netkit lab Traffic Engineering with MPLS for Linux Version Author(s) F. Di Ciccio, F. Antonini (Kasko Networks S.r.l.)
|
|
|
- Jonas Parks
- 9 years ago
- Views:
Transcription
1 netkit lab Traffic Engineering with for Linux Version Author(s) Web Description 1.1 F. Di Ciccio, F. Antonini (Kasko Networks S.r.l.) Reviewed by M. Rimondini (Roma Tre University) An example with 5 routers (2 lers, 3 lsrs) and 2 hosts to show link protection on a link and node protection on a router, with
2 copyright notice All the pages/slides in this presentation, including but not limited to, images, photos, animations, videos, sounds, music, and text (hereby referred to as material ) are protected by copyright. This material, with the exception of some multimedia elements licensed by other organizations, is property of the authors and/or organizations appearing in the first slide. This material, or its parts, can be reproduced and used for didactical purposes within universities and schools, provided that this happens for non-profit purposes. Information contained in this material cannot be used within network design projects or other products of any kind. Any other use is prohibited, unless explicitly authorized by the authors on the basis of an explicit agreement. The authors assume no responsibility about this material and provide this material as is, with no implicit or explicit warranty about the correctness and completeness of its contents, which may be subject to changes. This copyright notice must always be redistributed together with the material, or its portions.
3 The Lab This lab is (highly) inspired to the example -Linux labs 4.2 Node Protection from [1] Goal: achieving fast & seamless rerouting in case of link/node failure using Approach: emulate fast rerouting by changing label swapping rules on the fly upon detecting link/node failures [1]
4 A3 30 eth0 Link / /24 2 eth2 1 eth1 Link3 2 eth3 Topology 1 eth2 1 eth3 2 eth0 Link1 Link2 Link / /24 3 eth2 3 eth /24 Link4 3 eth1 Link6 4 eth /24 4 eth1 4 eth2 Link /24 5 eth1 5 eth /24 20 eth2 A2
5 Network topology A3 and A2 are connected by an network (E1, E2, E3, E4, E5) Note: there are no VPNs, i.e., we use a single label For the traffic from A2 to A3 routers are configured to choose the best route (E4, E3, E1) If link 6 fails, all traffic between A2 and A3 is switched to a backup path (E4, E5, E2, E3, E1) If node E3 fails, all traffic between A2 and A3 is switched to a backup route (E4, E5, E2, E1)
6 100 Normal traffic A A2
7 Traffic with link 6 down A A2
8 Traffic with E3 down A A2
9 Basic configuration on end hosts A2.startup ifconfig eth2 down ifconfig eth netmask up ip route add /24 via dev eth2 ip route add /24 via dev eth2 A3.startup ifconfig eth0 down ifconfig eth netmask up ip route add /24 dev eth0 via ip route add /24 dev eth0 via
10 Router settings All routers load kernel modules at startup configuration on E5 is in E5.startup as usual configurations for E1-E4 are in external scripts found in shared/root/ (therefore /root inside virtual machines) These scripts take care of redirecting traffic as soon as failures are detected They periodically ping to check which routes are still available best: via E4, E3, E1 medium: via E4, E5, E2, E3, E1 low: via E4, E5, E2, E1
11 configuration on ler E1 _on_e1.sh #A2 >A3 default route mpls labelspace set dev eth3 labelspace 0 mpls ilm add label gen 200 labelspace 0 Enable eth3 to to receive traffic add an an entry on on ilm table in in order to to list (and pop) the incoming label (200) #A2 >A3 backup route mpls labelspace set dev eth2 labelspace 0
12 configuration on ler E1 #A3 >A2 default route _on_e1.sh var_best=`mpls nhlfe add key 0 instructions push gen 500 nexthop eth3 ipv grep key cut c 17 26` ip route add /24 via mpls $var_best New nhlfe entry #A3 >A2 backup route sequential number identifying the entry (0= new entry : a number will be be automatically assigned) var_low=`mpls nhlfe add key 0 instructions push gen 600 nexthop eth2 ipv grep key cut c 17 26`
13 configuration on ler E1 #A3 >A2 default route _on_e1.sh var_best=`mpls nhlfe add key 0 instructions push gen 500 nexthop eth3 ipv grep key cut c 17 26` ip route add /24 via mpls $var_best Push a label of of type gen and value #A3 >A2 backup route...and forward the packet to to a certain router var_low=`mpls nhlfe add key 0 instructions push gen 600 nexthop eth2 ipv grep key cut c 17 26`
