SlideShare a Scribd company logo
1 of 123
Network Architecture (R02)  Name Based Nets? Jon Crowcroft,  http://www. cl .cam.ac.uk/~jac22 http://www.cl.cam.ac.uk/teaching/0910/R02/
Shoch’s Mnemonic Mantra ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multicast/Anycast “addresses” ,[object Object],[object Object],[object Object]
Mobility & Address Re-Use ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where can we update things ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bug in internet ,[object Object],[object Object]
Mobile => State Update ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cellular (GPRS, 3G etc) Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What breaks if we update our IP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
My crazy idea ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For static systems sometimes need a transparent choice ,[object Object],[object Object],[object Object],[object Object]
Global Server Load Balancing Dima Krioukov  [ [email_address] .com] Alex Kit  [ [email_address] .com] October 24, 2000
Purpose ,[object Object],[object Object],[object Object],[object Object]
Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Abbreviations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1. Introduction ,[object Object]
Hosting Infrastructure Web User Content Owner IDC Owner ISP OSS
ASP Infrastructure End Customer ASP Applications Operations ISP/Backbone Access IDC
IDC IDC Core (Routing) Distribution (L3 Switching) Tier Tier Tier LB Tier Load Balancing (L4 Switching) Port Density (L2 Switching) Servers SAN
Requirements to IDCs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IDC1 IDC2 Client HA    LB
2. Generic SLB and LSLB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LSLB Forwarding ,[object Object],[object Object],[object Object]
LSNAT Router LB S1 S2 S3 X Y src/ dst Layer Ingress Client_Port S1_Port dst Client_IP S1_IP dst LB_MAC S1_MAC dst Client_Port Virtual_Port dst Client_IP Virtual_IP dst dst Router_MAC Virtual_MAC Client_Port Client_IP LB_MAC Client_Port Client_IP Router_MAC S1_IP src L3 src src src src src Virtual_IP L3 S1_Port L4 Virtual_Port L4 S1_MAC L2 Y Virtual_MAC L2 X Egress Segment
LSNAT + Source NAT Router LB S1 S2 S3 X Y src/ dst Layer Ingress LB_V_Port S1_Port dst LB_V_IP S1_IP dst LB_V_MAC S1_MAC dst Client_Port Virtual_Port dst Client_IP Virtual_IP dst dst Router_MAC Virtual_MAC LB_V_Port LB_V_IP LB_V_MAC Client_Port Client_IP Router_MAC S1_IP src L3 src src src src src Virtual_IP L3 S1_Port L4 Virtual_Port L4 S1_MAC L2 Y Virtual_MAC L2 X Egress Segment
DSR Router LB S1 S2 S3 1 2 3 Virtual_Port Client_Port Virtual_IP Client_IP S1_MAC Virtual_MAC 2 Client_Port Virtual_Port Client_IP Virtual_IP Router_MAC S1_MAC 3 src/ dst Layer 1 Virtual_Port dst Virtual_IP dst dst Virtual_MAC Client_Port Client_IP Router_MAC src src src L3 L4 L2
Tunneling Router LB S1 S2 S3 1 2 3 Int: V_IP Int: C_IP V_Port C_Port Ext: S1_IP Ext: LB_IP S1_MAC LB_MAC 2 C_Port V_Port C_IP V_IP R_MAC S1_MAC 3 src/ dst Layer 1 V_Port dst V_IP dst dst V_MAC C_Port C_IP R_MAC src src src L3 L4 L2
3. GSLB ,[object Object],[object Object],[object Object],[object Object]
3.1 DNS Based ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LPRP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IDC1 LB IDC2 LB IDC3 LB
PRP ,[object Object],[object Object],[object Object],[object Object],[object Object],Proximity to the client LDNS, not to the client
LRP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How it works IDC1 IDC2 LB IDC3 LB Customer LDNS ADNS Client RDNS 1 2 3 4 5 5 6 6 6
How it works IDC1 IDC2 LB IDC3 LB Customer LDNS ADNS Client RDNS 7 7 8 10 11 9
Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.2 HRI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To what ,[object Object],[object Object],[object Object],[object Object],Client Router IDC1 IDC2
By what ,[object Object],IDC1 Router RS BGP IDC2 Router RS BGP
By what ,[object Object],IDC1 Router RS IDC2 Router RS RS LB
By what ,[object Object],IDC2 Router RS RS LB IDC1 Router RS RS LB BGP BGP
Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3.3 TDF ,[object Object],[object Object],[object Object],Client IDC1,  “ wrong” IDC2, “ right”
Why “wrong” IDC? ,[object Object],[object Object],[object Object]
NAT Based Client IDC1,  “ wrong” V1.1;  V1.2 IDC2, “ right” V2.1;  V2.2 3 2 1 1 V1.1 C C V2.2 dst V1.1 C src L3 3 2
“ Remote Servers” Client IDC1,  “ wrong” V1.1 IDC2, “ right” V2.1 2 1 C V1.1 4 1 V1.1 C V1.1 V2.1 dst V2.1 V1.1 src L3 3 2 3 4
Tunneling ,[object Object]
Analysis ,[object Object],[object Object],[object Object],[object Object],Client Router Router IDC1,  “ wrong” IDC2, “ right”
Analysis ,[object Object],[object Object],[object Object],[object Object],Client Router Router IDC1,  “ wrong” IDC2, “ right”
3.4 Latest Trends, Radicalism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Infiltrations IDC2 LB IDC1 LB Customer LB LB LB Client LB LB LB
Internet Infiltrations IDC2 LB IDC1 LB Customer LB LB LB Client LB LB
LDNS modifications in CDNs IDC2 LB IDC1 LB Customer LDNS Client ASP Backbone
4. Virtual Block Injection (VBI) ,[object Object],[object Object]
How it works AS1 AS2 V/20, AS3 V/20, AS3 Client ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
How it works AS1 AS2 V/20, AS3 Client ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
