Networking For the Future By Dr. Junaid Ahmed Zubairi Sigma Xi Brown Bag Seminar Oct 3 rd, 2003 at...
-
date post
20-Dec-2015 -
Category
Documents
-
view
216 -
download
0
Transcript of Networking For the Future By Dr. Junaid Ahmed Zubairi Sigma Xi Brown Bag Seminar Oct 3 rd, 2003 at...
Networking For the Future
By
Dr. Junaid Ahmed Zubairi
Sigma Xi Brown Bag SeminarOct 3rd, 2003 at 12 Noon
Overview of Presentation The Evolution of Internet The Types of Traffic on the Internet Performance Issues in Packet Switching The World Wide Web Changing Traffic on the Internet The Birth of ATM!! ATM’s Service Classes and Layers Intserv, Diffserv, MPLS, TE GMPLS Future Network
Seminar References
Computer Networking: A Top Down Approach Featuring the Internet by Kurose and Ross, Addison Wesley 2001
ATM With X-Cell, XYLAN Course 701, XYLAN Inc.
Computer Networks: A Systems Approach Peterson and Davie, Morgan Kaufmann 2000
Computer Networks Andrew Tanenbaum Prentice Hall 1996
The Evolution of Internet
DARPA (Defense Advanced Projects Research Agency) funded the development of the Internet.
The first working network was ARPAnet that was started in 1969 between four nodes
The emphasis was on developing a robust network that would continue to function even if some of its parts were bombed out
The Evolution of Internet
email, usenet, file transfer and remote login were the main
Internet applications
Types of Traffic on the Internet
These applications generated almost identical traffic stream on the Internet
This traffic required “reliability”. The protocols were expected to
deliver all the data no matter how long it took
Performance Issues in Packet Switching The TCP/IP suite of protocols breaks the
data into datagrams or packets and routes each packet through an independently selected path
Packets may arrive at the destination out of sequence but due to buffering and re-ordering, the actual data can be recovered easily
Message Text
Dear John I agree with your suggestions. I think we
may want to include Mike in the discussion. I am forwarding this message to him as well. He is an expert in this area and we should wait for his comments before proceeding forward on this project.
Junaid
Message Broken Down
Dear John
I agree with your suggestions. I think we may want to include Mike in the discussion. I am forwarding this message to him as
well. He is an expert in this area and we should wait for his comments before proceeding forward on this project.
Junaid
Packet # 1
Packet # 2
Performance Issues in Packet Switching
Selecting a path is called routing and the intermediate nodes from source to destination are called routers
Each router builds up a routing table to keep track of reachable destinations
If more than one path is open to destination, the router may select the “best” path
Performance Issues in Packet Switching Path selection criterion is usually shortest
path first If the shortest path is congested or
unreliable, the router can choose another path
The traffic is bursty and it can increase or decrease abruptly based on the way the Internet is used
Performance Issues in Packet Switching Given this scenario, a router may find itself
overwhelmed with a lot more packets than it can handle
Usually routers would use simple FIFO scheme to select the next packet to be transmitted from a queue of packets
Performance Issues in Packet Switching If the queue is full, the newly arrived packets must
be dropped (or discarded) Thus increase in traffic may increase time-outs,
retransmissions and decrease in efficiency Usually, congestion in the network results in
delay and loss penalties Congestion builds up due to bursty users, no
active resource allocation and selfish users trying to monopolize the bandwidth
Performance Issues in Packet Switching Traditional TCP/IP based Internet can be
described as– “Best Effort”– “One Size Fits All”– “Hardly Any Service”– “World Wide Wait”
The World Wide Web
Web deployment is flexible and easy Due to the web technologies, the Internet has
been put to use in almost all areas of human knowledge
For example, water distribution monitoring, real-time traffic maps of big cities, free long distance calling, distance learning with lecture videos, buying and selling shares, online shopping etc., the list appears endless
The Changing Traffic on the Internet Due to the web enabled applications on the
Internet, there has been a tremendous change in the types of traffic
Now we have to deal with a significant amount of traffic that is time-sensitive
For example, consider the case of an audio based application that needs to transmit the data across the Internet
The Birth of ATM!!
