Locator/ID Separation Protocol: do we really need such a thing?
|
|
|
- Gerald Walsh
- 9 years ago
- Views:
Transcription
1 Locator/ID Separation Protocol: do we really need such a thing? GBR'11 - Beyond Networking Luigi Iannone Senior Research Scientist Deutsche Telekom Laboratories The Internet as we know it?
2 Who remembers where each of us is working? There is a difference between who we are (ID) and where we are (location in a certain context) L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 2
3 Who remembers where Christophe is working? We tend to remember (cache) where (location) someone (ID) is ( communication ) when we have frequent contact L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 3
4 What does it mean? We do not keep detailed contact information of everybody but we are able to locate people we want to communicate with. It scales L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 4
5 Anybody remembers resolv.txt? Simple Proactive. but turned out to be a nightmare to maintain! An then came on-demand DNS! L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 5
6 Where am I heading? Internet Routing & Address Infrastructure is a two-tier proactive communist system designed for single connected end-hosts! L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 6
7 The two-tier Architecture Do you speak BGP? Internet ( DFZ ) ASx ASy L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 7
8 Designed for single-connected end-hosts AS X ASWiF i AS Y ASG Internet AS4 G That's why we designed Mobile IP L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 8
9 Communism... People are the State, the State is the people Rekhter s Law Addressing can follow topology or topology can follow addressing. Choose one. L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 9
10 Proactively tell everything to everybody Jan-94 to 14-March-11 Source: L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 10
11 The BGP s FIB inflation problem 01-Jan-94 to 14-March-11 Source: Peak Prefix Update Rate per Second IPv4 IPv6 BGP Forwarding Information Base (FIB) and Churn Explosion: PI (Provider Independent) prefix Churn can have peaks of thousands per assignment seconds Multi-homing Churn increases the need processing Traffic-Engineering power... L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 11
12 .. and some of the reasons! Security: Remember the youtube incident? Big CDNs de-aggregate to avoid prefix hijacking Moore s Law The number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years True for high-volume productions, not for low-volume highly specialized hardware like routers Rekhter s Law Addressing can follow topology or topology can follow addressing. Choose one. Due to: Overloaded IP Address Semantic The single connection design of the Internet L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 12
13 Is the Sky falling? 01-Jan-94 to 14-March-11 Source: Let s be clear: There is no hard scaling limit We need: Improve Scalability ( Internet Reduce OpEx (make a cheaper L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 13
14 More Formally: Internet s Scaling Issues It is commonly recognized that today s Internet routing and addressing system is facing serious scaling problems. D. Meyer, L. Zhang, K. Fall, Report from IAB Workshop on Routing and Addressing, RFC 4984, IETF, September L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 14
15 After more than two years of discussion at the IRTF (Internet Research Task Force)... Along with a plethora of proposals: ( LISP ) Locator/ID Separation Protocol ( RANGI ) Routing Architecture for the Next Generation Internet ( Ivip ) Internet Vastly Improved Plumbing ( hipv4 ) Hierarchical IPv4 Framework Name Overlay (NOL) Service for Scalable Internet Routing ( CRM ) Compact Routing in a Locator Identifier Mapping System ( LMS ) Layered Mapping System Two-Phased Mapping ( GLI-Split ) Global Locator, Local Locator, and Identifier Split ( TIDR ) Tunneled Inter-Domain Routing ( ILNP ) Identifier-Locator Network Protocol ( EEMDP ) Enhanced Efficiency of Mapping Distribution protocols in Map-and-Encap Schemes Evolution The Research Group has rough consensus that separating identity from location is desirable and technically feasible. However, the Research Group does NOT have consensus on the best engineering approach to such an identity/location split. Name-Based Sockets ( IRON-RANGER ) Routing and Addressing in Networks with Global Enterprise Recursion ( HAIR ) Hierarchical Architecture for Internet Routing From RFC 6115: Recommendation for a Routing Architecture L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 15
16 Locator/ID Separation in one Slide ( LISP ) Map & Encap with Locator/ID Separation Protocol Internet RLOC 2 EIDx RLOC 1 EIDy ASx ASy RLOC 1 EIDx RLOC 2 EIDy EIDx RLOC 2 RLOC 2 EIDx EIDy EIDx EIDy Bindings between ID and Locators: Mappings EIDy EIDx EIDy RLOC 1 EIDx RLOC 1 EIDy RLOC 2 EIDx RLOC 2 EIDy L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 16