14 configuration on ler E1 #A3 >A2 default route _on_e1.sh var_best=`mpls nhlfe add key 0 instructions push gen 500 nexthop eth3 ipv grep key cut c 17 26` ip route add /24 via mpls $var_best label label binding: instruct the the router router to to use use the the previously created nhlfe nhlfe to to forward the the packet #A3 >A2 backup route this this is is the the key key returned by by the the previous mpls mpls nhlfe nhlfe add add command note: note: here here we we are are defining a var_low=`mpls nhlfe add key 0 instructions push gen fec fec 600 nexthop eth2 ipv grep key cut c 17 26`
15 route="best" while [ "1" = "1" ] do case $route in best) esac done configuration on ler E1 Loop _on_e1.sh status=`/usr/sbin/hping3 c 1 icmp >&1 grep "100% packet loss\ Host Unreachable"` if [! z "$status" ] ;then # E3 is down switch to low route route="low"; ip route del /24 via mpls $var_best ip route add /24 via mpls $var_low fi ;; low) status=`/usr/sbin/hping3 c 1 icmp >&1 grep "100% packet loss\ Host Unreachable"` if [ z "$status" ] ;then # E3 is up again switch to best route route="best"; ip route del /24 via mpls $var_low ip route add /24 via mpls $var_best fi ;; We We are are on on the the best/medium route, route, ping ping to to see see if if E3 E3 is is still still up up E3 E3 is is down: down: traffic traffic directed to to network /24 is is switched from from E3 E3 to to E2 E2
16 configuration on ler E1 _on_e1.sh route="best" while [ "1" = "1" ] do case $route in best) status=`/usr/sbin/hping3 c 1 icmp >&1 grep "100% packet loss\ Host Unreachable"` if [! z "$status" ] ;then # E3 is down switch to low route route="low"; ip route del /24 via mpls $var_best ip route add /24 via mpls $var_low fi ;; low) status=`/usr/sbin/hping3 c 1 icmp >&1 grep "100% packet loss\ Host Unreachable"` if [ z "$status" ] ;then # E3 is up again switch to best route route="best"; ip route del /24 via mpls $var_low ip route add /24 via mpls $var_best fi ;; esac done we we are are on on the the low low route, route, ping ping to to see see if if E3 E3 is is up up E3 E3 is is back back up: up: traffic traffic directed to to network /24 is is switched from from E2 E2 to to E3 E3
17 configuration on ler E1 Note: the script for E1 collapses the best and medium routes into one case, because both routes reach E1 via the same link
18 configuration on ler E4 Similar to E1 The loop inside the scripts distinguishes among best, medium, and low routes by checking the status of link 6 and of E3 using ping packets
19 configuration on lsr E5 #A2 >A3 #if input label is 100, keep it and push on top of it. mpls labelspace set dev eth0 labelspace 0 mpls ilm add label gen 100 labelspace 0 key1=`mpls nhlfe add key 0 instructions push gen nexthop eth1 ipv grep key cut c 17 26` key2=`mpls nhlfe add key 0 instructions push gen 100 forward $key1 grep key cut c 17 26` With With this this instruction label label is is set set on on top top of of label label #This instruction exchange incoming label 100 with the label #stack (100, 10000) mpls xc add ilm_label gen 100 ilm_labelspace 0 nhlfe_key $key2 exchange Incoming label label
20 configuration on lsr E5 #A3 >A2 #if input label is 20000, pop it and keep the bottom label 600 mpls labelspace set dev eth1 labelspace 0 mpls ilm add label gen labelspace 0 mpls ilm add label gen 600 labelspace 0 key1=`mpls nhlfe add key 0 instructions push gen 600 nexthop eth0 ipv grep key cut c 17 26` mpls xc add ilm_label gen 600 ilm_labelspace 0 nhlfe_key $key1 Exchange......incoming label label at at the the bottom of of the the stack stack (so (so it it is is removed from from the the stack)......with...with another label label
21 configuration on other lsrs E2 and E3 are similar to E5. In addition to E5 they only have the loop instructions (very similar to the E1's): E2 to check the status of E3 E3 to check the status of Link6 Side note: we simulate the fault of Link6 by bringing E3 s eth1 down. Therefore, upon restoring this interface we need to also redefine the nhlfe
22 Starting the lab host machine cd netkit-lab TE TE$ lstart Currently selected routes are shown at the top of terminal windows of relevant routers
