Master Course Computer Networks IN2097

Similar documents
IP addressing and forwarding Network layer

Network layer: Overview. Network layer functions IP Routing and forwarding

Lecture Computer Networks

Chapter 4 Network Layer

8.2 The Internet Protocol

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

CS268 Exam Solutions. 1) End-to-End (20 pts)

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Internet Protocols Fall Outline

Chapter 4 Network Layer

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Internet Protocol: IP packet headers. vendredi 18 octobre 13

TCP/IP Over Lossy Links - TCP SACK without Congestion Control

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Компјутерски Мрежи NAT & ICMP

Overview Computer Networking. IP Address Classes (Some are Obsolete) Outline. Lecture 9 IP Packets. CIDR IP addressing. Forwarding examples

Classful IP Addressing. Classless Addressing: CIDR. Routing & Forwarding: Logical View of a Router. IP Addressing: Basics

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

IP - The Internet Protocol

Internet Infrastructure Measurement: Challenges and Tools

Instructor Notes for Lab 3

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

IP Address Classes (Some are Obsolete) Computer Networking. Important Concepts. Subnetting Lecture 8 IP Addressing & Packets

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford

Internet Packets. Forwarding Datagrams

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

A Survey: High Speed TCP Variants in Wireless Networks

Introduction to LAN/WAN. Network Layer (part II)

Troubleshooting Tools

Transport Layer Protocols

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

TCP in Wireless Mobile Networks

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

High-Speed TCP Performance Characterization under Various Operating Systems

Network Layer: Network Layer and IP Protocol

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Subnetting,Supernetting, VLSM & CIDR

Advanced Computer Networks IN Dec 2015

Internet Control Protocols Reading: Chapter 3

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

Route Discovery Protocols

Introduction to LAN/WAN. Network Layer

Technical Support Information Belkin internal use only

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Classful IP Addressing (cont.)

Unix System Administration

VLAN und MPLS, Firewall und NAT,

CS 43: Computer Networks IP. Kevin Webb Swarthmore College November 5, 2013

Master Course Computer Networks IN2097

NETWORK LAYER/INTERNET PROTOCOLS

Final for ECE374 05/06/13 Solution!!

ALTHOUGH it is one of the first protocols

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Transport and Network Layer

IP Subnetting and Addressing

TCP/IP Optimization for Wide Area Storage Networks. Dr. Joseph L White Juniper Networks

What is a DoS attack?

Linux MDS Firewall Supplement

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

IP address format: Dotted decimal notation:

Cisco Configuring Commonly Used IP ACLs

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Future Internet Technologies

About Firewall Protection

Low-rate TCP-targeted Denial of Service Attack Defense

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Computer Networks. Chapter 5 Transport Protocols

First Midterm for ECE374 03/24/11 Solution!!

ECSE-6600: Internet Protocols Exam 2

Measuring IP Performance. Geoff Huston Telstra

(Refer Slide Time: 02:17)

First Midterm for ECE374 03/09/12 Solution!!

Improving DNS performance using Stateless TCP in FreeBSD 9

Using IPM to Measure Network Performance

Avaya ExpertNet Lite Assessment Tool

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012

IP Routing Features. Contents

Routing Protocols (RIP, OSPF, BGP)

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Internet Protocols. Background CHAPTER

Introduction to IP networking

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

A Study on TCP Performance over Mobile Ad Hoc Networks

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

TCP Labs. WACREN Network Monitoring and Measurement Workshop Antoine Delvaux perfsonar developer

Computer Networks - CS132/EECS148 - Spring

Internet Ideal: Simple Network Model

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Congestion Control Review Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

1 DNS in the real world

Congestions and Control Mechanisms n Wired and Wireless Networks

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

TEIN2 Measurement and Monitoring Workshop.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Transcription:

Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther Chair for Network Architectures and Services Department of Computer Science Technische Universität München http://www.net.in.tum.de

Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Transport Layer - continuation -

Roadmap q Advanced Transport Layer Concepts q Internet Protocol, The Internet Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 3

Advanced Transport Layer Concepts q Buffer bloat q TCP for high bandwidth long distance connections q TCP Throughput Formula q Overview of Deployment of TCP variants q Detection of TCP-unfriendly Flows q Multipath TCP Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 4

TCP Congestion Control q Variable Threshold q At loss event, Threshold is set to 1/2 of CongWin just before loss event triple duplicate ack Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 5

TCP Reno q TCP Fast Recovery algorithm described in RFC 2581 q Implementation introduced 1990 in BSD Reno release q Behaviour sender only retransmits a packet after a retransmit timeout has occurred or after three duplicate acknowledgements have arrived triggering the Fast Retransmit algorithm. a single retransmit timeout might result in the retransmission of several data packets each invocation of the Fast Retransmit algorithm leads to retransmission of only a single data packet problems may arrive when multiple packets are dropped from a single window Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 6

