CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs



Similar documents
Cisco Which VPN Solution is Right for You?

How Routers Forward Packets

Introduction to MPLS-based VPNs

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

MPLS L2VPN (VLL) Technology White Paper

Bandwidth Management in MPLS Networks

Internetworking II: VPNs, MPLS, and Traffic Engineering

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Introducing Basic MPLS Concepts

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Virtual Private Networks

Virtual Private Networks. Juha Heinänen Song Networks

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Network virtualization

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

- Multiprotocol Label Switching -

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Enterprise Network Simulation Using MPLS- BGP

1.264 Lecture 37. Telecom: Enterprise networks, VPN

RFC 2547bis: BGP/MPLS VPN Fundamentals

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Multi Protocol Label Switching (MPLS) is a core networking technology that

How To Understand The Benefits Of An Mpls Network

Designing and Developing Scalable IP Networks

Lecture 17 - Network Security

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Quidway MPLS VPN Solution for Financial Networks

INTRODUCTION TO L2VPNS

Internet Protocol: IP packet headers. vendredi 18 octobre 13

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Implementing VPN over MPLS

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

MPLS Concepts. Overview. Objectives

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Cisco Configuring Basic MPLS Using OSPF

Master Course Computer Networks IN2097

MPLS is the enabling technology for the New Broadband (IP) Public Network

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

What Is a Virtual Private Network?

Protection Methods in Traffic Engineering MPLS Networks

MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE

MPLS Implementation MPLS VPN

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

VPN. Date: 4/15/2004 By: Heena Patel

Broadband Network Architecture

SBSCET, Firozpur (Punjab), India

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

SEC , Cisco Systems, Inc. All rights reserved.

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

November Defining the Value of MPLS VPNs

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

Virtual Private Networks

How Virtual Private Networks Work

Welcome to Today s Seminar!

How To Make A Network Secure

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

MPLS and IPSec A Misunderstood Relationship

End-To-End QoS Architecture for VPNs: MPLS VPN Deployment in a Backbone Network

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

Development of the FITELnet-G20 Metro Edge Router

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone

21.4 Network Address Translation (NAT) NAT concept

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Understanding PBB-TE for Carrier Ethernet

Security of the MPLS Architecture

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

Secured Voice over VPN Tunnel and QoS. Feature Paper

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Transport and Network Layer

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

WAN Failover Scenarios Using Digi Wireless WAN Routers

Design of MPLS networks VPN and TE with testing its resiliency and reliability

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

VXLAN: Scaling Data Center Capacity. White Paper

Kingston University London

WAN Data Link Protocols

Lesson 13: MPLS Networks

The Essential Guide to Deploying MPLS for Enterprise Networks

IPv6 Deployment Strategies

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Transcription:

: Computer Networks Lecture 9: Mar 30, 2005 VPNs

VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

What is a VPN? Making a shared network look like a private network Why do this? Private networks have all kinds of advantages (we ll get to that) But building a private network is expensive (cheaper to have shared resources rather than dedicated)

History of VPNs Originally a telephone network concept Separated offices could have a phone system that looked like one internal phone system Benefits? Fewer digits to dial Could have different tariffs Company didn t have to pay for individual long distance calls Came with own blocking probabilities, etc. Service guarantees better (or worse) than public phone service

Original data VPNs Lots of different network technologies in those days Decnet, Appletalk, SNA, XNS, IPX, None of these were meant to scale to global proportions Virtually always used in corporate settings Providers offer virtual circuits between customer sites Frame Relay or ATM A lot cheaper than dedicated leased lines Customer runs whatever network technology over these These still exist (but being replaced by IP VPNs)

VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Advantages of original data VPNs Repeat: a lot cheaper than dedicated leased lines Corporate users had no other choice This was the whole business behind framerelay and ATM services Fine-grained bandwidth tariffs Bandwidth guarantees Service Level Agreements (SLA) Multi-protocol

Frame Relay VPN Example CE CE CE FR FR CE FR FR CE FR FR FR CE CE CE CE = Customer Equipment FR = Frame Relay

CE1 Define circuits CE to CE (for given customer: purple) CE3 CE1 24 12 FR FR CE3 FR 31 FR CE4 FR FR FR CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay

CE1 dest circuit CE2 24 CE3 12 CE4 31 Customer establishes routing tables (per protocol) 24 FR CE1 12 31 FR FR FR CE3 CE3 CE4 FR FR FR CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay

CE1 Provider provisions underlying network CE3 CE1 FR FR CE3 FR Provider does queuing analysis of load through each link, determines, throughput characteristics, gives service guarantees to customers accordingly. FR FR FR FR CE4 CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay

How has the world changed? Everything is IP now Some old stuff still around, but most data networks are just IP So, why do we still care about VPNs???

