies),... Still relies on lots of error-prone manual configuration Scalability will depend on whether aggregation will be possible If mapping requests are lost due to congestion, difficult to diagnose the problem or send them via another path Security needs to be studied 32
111 The reachability problem in todayʼs Internet ET1 e/48 ET AS /8 IT1 In todayʼs Internet, routing protocols converge after a link failure to ensure that multihomed prefixes such as e remain reachable 33
112 The reachability problem in a LISP-based Internet ET1 e/48 ET AS / IT1 Mapping e/48 via and
113 The reachability problem in a LISP-based Internet ET1 e/48 ET AS / IT1 Mapping e/48 via and Upon failure of ET1-3, AS2 continues to advertise /8 as reachable to IT1 via BGP How can IT1 notice that ET1 is down and that it should use only ET2 ( ) to reach prefix e? 34
114 Solving the reachability problem with the reachability bits ET1 e/48 ET2 IP UDP LISP AS / IP UDP LISP IT1 Mapping e/48 via and
115 Solving the reachability problem with the reachability bits ET1 e/48 ET AS / IP UDP LISP IT1 Mapping e/48 via and
116 Solving the reachability problem with the reachability bits ET1 e/48 ET AS / IP UDP LISP IT1 Mapping e/48 via and When ET1 fails, it removes its default route from OSPF ET2 notices the failure and informs all ITs to which it is sending LISP encapsulated packets by setting the reachability bit of ET1 to 0 35
117 Solving the reachability problem with the reachability bits ET1 e/48 ET AS / IP UDP LISP IT1 Mapping e/48 via and When ET1 fails, it removes its default route from OSPF ET2 notices the failure and informs all ITs to which it is sending LISP encapsulated packets by setting the reachability bit of ET1 to 0 35
118 Solving the reachability problem with the SM bits ET1 e/48 ET AS / IT1 Mapping e/48 via and ET1-3 has been decommissioned and ET2 wants to force IT1 to update its mapping 36
119 Solving the reachability problem with the SM bits ET1 e/48 ET AS / S 1234 IP UDP LISP IT1 Mapping e/48 via and ET1-3 has been decommissioned and ET2 wants to force IT1 to update its mapping 36
120 Solving the reachability problem with the SM bits ET1 e/48 ET2 Mapequest IPv6 e IPv4-AFI AS / S 1234 IP UDP LISP IT1 Mapping e/48 via and ET1-3 has been decommissioned and ET2 wants to force IT1 to update its mapping 36
121 Solving the reachability problem with the SM bits ET1 e/48 ET2 Mapequest IPv6 e IPv4-AFI IT1 4 2 AS / S 1234 Mapeply Nonce=1234 e/48 via Mapping e/48 via and IP UDP LISP ET1-3 has been decommissioned and ET2 wants to force IT1 to update its mapping 36
122 Solving the reachability problem with the SM bits ET1 e/48 ET2 Mapequest IPv6 e IPv4-AFI IT1 4 2 AS / S 1234 Mapeply Nonce=1234 e/48 via Mapping e/48 via IP UDP LISP ET1-3 has been decommissioned and ET2 wants to force IT1 to update its mapping 36
123 Partial reachability problems ET1 e/48 ET AS / IT1 Mapping e/48 via and
124 Partial reachability problems ET1 e/48 ET AS / IT1 Mapping e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
125 Partial reachability problems ET1 e/48 ET IT1 4 2 AS /8 IP UDP Mapping LISP E 5678 e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
126 Partial reachability problems ET1 3 1 e/48 ET AS /8 IP UDP LISP E IT1 Mapping e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
127 Partial reachability problems ET1 3 1 e/48 ET IP UDP LISP AS / IT1 Mapping e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
128 Partial reachability problems ET1 e/48 ET IT1 4 2 AS2 IP /8 UDP LISP Mapping e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
129 Partial reachability problems ET1 e/48 ET AS / IT1 Mapping e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
130 Partial reachability problems ET1 e/48 ET IP UDP LISP E AS / IT1 Mapping e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
131 Partial reachability problems ET1 e/48 ET AS /8 IP UDP LISP IT1 Mapping e/48 via and ET1 is up and sends packets, but packets sent by IT1 do not reach ET1 How can IT1 detect this problem? 37
