draft-forwarding-label-ccn- 01.txt
|
|
|
- Bernard York
- 10 years ago
- Views:
Transcription
1 draft-forwarding-label-ccn- 01.txt Ravi Ravindran and Asit Chakraborti Huawei (IETF/ICNRG, Yokohama, 94)
2 Agenda Draft Objectives Terminology Why ID/Locator Split in CCN FL Object Management FIB Processing PIT/CS Processing Multi-Domain Considerations Security Consideration Use case scenarios Next Steps
3 Draft Objectives Second iteration of this draft. Proposes to have ID/Locator Split in CCN. The locator is called Forwarding-Label which can be modified in the infrastructure. Could be used by for different purposes: Mobility Opportunistic Indirections (off-path caching) Service Affinity (Edge Computing) In-Network Computing (e.g. NFN) Inter-domain Routing.. The draft talks about FL management, PIT/CS Processing, Multi-Domain Scenario Handling, Usage Scenarios. Also also opens many questions around managing two
4 Terminology Interesting discussion during the Interim meeting Don t want to use these terminologies because they meant something in the past. For our discussion ID=Locator=Name Name := Hierarchically Structured Identifier Should this be Routable? CCN1.0 or NDN Name definition doesn t require Routeability We should eventually address, non Routable names too, e.g. selfcertified ID, e.g. M2M communications. For this discussion we assume, ID are names managed by Applications and Locators are Names managed by the infrastructure provider, hence topologically relevant. They are Routable Names in a given context. ID :/disney/video/. Locator : /att/santaclara/..
5 ID/Locator Split in CCN Why do we need ID/locator Split? Management: ID and Locator belong to different administrative authorities, and do not want to be influenced by each other. Security/Turst : Security/Trust over IDs independent of the network requirements. Flexibility : In the context of CCN, this it to aid dynamic scenarios like content replication, mobility, migration, multihoming etc. Scalability : Routing on IDs (even though aggregateable) is challenging. Better for core networks to only deal with locator
6 Advantages CCN Routing on IDs A single name space for both network and applications. IDs are contextual, hence several services can be invoked: Security, Policy Based Routing, Strategy layer forwarding Disadvantages Infrastructure provider may not want to work with Application IDs. Large name space - always growing ID Dynamism affect its stability: Replication, Migration, Mobility etc.
7 We see there are considerable benefits with Challenges too, so these have to be studied further. CCN Routing on ID+Locators Advantages Achieves Management, Flexibility, Scalability, Security requirements. The network can apply name based routing only at the edges routers, but the core can be based on locators only. Core Network independent of application name dynamism Edge networks can be Name based Disadvantages Explicit guidelines on handling two names in the Interest/Content Packet. Mapping required from names to locators, either managed by the application or by the network or both. Forwarding looses contextual operation that it can derive from names, e.g. strategy forwarding features. Open to malicious acts, e.g. cache poisoning, but primarily a trust concern.
8 FL Object Encoding As a Optional hop-by-hop Header TLV. CCN Fixed Header FL-Object Optional Hop-by- Hop Header TLVs Interest/Data Message
9 [1] Afanasyev, A., "Map-and-Encap for Scaling NDN Routing., NDN Technical Report ndn , FL-Object Object embeds three kinds of information: LID : Locator ID (T_LID_NAME): AS-ID/Router- ID etc FL-Metadata (optional) : Service specific metadata, to aid FL processing in a given context, e.g. as in Mobility, In-Network Computing etc. FL-Security (optional) : ID to LID binding Security information, similar to LINK-Object [1]
10 FL Object Insertion FL can be inserted by applications or the network. FL insertion by the network can be policy based Policy based actions on the names, Interest Marking etc. For Applications this may be a default choice, or based on feedback from the network. Depending on the trust context, networks may or may not choose to trust these suggestions. FL insertions by applications may be subjected to security validation. Validation is between ID and the LID The infrastructure may choose to only accept FL Object from trusted applications, while ignoring or explicitly removing the rest.
11 FL Object Swapping/Termination FL objects may be swapped at designated points in the network. FL can be terminated by designated points in the network Edge Service Routers, Middlebox, Border Routers Here the FL matches one of the LocatorID of the forwarder A node may have multiple locator names. e.g. /att/santaclara or /att/santaclara/poa Further service logic is applied, and the FL can be replaced by another FL Object Else Name based routing may ensue
12 FIB Processing Depends on the use of FL Object, hence multiple possibilities. Case 1: the FL can always given priority over ID in the Interest, assuming they are always trusted in-directions. Case 2: forwarder could always prioritize ID based routing, and if that fails, use the FL for forwarding Case 3: If policy based routing is involved, the ID could be used to decide the FL insertion, while the core nodes always uses 1 or 2. Then we discuss the FIB processing for case 1. Validate FL Object if it is not trusted If lookup(lid) is a Node ID Then invoke appropriate service logic else if it results in a next-hop Forward it.