How it works AS1 AS2 V/20, AS3 V/20, AS3 Client ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Test Network
Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Flapping AS1 AS2 V/20, AS3 V/20, AS3 Client Router ISP1 ISP2 IDC1, R1/20 IDC2, R2/20 UDP TCP
Solution for UDP ,[object Object],AS1 AS2 V/20, AS3 V/20, AS3 Client Router ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
Solution for UDP ,[object Object],AS1 AS2 V/20, AS3 V/20, AS3 Client Router ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
Solution for TCP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AS1 AS2 V/20, AS3 V/20, AS3 Client Router ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
5. Applicability Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
6. Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object]
IPNL: A NAT-Extended Internet Architecture Paul Francis  Tahoe Network Remakrishna Gummadi  UC Berkeley
About title ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Answer Question ,[object Object],[object Object],[object Object],?
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic(0)--NAT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basics(1)--concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],internal nl-router Global private private frontdoor private EHIP RN MRIP
Terms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basics(2)--routing IPNL Header Optional FQDN header (variable) Optional global header (16) Local header (24)
Basic(2)--routing  ,[object Object],HOST: (1)FQDN & EHIP (2)one or more nl-routers Internal nl-router: (1)its neighbors (2)FQDN, IP pair list (3)Routing information Frontdoor: Entry for all realms behind it
Example1: Routing by FQDN
Example2: Routing by IPNL addresses DestAddress: M3:R6:H3
Key attributes of IPNL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MRIP  RN  EHIP
Experiment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Testbed
Review question  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],     
NICE
Other works ,[object Object],[object Object],[object Object],[object Object],[object Object]
Comparisons with IPv6 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Advantages disappear in IPv6on4 env
Discussions  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resource Discovery Using an Intentional Naming System Hari Balakrishnan  MIT Lab for Computer Science http://wind.lcs.mit.edu/ [email_address] With: William Adjie-Winoto, Elliot Schwartz,  Jeremy Lilley, Anit Chakraborty
Application: Location-dependent wireless services ,[object Object],[object Object],App should be able to conveniently specify a resource and access it ,[object Object],[object Object],Where? ,[object Object]
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],Dynamic, mobile environment with no pre-configured  support for internetworking or service location
Today ,[object Object],[object Object],[object Object],[object Object],[object Object],Routers Servers Clients DNS Hostname Address
Ad hoc  configuration ,[object Object],[object Object],[object Object],[object Object],addr = a r mask = m r addr = b r mask = m r addr = c r mask = n Coalesce? Route? [a r :m r ]
Resource discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Design goals ,[object Object],Responsiveness Name resolvers must track rapid changes Robustness System must overcome resolver and service failure Easy configuration Name resolvers must  self-configure Expressiveness
Intentional Naming System (INS) principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INS architecture overview ,[object Object],Integrate resolution and message routing image Lookup camera510.lcs.mit.edu INR  self-configuration ,[object Object],[object Object],[object Object],Intentional name
How does it work? INR DSR Virtual space partitions Domain Space Resolvers Scaling? Application-level overlay network formed based on performance Inter-domain information via DSR protocol Exchange names as if they were routes
INS service model INR application Early binding Late binding query Intentional anycast Intentional multicast Application-level routing using intentional names Self-configuring app-level overlay network formed based on  performance Soft-state name dissemination set of names
What’s in a name? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],data [vspace = netgroup] [department = arch-lab [state = oregon [city = hillsboro]]] [rank = admin] data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responsiveness: Late binding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Late binding services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Robustness: Names as soft-state ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Self-configuring resolvers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Efficient name lookups ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scaling issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual space partitioning vspace=camera vspace=5th-floor Routing updates for each vspace Delegate this to  another INR
INR Implementation Overlay Manager Network Monitor Route Manager Client Manager Forwarder vspace neighbors NameTreeSet Communicator Mobility Sockets TCP/UDP lookup Intentional anycast, multicast Incoming message
Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WIND
 
