Scaling and Wholesale Computer Networks 2007 Week 7 Lecture 1 by Donald Neal.

Slides:



Advertisements
Similar presentations
Labcourse “Routerlab”
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Layer 2 Tunneling Protocol (L2TP)
IPv6 over xDSL: The DIODOS Proposal Athanassios Liakopoulos Greek Research & Technology Network International IPv6 Workshop, Kopaonik,
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
DSL Access Architectures and Protocols. xDSL Architecture.
Virtual Private Networks (VPN)
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Virtual Private Networking Karlene R. Samuels COSC513.
MPLS L3 and L2 VPNs Virtual Private Network –Connect sites of a customer over a public infrastructure Requires: –Isolation of traffic Terminology –PE,
Remote Networking Architectures
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Windows Server 2008 Chapter 9 Last Update
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Access Protocols PPP vs. DHCP Chapter 5. Overview PPP DHCP User identities Assignment of IP addresses Assignment of other parameters.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
BT IPStream Products James Appleton 01/09/ BT IPStream Portfolio IP switch Content Provider Corporate High speed IP infrastructure with DSL access.
514 Wrap-up. Summary of Course This was a course on modern Carrier Networks –i.e., how a telco might organise its IP network from the customer to the.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Networks Warren Toomey. Available WAN Links.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
L2TP Chapter 7. Motivation Sometimes we want to tunnel one protocol over another protocol –Maybe the network does not understand how to forward that protocol.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Network Access for Remote Users Dr John S. Graham ULCC
Introduction to Telecommunications, 2/e By M.A.Rosengrant Copyright (c) 2007 by Pearson Education, Inc. All rights reserved. Figure 28–1 A next generation.
Triple Play / Multiplay Computer Networks 2007 Week 8 Lecture 2 by Donald Neal.
Jonathan Brewer Technical Director Araneo Wireless Solutions Layer 3 Tunnels for Broadband Delivery.
Virtual Private LAN Service
MBGP and Customer Routes
MPLS Introduction Computer Networks 2007 Week 9 Lecture 1 by Donald Neal.
WholeSale Model 10. WholeSale Model This feature enables the Nomadix device to act as an L2TP Access Concentrator (LAC) and initiate single or multiple.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Ethernet, VoIP Issues, BFD Computer Networks 2007 Week 8 Lecture 1 by Donald Neal.
MPLS Virtual Private Networks (VPNs)
Top-Down Network Design Chapter Eleven Selecting Technologies and Devices for Enterprise Networks Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Inter VLAN routing Ferry Astika Saputra.
Chapter 1: Explore the Network
Advanced Computer Networks
MTA Network Fundamental Cram Sesion
Networks – Network Fundamentals
Module 9: Configuring Network Access
Virtual Private Networks
Network Overview.
<draft-ohba-pana-framework-00.txt>
Virtual Private Networks
Virtual Private Networks (VPN)
IPSec VPN Chapter 13 of Malik.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Examining Network Protocols
Chapter 1: WAN Concepts Connecting Networks
Network+ Guide to Networks 6th Edition
KCOM HEY Wholesale FibreLine Services
Broadband Components Customer Premises Equipment(CPE)
PPPoE Internet Point to Point Protocol over Ethernet
Goals Introduce the Windows Server 2003 family of operating systems
Introduction to Network Security
Network Layer: Internet Inter-Domain Routing
Topic 12: Virtual Private Networks
Review of Internet Protocols Network Layer
Private Networks.
Chapter 8 – Data switching and routing
Presentation transcript:

Scaling and Wholesale Computer Networks 2007 Week 7 Lecture 1 by Donald Neal

The Players Telekordstra – A telco. See also Carrier, Incumbent. Goblinet – An ISP. See also Challenger. PFY Communications – Another ISP. PFY

Week 7 Lecture 1 Access Network Structure Scaling RADIUS using Proxies Scaling BRAS's with Logical Routers Access Network Wholesaling L2TP in a Wholesale Environment