IP VPN benefits IP not really global (private addresses) VPN makes separated IP sites look like one private IP network Security Bandwidth guarantees across ISP QoS, SLAs Simplified network operation ISP can do the routing for you

Client VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Client VPNs Solves problem of how to connect remote hosts to a firewalled network Security and private addresses benefits only Not simplicity or QoS benefits

Client VPNs Solves problem of how to connect remote hosts to a firewalled network Internet FW/ VPN Site (private network) Site Host Remote Host IPsec Tunnels Site Host Remote Host

Client VPNs: Configuration VPN IP addr: 20.1.1.1 User name: joe Password: Rtu44!+3wyZ 20.1.1.1 FW/ VPN Site Host Remote Host Site joe: Rtu44!+3wyZ Host sally: 5Yee#34hB!2

Client VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Client VPNs: Configuration VPN IP addr: 20.1.1.1 User name: joe Password: Rtu44!+3wyZ Remote Host 20.1.1.1 More likely AAA or LDAP backend has the passwords FW/ VPN AAA Site joe: Rtu44!+3wyZ Host sally: 5Yee#34hB!2 Site Host

Client VPNs: Host gets local IP address Remote Host 30.1.1.1 DHCP Router 20.1.1.1 FW/ VPN AAA Site Host Site Host

Client VPNs: Host connects to VPN VPN authenticates remote host through backend database (RADIUS or LDAP) 20.1.1.1 FW/ VPN AAA RADIUS Site Host Remote Host 30.1.1.1 IPsec Site Host

Client VPNs: VPN assigns site address As proprietary enhancement to IPsec, or with PPP (over IPsec) 10.1.1.1 Remote Host 30.1.1.1 IPsec 20.1.1.1 10.1.1.1 FW/ VPN AAA RADIUS Site Host Site Host

Client VPNs: Packets tunneled over IPsec 20.1.1.1 FW/ RADIUS VPN 10.1.1.1 10.1.1.2 IPsec Remote Host 30.1.1.1 AAA Site Host Site Host 10.1.1.1 10.1.1.2 30.1.1.1 20.1.1.2 IPsec Tunnel 30.1.1.1 20.1.1.2 10.1.1.1 10.1.1.2

Client VPNs: Packets tunneled over IPsec Some VPN clients smart enough to avoid sending non-vpn traffic through the VPN tunnel Not this This Public AAA Host 20.1.1.1 FW/ RADIUS VPN 10.1.1.1 10.1.1.2 IPsec Remote Host 30.1.1.1 Site Host Site Host

IPsec Two parts: Session Establishment (key exchange) and Payload IKE/ISAKMP is session establishment Negotiate encryption algorithms Negotiate payload headers (AH, ESP) Negotiate policies Keying can be either: Symmetric shared keys Public keys (in certificates) Either way, a session key is negotiated by IKE

IPsec Payloads AH: Authentication Header Authenticates each packet but doesn t encrypt Has fallen out of favor (redundant and no more efficient) ESP: Encapsulating Security Payload Encrypts (with authentication as side effect)

Transport IPsec IPsec transmission modes: Transport or Tunnel mode TCP/UDP ESP or AH IP Transport mode. Used when IPsec tunnel is end-to-end. Operates over some of the IP fields, and doesn t work with NAT! Transport IPsec TCP/UDP IP ESP or AH IP Tunnel mode. Used when IPsec tunnel not end-to-end. Hides the IP identity of endpoints. Operates over inner IP fields can work with NAT.

AH header format 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Next Header Payload Len RESERVED +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Security Parameters Index (SPI) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Sequence Number Field +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ + Authentication Data (variable) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

ESP header format 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Security Parameters Index (SPI) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Sequence Number +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Payload Data* (variable) + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Padding (0-255 bytes) +-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Pad Length Next Header +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Authentication Data (variable) +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

New IPsec transmission modes Transport IPsec NAT Transport IPsec NAT TCP/UDP ESP or AH UDP IP TCP/UDP IP ESP or AH UDP IP Extra layer of UDP allows IPsec to work over NAT.