 
 
 
 
 
 
 
Status & performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Related work ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application-Level Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What Do They Have in Common? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Supporting Application-Level Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future Internet Architecture Flexible IP  routers Scheduling, buffer mgmt Use each other  to add value Resource management Traffic  engineering Congestion  Manager Middleware ... Cache & replica  management Self-configuring overlays INS Media  transcoders Performance  discovery Service location Jini UPnP E-speak T-spaces Decentralized security
Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For next week (Tuesday 27th oct)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

What is LDP || Frequently asked Questions and Answers on MPLS LDP
What is LDP || Frequently asked Questions and Answers on MPLS LDPWhat is LDP || Frequently asked Questions and Answers on MPLS LDP
What is LDP || Frequently asked Questions and Answers on MPLS LDPNetworKingStudy
 
Gaweł mikołajczyk. i pv6 insecurities at first hop
Gaweł mikołajczyk. i pv6 insecurities at first hopGaweł mikołajczyk. i pv6 insecurities at first hop
Gaweł mikołajczyk. i pv6 insecurities at first hopYury Chemerkin
 
QoS In The Enterprise
QoS In The EnterpriseQoS In The Enterprise
QoS In The EnterprisePrivate
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sgDang Hop
 
Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)Reza Farahani
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1hanums1
 
internet applications
 internet applications internet applications
internet applicationsSrinivasa Rao
 
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsAnalysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsSiddharth Nawani
 
Quality of service
Quality of serviceQuality of service
Quality of servicevmkris000
 
Introduction to Remote Procedure Call
Introduction to Remote Procedure CallIntroduction to Remote Procedure Call
Introduction to Remote Procedure CallAbdelrahman Al-Ogail
 
Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljithanums1
 
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterAssessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterIOSR Journals
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined NetworksJose Saldana
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure callsimnomus
 

What's hot (20)

What is LDP || Frequently asked Questions and Answers on MPLS LDP
What is LDP || Frequently asked Questions and Answers on MPLS LDPWhat is LDP || Frequently asked Questions and Answers on MPLS LDP
What is LDP || Frequently asked Questions and Answers on MPLS LDP
 
Gaweł mikołajczyk. i pv6 insecurities at first hop
Gaweł mikołajczyk. i pv6 insecurities at first hopGaweł mikołajczyk. i pv6 insecurities at first hop
Gaweł mikołajczyk. i pv6 insecurities at first hop
 
QoS In The Enterprise
QoS In The EnterpriseQoS In The Enterprise
QoS In The Enterprise
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)Quality of Service(Queuing Methods)
Quality of Service(Queuing Methods)
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
 