17 So... do we really need it? L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 17
18 Well... it helps alleviating some issues FIB: ( Zone shrunk since stub AS do not inject anything in the DFZ (Default Free PI Addresses: Just a matter of changing RLOCs Multi-Homing: Just a list of RLOCs TE: Just a matter of giving priorities to RLOCs Churn: Flapping Edge AS are not anymore in the DFZ Additional Benefits: Mobility Support Path Diversity L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 18
19 But it is much more... L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 19
20 1. We can use it for Mobility in Mesh Networks... Map-Server Bob: WMR1 Alice: WMR3 Alice: WMR4 Bob: WMR1 WMR 5 WMR 6 WMR 4 WMR 1 WMR 2 WMR 3 Bob: WMR1 Bob Alice L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 20
21 2. We can use it in small devices like smartphones.. Flow-Optimizer Applications Applications use the EID only (Loopback ( Interface Cisco - UPC Linux Implementation: Dynamic IP (Locator) assigned by your 4G Service Provider ( Locator ) Dynamic IP assigned by your WiFi Service Provider Smart TE Manager LISP 4G if WiFi if Loopback Traffic goes through LISP LISP tunnels through appropriate interface ( EID ) Static IP assigned by your MO Service Provider L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 21
22 3. Can we finally have seamless connectivity? AS X ASWiF i AS Y ASG Internet AS4 G L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 22
23 4. WiFi Offloading AS X ASWiF i AS Y ASG Internet AS4 G What to offload? When to offload? How to offload? What support to put in the network? L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 23
24 5. MOaaS: Mobile Offloading As A Service AS X ASWiF i AS Y ASG Internet AS4 G Mobile Offload Service Provider: Third part connection manager on the smartphone Proxy in the network Tunnel in between L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 24
25 6. We can use it in Huge and Nano Data Centres Load balancing on VM Traffic Engineering WM mobility/migration ( distribution VPN (even for content L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 25
26 7. Can the Internet Architecture be recursive? Internet ( DFZ ) ASx ASy L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 26
27 Revolution through Evolution? From Divide and Conquer to Split and Scale? Open Research Issues: Mapping Distribution Design Gain know-how on loc/id split Mobility Traffic Engineering Scalability Data-Centers ( centers Set-top Boxes (nano data Source L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 27
28 ?? /* */ L. Iannone - Deutsche Telekom Laboratories GBR Beyond Networking 28
The Benefits. Locator/ID Separation
INL: IP Networking Lab Université Catholique de Louvain The Benefits of Locator/ID Separation AGAVE: A lightweight Approach for Viable End-to-end IP-based QoS Services Joint Work: L. Iannone, O.Bonaventure,
Multihoming: An Overview
Multihoming: An Overview & a brief introduction to GSE(8+8) Lixia Zhang IAB BOF on IPv6 Multihoming RIPE 2006 Customer network 1 1.1.16.0/20 Single Home Global Routing Table...... 1.1.0.0/16 2.2.0.0/16.......
A Review of IPv6 Multihoming Solutions
A Review of IPv6 Multihoming Solutions Habib Naderi Department of Computer Science University of Auckland Auckland, New Zealand [email protected] Brian E. Carpenter Department of Computer Science
Simplify Your Route to the Internet:
Expert Reference Series of White Papers Simplify Your Route to the Internet: Three Advantages of Using LISP 1-800-COURSES www.globalknowledge.com Simplify Your Route to the Internet: Three Advantages of
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
draft-forwarding-label-ccn- 01.txt
draft-forwarding-label-ccn- 01.txt Ravi Ravindran and Asit Chakraborti Huawei (IETF/ICNRG, Yokohama, 94) [[email protected]] [[email protected]] Agenda Draft Objectives Terminology Why
Implementing a BGP-Free ISP Core with LISP
Implementing a BGP-Free ISP Core with LISP Florin Coras, Damien Saucez, Loránd Jakab, Albert Cabellos-Aparicio, and Jordi Domingo-Pascual Universitat Politècnica de Catalunya, Barcelona, Spain INRIA, Sophia
Traffic Engineering for Pan-African Research and Education Network: Software Defined Internet exchange Points
Traffic Engineering for Pan-African Research and Education Network: Software Defined Internet exchange Points Josiah Chavula Supervisors: A/Prof. Hussein Suleman, A/Prof. Antoine Bagula 1 Introduction
CLASSLESS INTER DOMAIN ROUTING - CIDR
CLASSLESS INTER DOMAIN ROUTING - CIDR Marko Luoma Helsinki University of Technology Laboratory of Telecommunications Technology [email protected] ABSTRACT As the Internet evolved and become more familiar
Transitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Scaling the Internet with LISP
Scaling the Internet with LISP Olivier Bonaventure Department of Computing Science and Engineering Université catholique de Louvain (UCL) Place Sainte-Barbe, 2, B-1348, Louvain-la-Neuve (Belgium) http://inl.info.ucl.ac.be
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
www.alcatel-lucent.com
Dynamic Compact Routing Project www.alcatel-lucent.com Kick-off meeting - Jan 16, 2009 INRIA Sophia-Antipolis Dimitri Papadimitriou Alcatel-Lucent BELL NV [email protected] 1 September
A BETTER INTERNET WITHOUT IP ADDRESSES. Craig A. Shue
A BETTER INTERNET WITHOUT IP ADDRESSES Craig A. Shue Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the Department
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing
White Paper Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing What You Will Learn With the exhaustion of IPv4 addresses, businesses and government agencies
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System
LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System Loránd Jakab, Albert Cabellos-Aparicio, Florin Coras, Damien Saucez and Olivier Bonaventure 1 Abstract During the last years several operators
Using LISP for Secure Hybrid Cloud Extension
Using LISP for Secure Hybrid Cloud Extension draft-freitasbellagamba-lisp-hybrid-cloud-use-case-00 Santiago Freitas Patrice Bellagamba Yves Hertoghs IETF 89, London, UK A New Use Case for LISP It s a use
Traffic & Peering Analysis
Traffic & Peering Analysis or how I learned to stop worrying and love route hijacking Pete Crocker [email protected] Agenda Alternate methods of traffic / peering analysis Traffic Matrices Pros & Cons
MOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
Multihoming Management for Future Networks
Mobile Network and Applications manuscript No. (will be inserted by the editor) Multihoming Management for Future Networks Bruno Sousa Kostas Pentikousis Marilia Curado Received: 2010-11-15 / Accepted:
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
Lecture 18: Border Gateway Protocol"
Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed
Strategies for Getting Started with IPv6
Strategies for Getting Started with IPv6 IPv6 Transition Acceleration Options for Web Applications and Services By Scott Hogg GTRI - Director of Technology Solutions CCIE #5133, CISSP #4610 IPv6 Transition
Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor
642-902 Route: Implementing Cisco IP Routing Course Introduction Course Introduction Module 01 - Planning Routing Services Lesson: Assessing Complex Enterprise Network Requirements Cisco Enterprise Architectures
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Network-Based Protocol Innovations in Secure Encryption Environments
Network-Based Protocol Innovations in Secure Encryption Environments Using Locator/ID Separation Protocol (LISP) to Optimize Routing in IP Encryption Environments Craig Hill Distinguished Systems Engineer
LISP Functional Overview
CHAPTER 2 This document assumes that the reader has prior knowledge of LISP and its network components. For detailed information on LISP components, their roles, operation and configuration, refer to http://www.cisco.com/go/lisp
How To Understand The Power Of Icdn
MobiArch 2014 R-iCDN: an Approach Supporting Flexible Content Routing for ISP-operated CDN Song Ci High Performance Network Lab, Institute of Acoustics, Chinese Academy of Sciences Outline I. Background
IPv6, Perspective from small to medium ISP
IPv6, Perspective from small to medium ISP April 13 th, 2010 INET Conference, Hong Kong Christian Dwinantyo Overview Some myths and facts about IPv6 Implementation Strategy Before you begin Case study:
IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2. A Thesis by.
IMPLEMENTATION OF LOCATION IDENTIFIER SEPARATION PROTOCOL (LISP) ROUTING PROTOCOL IN NETWORK SIMULATOR 2 A Thesis by Prithvi Manduva B.Tech, Progressive Engineering College, JNTU 2008 Submitted to the
A PKI For IDR Public Key Infrastructure and Number Resource Certification
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)
Mitigation of Breaking Connections (a.k.a. OLSRd v1 Multi-Gateway & BRDP) About Me Ferry Huberts Self-Employed Open Source Entrepreneur Lead Committer for OLSRd v1 Committer in several other projects Mainly
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
Address Scheme Planning for an ISP backbone Network
Address Scheme Planning for an ISP backbone Network Philip Smith Consulting Engineering, Office of the CTO Version 0.1 (draft) LIST OF FIGURES 2 INTRODUCTION 3 BACKGROUND 3 BUSINESS MODEL 3 ADDRESS PLAN
VPN Technologies: Definitions and Requirements
VPN Technologies: Definitions and Requirements 1. Introduction VPN Consortium, January 2003 This white paper describes the major technologies for virtual private networks (VPNs) used today on the Internet.