13 PIT Processing The question here is if we need to have FL Object state in the PIT or the CS? Depends on the purpose of the FL Object Case 1: If it is simply a in-direction directive Case 2: Consumer imply more meaning on the ID and FL Object. Case 1: FL-Objects purpose is to guide Interest messages to improve routing efficiency and offer flexibility. Simple policy is not to have any FL state in the PIT In certain situations, for the same Interest Name and different FL aggregation will not allow those Interests to be forwarded In this case, the PIT will require saving the FL Object state Is it only LID or the whole FL Object? Case 2: Consumers implies a tight binding between ID and the FL Object. In this case, PIT saves the whole FL Object, which is also returned with the CO. In this case, if the FL Object is swapped, then the it should be replaced by appropriate FL Object in the return path.
14 CS Processing Follows the PIT processing discussion. CO may carry the FL Object only if there is a such an expectation from the Consumers.
15 FL Security Depends on the purpose it will be used for. Security Considerations: 1) Malicious publisher injecting incorrect mapping between ID and the LID 2) Malicious interceptor between the node seeking mapping and the mapping system 3) Compromised intermediate router maliciously changing the FL 4) Untrusted application may inject invalid FL Object 1&2 are issues addressed in other protocols like DNS-SEC, LISP-SEC 3 requires new security mechanisms to enable a domain level trust infrastructure 4 is policy driven, require authentication of the consumer and the ID/LID binding, more lightweight mechanisms can be studied.
16 FL Object Application Scenarios Producer Mobility: Late Binding Edge Routers/PoA late binds Interest to its current location Using semantic names, can be used to realize a Decentralized Name Resolution Manifests Contains indirections to CO. Here FL Object can contain the LID, while CO has the immutable name. Related to discussion around Nameless CO. Routing Optimization Application controllers in the domain can apply policy based routing based on service names. So request for a CO can be handled in a specialized manner. Inter-domain Routing Routing scalability problem is handled, as LID is a bounded name space, in DFZ it will bound it O(#of AS).
17 Evolving the draft Clarification of Terminologies More details on FL Management/Processing Security Considerations Detailing use case scenarios Feedback is welcome..anytime.
18 Thank You and Questions
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
ICN based Scalable Video Conferencing on Virtual Edge Service Routers (VSER) Platform
Security Level: 客 户 伙 伴 在 右 35pt B0 体 : ium rial 32pt B0 体 based Scalable Video Conferencing on Virtual Edge Service Routers (VSER) Platform 配 色 建 议 不 超 以 下 方 案 内 只 用 22pt 色 体 : ular rial Asit Chakraborti,
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
ICN-IoT and its Evaluation
ICN-IoT and its Evaluation Sugang Li, Yanyong Zhang, Dipankar Raychaudhuri (WINLAB, Rutgers University) Ravishankar Ravindran, GQ Wang (Huawei Research Center) Phase I: ICN-IoT Architecture IoT Architectural
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University
Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to
Florian Liers, Thomas Volkert, Andreas Mitschele-Thiel
Florian Liers, Thomas Volkert, Andreas Mitschele-Thiel The Forwarding on Gates architecture: Flexible placement of QoS functions and states in internetworks Original published in: International Journal
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Locator/ID Separation Protocol: do we really need such a thing?
Locator/ID Separation Protocol: do we really need such a thing? GBR'11 - Beyond Networking Luigi Iannone Senior Research Scientist Deutsche Telekom Laboratories The Internet as we know it? Who remembers
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing
Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
TORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
The Benefits. Locator/ID Separation
INL: IP Networking Lab Université Catholique de Louvain The Benefits of Locator/ID Separation AGAVE: A lightweight Approach for Viable End-to-end IP-based QoS Services Joint Work: L. Iannone, O.Bonaventure,
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
Static IP Routing and Aggregation Exercises
Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................
Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)
Mitigation of Breaking Connections (a.k.a. OLSRd v1 Multi-Gateway & BRDP) About Me Ferry Huberts Self-Employed Open Source Entrepreneur Lead Committer for OLSRd v1 Committer in several other projects Mainly
Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
NDN Technical Memo: NDNS, NDN based Domain Name System
NDN, Technical Report NDN-00XX. http://named-data.net/techreports.html NDN Technical Memo: NDNS, NDN based Domain Name System immediate Revision history Revision Revision date Description 0.21 Oct 22,
Link-State Routing Protocols
Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
Using OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that
Multidomain Network Based on Programmable Networks: Security Architecture
Multidomain Network Based on Programmable Networks: Security Architecture Bernardo Alarco, Marifeli Sedano, and Maria Calderon This paper proposes a generic security architecture designed for a multidomain
DG Forwarding Algorithm
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks
Internet Peering, IPv6, and NATs Mike Freedman V22.0480-005 Networks Internet Peering Review: Routing Internet has a loose hierarchy of domains Hosts now local router Local routers know site routers Site
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
The Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Multiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification
Multiprotocol Label Switching Architecture & LDP Introduction MPLS Basics LDP Procedures LDP Specification 1 MPLS&LDP->Introduction Conventional network forwarding Each router analyzes the coming packet
OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).
OSPF Version 2 (RFC 2328) Interior gateway protocol (IGP). Routers maintain link-state database. Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs). Router
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
OF-CCN: CCN over OpenFlow. NDN hands-on Workshop Junho Suh ( [email protected])
OF-CCN: CCN over OpenFlow NDN hands-on Workshop Junho Suh ( [email protected]) Contents Motivation Problem Definition Design Overview Conclusion Motivation (1/2) Communication paradigm in Internet
How To Build A Policy Aware Switching Layer For Data Center Data Center Servers
A Policy-aware Switching Layer for Data Centers Dilip Joseph Arsalan Tavakoli Ion Stoica University of California at Berkeley 1 Problem: Middleboxes are hard to deploy Place on network path Overload path
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1
IP Routing Primer Paul C. Huang, Ph.D. ITRI / / N300 /N300; Paul Huang 1999/6/2 1 Basic Addressing / Subnetting Class A 0 Network Host Host Host 127 networks / 16,777,216 hosts Class A natural mask 255.0.0.0
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
A Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics
CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60
Facility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
Differentiated Services
March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: [email protected] URL: http://bmrc.berkeley.edu/people/chaffee 1 Outline Architecture
MPLS Architecture for evaluating end-to-end delivery
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
Flexible SDN Transport Networks With Optical Circuit Switching
Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
Realtime Multi-party Video Conferencing Service over Information Centric Networks
Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,
Border Gateway Protocol BGP4 (2)
Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning
IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt
IP over Optical Networks - A Framework draft-ip-optical-framework-01.txt Bala Rajagopalan James Luciani Daniel Awduche Brad Cain Bilel Jamoussi 1 IETF 7/31/00 About this Draft Deals with the following
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
FileSync/NDN: Peer-to-Peer File Sync over Named Data Networking
FileSync/NDN: Peer-to-Peer File Sync over Named Data Networking Jared Lindblöm 1, Ming-Chun Huang 1, Jeff Burke 2 and Lixia Zhang 1 1. Computer Science Department, University of California, Los Angeles
IP Switching: Issues and Alternatives
IP Switching: Issues and Alternatives Professor of Computer and Information Sciences http://www.cis.ohio-state.edu/~jain/ 6-1 Overview LANE, IPOA, NHRP, MPOA IP Switch Cell Switched Router Tag Switching
The Complete IS-IS Routing Protocol
Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2
NDSS: A Named Data Storage System
NDSS: A Named Data Storage System Shuo Chen, Junwei Cao Research Institute of Information Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University, Beijing 100084,
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
Internet Engineering Task Force (IETF) Request for Comments: 6422 Updates: 3315 Category: Standards Track ISSN: 2070-1721 December 2011
Internet Engineering Task Force (IETF) T. Lemon Request for Comments: 6422 Nominum Updates: 3315 Q. Wu Category: Standards Track Huawei ISSN: 2070-1721 December 2011 Abstract Relay-Supplied DHCP Options
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - DNS; 22 nd Oct 2012 Instructor: Sridhar Iyer IIT Bombay Domain Name System Map between host names and IP addresses People: many identifiers: name, Passport #, Internet hosts:
References and Requirements for CPE Architectures for Data Access
Technical Report TR-018 References and Requirements for CPE Architectures for Data Access March 1999 '1999 Asymmetric Digital Subscriber Line Forum. All Rights Reserved. ADSL Forum technical reports may
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Administrative Distance
RIP is a distance vector routing protocol. It shares routing information through the local broadcast in every 30 seconds. In this tutorial we will explain RIP routing fundamentals with examples such as
SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel
SOFTWARE DEFINED NETWORKS REALITY CHECK DENOG5, Darmstadt, 14/11/2013 Carsten Michel Software Defined Networks (SDN)! Why Software Defined Networking? There s a hype in the industry!! Dispelling some myths
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
Chapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