QoS
QoSQoS
QoS
 
Iccsit 2010 paper1
Iccsit 2010 paper1Iccsit 2010 paper1
Iccsit 2010 paper1
 
internet applications
 internet applications internet applications
internet applications
 
Analysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM AlgortihmsAnalysis and Evolution of AQM Algortihms
Analysis and Evolution of AQM Algortihms
 
Real-Time Streaming Protocol -QOS
Real-Time Streaming Protocol -QOSReal-Time Streaming Protocol -QOS
Real-Time Streaming Protocol -QOS
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
 
Introduction to Remote Procedure Call
Introduction to Remote Procedure CallIntroduction to Remote Procedure Call
Introduction to Remote Procedure Call
 
Chapter 3 - Transport Layer
Chapter 3 - Transport LayerChapter 3 - Transport Layer
Chapter 3 - Transport Layer
 
Iccsit 2010 rljit
Iccsit 2010 rljitIccsit 2010 rljit
Iccsit 2010 rljit
 
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterAssessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
 
Remote procedure calls
Remote procedure callsRemote procedure calls
Remote procedure calls
 
Ppp
PppPpp
Ppp
 

Viewers also liked

Effective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA PlatformsEffective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA PlatformsContinuous Computing
 
From L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernelsFrom L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernelsmicrokerneldude
 
Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009
Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009
Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009CloudAngels
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Torontopatmisasi
 
Why You Should Choose a Software-Based Load Balancer
Why You Should Choose a Software-Based Load BalancerWhy You Should Choose a Software-Based Load Balancer
Why You Should Choose a Software-Based Load BalancerNGINX, Inc.
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorialopenflow
 

Viewers also liked (11)

Effective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA PlatformsEffective Load Balancing for ATCA Platforms
Effective Load Balancing for ATCA Platforms
 
Title Subtitle
Title SubtitleTitle Subtitle
Title Subtitle
 
Ha of load balancer
Ha of load balancerHa of load balancer
Ha of load balancer
 
From L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernelsFrom L3 to seL4: What have we learnt in 20 years of L4 microkernels
From L3 to seL4: What have we learnt in 20 years of L4 microkernels
 
L4 Microkernel :: Design Overview
L4 Microkernel :: Design OverviewL4 Microkernel :: Design Overview
L4 Microkernel :: Design Overview
 
Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009
Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009
Nick Bond - Zeus - Load Balancing in the Cloud - CloudCamp Berlin 30.04.2009
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 
Hints for L4 Microkernel
Hints for L4 MicrokernelHints for L4 Microkernel
Hints for L4 Microkernel
 
Microkernel Evolution
Microkernel EvolutionMicrokernel Evolution
Microkernel Evolution
 
Why You Should Choose a Software-Based Load Balancer
Why You Should Choose a Software-Based Load BalancerWhy You Should Choose a Software-Based Load Balancer
Why You Should Choose a Software-Based Load Balancer
 
OpenFlow tutorial
OpenFlow tutorialOpenFlow tutorial
OpenFlow tutorial
 

Similar to Name Based Net Architectures

redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionRedge Technologies
 
Distributed Virtual Transaction Directory Server
Distributed Virtual Transaction Directory ServerDistributed Virtual Transaction Directory Server
Distributed Virtual Transaction Directory ServerLDAPCon
 
Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing Cisco Canada
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginEC-Council
 
Lync 2010 deep dive edge
Lync 2010 deep dive edgeLync 2010 deep dive edge
Lync 2010 deep dive edgeHarold Wong
 
2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance Considerations2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance ConsiderationsShawn Wells
 
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAMPLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAMPROIDEA
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion PacketsAmazon Web Services
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image DvdSusan Cox
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT PROIDEA
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion PacketsAmazon Web Services
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsGerardo Pardo-Castellote
 

Similar to Name Based Net Architectures (20)

Title Subtitle
Title SubtitleTitle Subtitle
Title Subtitle
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
Distributed Virtual Transaction Directory Server
Distributed Virtual Transaction Directory ServerDistributed Virtual Transaction Directory Server
Distributed Virtual Transaction Directory Server
 
Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing Traffic Engineering Using Segment Routing
Traffic Engineering Using Segment Routing
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Lync 2010 deep dive edge
Lync 2010 deep dive edgeLync 2010 deep dive edge
Lync 2010 deep dive edge
 
Link_NwkingforDevOps
Link_NwkingforDevOpsLink_NwkingforDevOps
Link_NwkingforDevOps
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 
Networking revolution
Networking revolutionNetworking revolution
Networking revolution
 
DDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data LinksDDS Over Low Bandwidth Data Links
DDS Over Low Bandwidth Data Links
 
2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance Considerations2009-01-28 DOI NBC Red Hat on System z Performance Considerations
2009-01-28 DOI NBC Red Hat on System z Performance Considerations
 
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAMPLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
PLNOG 5: Rafał Szarecki - EXPERIENCE FROM L2TP IMPLEMENTATION FOR BITSTREAM
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion Packets
 
Evolving Enterprise Network Architecture
Evolving Enterprise Network ArchitectureEvolving Enterprise Network Architecture
Evolving Enterprise Network Architecture
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Another Day, Another Billion Packets
Another Day, Another Billion PacketsAnother Day, Another Billion Packets
Another Day, Another Billion Packets
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
 

More from webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 

More from webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

Name Based Net Architectures

  • 1. Network Architecture (R02) Name Based Nets? Jon Crowcroft, http://www. cl .cam.ac.uk/~jac22 http://www.cl.cam.ac.uk/teaching/0910/R02/
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Global Server Load Balancing Dima Krioukov [ [email_address] .com] Alex Kit [ [email_address] .com] October 24, 2000
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Hosting Infrastructure Web User Content Owner IDC Owner ISP OSS
  • 19. ASP Infrastructure End Customer ASP Applications Operations ISP/Backbone Access IDC
  • 20. IDC IDC Core (Routing) Distribution (L3 Switching) Tier Tier Tier LB Tier Load Balancing (L4 Switching) Port Density (L2 Switching) Servers SAN
  • 21.
  • 22.
  • 23.
  • 24. LSNAT Router LB S1 S2 S3 X Y src/ dst Layer Ingress Client_Port S1_Port dst Client_IP S1_IP dst LB_MAC S1_MAC dst Client_Port Virtual_Port dst Client_IP Virtual_IP dst dst Router_MAC Virtual_MAC Client_Port Client_IP LB_MAC Client_Port Client_IP Router_MAC S1_IP src L3 src src src src src Virtual_IP L3 S1_Port L4 Virtual_Port L4 S1_MAC L2 Y Virtual_MAC L2 X Egress Segment
  • 25. LSNAT + Source NAT Router LB S1 S2 S3 X Y src/ dst Layer Ingress LB_V_Port S1_Port dst LB_V_IP S1_IP dst LB_V_MAC S1_MAC dst Client_Port Virtual_Port dst Client_IP Virtual_IP dst dst Router_MAC Virtual_MAC LB_V_Port LB_V_IP LB_V_MAC Client_Port Client_IP Router_MAC S1_IP src L3 src src src src src Virtual_IP L3 S1_Port L4 Virtual_Port L4 S1_MAC L2 Y Virtual_MAC L2 X Egress Segment
  • 26. DSR Router LB S1 S2 S3 1 2 3 Virtual_Port Client_Port Virtual_IP Client_IP S1_MAC Virtual_MAC 2 Client_Port Virtual_Port Client_IP Virtual_IP Router_MAC S1_MAC 3 src/ dst Layer 1 Virtual_Port dst Virtual_IP dst dst Virtual_MAC Client_Port Client_IP Router_MAC src src src L3 L4 L2
  • 27. Tunneling Router LB S1 S2 S3 1 2 3 Int: V_IP Int: C_IP V_Port C_Port Ext: S1_IP Ext: LB_IP S1_MAC LB_MAC 2 C_Port V_Port C_IP V_IP R_MAC S1_MAC 3 src/ dst Layer 1 V_Port dst V_IP dst dst V_MAC C_Port C_IP R_MAC src src src L3 L4 L2
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. How it works IDC1 IDC2 LB IDC3 LB Customer LDNS ADNS Client RDNS 1 2 3 4 5 5 6 6 6
