DOC PREVIEW
CMU 15441 Computer Networking - lecture 26

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

15-441: Computer NetworkingOverviewLearning From FailuresWhy Did They Fail?What Can We Learn?Slide 6Link LayerOverlay RoutingIP MulticastOverlay MulticastOverlay ChallengesCongestion ControlDenial of ServiceBandwidth DoS AttacksSlide 15Network Location ServiceServices For Mobile UsersSlide 18Three Project Areas15-441: Computer NetworkingLecture 26: Networking FutureLecture 26: 12-06-01 2Overview•Learning From Failures •Changes in Various Layers•New Services•What Do I Work On?Lecture 26: 12-06-01 3Learning From Failures•Past failures•Multicast•QoS•MobileIPLecture 26: 12-06-01 4Why Did They Fail?•Scalability problems•Incremental deployment•Interfacing with applications/Building useful services•Debugging problems•Conservative network administratorsLecture 26: 12-06-01 5What Can We Learn?•Avoid same pitfalls•Clever techniques•Fair queuing, announce/suppress protocols, tunneling/encapsulation, etc.Lecture 26: 12-06-01 6Overview•Learning From Failures •Changes in Various Layers•New Services•What Do I Work On?Lecture 26: 12-06-01 7Link Layer•Optical links•Multiple wavelengths on a single fiber (WDM)•MPLS applied to wavelengths  MPλS•No longer broadcast•All optical networks•No buffering!!  How does this affect other protocols•Mobile/wireless linksLecture 26: 12-06-01 8Overlay Routing•Basic idea:•Treat multiple hops through IP network as one hop in overlay network•Run routing protocol on overlay nodes•Why?•For performance – can run more clever protocol on overlay•For efficiency – can make core routers very simple•For functionality – can provide new features such as multicast, active processing, IPv6Lecture 26: 12-06-01 9IP MulticastKey Architectural Decision: Add support for multicast in IP layerBerkeleyGatechStanfordCMULecture 26: 12-06-01 10Overlay MulticastStanfordOverlay TreeCMUStan-LANStan-ModemBerk2GatechBerk1BerkeleyGatechStan-LANStan-ModemBerk1Berk2CMULecture 26: 12-06-01 11Overlay Challenges•“Routers” no longer have complete knowledge about link they are responsible for•How do you build efficient overlay•Probably don’t want all N2 links – which links to create?•Without direct knowledge of underlying topology how to know what’s nearby and what is efficient?Lecture 26: 12-06-01 12Congestion Control•Is AIMD the right choice for everyone?•What are the requirements on choices  TCP-friendliness•Non-linear controls•Rate-based controls•Fixing poor interaction with HTTPLecture 26: 12-06-01 13Denial of Service•Objective of attack: make a service unusable, usually by overloading the server or network•Example: SYN flooding attack•Send SYN packets with bogus source address•Server responds with SYNACK keeps state about TCP half-open connection•Eventually server memory is exhausted with this state•Solution: SYN cookies – make the SYNACK contents purely a function of SYN contents, therefore, it can be recomputed on reception of next ACK•More recent attacks have used bandwidth floods•How do we stop these?Lecture 26: 12-06-01 14Bandwidth DoS Attacks•Possible solutions•Ingress filtering – examine packets to identify bogus source addresses•Link testing – how routers either explicitly identify which hops are involved in attack or use controlled flooding and a network map to perturb attack traffic•Logging – log packets at key routers and post-process to identify attacker’s path•ICMP traceback – sample occasional packets and copy path info into special ICMP messages•IP tracebackLecture 26: 12-06-01 15Overview•Learning From Failures •Changes in Various Layers•New Services•What Do I Work On?Lecture 26: 12-06-01 16Network Location Service•Desirable to lookup performance between hosts•Why?•How to predict?•Based on historical measurements•Based on on-demand probing•What exactly is performance?•Bandwidth•Delay•Application responseLecture 26: 12-06-01 17Services For Mobile Users•Why?•(Example) Mobile users are more likely to search for services near them•Not well suited to administratively organized Internet systems•Example•Build a wide area service discovery that can support multiple search stylesLecture 26: 12-06-01 18Overview•Learning From Failures •Changes in Various Layers•New Services•What Do I Work On?Lecture 26: 12-06-01 19Three Project Areas•Congestion Control •Solving interaction between HTTP and TCP •Using congestion control to implement QoS •Mobile Networking •Making protocols adapt to dynamic conditions•Helping “ubiquitous” networks evolve•Sensor networks•Wide-Area Distributed Applications•Tools to help developers build large distributed applications•Overlay