Access Networks Aggregation Transport To provide multiple virtual IP networks, runs at layer 2. e.g. ATM, ethernet. (Contrast “Layer 2 VPN's”) Some AAA components, but data and decision making located elsewhere

Access – DSL / ATM Mode m ADSL Layer 2, say ATM DSLAM ATM Mode m It's The ATM Cloud! PPP IP RADIUS BRAS

On a BRAS Using ATM Physical Interfaces attached to ATM switch(es) Virtual Path carried by ATM switches to DSLAM VPI/VCI identify Virtual Circuit (PVC) to customer So one ATM subinterface per customer ATM device. BRAS terminates all those ATM PVC's. Aggregation is the name of the game. May allocate addresses from local pools (or by DHCP or RADIUS). Routes packets, including advertising routes for local pools. Applies QoS policies to subinterfaces.

From Here, Not About DSL From this point, DSL for example only. Scaling and wholesale considerations also apply to dial and wireless. Not about ATM, either.

PPP – RADIUS AUTH. Mode m DSLAM Mode m RADIUS Access-Request (User-Name, CHAP-Password) Secur3 Access-Accept (Framed-IP-Address, VSA's) , AverageService BRAS

PPP – RADIUS RADIUS PROXY RADIUS Can proxy for both authentication and accounting. BRAS

Logical Routers aka Virtual Routers Some shared configuration Each logical router has its own peers and its own routing/forwarding table (DHCP configuration, DNS, RADIUS accounting...) Complex vs. MPLS

Which Logical Router? All incoming PPP requests come to one logical router. Could just statically configure it. telek.co.nz -> telekordstra goblin.net.nz -> goblinet pfy.net.nz -> pfy

PPP – RADIUS BRAS RADIUS PROXY Telekordstra RADIUS Goblinet RADIUS Access-Request (User-Name, CHAP-Password) Secur3 Access-Accept (Framed-IP-Address) Access-Accept (Framed-IP-Address, VSA's) , AverageService, telekordstra

PPP – RADIUS BRAS RADIUS PROXY Telekordstra RADIUS Goblinet RADIUS Access-Request (User-Name, CHAP-Password) S3cure Access-Accept (Framed-IP-Address) Access-Accept (Framed-IP-Address, VSA's) , AverageService, goblinet

But Then... BRAS RADIUS PROXY Telekordstra RADIUS Goblinet RADIUS Access-Request (User-Name, CHAP-Password) S3cure Access-Accept (Framed-IP-Address) Access-Accept (Framed-IP-Address, VSA's) , AverageService, goblinet

Layer 2 Service With The Same Network BRA S Part 1 BRA S Part 2 ISPCarrie r Aggregatio n Authentication, Accounting, IP and above ISP RADIUS

Layer 2 Service With The Same Network LA C LN S ISPCarrie r ISP RADIUS “L2TP extends the PPP model by allowing the L2 and PPP endpoints to reside on different devices interconnected by a packet-switched network.... instead of requiring the L2 connection terminate at the NAS (which may require long-distance toll charge), the connection may terminate at a local circuit concentrator, which then extends the logical PPP session over a shared infrastructure” - RFC2661

Layer 2 Service With The Same Network LA C LN S ISPCarrie r ISP RADIUS PPP IP UDP

Layer 2 Service With The Same Network Mode m ADSL Layer 2 DSLAM ATM Mode m PPP IP RADIUS LAC LNS L2TP Tunnel Access SeekerCarrie r

Layer 2 Service With The Same Network Mode m DSLAM Mode m RADIUS LAC LNS RADIUS Access-Request (User-Name, CHAP-Password – not used) S3cure Access-Accept (attributes including Tunnel Destination and probably QoS) , BitstreamService

L2TP Aggregation LAC LNS LAC NAS

Further Reading Broadband Network Architectures pp