Client VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Client VPNs: Host gets local IP address 2. If PPP, AAA tells Access Router to tunnel user to VPN. (If not PPP, Access Router uses local configuration.) Remote Host 30.1.1.1 AAA Access Router 1. Remote host connects to Internet (dialup-ppp or PPPoE (cable) or DSL) IPsec or GRE or L2TP FW/ VPN Site Host 3. Tunnel established (or packets forwarded over pre-established tunnel) Compulsory if Access Router forces tunnel, voluntary if user requests it (through certain NAI). NAI = user@domain Site Host

Provider-based client VPNs Used for instance when enterprise pays for employee access, wants it to go through enterprise network I know Cisco did this But never used that much Business model didn t take off Used even less now In part because VPN client comes with windows OS??? The tunneling technology commonly used for roaming dialup though

Network VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Reiterate network VPN benefits Makes separated IP sites look like one private IP network Security QoS guarantees Simplified network operation

Customer-based Network VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Customer-based Network VPNs Site CE CE Site Internet Site CE CE Site Customer buys own equipment, configures IPsec tunnels over the global internet, manages addressing and routing. ISP plays no role.

Customer-based Network VPNs Great for enterprises that have the resources and skills to do it Large companies More control, better security model Doesn t require trust in ISP ability and intentions Can use different ISPs at different sites But not all enterprises have this skill

Provider-based Network VPNs (aka Provider Provisioned: PPVPN) VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Provider-based Network VPNs Site CE PE ISP PE CE Site Site CE PE PE CE Site Provider manages all the complexity of the VPN. Customer simply connects to the provider equipment.

Same provider equipment used for multiple customers Site Site CE CE PE ISP PE CE Site Site CE PE PE CE Site CE CE Site Site

Model for customer Attach to ISP router (PE) as though it was one of your routers Run routing algorithm with it OSPF, RIP, BGP PE will advertise prefixes from other sites of same customer

Various PPVPN issues Tunnel type? IPsec (more secure, more expensive) GRE etc. How to discover which customer is at which PE? Don t want PEs without given customer to participate in routing for that customer How to distinguish overlapping private address spaces

BGP/MPLS VPNs (RFC2547) VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

BGP/MPLS VPNs (RFC2547) Cisco invention Leverage Cisco s investment in both BGP and MPLS (Multi-Protocol Label Switching) What is MPLS? Link-layer technology Tags like circuit switching But with some IP awareness How Cisco killed Epsilon Initially marketed as high performance switching Later became traffic engineering and VPN

CE1 Recall this frame-relay traffic engineered L2 VPN CE3 CE1 FR FR CE3 FR FR CE4 FR FR FR CE2 CE2 CE4 CE = Customer Equipment FR = Frame Relay

ISPs historically used L2 networks in their core ER ER ER ATM ATM ER ATM ATM ER ER ATM ER ATM ATM ER ATM = Asynchronous Transfer Mode ER = Edge Router

Logically, ISPs were structured like this ER ER ER ER ATM Cloud ER ER ER ER Every router was adjacent to every other

Why L2 (ATM)? ATM was, at least until 4-5 years ago, faster than IP forwarding ATM switches were better matched to the underlying SONET transmission links It was easier to traffic engineer based on virtual circuits than based on destination IP address IP wasn t the only network protocol

But there were problems ISPs had 100 s of routers, each of which logically had a link to all others Was difficult to manage and run routing over all of these logical links Scaled poorly Basic idea of MPLS was to elevate ATM intelligence to L3, while doing switching at L2! Epsilon business model

MPLS tried to get the best of both worlds IP Router MPLS ATM Switch Control: IP Router Software Forwarding: Longestmatch Control: IP Router Software Forwarding: Label Swapping Control: ATM Forum Software Forwarding: Label Swapping

MPLS Operation 1a. Routing protocols (e.g. OSPF-TE, IS-IS-TE) exchange reachability to destination networks 1b. Label Distribution Protocol (LDP) establishes label mappings to destination network 4. LER at egress removes label and delivers packet IP IP 10 IP 20 IP 40 IP 2. Ingress LER receives packet and label s packets 3. LSR forwards packets using label swapping