TCP and Buffer Bloat q q Capacities of router queues Large queue = good: Less packet losses at bottlenecks Do you agree? What would happen to TCP? Effects of large buffers at bottleneck on TCP connections Once queues are full: Queueing delays increase significantly or even dramatically TCP congestion control gets no early warning No duplicate ACKS ð no Fast Retransmit Instead: Sudden timeouts Congestion windows way too large Many parallel TCP connections over same link get warning way too late Synchronisation: Oscillation between All send way too much and all get frightened by timeouts and send way too little Huge variations in queueing delays ð DevRTT becomes very large ð Timeout value becomes very large Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 7

Buffer bloat - ICSI Netalyzr Measurements http://www.broadbandreports.com/shownews/the-icsi-netalyzr- Explored-113972 http://www.icir.org/christian/publications/2010-imc-netalyzr.pdf Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 8

TCP for High Bandwidth Long Distance Connections q Several transport protocol variants for high bandwidth long distance connections (LFNs - Long Fat Networks) exist q Frequent property Effectively use available bandwidth Unfriendly doesn t play nicely with others Unfair to different RTT flows achieves better performance than standard TCP is not fair to standard TCP q General approaches for congestion control loss-based: NewReno, CUBIC delay-based: Vegas, CAIA Delay Gradiant (CDG) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 9

TCP NewReno q c.f. RFC 3782 - April 2004, Proposed Standard q Properties addresses problems that may arrive when multiple packets are dropped from a single window Base algorithm described in RFC 2582 did not attempt to avoid unnecessary multiple Fast Retransmits after timeout. RFC 2582 also defined "Careful" variant that avoids these unnecessary Fast Retransmits Careful variant of RFC 2582 NewReno as default Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 10

TCP CUBIC q CUBIC Loss-based congestion control optimised for high bandwidth, high latency q Properties modified window-growth-control algorithm window grows slowly around W max fast probing growth away from W max Standard TCP outperforms CUBIC s window growth function in short RTT networks. CUBIC emulates standard (time-independent) TCP window adjustment algorithm, select the greater of the two windows (emulated versus cubic) q Implemenation: in Linux since kernel 2.6.19, in FreeBSD 8-STABLE Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 11

TCP Vegas q TCP Vegas by Lawrence Brakmo, Sean W. O'Malley, Larry L. Peterson at University of Arizona published at SIGCOMM 1994 q Properties delay-based congestion control uses i th RTT > min RTT + delay threshold, delay measured every RTT Additive Increase Additive Decrease (AIAD) to adjust cwnd q Properties implementations available for Linux and BSD Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 12

Delay Gradient TCP q D. Hayes, G. Armitage, "Revisiting TCP Congestion Control using Delay Gradients," IFIP/TC6 NETWORKING 2011, Valencia, Spain, 9-13 May 2011 http://caia.swin.edu.au/cv/dahayes/content/networking2011-cdgpreprint.pdf q CDG ( CAIA Delay-Gradient ) modified TCP sender behaviour: uses delay gradient as a congestion indicator tolerates non-congestion packet loss, and backoff for congestion related packet loss works together with loss-based congestion control flows, e.g. NewReno Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 13

Comparison of TCP Variants q Grenville Armitage: A rough comparison of NewReno, CUBIC, Vegas and CAIA Delay Gradient TCP (v0.1), CAIA Technical report 110729A, 29 July 2011 http:// caia.swin.edu.au/reports/110729a/caia-tr-110729a.pdf q SPP Synthetic Packet Pairs Tool http://caia.swin.edu.au/tools/spp/ Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 14

Multipath TCP q IETF Working Group Multipath TCP (mptcp) http://datatracker.ietf.org/doc/charter-ietf-mptcp/ q Key goals deployable and usable without significant changes to existing Internet infrastructure usable by unmodified applications stable and congestion-safe, including NAT interactions q Objectives a. An architectural framework for congestion-dependent multipath transport protocols b. A security threat analysis for multipath TCP c. A coupled multipath-aware congestion control algorithm d. Multi-addressed multipath extensions to current TCP e. Application interface considerations Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 15

Multipath TCP q q http://bgp.potaroo.net/ietf/html/ids-wg-mptcp.html TCP Extensions for Multipath Operation with Multiple Addresses, draft-ietf-mptcp-multiaddressed MPTCP Application Interface Considerations, draft-ietf-mptcp-api-06.txt Milestones Submit to IESG architectural guidelines and security threat analysis as informational RFC(s) Submit to IESG basic coupled congestion control as an experimental RFC Consensus on what high-level changes are needed to the current MPTCP Experimental document in order to progress it on the standards track Apr 2013 Implementation advice (Informational) to IESG Aug 2013 Use-cases and operational experiences (Informational) to IESG Dec 2013 MPTCP-enabled middleboxes (Informational) to IESG Dec 2013 MPTCP standards track protocol to IESG Jan 2014 Re-charter or close Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 16

Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Internet Protocol

Functional Components routing protocol routing table updates Routing functions routing protocol Control incoming IP datagrams routing table lookup routing table IP Forwarding outgoing IP datagrams Datapath: per-packet processing Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 18 18

The Internet Network layer Host, router network layer functions: The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Transport layer: TCP, UDP Network layer Routing protocols path selection RIP, OSPF, BGP forwarding table IP protocol addressing conventions datagram format packet handling conventions ICMP protocol error reporting router signaling Link layer physical layer Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 19

ICMP: Internet Control Message Protocol q used by hosts & routers to communicate network-level information error reporting: unreachable host, network, port, protocol echo request/reply (used by ping) q network-layer above IP: ICMP msgs carried in IP datagrams q ICMP message: type, code plus first 8 bytes of IP datagram causing error Type Code description 0 0 echo reply (ping) 3 0 dest. network unreachable 3 1 dest host unreachable 3 2 dest protocol unreachable 3 3 dest port unreachable 3 6 dest network unknown 3 7 dest host unknown 4 0 source quench (congestion control - not used) 8 0 echo request (ping) 9 0 route advertisement 10 0 router discovery 11 0 TTL expired 12 0 bad IP header Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 20

Traceroute and ICMP q Source sends series of UDP segments to destination First has TTL =1 Second has TTL=2, etc. Unlikely port number q When nth datagram arrives to nth router: Router discards datagram And sends to source an ICMP message (type 11, code 0) Message includes name of router& IP address q When ICMP message arrives, source calculates RTT q Traceroute does this 3 times Stopping criterion q UDP segment eventually arrives at destination host q Destination returns ICMP dest port unreachable packet (type 3, code 3) q When source gets this ICMP, stops. Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 21

IP addressing: CIDR CIDR: Classless InterDomain Routing subnet portion of address of arbitrary length address format: a.b.c.d/x, where x is # bits in subnet portion of address subnet part 11001000 00010111 00010000 00000000 200.23.16.0/23 host part Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 22

IP addresses: how to get one? Q: How does network get subnet part of IP addr? A: gets allocated portion of its provider ISP s address space ISP's block 11001000 00010111 00010000 00000000 200.23.16.0/20 Organization 0 11001000 00010111 00010000 00000000 200.23.16.0/23 Organization 1 11001000 00010111 00010010 00000000 200.23.18.0/23 Organization 2 11001000 00010111 00010100 00000000 200.23.20.0/23....... Organization 7 11001000 00010111 00011110 00000000 200.23.30.0/23 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 23

Hierarchical addressing: route aggregation Hierarchical addressing allows efficient advertisement of routing information: Organization 0 200.23.16.0/23 Organization 1 200.23.18.0/23 Organization 2 200.23.20.0/23 Organization 7. 200.23.30.0/23. Fly-By-Night-ISP Send me anything with addresses beginning 200.23.16.0/20 Internet ISPs-R-Us Send me anything with addresses beginning 199.31.0.0/16 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 24

Hierarchical addressing: more specific routes ISPs-R-Us has a more specific route to Organization 1 Organization 0 200.23.16.0/23 Organization 2 200.23.20.0/23 Organization 7. 200.23.30.0/23. Fly-By-Night-ISP Send me anything with addresses beginning 200.23.16.0/20 Internet Organization 1 200.23.18.0/23 ISPs-R-Us Send me anything with addresses beginning 199.31.0.0/16 or 200.23.18.0/23 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 25

IP addressing: the last word... Q: How does an ISP get block of addresses? A: ICANN: Internet Corporation for Assigned Names and Numbers allocates addresses manages DNS assigns domain names, resolves disputes Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 26

How big is the Internet? q Many measures: networks (routed entities) domains, host names (but: several names per host!) directly (continuously) attached hosts ( ping able ) IP-connected hosts (including dialin, e.g. PPP) firewalled hosts e-mail reachable q What is the German Internet? Entities within Germany Entities operated by Germans / German organisations Entities used by Germans / German organisations Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 27

Counting q Worldwide q q > 700.000.000 Hosts > 37.000 Autonomous Systems > 3.000.000.000 Assigned IP Addresses > 2.180.000.000 Reachable IP Addresses Europe > 126.600.000 Hosts > 19.000 Autonomous Systems > 420.000.000 Reachable IP Addresses > 500.000.000 Assigned IP Addresses Germany > 13.300.000 Hosts > 1.200 Autonomous Systems > 70.700.000 Assigned IP Addresses (5.500 prefixes) > 62.700.000 Reachable IP Addresses Snapshot 2011 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2012/2013 28