Lecture 6 Overlay Networks

Slides:



Advertisements
Similar presentations
Introduction 1 Lecture 22 Network Layer (Broadcast and Multicast) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
Re-Thinking Internet Architecture
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
CS 4700 / CS 5700 Network Fundamentals Lecture 15: NAT (You Better Forward Those Ports) Revised 3/9/2013.
Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford.
1 A Case For End System Multicast Yang-hua Chu, Sanjay Rao and Hui Zhang Carnegie Mellon University Largely adopted from Jonathan Shapiro’s slides at umass.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
15-441: Computer Networking Lecture 26: Networking Future.
1 Overlay Networks Reading: 9.4 COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in COS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and.
1 Overlay Networks Reading: 9.4 COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Jennifer Rexford Teaching Assistant: Ioannis Avramopoulos.
New Routing Architectures Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Application Layer Multicast
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Overlay Networks and Tunneling Reading: 4.5, 9.4 COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in COS 105) Mike Freedman Teaching Assistants: Wyatt.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
Overlay network concept Case study: Distributed Hash table (DHT) Case study: Distributed Hash table (DHT)
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
CS 268: Overlay Networks: Introduction and Multicast Ion Stoica April 15-17, 2003.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
OVERVIEW Lecture 6 Overlay Networks. 2 Focus at the application level.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
APPLICATION LAYER MULTICASTING
CIS679: Multicast and Multimedia (more) r Review of Last Lecture r More about Multicast.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Overlay Networks and Overlay Multicast May Definition  Network -defines addressing, routing, and service model for communication between hosts.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
1 A Case For End System Multicast Yang-hua Chu, Sanjay Rao and Hui Zhang Carnegie Mellon University.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 39 How Multicast IP and MBone Work.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
SUBJECT NAME: COMPUTER NETWORKS –II SUBJECT CODE: 10CS63.
CS 3700 Networks and Distributed Systems
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Kapitel 19: Routing. Kapitel 21: Routing Protocols
CIS 700-5: The Design and Implementation of Cloud Networks
Optimising Streaming Systems with SDN/P4/NetFPGA
Zueyong Zhu† and J. William Atwood‡
Multicast Outline Multicast Introduction and Motivation DVRMP.
Scaling the Network: The Internet Protocol
CS 3700 Networks and Distributed Systems
CS4470 Computer Networking Protocols
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Introduction to Networks
NET323 D: Network Protocols
CS 457 – Lecture 12 Routing Spring 2012.
Managing Online Services
Net 431: ADVANCED COMPUTER NETWORKS
Overlay Networking Overview.
CPE 401/601 Computer Network Systems
CS 3700 Networks and Distributed Systems
NET323 D: Network Protocols
COS 561: Advanced Computer Networks
Lecture 6 Overlay Networks
PRESENTATION COMPUTER NETWORKS
Scaling the Network: The Internet Protocol
COS 461: Computer Networks
Fixing the Internet: Think Locally, Impact Globally
EE 122: Lecture 22 (Overlay Networks)
Other Routing Protocols
DHCP: Dynamic Host Configuration Protocol
Optional Read Slides: Network Multicast
Elmo Muhammad Shahbaz Lalith Suresh, Jennifer Rexford, Nick Feamster,
Presentation transcript:

Lecture 6 Overlay Networks CPE 401/601 Computer Network Systems slides are modified from Jennifer Rexford

Overlay Networks

Overlay Networks Focus at the application level

IP Tunneling to Build Overlay Links IP tunnel is a virtual point-to-point link Illusion of a direct link between two separated nodes Encapsulation of the packet inside an IP datagram Node B sends a packet to node E … containing another packet as the payload A B E F Logical view: tunnel A B E F Physical view:

Tunnels Between End Hosts Src: A Dest: B Src: C Dest: B Src: A Dest: B A C Src: A Dest: C Src: A Dest: B

Overlay Networks A logical network built on top of a physical network Overlay links are tunnels through the underlying network Many logical networks may coexist at once Over the same underlying network And providing its own particular service Nodes are often end hosts Acting as intermediate nodes that forward traffic Providing a service, such as access to files Who controls the nodes providing service? The party providing the service Distributed collection of end users

Overlays for Incremental Deployment

Using Overlays to Evolve the Internet Internet needs to evolve IPv6 Security Mobility Multicast But, global change is hard Coordination with many ASes “Flag day” to deploy and enable the technology Instead, better to incrementally deploy And find ways to bridge deployment gaps