Original business model failed Simple reason: People figured out how to make IP fast as fast as ATM MPLS spent a long time looking for a reason to exist Finally found it in MPLS-BGP PPVPNs

Basic difficulty with PPVPN: private addresses

MPLS Label identifies VPN

How BGP/MPLS VPNs work BGP updates normally carry a set of IP prefixes in the routing path With MPLS VPN, they carry a VPN identifier, and an MPLS tag VPN identifier distinguishes overlapping address MPLS tag says how to encapsulate customer s IP over MPLS Within MPLS, the tag both routes the packet and identifies the customer Tunnels are typically not secure Customer assumes provider links are physically secure

A few more MPLS details Headers are stackable Uses variant of RSVP for establishing label values Also used these days for Traffic Engineering Because can route on source and dest Allows per-customer Service Level Aggrements 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Label Exp S TTL +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Virtual Router based L3 VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Virtual Router based L3 VPNs BGP/MPLS gave Cisco a huge advantage Because Cisco was the BGP and MPLS expert Competitors counter argument: No need to couple routing technology with tunneling technology they are separate issues Simpler to use virtual routers

What is a virtual router (VR)? Separate logical router within a single physical router Runs its own routing algorithm Has its own FIB (Forwarding Information Base) Basic idea: Incoming tunnel identifies which VR is intended If GRE, then GRE key field If IPsec, then IPsec SPI field If L2TP, then L2TP key field This is how overlapping addresses are distinguished

VR approach has discovery issues No standard way to configure tunnels and discover which PEs attach to which customers All manually configured (via management system) Various proposals exist Via BGP, OSPF, DNS, an LDAP database, and even IP multicast

Layer 2 LAN VPNs VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay LAN Virtual Router BGP/MPLS Secure Non-secure

Layer 2 LAN VPNs Model is for PE to look like LAN to CE CE broadcast over LAN reaches only other CEs of the same customer Thus customer can run OSPF over LAN in standard way Supports multicast Multi-protocol Uses VLAN (Virtual LAN) tags to distinguish customers Advantages over FR and ATM are: Ethernet is more common interface Supports broadcast/multicast

What is a VLAN? A virtual LAN : makes a single physical look like multiple LANs Virtual LAN and priority capabilities are provided by 802.1Q/p: a VLAN tag is provided by 802.1Q to identify VLAN membership Limited to 4096 VLANs this is a potential scalability issue the VLAN tag has a 3-bit priority field that allows 8 possible service classes (matches DiffServ s 8 possible classes)

Why VLANs? LAN scalability: limits broadcast domains (limits broadcast storms); also limits multicast, chatty protocols, etc., reducing overall network traffic. Network efficiencies: traffic flows from different VLANS can be segregated Allows non-physical grouping of nodes that share similar resources Allows easy changing of LAN membership Reduces the amount of level 3 (IP) routing Security: limits snooping; authentication required (via GVRP) to join VLAN

More to the point Ethernet has gotten very fast GigE common 10gig Ethernet coming (optical) We can put much more on an Ethernet, so we need to segregate These days, site networks are composed of ethernet switches and VLANs, not routers and subnets!

Typical site configuration (from Cisco)

VLAN Header 64 bits 48 bits 48 bits 16 bits 46 to 1500 Bytes 32 bits Preamble Destination MAC Address Source MAC Address Length/ Type Data/LLC Frame Check Sequence Original Ethernet Frame Structure 64 bits 48 bits 48 bits 16 bits16 bits 16 bits 46 to 1500 Bytes 32 bits Preamble Dest MAC Address Source MAC Address TPID TCI Length/ Type Data/LLC Frame Check Sequence User Priority (3) CFI (1) VLAN ID (12) Ethernet with VLAN

Meta-Point: Its all about tunnels! In this lecture we saw a lot of tunnels IPsec, MPLS, GRE, L2TP I said before that the Internet has two ways to scale: Hierarchy and caching It has a third way: Tunnels!

Tunnels are scalable Tunnels prevents the middle from having to know details of the edge But in a manner that is more flexible than hierarchy Hierarchy forces a structure from the middle (top) Tunnels cut through the middle transparently Tunnels have been introduced piecemeal We still don t have a coherent architecture for them...