23 E4 traffic analisys ler E4 applies NHLFE 0x2 (= push label 100 ) to traffic directed to /24 and forwards it to E3 E4:~# ip route show via dev eth /24 dev eth0 proto kernel scope link src /24 dev eth2 proto kernel scope link src /24 dev eth1 proto kernel scope link src /24 via dev eth1 mpls 0x2 E4:~# mpls nhlfe show NHLFE entry key 0x mtu 1496 propagate_ttl push gen 100 set eth0 ipv (0 bytes, 0 pkts) NHLFE entry key 0x mtu 1496 propagate_ttl push gen 100 set eth1 ipv (8652 bytes, 103 pkts) E4:~#
24 E3 traffic analisys lsr E3's (correctly) knows nothing about /24 and /24 E3:~# ip route show via dev eth via dev eth /24 dev eth2 proto kernel scope link src /24 dev eth1 proto kernel scope link src /24 dev eth0 proto kernel scope link src E3:~#
25 E3 traffic analisys lsr E3's knows how to forward labeled packets E3:~# mpls nhlfe show NHLFE entry key 0x mtu 1496 propagate_ttl push gen 600 set eth0 ipv (0 bytes, 0 pkts) NHLFE entry key 0x mtu 1496 propagate_ttl push gen 600 set eth1 ipv (10248 bytes, 122 pkts) NHLFE entry key 0x mtu 1496 propagate_ttl push gen 200 set eth2 ipv (10248 bytes, 122 pkts) E3:~# mpls ilm show ILM entry label gen 500 labelspace 0 proto ipv4 pop forward key 0x (10736 bytes, 122 pkts) ILM entry label gen 100 labelspace 0 proto ipv4 pop forward key 0x (10736 bytes, 122 pkts) E3:~# mpls xc show XC entry ilm_label gen 500 ilm_labelspace 0 nhlfe_key 0x XC entry ilm_label gen 100 ilm_labelspace 0 nhlfe_key 0x E3:~#
26 E3 traffic analisys incoming packets with label 100 have their label recognized and popped... E3:~# mpls nhlfe show NHLFE entry key 0x mtu 1496 propagate_ttl push gen 600 set eth0 ipv (0 bytes, 0 pkts) NHLFE entry key 0x mtu 1496 propagate_ttl push gen 600 set eth1 ipv (10248 bytes, 122 pkts) NHLFE entry key 0x mtu 1496 propagate_ttl push gen 200 set eth2 ipv (10248 bytes, 122 pkts) E3:~# mpls ilm show ILM entry label gen 500 labelspace 0 proto ipv4 pop forward key 0x (10736 bytes, 122 pkts) ILM entry label gen 100 labelspace 0 proto ipv4 pop forward key 0x (10736 bytes, 122 pkts) E3:~# mpls xc show XC entry ilm_label gen 500 ilm_labelspace 0 nhlfe_key 0x XC entry ilm_label gen 100 ilm_labelspace 0 nhlfe_key 0x E3:~#
27 E3 traffic analisys...and are forwarded to E1 after swapping the label with 200 E3:~# mpls nhlfe show NHLFE entry key 0x mtu 1496 propagate_ttl push gen 600 set eth0 ipv (0 bytes, 0 pkts) NHLFE entry key 0x mtu 1496 propagate_ttl push gen 600 set eth1 ipv (10248 bytes, 122 pkts) NHLFE entry key 0x mtu 1496 propagate_ttl push gen 200 set eth2 ipv (10248 bytes, 122 pkts) E3:~# mpls ilm show ILM entry label gen 500 labelspace 0 proto ipv4 pop forward key 0x (10736 bytes, 122 pkts) ILM entry label gen 100 labelspace 0 proto ipv4 pop forward key 0x (10736 bytes, 122 pkts) E3:~# mpls xc show XC entry ilm_label gen 500 ilm_labelspace 0 nhlfe_key 0x XC entry ilm_label gen 100 ilm_labelspace 0 nhlfe_key 0x E3:~#
28 traffic analisys We see how fills its tables and the integration between and You can try, for exercise, to see other ler's and lsr's routing tables to check their correctness
29 Normal traffic A3 eth eth eth1 eth2 A2
30 Traffic analisys Some checkpoints have been identified along the path from A2 to A3 E4: both interfaces, to observe traffic before and after the insertion of the header E3: interface eth2 to observe label switching E1: interface eth1, where the header is removed Similar checkpoints can be considered for the traffic from A3 to A2
31 Traffic analisys We sniff packets using tcpdump and examine the dumps on the host using wireshark A2 A2:~# ping EX EX:~# tcpdump -i ethy -w /hostlab/sniff_${hostname}_y.cap -s 1500 host machine TE$ wireshark -r sniff_ex_y.cap
32 Traffic analisys Sniffing on E4 s eth2: plain ICMP packets
33 Traffic analisys Sniffing on E4 s eth1: ICMP packets encapsulated in Pushed label 100
34 Traffic analisys Sniffing on E4 s eth1: ICMP packets encapsulated in Received label 600
35 Traffic analisys Sniffing on E3 s eth2: ICMP packets encapsulated in with a label swapped Pushed label 200
36 Traffic analisys Sniffing on E3 s eth2 Received label 500
37 Traffic analisys Sniffing on E1 s eth1: (back to) plain ICMP packets
38 Traffic analisys Let's try to put link 6 down E3 E3:~# ifconfig eth1 down Routes taken by E1-E4 are updated (look at the currently selected routes in their windows) Note: due to the time required for detection, a few ICMP packets may be lost (or enqueued at some interface until it is brought back up)