132 An evaluation of the cost of using LISP mappings Full Netflow (v7) on border router 1 Gigabit link to Belnet ~10000 users (/16 prefix block) Analysis: flow-tools + custom software /BGP Granularity of mappings iplane data set Source : Iannone, L. and Bonaventure, O On the cost Evolution-Internet-Architecture/2008/ 38 of caching locator/id mappings. In Proceedings of the 2007 ACM CoNEXT Conference L. Iannone,
133 Correspondent Prefixes Incoming Flows Correspondent Prefixes/Minute Outgoing Flows Union Hour Daily eport (Per-Minute Granularity) Evolution-Internet-Architecture/2008/ 39 L. Iannone,
134 Mappingsʼ Cache Size Number of Entries h 3 Min Timeout 30 Min Timeout 300 Min Timeout 12h 24h Evolution-Internet-Architecture/2008/ 40 L. Iannone,
135 Hit atio - Full PULL Model Hit atio (%) h 3 Min Timeout 30 Min Timeout 300 Min Timeout Evolution-Internet-Architecture/2008/ 41 12h 24h L. Iannone,
136 Traffic Volume per Entry CDF Mbytes 3 Min Timeout 30 Min Timeout 300 Min Timeout Evolution-Internet-Architecture/2008/ 42 L. Iannone,
137 Lookups - PULL Model 3 min timeout Timeout Period 1 LOC 2 LOCs 3 LOCs 3 min. Night 4 kbps 4.9 kbps 5.7 kbps Day 24.4 kpbs 29.2 kbps 34 kbps 30 min. Night kbps kbps 1.14 kbps Day 8.2 kbps 9.7 kbps 11.3 kbps 300 min. Night kbps kbps kbps Day 2.36 kbps 2.82 kbps 3.29 kbps Evolution-Internet-Architecture/2008/ 43 L. Iannone,
138 LISP challenges How to securely map one identifier onto the corresponding locators? (too) many proposals security not addressed convincingly scalability and performance are concerns How to deal with mobile hosts? Some discussions have started Is there enough incentive for edge networks to deploy this solution while they donʼt suffer from the cost of huge BGP routing tables? Other work within LISP WG Multicast LISP LISP Interworking 44
139 eferences LISP Working group Farinacci, D., et al., Locator/ID Separation Protocol (LISP), draft-ietf-lisp-02, 2009 Farinacci, D., et al., LISP Alternative Topology (LISP-ALT), draft-ietf-lisp-alt-02, Implementations Papers D. Meyer, The Locator/Identifier Separation Protocol, Internet Protocol Journal, L. Iannone et al., On the cost of caching locator/id mappings. CoNEXT 2007 L. Iannone, L. Mathy, LISP-DHT, earch
IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2. A Thesis by.
IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2 A Thesis by Prithvi Manduva B.Tech, Progressive Engineering College, JNTU 2008 Submitted to the
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System Loránd Jakab, Albert Cabellos-Aparicio, Florin Coras, Damien Saucez and Olivier Bonaventure 1 Abstract During the last years several operators
LISP Functional Overview
CHAPTER 2 This document assumes that the reader has prior knowledge of LISP and its network components. For detailed information on LISP components, their roles, operation and configuration, refer to http://www.cisco.com/go/lisp
The Benefits. Locator/ID Separation
INL: IP Networking Lab Université Catholique de Louvain The Benefits of Locator/ID Separation AGAVE: A lightweight Approach for Viable End-to-end IP-based QoS Services Joint Work: L. Iannone, O.Bonaventure,
LISP & NERD: An application person s adventure in routing
LISP & NERD: An application person s adventure in routing Eliot Lear DIMACS Routing & Security Workshop Before we start The purpose of this talk: Not to push NERD NERD was an experiment to demonstrate
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
Types of IPv4 addresses in Internet
Types of IPv4 addresses in Internet PA (Provider Aggregatable): Blocks of addresses that may be sub-assigned to other ISPs or to other companies that also may leased the addresses to their customers May
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
We Are HERE! Subne\ng
TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.
Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Future Internet Technologies
Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
Technology Brief IPv6 White Paper.
Technology Brief White Paper. Page 1 of 37 Table of Contents 1 Overview... 3 1.1 Background... 3 1.2 Advantages of... 5 2 Packet... 9 2.1 Basic Header... 9 2.1.1 Extension Headers... 11 2.1.2 ICMP Packet...