As the users started to use the web for time-sensitive applications, they did not get what they wanted--- a consistent acceptable performance
On some occasions, the network would give the best performance and on other occasions, it would be horrible in terms of delays and lost packets
The Birth of ATM!!
In this scenario, ATM offered a great promise to the users
ATM standards started taking shape in mid-1980’s as telcos pushed for integrating voice, video and data networks
ATM was developed with the right targets and in mid-1990’s, it offered the much awaited performance assurance
What is ATM?
ATM:
Is a cell-switching and multiplexing
technology that combines the benefits
of Circuit Switching (consistent
transmission delay and guaranteed
bandwidth) with those of Packet
Switching (flexibility and efficiency for
intermittent traffic).
Why is ATM needed?
Need to mix data, voice, and video traffic. We cannot just throw more bandwidth at the
problem
Switch
Why is ATM needed?
All data packets are fragmented into fixed size cells Segmentation & re-assembly only occurs at end stations Time critical traffic on segment “A” only has to wait for the
current cell of “B”s data packet to be sent before it can get the wire and be transmitted
The ability to interleave cells from different messages is instrumental to the operation of ATMs QoS.
“A”
“B”
“C”Switch
ATM Cell
Small Cells - 53 bytes long– 5 byte header
– 48 byte payload
Fixed Length = Fast Switching Fixed Length = Contracts can be established and QoS
maintained
Header Payload
5 bytes 48 bytes
AAL TypesAAL Types
AAL1 is for circuit emulation
– Class A - constant bit rate and time sensitive trafficAAL5 is for compressed video and data (used in IP over ATM)
– Class B - variable bit rate and time sensitive traffic
– Class C - variable bit rate (e.g., Frame Relay)
– Class D - variable bit rate, connectionless
ATM Adaptation layer
ATM layer
Physical layer
User Traffic: Voice, video and data
Service Categories
Categories are based on type of traffic and type of service– CBR Constant Bit Rate -Voice
– rt-VBR Real-Time Variable Bit Rate -Video
– nrt-VBR Non-Real Time Variable Bit Rate -Frame Relay
– ABR Available Bit Rate -Data
– UBR Unspecified Bit Rate -Data
Traffic Management
Two opposing views– Enforce several rules in order to regulate the
traffic and adapt to the available bandwidth– Add more bandwidth
For example, highways enforce HOV rule, speed limits, traffic light controlled ramps to enter the highway etc. OR autobahns with no such rules
CACCAC
Can I support this reliably without
jeopardizing other contracts
ATM Network
No oror Yes,Agree to a
Traffic Contract
Guaranteed QoS request
• If CAC passes, network and user agree on a traffic contracttraffic contract
I want to send traffic of this
type, and want this QoS
VPIs and VCIs
Virtual Path Identifier (VPI) Virtual Circuit Identifier (VCI)
OC-3 155 MbpsVPI-10, 50 Mbps
VPI-20, 60 Mbps
Remaining 45 Mbps is in VPI-0
VCI-100VCI-101
VCI-100VCI-101
Traffic Shaping and Policing
In order to meet the QoS contract obligations, ATM network enforces traffic shaping and policing
Shaping involves techniques such as “Leaky Bucket Algorithm” to regulate bursty traffic
Policing means marking CLP (Cell Loss Priority) on the offending cells that violate the maximum rates agreed
Why ATM Failed!!