39 Traffic with link 6 down A eth2 eth eth eth A2
40 traffic analisys Sniffing on E4 s eth0 Pushed label 100
41 traffic analisys Sniffing on E4 s eth0 Received label 600
42 traffic analisys Sniffing on E5 s eth1 External label Internal label 100
43 traffic analisys Sniffing on E5 s eth1 Receive internal label Received external label 600
44 traffic analisys Sniffing on E2 s eth0 Pushed label 100
45 traffic analisys Sniffing on E2 s eth0 Received label 600
46 traffic analisys Sniffing on E3 s eth2 Pushed label 200
47 traffic analisys Sniffing on E3 s eth2 Received label 500
48 Traffic analisys We bring link 6 up again, you can check that traffic will switch to best E5 E3:~# ifconfig eth1 up Now we bring E3 down and see what happens host machine user@localhost:~/netkit-lab TE$ lcrash E3
49 Traffic with E3 down A3 eth eth eth1 A2
50 traffic analisys Sniffing on E4 s eth0 Pushed label 100
51 traffic analisys Sniffing on E4 s eth0 Received label 600
52 traffic analisys Sniffing on E5 s eth1 External label Internal label 100
53 traffic analisys Sniffing on E5 s eth1 Received external label Received internal label 600
54 traffic analisys Sniffing on E2 s eth2 Pushed label 200
55 traffic analisys Sniffing on E2 s eth2 Received label 600
56 Proposed exercises Sniff on all the interfaces with wireshark Try to change NHLFE tables on the running lab, adding or deleting entries (use mpls -help inside virtual machines to see the help) Try to change label numbers and encapsulation
netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)
netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description [email protected] http://www.kaksonetworks.it/ A lab showing
netkit lab two-hosts Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab two-hosts Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,
netkit lab static-routing Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab static-routing Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,
netkit lab Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version 1.
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab walkthrough Version 1.3 Author(s) Massimo Rimondini E-mail Web Description [email protected]
walkthrough Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version 1.
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab walkthrough Version 1.2 Author(s) Massimo Rimondini E-mail Web Description [email protected]
Version Author(s) E-mail Web Description
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Netkit The poor man s system for experimenting computer networking Version Author(s) E-mail Web
netkit lab load balancer web switch 1.1 Giuseppe Di Battista, Massimo Rimondini Version Author(s)
netkit lab load balancer web switch Version Author(s) 1.1 Giuseppe Di Battista, Massimo Rimondini E-mail Web Description [email protected] http://www.netkit.org/ A lab showing the operation of a web switch
netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab single-host Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,
netkit lab bgp: multi-homed Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: multi-homed Version Author(s) E-mail Web Description 2.0 G. Di Battista, M. Patrignani,
Host Configuration (Linux)
: Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support
netkit lab bgp: prefix-filtering Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: prefix-filtering Version Author(s) E-mail Web Description 2.1 G. Di Battista,
netkit lab web server and browser 1.2 Giuseppe Di Battista, Maurizio Patrignani, Massimo Rimondini Version Author(s)
netkit lab web server and browser Version Author(s) E-mail Web Description 1.2 Giuseppe Di Battista, Maurizio Patrignani, Massimo Rimondini [email protected] http://www.netkit.org/ A lab showing the operation
netkit lab load balancer dns 1.2 Massimo Rimondini Version Author(s)
netkit lab load balancer dns Version Author(s) 1.2 Massimo Rimondini E-mail Web Description [email protected] http://www.netkit.org/ A lab showing how to perform simple load balancing on a set of web
Exercise 4 MPLS router configuration
Exercise 4 MPLS router configuration Computer Network Technologies and Services (CNTS) Tecnologie e Servizi di Rete (TSR) Preliminary note For this exercise you have to use the virtual routing laboratory.