View Full Document

CMU 15441 Computer Networking - lecture 26

Documents in this Course
Lecture

Lecture

14 pages

Lecture

Lecture

19 pages

Lecture

Lecture

14 pages

Lecture

Lecture

78 pages

Lecture

Lecture

35 pages

Lecture

Lecture

4 pages

Lecture

Lecture

4 pages

Lecture

Lecture

29 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

44 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

13 pages

Lecture

Lecture

47 pages

Lecture

Lecture

49 pages

Lecture

Lecture

7 pages

Lecture

Lecture

18 pages

Lecture

Lecture

15 pages

Lecture

Lecture

74 pages

Lecture

Lecture

35 pages

Lecture

Lecture

17 pages

lecture

lecture

13 pages

Lecture

Lecture

21 pages

Lecture

Lecture

14 pages

Lecture

Lecture

53 pages

Lecture

Lecture

52 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

20 pages

Lecture

Lecture

39 pages

Lecture

Lecture

10 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

lecture

lecture

11 pages

lecture

lecture

7 pages

Lecture

Lecture

10 pages

lecture

lecture

46 pages

lecture

lecture

7 pages

Lecture

Lecture

8 pages

lecture

lecture

55 pages

lecture

lecture

45 pages

lecture

lecture

47 pages

lecture

lecture

39 pages

lecture

lecture

33 pages

lecture

lecture

38 pages

lecture

lecture

9 pages

midterm

midterm

16 pages

Lecture

Lecture

39 pages

Lecture

Lecture

14 pages

Lecture

Lecture

46 pages

Lecture

Lecture

8 pages

Lecture

Lecture

40 pages

Lecture

Lecture

11 pages

Lecture

Lecture

41 pages

Lecture

Lecture

38 pages

Lecture

Lecture

9 pages

Lab

Lab

3 pages

Lecture

Lecture

53 pages

Lecture

Lecture

51 pages

Lecture

Lecture

38 pages

Lecture

Lecture

42 pages

Lecture

Lecture

49 pages

Lecture

Lecture

63 pages

Lecture

Lecture

7 pages

Lecture

Lecture

51 pages

Lecture

Lecture

35 pages

Lecture

Lecture

29 pages

Lecture

Lecture

65 pages

Lecture

Lecture

47 pages

Lecture

Lecture

41 pages

Lecture

Lecture

41 pages

Lecture

Lecture

32 pages

Lecture

Lecture

35 pages

Lecture

Lecture

15 pages

Lecture

Lecture

52 pages

Lecture

Lecture

16 pages

Lecture

Lecture

4 pages

lecture

lecture

27 pages

lecture04

lecture04

46 pages

Lecture

Lecture

46 pages

Lecture

Lecture

13 pages

lecture

lecture

41 pages

lecture

lecture

38 pages

Lecture

Lecture

40 pages

Lecture

Lecture

25 pages

Lecture

Lecture

38 pages

lecture

lecture

11 pages

Lecture

Lecture

42 pages

Lecture

Lecture

12 pages

Lecture

Lecture

36 pages

Lecture

Lecture

46 pages

Lecture

Lecture

35 pages

Lecture

Lecture

34 pages

Lecture

Lecture

9 pages

lecture

lecture

49 pages

class03

class03

39 pages

Lecture

Lecture

8 pages

Lecture 8

Lecture 8

42 pages

Lecture

Lecture

20 pages

lecture

lecture

29 pages

Lecture

Lecture

9 pages

lecture

lecture

46 pages

Lecture

Lecture

12 pages

Lecture

Lecture

24 pages

Lecture

Lecture

41 pages

Lecture

Lecture

37 pages

lecture

lecture

59 pages

Lecture

Lecture

47 pages

Lecture

Lecture

34 pages

Lecture

Lecture

38 pages

Lecture

Lecture

28 pages

Exam

Exam

17 pages

Lecture

Lecture

21 pages

Lecture

Lecture

15 pages

Lecture

Lecture

9 pages

Project

Project

20 pages

Lecture

Lecture

40 pages

L13b_Exam

L13b_Exam

17 pages

Lecture

Lecture

48 pages

Lecture

Lecture

10 pages

Lecture

Lecture

52 pages

21-p2p

21-p2p

16 pages

lecture

lecture

77 pages

Lecture

Lecture

18 pages

Lecture

Lecture

62 pages

Lecture

Lecture

25 pages

Lecture

Lecture

24 pages

Project

Project

20 pages

Lecture

Lecture

47 pages

Lecture

Lecture

38 pages

Lecture

Lecture

35 pages

Roundup

Roundup

45 pages

Lecture

Lecture

47 pages

Lecture

Lecture

39 pages

Lecture

Lecture

13 pages

Midterm

Midterm

22 pages

Project

Project

26 pages

Lecture

Lecture

11 pages

Project

Project

27 pages

Lecture

Lecture

10 pages

Lecture

Lecture

50 pages

Lab

Lab

9 pages

Lecture

Lecture

30 pages

Lecture

Lecture

6 pages

r05-ruby

r05-ruby

27 pages

Lecture

Lecture

8 pages

Lecture

Lecture

28 pages

Lecture

Lecture

30 pages

Project

Project

13 pages

Lecture

Lecture

11 pages

Lecture

Lecture

12 pages

Lecture

Lecture

48 pages

Lecture

Lecture

55 pages

Lecture

Lecture

36 pages

Lecture

Lecture

17 pages

Load more
Download lecture 26
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view lecture 26 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view lecture 26 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?