I2RS Overlay usecase 1 Fangwei hu Bhumip Khasnabish.

Slides:



Advertisements
Similar presentations
Electronic Visualization Laboratory University of Illinois at Chicago EVL Optical Networking Research Oliver Yu Electronic Visualization Laboratory University.
Advertisements

1 Virtual Resource Management (VRM) in Cloud Environment draft-Junsheng-Cloud-VRM-00 Friday 21 Jan 2011 B. Khasnabish, Chu JunSheng, Meng Yu.
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
MPLS: The Magic Behind the Myths Grenville Armitage (author) Scott Crosby (presenter)
NETWORK TRANSFORMATION THROUGH VIRTUALIZATION
Towards Software Defined Cellular Networks
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN and Data Center R. Aggarwal
Deployment of MPLS VPN in Large ISP Networks
L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Guide to Network Defense and Countermeasures Second Edition
Network Based Services in Mobile Networks Context, Typical Use Cases, Problem Area, Requirements IETF 87 Berlin, 29 July 2013 BoF Meeting on Network Service.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
EthioTelecom IP NGN Network
Rapid Mobility via Type Indirection Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John D. Kubiatowicz Computer Science Division, UC Berkeley IPTPS 2004.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
1 Presentation_ID © 1999, Cisco Systems, Inc. Programmable Networks OPENSIG-99 Industry Panel John Hopprich.
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
WSV404 DirectAccess Server (Server 2008 R2) DirectAccess Client (Windows 7) Internet Native IPv6 6to4 Teredo IP-HTTPS Tunnel over IPv4 UDP, HTTPS,
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Data Center Network Redesign using SDN
Intranet, Extranet, Firewall. Intranet and Extranet.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Service Function Chaining Use Cases draft-liu-service-chaining-use-cases IETF 89 London, March 3, 2014 Will Liu, Hongyu Li, Oliver Huang, Huawei Technologies.
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
To be smart or not to be? Siva Subramanian Polaris R&D Lab, RTP Tal Lavian OPENET Lab, Santa Clara.
Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
Dynamic Virtual Networks (DVNE) Margaret Wasserman & Paddy Nallur November 11, 2010 IETF Beijing, China.
IETF 81 Quebec City1 Requirements and Framework of VPN-oriented Data Center Services Ning
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Internet (THEnet ISP Gateway) Home PC Home Laptop Wireless AP/RouterVPN Concentrator Firewall Hub (running WireShark for Monitoring) Work Server Work PCs.
© 2006 National Institute of Informatics 1 Jun Matsukata National Institute of Informatics SINET3: The Next Generation SINET July 19, 2006.
BGP L3VPN Virtual CE draft-fang-l3vpn-virtual-ce-01 Luyuan Fang Cisco John Evans Cisco David Ward Cisco Rex Fernando Cisco John Mullooly Cisco Ning So.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Extending OVN Forwarding Pipeline Topology-based Service Injection
1 | © 2015 Infinera Open SDN in Metro P-OTS Networks Sten Nordell CTO Metro Business Group
L2TP-VP: Layer Two Tunneling Protocol - Virtualization Profile draft-fan-l2tp-vp-00 Duoliang Fan, Liang Xia, Zhen Cao, Namgon Kim November 2013 Vancouver.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
Overlay Networks - Path Computation Approaches draft-bardalai-ccamp-overlay-path-comp-02 Snigdho Bardalai Khuzema Pithewan Rajan Rao IETF-88, Vancouver.
1 ForCES Applicability Statement Alan Crouch Mark Handley Hormuzd Khosravi 65 th IETF Meeting, Dallas.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008.
NETWORKING COMPONENTS Jeffery Rice LTEC Assignment 3.
Draft-li-idr-cc-bgp-arch-00IETF 88 IDR1 An Architecture of Central Controlled Border Gateway Protocol (BGP) draft-li-idr-cc-bgp-arch-00 Zhenbin Li, Mach.
Recent Progress in Routing Standardization An IETF update for UKNOF 23 Old Dog Consulting Adrian
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Instructor Materials Chapter 7: Network Evolution
Enterprise vCPE use case requirement
Interface to Routing System (I2RS)
HP Networking OpenFlow in Action
ISMS Information Security Management System
The Business Value of MPLS VPNs
Zhenbin Li, Shunwan Zhuang Huawei Technologies
VPN: Virtual Private Network
AT&T Firewall Battlecard
Presentation transcript:

I2RS Overlay usecase 1 Fangwei hu Bhumip Khasnabish

Goals Two types Router in the I2RS network – ER(Edge Router): Perform data encapsulation, topology and traffic report to control – CR(Core Router): Simplicity and cost down, focus only on fast data forwarding Provides an overlay structure – Benefit: Lower cost down for Core Routers Improved network security Support of network virtualization 2

Overlay Model 3 A A E E G G D D C C B B A A B B C C D D CR ER Physical topology F F CR Establishing IP/MPLS/OTN tunnel among ERs ER encapsulate /decapsulate the data based on the tunnel type CR only fast forward the encapsulation data Logical tunnel

Overlay Structure Application 4 I2RS Client ER CR Application I2RS Client ER CR Traffic analysis, path compute and route download to ER and CR collect topology information and report to I2RS Client LSA flood and topology announcement

Core Router (CR): high capability, and simplicity CR node(Core Node) : – Mainly focus on fast forwarding of encapsulated data – The control plane is very simple Topology announcement and flooding For compatibility, Route computing may need to be performed, but this may not necessary 5

Edge Router (ER) The Requirement for ER: – Use Access authentication, authorization, and resource controller – Topology management – Policy management – Route and signal protocol – Tunnel management control – Traffic analysis and report – Service Management 6

Network Virtualization (NV) The ERs may support many services, and be complex The Network Virtualization for ERs (control and forward elements virtualization) – Reduce ER complexity and equipment costs – Flexible and fast new services deployment – Increase scalability and reliability – Easy for function combination, achieving co-existence with hardware based network platform – Rapid Service prototyping – Service/Access agility 7

Network Virtualization Requirements (control and forward elements virtualization) – Tunnel gateway elements: IPSec/SSL VPN gateway – Traffic analytics: DPI, QoS measurement, SLA agent – Converged and network-wide function: AAA Server, policy control and charging platform – Security function: Firewalls, virus scanners, instruction detection and prevention systems, spam protection 8

Overlay + Network Virtualization Structure 9 Core Router/ Switch Core Router/ Switch Edge Router Core Router/ Switch Edge Router Server DPI Server FW Server NAT Server BRAS I2RS Client Server DPI Server FW Server NAT Server BRAS I2RS Client Overlay network The Server DPI(FW, NAT) is located in the application model in the I2RS structure

Next Step Comments and feedback? Call for WG adoption? 10

Thank you!!!!