ATM failed because of several factors– ATM is too complex (From packets to cells to SONET
frames, using AAL’s, emulating LAN)
– ATM is expensive
– Ethernet has evolved into much faster 100Mbps and 1000Mbps services
– All popular and established network applications are packet based
ATM is down but not out. It is used in the telco cores
Life after ATM
IETF (Internet Engineering Task Force) is a very large organization with thousands of members
IETF identified the problems with the traditional Internet and engaged in a long and continuing effort to improve the services and management
Quality of Service
New applications need performance and resource assurance
Service differentiation is also needed so that the traffic from different applications is treated in service-appropriate way
Resource assurance and service differentiation means QoS (Quality of Service)
IETF’s Models
Targets:– Internet should be run in a way that there is no
congestion– Applications should be able to reserve or obtain
network resources at a given QoS IETF has been working on developing new
models and protocols for the Internet During the last decade, Intserv and Diffserv
models have been developed
Integrated Services
Intserv stands for “Integrated Services” and requires reservations before transmission
To receive resource reservation, an application describes its requirements
The network determines a path based on the request
Intserv
A reservation protocol is used to install the reservation state along the selected path
The reservation setup protocol in the Intserv model is the RSVP (Resource ReSerVation Protocol)
RSVP’s Services
RSVP offers two types of services CONTROLLED LOAD service means that
the service offered to a flow in an overloaded network is the same as it would get in a lightly loaded network
GUARANTEED SERVICE is when a flow gets hard guarantees on the delay it will suffer
RSVP Problems
RSVP relies on extensive signaling for obtaining flow reservations along a path.It also entails soft state overhead and therefore does not scale well to the Internet
Most of the Internet traffic consists of short-lived web transactions. It will be unwise to go through reservations for such traffic
RSVP may be successfully deployed in a campus network but not on the global network
IETF’s DiffServ Model Intserv’s problems prevented its deployment IETF started developing a new model in 1997 to
provide differing levels of service to different applications without the overhead of signaling and state maintenance
The DiffServ model uses the TOS field in IPv4 header to affix labels on packets belonging to different service levels
DiffServ has the potential to offer QoS on the Internet, at last!!
IETF’s DiffServ Model
Consider a gas station, you can buy regular, super or premium gasoline from the same pump
DiffServ offers various service levels to the customer from the same network with SLA
DiffServ adopts techniques used in ATM for traffic management, in a simplified way
Diffserv Outline
Diffserv works on the basis of dividing the traffic into a small number of forwarding classes
For each FEC, the amount of traffic entering the network is controlled at the edge of the Diffserv network
FEC’s are prioritized, with each one coded into the IP header’s TOS byte. Core routers offer priority treatment based on the coding
Per-Hop Behaviors
IETF has defined two DS services that are visible as PHB (per-hop-behavior) of an intermediate router for the marked packet
EF (Expedited Forwarding)– EF is the premium service offered. It can
appear as a virtual leased line for the customer. It offers low loss/latency and assured bandwidth
http://www.ietf.org/rfc/rfc2598.txt
Per-Hop Behaviors
AF (Assured Forwarding)– The AF PHB group provides delivery of IP
packets in four independently forwarded AF classes. Within each AF class, an IP packet can be assigned one of three different levels of drop precedence. A DS node does not reorder IP packets of the same microflow if they belong to the same AF class.
http://www.ietf.org/rfc/rfc2597.txt
MPLS
MPLS was developed to map IP over ATM because the core routers use ATM. MPLS has additional features that are too exciting to ignore
In MPLS, a short fixed length label is encoded into the packet
The intermediate LSR (Label Switched Router) finds the next hop from a table, using the label as an index
MPLS
If the LSR is an ATM switch, label is just the VPI/VCI identifier
If the LSR is an IP router, the label eliminates the destination based routing and reduces the router to a label switch
A label switched path (LSP) must be set up prior to the start of transmission
MPLS & TE
Instead of routing, now the routers do label switching, a much faster job
Network manager can decide LSP’s (label switched paths) based on load distribution and other administrative goals
Directing traffic on paths not determined by traditional IGP’s provides flexibility and load balancing. It is known as TE (Traffic Engineering)
MPLS AND TE
MPLS runs constrained routing to determine an LSP within an MPLS domain.