6Bone: Deploying IPv6 over IP4 A B E F tunnel Logical view: IPv6 IPv6 IPv6 IPv6 A B C D E F Physical view: IPv6 IPv6 IPv4 IPv4 IPv6 IPv6 Flow: X Src: A Dest: F data Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F data A-to-B: IPv6 E-to-F: IPv6 B-to-C: IPv6 inside IPv4 B-to-C: IPv6 inside IPv4

Secure Communication Over Insecure Links Encrypt packets at entry and decrypt at exit Eavesdropper cannot snoop the data … or determine the real source and destination

Communicating With Mobile Users A mobile user changes locations frequently So, the IP address of the machine changes often The user wants applications to continue running So, the change in IP address needs to be hidden Solution: fixed gateway forwards packets Gateway has a fixed IP address … and keeps track of the mobile’s address changes www.cnn.com gateway

IP Multicast Multicast IP multicast Delivering the same data to many receivers Avoiding sending the same data many times IP multicast Special addressing, forwarding, and routing schemes Pretty complicated stuff unicast multicast

MBone: Multicast Backbone A catch-22 for deploying multicast Router vendors wouldn’t support IP multicast … since they weren’t sure anyone would use it And, since it didn’t exist, nobody was using it Idea: software implementing multicast protocols And unicast tunnels to traverse non-participants

Multicast Today Mbone applications starting in early 1990s Primarily video conferencing, but no longer operational Still many challenges to deploying IP multicast Security vulnerabilities, business models, … Application-layer multicast is more prevalent Tree of servers delivering the content Collection of end hosts cooperating to delivery video Some multicast within individual ASes Financial sector: stock tickers Within campuses or broadband networks: TV shows Backbone networks: IPTV

Case Study: Narada - End System Multicast

Narada: End System Multicast Gatech Stanford Stan1 Stan2 CMU Berk1 Berk2 Berkeley Overlay Tree Stan1 Gatech Stan2 CMU Berk1 Berk2

Performance Concerns Delay from CMU to Berk1 increases Stan1 Stan2 CMU Gatech Stan2 CMU Berk2 Berk1 Duplicate Packets: Bandwidth Wastage Gatech Stanford Stan1 Stan2 CMU Berk1 Berk2 Berkeley

Overlay Tree The delay between the source and receivers is small Ideally, the number of redundant packets on any physical link is low Heuristic: Every member in the tree has a small degree Degree chosen to reflect bandwidth of connection to Internet CMU CMU Stan2 CMU Stan2 Stan2 Stan1 Stan1 Stan1 Berk1 Gatech Berk1 Gatech Berk1 Gatech Berk2 Berk2 Berk2 High latency High degree (unicast) “Efficient” overlay

Overlay Trees Source routed minimum spanning tree on mesh Desired properties Members have low degree Small delays from source to receivers CMU Berk2 Gatech Berk1 Stan1 Stan2 Stan2 Stan1 Gatech Berk2 Berk1

Case Study: Resilient Overlay Networks

RON: Resilient Overlay Networks Premise: by building application overlay network, can increase performance and reliability of routing Princeton Yale application-layer router Two-hop (application-level) Berkeley-to-Princeton route Berkeley UNR

RON Circumvents Policy Restrictions IP routing depends on AS routing policies But hosts may pick paths that circumvent policies USLEC ISP PU Patriot me My home computer

RON Adapts to Network Conditions B A C Start experiencing bad performance Then, start forwarding through intermediate host

RON Customizes to Applications B voice A bulk transfer C VoIP traffic: low-latency path Bulk transfer: high-bandwidth path

How Does RON Work? Keeping it small to avoid scaling problems A few friends who want better service Just for their communication with each other E.g., VoIP, gaming, collaborative work, etc. Send probes between each pair of hosts B A C

How Does RON Work? Exchange the results of the probes Each host shares results with every other host Essentially running a link-state protocol! So, every host knows the performance properties Forward through intermediate host when needed B B A C

RON Works in Practice Faster reaction to failure RON reacts in a few seconds BGP sometimes takes a few minutes Single-hop indirect routing No need to go through many intermediate hosts Typically, an extra hop circumvents the problems Better end-to-end paths Circumventing routing policy restrictions Sometimes the RON paths are actually shorter

RON Limited to Small Deployments Extra latency through intermediate hops Software delays for packet forwarding Propagation delay across the access link Overhead on the intermediate node Imposing CPU and I/O load on the host Consuming bandwidth on the access link Overhead for probing the virtual links Bandwidth consumed by frequent probes Trade-off between probe overhead and detection speed Possibility of causing instability Moving traffic in response to poor performance May lead to congestion on the new paths