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
iproute2 and Advanced Linux Routing
iproute2 and Advanced Linux Routing What is iproute2 A collection of utilities for controlling TCP/IP networking and traffic control in Linux Usually shipped in a package called iproute or iproute2 and
MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
NETWORK EMULATION AND NETKIT
NETWORK EMULATION AND NETKIT Gestão e Segurança de Redes / Gestão de Redes e Serviços LERC / MEIC- T 2013/14 Artur M. Arsénio & Miguel P. Correia CLASS OBJECTIVES To understand what is meant by network
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
Corso di Configurazione e Gestione di Reti Locali
Corso di Configurazione e Gestione di Reti Locali Marco Bonola Lorenzo Bracciale A.A. 2011/2012 TOC Netkit: installation, configuration, use Lab0-interfaces: basic IP configuration IP Networking (ifconfig,
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
MPLS Architecture for evaluating end-to-end delivery
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
Network Administration and Monitoring
Network Administration and Monitoring Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingengeria Politecnico di Milano barenghi - at - elet.polimi.it April 17, 2013 Recap What did we
Multiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification
Multiprotocol Label Switching Architecture & LDP Introduction MPLS Basics LDP Procedures LDP Specification 1 MPLS&LDP->Introduction Conventional network forwarding Each router analyzes the coming packet
Advanced routing scenarios POLICY BASED ROUTING: CONCEPTS AND LINUX IMPLEMENTATION
Advanced routing scenarios POLICY BASED ROUTING: CONCEPTS AND LINUX IMPLEMENTATION What is wrong with standard IP forwarding? The IP forwarding algorithm selects the route according to the destination
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
IP Address: the per-network unique identifier used to find you on a network
Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Introduction to NetGUI
Computer Network Architectures [email protected] December 5, 2007 (cc) 2007. Algunos derechos reservados. Este trabajo se entrega bajo la licencia Creative Commons Attribution-ShareAlike.
Load Balancing - Single Multipath Route HOWTO
Load Balancing - Single Multipath Route HOWTO Shakthi Kannan, shaks_wants_no_spam_at_shakthimaan_dot_com January 5, 2007 Revision: 1.2 Abstract This documentation provides the steps to setup load-balancing
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
MPLS. Packet switching vs. circuit switching Virtual circuits
MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit
Fault Management In MPLS Networks
CHAPTER 6 This chapter describes the alarms that Cisco ANA detects and reports for LDP, BGP, MPLS TE (using RSVP TE), MPLS Black Holes, as well as alarm reports for Layer 2 and Layer 3 VPNs: MPLS Related
DD2490 p4 2011. Routing and MPLS/IP. Olof Hagsand KTH CSC
DD2490 p4 2011 Routing and MPLS/IP Olof Hagsand KTH CSC 1 Literature Lecture slides and lecture notes (on web) Reference JunOS Cookbook: Chapter 14 2 Background MPLS - Multiprotocol Label Switching Originally
Link Failure Recovery. for MPLS Networks with Multicasting
Link Failure Recovery for MPLS Networks with Multicasting A Thesis Presented to the faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements
Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Load Balancing Clearswift Secure Web Gateway
Load Balancing Clearswift Secure Web Gateway Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
APNIC elearning: Introduction to MPLS
2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security DNS/DNSSEC
Internetworking II: VPNs, MPLS, and Traffic Engineering
Internetworking II: VPNs, MPLS, and Traffic Engineering 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Taxonomy of communica@on networks Virtual
A New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University [email protected] ABSTRACT This paper
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
Emulating Computer Networks with Netkit. Massimo Rimondini
UNIVERSITY OF ROMA TRE Department of Computer Science and Automation Emulating Computer Networks with Netkit Massimo Rimondini Computer Networks Research Group http://www.dia.uniroma3.it/~compunet 4th
Scalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. [email protected] April 2008 Abstract Whether you are perusing mailing lists or reading
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Instructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Tcpdump Lab: Wired Network Traffic Sniffing
Cyber Forensics Laboratory 1 Tcpdump Lab: Wired Network Traffic Sniffing Copyright c 2012 Hui Li and Xinwen Fu, University of Massachusetts Lowell Permission is granted to copy, distribute and/or modify