  • 34. How it works IDC1 IDC2 LB IDC3 LB Customer LDNS ADNS Client RDNS 7 7 8 10 11 9
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. NAT Based Client IDC1, “ wrong” V1.1; V1.2 IDC2, “ right” V2.1; V2.2 3 2 1 1 V1.1 C C V2.2 dst V1.1 C src L3 3 2
  • 45. “ Remote Servers” Client IDC1, “ wrong” V1.1 IDC2, “ right” V2.1 2 1 C V1.1 4 1 V1.1 C V1.1 V2.1 dst V2.1 V1.1 src L3 3 2 3 4
  • 46.
  • 47.
  • 48.
  • 49.
  • 50. Internet Infiltrations IDC2 LB IDC1 LB Customer LB LB LB Client LB LB LB
  • 51. Internet Infiltrations IDC2 LB IDC1 LB Customer LB LB LB Client LB LB
  • 52. LDNS modifications in CDNs IDC2 LB IDC1 LB Customer LDNS Client ASP Backbone
  • 53.
  • 54. How it works AS1 AS2 V/20, AS3 V/20, AS3 Client ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
  • 55. How it works AS1 AS2 V/20, AS3 Client ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
  • 56. How it works AS1 AS2 V/20, AS3 V/20, AS3 Client ISP1 ISP2 IDC1, R1/20 IDC2, R2/20
  • 57.
  • 59.
  • 60. Route Flapping AS1 AS2 V/20, AS3 V/20, AS3 Client Router ISP1 ISP2 IDC1, R1/20 IDC2, R2/20 UDP TCP
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67. IPNL: A NAT-Extended Internet Architecture Paul Francis Tahoe Network Remakrishna Gummadi UC Berkeley
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. Basics(2)--routing IPNL Header Optional FQDN header (variable) Optional global header (16) Local header (24)
  • 75.
  • 77. Example2: Routing by IPNL addresses DestAddress: M3:R6:H3
  • 78.
  • 79.
  • 81.
  • 82. NICE
  • 83.
  • 84.
  • 85.
  • 86. Resource Discovery Using an Intentional Naming System Hari Balakrishnan MIT Lab for Computer Science http://wind.lcs.mit.edu/ [email_address] With: William Adjie-Winoto, Elliot Schwartz, Jeremy Lilley, Anit Chakraborty
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95. How does it work? INR DSR Virtual space partitions Domain Space Resolvers Scaling? Application-level overlay network formed based on performance Inter-domain information via DSR protocol Exchange names as if they were routes
  • 96. INS service model INR application Early binding Late binding query Intentional anycast Intentional multicast Application-level routing using intentional names Self-configuring app-level overlay network formed based on performance Soft-state name dissemination set of names
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104. Virtual space partitioning vspace=camera vspace=5th-floor Routing updates for each vspace Delegate this to another INR
  • 105. INR Implementation Overlay Manager Network Monitor Route Manager Client Manager Forwarder vspace neighbors NameTreeSet Communicator Mobility Sockets TCP/UDP lookup Intentional anycast, multicast Incoming message
  • 106.
  • 107. WIND
  • 108.  
  • 109.  
  • 110.  
  • 111.  
  • 112.  
  • 113.  
  • 114.  
  • 115.  
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121. Future Internet Architecture Flexible IP routers Scheduling, buffer mgmt Use each other to add value Resource management Traffic engineering Congestion Manager Middleware ... Cache & replica management Self-configuring overlays INS Media transcoders Performance discovery Service location Jini UPnP E-speak T-spaces Decentralized security
  • 122.
  • 123.

Editor's Notes

  1. Does the paper answer the question?
  2. It does satisfy the requirement of their suitable IA
  3. Lots of problems with what the Internet is tuned to do today DNS is rather static
  4. WHAT, not WHERE! You don’t often know WHERE, but you always know WHAT you want!
  5. One of the cornerstones of N21 is a new naming system. Intentional names --> express WHAT you want Names are descriptions; names are queries
  6. What are some key features of the world I just described? - Lots of heterogeneity - Much higher levels of dynamism than today - Much more decentralized and needs much more robustness - allow for tetherless operation