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Developing an IPv6 Addressing Plan Guidelines, Rules, Best Practice
Developing an IPv6 Addressing Plan Guidelines, Rules, Best Practice Ron Broersma DREN Chief Engineer SPAWAR Network Security Manager [email protected] Introduction IPv6 deployment includes: obtaining
Table of Contents. Cisco IP Addressing and Subnetting for New Users
Table of Contents IP Addressing and Subnetting for New Users...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Additional Information...1 Understanding IP
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
ICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
The Complete IS-IS Routing Protocol
Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2
Group Encrypted Transport VPN
Group Encrypted Transport VPN Petr Růžička [email protected] Cisco Systems Czech Republic V Celnici 10, 117 21 Praha Abstract Today's networked applications, such as voice and video, are accelerating
Load balancing and traffic control in BGP
DD2491 p2 2009/2010 Load balancing and traffic control in BGP Olof Hagsand KTH /CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better
LISP & NERD: An application person s adventure in routing
LISP & NERD: An application person s adventure in routing Eliot Lear DIMACS Routing & Security Workshop Before we start The purpose of this talk: Not to push NERD NERD was an experiment to demonstrate
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
Oblivious DDoS Mitigation with Locator/ID Separation Protocol
Oblivious DDoS Mitigation with Locator/ID Separation Protocol Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi Nara Institute of Science and Technology, Japan {kazuya-o, hiroa-ha, youki-k}@is.naist.jp
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Introduction to The Internet
Introduction to The Internet ISP Workshops Last updated 5 September 2014 1 Introduction to the Internet p Topologies and Definitions p IP Addressing p Internet Hierarchy p Gluing it all together 2 Topologies
Load balancing and traffic control in BGP
DD2491 p2 2011 Load balancing and traffic control in BGP Olof Hagsand KTH CSC 1 Issues in load balancing Load balancing: spread traffic on several paths instead of a single. Why? Use resources better Can
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services
Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,
SDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
E6998-02: Internet Routing
E6998-02: Internet Routing Lecture 13 Border Gateway Protocol, Part II John Ioannidis AT&T Labs Research [email protected] Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures
Introduction to The Internet. ISP/IXP Workshops
Introduction to The Internet ISP/IXP Workshops 1 Introduction to the Internet Topologies and Definitions IP Addressing Internet Hierarchy Gluing it all together 2 Topologies and Definitions What does all
Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.
Where MPLS part I explains the basics of labeling packets, it s not giving any advantage over normal routing, apart from faster table lookups. But extensions to MPLS allow for more. In this article I ll
Simple Multihoming. ISP Workshops. Last updated 30 th March 2015
Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Building Nameserver Clusters with Free Software
Building Nameserver Clusters with Free Software Joe Abley, ISC NANOG 34 Seattle, WA, USA Starting Point Discrete, single-host authoritative nameservers several (two or more) several (two or more) geographically
Implementing Object Tracking on Cisco IOS XR Software
Implementing Object Tracking on Cisco IOS XR Software This module describes the configuration of object tracking on your Cisco IOS XR network. For information about its application in IPSec, see Cisco
What is SDN all about?
What is SDN all about? Emil Gągała Juniper Networks Piotr Jabłoński Cisco Systems In the beginning there was a chaos CLOUD BUILDING BLOCKS CAN I VIRTUALIZE MY Compute Network? Storage Where is my money?
Top IT Pain Points: Addressing the bandwidth issues with Ecessa solutions
Top IT Pain Points: Addressing the bandwidth issues with Ecessa solutions TABLE OF CONTENTS 02 02 05 07 08 Introduction Reliability Performance Scalability Flexibility 1 Amazon lost almost $31,000 per
Customized BGP Route Selection Using BGP/MPLS VPNs
Customized BGP Route Selection Using BGP/MPLS VPNs Laurent Vanbever Université catholique de Louvain, BE!"#$%&'()"&*%+%$,#-./#+"0&(*% Pierre Francois (UCLouvain, BE), Olivier Bonaventure (UCLouvain, BE)
The Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
Mobility Management Framework in Software Defined Networks
, pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea [email protected]
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
ETHEL THE AARDVARK GOES BGP ROUTING
Fable Of Contents ISP TECH TALK by Avi Freedman ETHEL THE AARDVARK GOES BGP ROUTING In this exciting column we'll actually walk through configuring a Cisco router for BGP. It's very important, however,
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