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
CS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab
CS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab This guide provide guidance on critical steps on using VirtualBox to setup a virtual machine (VM) on configure external (internet
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Assignment 3 Firewalls
LEIC/MEIC - IST Alameda ONLY For ALAMEDA LAB equipment Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment
Firewalls. Chien-Chung Shen [email protected]
Firewalls Chien-Chung Shen [email protected] The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective
Configuration of Cisco Routers. Mario Baldi
Configuration of Cisco Routers Basics Static Routing Mario Baldi Politecnico di Torino mario.baldi[at]polito.it http://staff.polito.it/mario.baldi ConfRoutEn - 1 M. Baldi: see page 2 Copyright Notice This
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Objectives The purpose of this lab is to demonstrate both high availability and performance using virtual IPs coupled with DNS round robin
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
Detour planning for fast and reliable fault recovery in SDN with OpenState
DRCN 15 - March 25, 2015 Detour planning for fast and reliable fault recovery in SDN with OpenState Antonio Capone^, Carmelo Cascone^*, Alessandro Q.T. Nguyen^*, Brunilde Sansò^ Join work with: Luca Pollini^,
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015
Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - [email protected] Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands
Lab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
QoS Strategy in DiffServ aware MPLS environment
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Managing Multiple Internet Connections with Shorewall
Managing Multiple Internet Connections with Shorewall Tom Eastep Linuxfest Northwest April 24-25, 2010 http://www.shorewall.net Agenda Introduction Routing Refresher Introduction to Policy Routing Policy
1:1 NAT in ZeroShell. Requirements. Overview. Network Setup
1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already
TCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
OS3 Fiber Day Broadband networks - Network Architecture. May 20, 2016 / Jan Martijn Metselaar Vodafone
OS3 Fiber Day Broadband networks - Network Architecture May 20, 2016 / Jan Martijn Metselaar Vodafone Quizzz Dual play, Triple play, Multi play IP all the way! But what does the end-user care? 2 Current
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Multiprotocol Label Switching Load Balancing
Multiprotocol Label Switching Load Balancing First Published: July 2013 The Cisco ME 3800 and ME 3600 switches support IPv4 and IPv6 load balancing at the LER and LSR. Effective with Cisco IOS Release
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Viola M2M Gateway User Manual
Viola M2M Gateway User Manual Document version 3.0 Modified June 25, 2008 Firmware version 2.4 Contents 1 Introduction 6 1.1 About Viola M2M Gateway....................................... 6 1.2 M2M Gateway
MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE
MPLS for ISPs PPPoE over VPLS MPLS, VPLS, PPPoE Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris, Slovakia Established 1991 Complete
Network Connect Performance Logs on MAC OS
Network Connect Performance Logs on MAC OS How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output IPs, Routes, Ping,
Network Management and Debugging. Jing Zhou
Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for
Broadband Network Architecture
Broadband Network Architecture Jan Martijn Metselaar May 24, 2012 Winitu Consulting Klipperaak 2d 2411 ND Bodegraven The Netherlands slide Broadband Services! Dual play, Triple play, Multi play! But what
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
IP networks Introduction to laboratory
IP networks Introduction to laboratory Piotr Pacyna, Katarzyna Kosek-Szott, Szymon Szott Working environment Laboratory exercises are based on netkit (www.netkit.org), a virtualization system, which allows
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
MPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center)
MPLS Quality of Service What Is It? Carsten Rossenhövel EANTC (European Advanced Networking Test Center) About EANTC EANTC offers vendor independent network quality assurance since 1991 EANTC Berlin -
TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.
TCP Labs WACREN Network Monitoring and Measurement Workshop Antoine Delvaux [email protected] perfsonar developer 30.09.2015 Hands-on session We ll explore practical aspects of TCP Checking the effect