LSP may have some QoS features, based on the algorithm used
The path could be strictly specified or loosely outlined and backup paths may be specified for handling link failures
Automated Provisioning
The networks are growing bigger!! The protocols are becoming more complex With Diffserv, MPLS, RSVP-TE, CR-LDP,
COPS and associated protocols, it is impossible to allow manual provisioning
Therefore, there is a need for automated TE-based path selection algorithms
QoS Traffic Considerations
If only the available bandwidth is considered, the class of service may not be taken into consideration
Thus, the best effort traffic may intersect the QoS traffic at several points within the domain
In Diffserv, this may be a recipe for disaster!!
TELIC
An efficient dynamic traffic engineering algorithm is developed for selecting paths across an MPLS-Diffserv domain
TELIC (Traffic Engineering with Link Coloring) works with a set of traffic requests present at an ingress router of such a domain
It allocates paths to an egress node using Dijkstra’s shortest path algorithm
TELIC
Each request specifies the amount of bandwidth requested followed by the Diffserv class of service (EF,AF,DF)
While processing a request, TELIC partitions the network into several monochromatic subgraphs and makes an effort to match the request with an appropriate subgraph
TELIC
In case a subgraph has no path to the egress node, TELIC merges it with another subgraph as per rules carefully built-in and starts the search all over again
In case a search is exhausted, rules are available to deallocate a best effort class LSP and start the search again
TELIC is written as a flexible tool in C++
Router 0
Router 2
Router 8
Router 7Router 1
Router 6
Router 10
Router 9
Router 3
Router 5
Router 4
BL16=20BL11=100
BL13=60
Silver
White
Green
Yellow
Red
All possible pathsP0: 0 1 3 10P1: 0 1 4 7 10P2: 0 1 4 8 10P3: 0 2 9 8 10P4: 0 2 9 10P5: 0 5 4 7 10P6: 0 5 4 8 10P7: 0 5 8 10P8: 0 6 9 8 10P9: 0 6 9 10
Figure 6: An MPLS domain
GMPLS The Internet backbone must use optical switching
instead of electronic switching to handle the projected huge bandwidth
MPLS cannot handle non-packet switching Recently the industry has gravitated towards
GMPLS (Generalized MPLS) as the control plane solution for automatic lightpath setup and teardown in optical networks
GMPLS is an extension of MPLS GMPLS allows control and provisioning of non-
packet devices
GMPLS
Using GMPLS, it is possible to perform switching based on:– Wavelengths– Wavebands– Timeslots– Ports– And Labels
GMPLS
For example, in an all-optical switch, there may be thousands of tiny mirrors that can be moved by miniature motors
Switching can be done by adjusting a mirror so that light entering from one fiber can be reflected (switched) to the desired path forward
LMP A link management protocol has been developed
for GMPLS. It provides link provisioning, fault isolation and link aggregation
Selection of label in MPLS Selection of wavelength and OXC port in GMPLS
MPLS LSP GMPLS lightpath Before GMPLS, control and provisioning of
optical network could take weeks!! Vendors were also reluctant to de-provision due to
any changes
Ubiquitous Networking
The future of networking is being defined today. It is planned as a global network with no breaks or bumps
Users may roam around with notebooks and remain connected wherever they go!!
The realization of this goal calls for a global wireless network, global wired network and an interface between the wired and wireless networks
Mobile Networking
Mobile networking is developed rapidly with IEEE 802.11and Bluetooth standards
Let us take a look at the various configurations possible with IEEE 802.11
Issues
Several issues are being investigated for improving Wireless LAN functionality
For example, how to perform transparent handoff ?
How to perform routing in an ad-hoc network?
How to shape and mark the traffic to esnure good QoS?
Bluetooth
Bluetooth is more focused on connecting electronic gadgets like digital cameras, mobile phones, printers, mouse etc. with each other and with the computer
It replaces infrared line-of-sight type of connection
It faces tough competition from UWB (ultra wideband), a similar technology but much faster than Bluetooth
Future Network We envision a global ubiquitous network with
instant access to email and the web from anywhere in the world
With tremendous capacity, the network would offer the desired quality of service to our multimedia applications
Traditional phone network will become a tiny section of the overall Internet
Videophone over the Internet is expected to be the next killer app
Privacy?? Huh