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
Wireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
IP Address Classes (Some are Obsolete) 15-441 Computer Networking. Important Concepts. Subnetting 15-441 15-641. Lecture 8 IP Addressing & Packets
Address Classes (Some are Obsolete) 15-441 15-441 Computer Networking 15-641 Class A 0 Network ID Network ID 8 16 Host ID Host ID 24 32 Lecture 8 Addressing & Packets Peter Steenkiste Fall 2013 www.cs.cmu.edu/~prs/15-441-f13
Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration
Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
Getting started with IPv6 on Linux
Getting started with IPv6 on Linux Jake Edge LWN.net [email protected] LinuxCon North America 19 August 2011 History and Motivation IPng project July 1994 IPv6 - RFC 2460 December 1998 IPv5 - Internet Stream
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements
Mobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
LISP A Multi-Homing and Mobility Solution for ATN using IPv6
ACP-WG I / IP01 International Civil Aviation Organization 15 July 2014 INFORMATION PAPER AERONAUTICAL COMMUNICATIONS PANEL (ACP) SEVENTEENTH MEETING OF WORKING GROUP - I Montreal, Canada 15 16 July 2014
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
A Review of IPv6 Multihoming Solutions
A Review of IPv6 Multihoming Solutions Habib Naderi Department of Computer Science University of Auckland Auckland, New Zealand [email protected] Brian E. Carpenter Department of Computer Science
Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy
Simplify Your Route to the Internet:
Expert Reference Series of White Papers Simplify Your Route to the Internet: Three Advantages of Using LISP 1-800-COURSES www.globalknowledge.com Simplify Your Route to the Internet: Three Advantages of
Interconnecting IPv6 Domains Using Tunnels
Interconnecting Domains Using Tunnels Version History Version Number Date Notes 1 30 July 2002 This document was created. 2 19 May 2003 Updated the related documents section. This document describes how
Chapter 13 Internet Protocol (IP)
Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Network-Based Protocol Innovations in Secure Encryption Environments
Network-Based Protocol Innovations in Secure Encryption Environments Using Locator/ID Separation Protocol (LISP) to Optimize Routing in IP Encryption Environments Craig Hill Distinguished Systems Engineer
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
- IPv4 Addressing and Subnetting -
1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI
Cisco IOS NetFlow Version 9 Flow-Record Format
Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: February 007 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
Introduction to LAN/WAN. Network Layer (part II)
Introduction to LAN/WAN Network Layer (part II) Topics The Network Layer Introduction Routing (5.2) The Internet (5.5) IP, IP addresses ARP (5.5.4) OSPF (5.5.5) BGP (5.5.6) Congestion Control (5.3) Internetworking
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January 2002. [email protected]. [email protected]. Using BGP topology information for DNS RR sorting
BGPDNS Using BGP topology information for DNS RR sorting a scalable way of multi-homing André Oppermann [email protected] Claudio Jeker [email protected] RIPE 41 Meeting Amsterdam, 15. January 2002 What
Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing
Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University
Preserve IP Addresses During Data Center Migration
White Paper Preserve IP Addresses During Data Center Migration Configure Cisco Locator/ID Separation Protocol and Cisco ASR 1000 Series Aggregation Services Routers 2015 Cisco and/or its affiliates. All
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Lecture 8. IP Fundamentals
Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities
ProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
IPv6 Advantages. www.compaq.com. Yanick Pouffary. [email protected]
IPv6 Advantages Yanick Pouffary [email protected] IPv6 FORUM A world-wide consortium of leading Internet vendors and Research and Education Networks The IPv6 FORUM mission To promote IPv6 in order
Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks
Internet Peering, IPv6, and NATs Mike Freedman V22.0480-005 Networks Internet Peering Review: Routing Internet has a loose hierarchy of domains Hosts now local router Local routers know site routers Site
Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino
Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
TCP/IP Fundamentals. Edmund Lam IT Audit Manager University of California [email protected] 7/25/99 1
TCP/IP Fundamentals Edmund Lam IT Audit Manager University of California [email protected] 7/25/99 1 What we will discuss: TCP/IP related to OSI Layers History of TCP/IP and what is it? TCP/IP Structure
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
The Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
