IS-IS
Control Plane or Data Plane?
Control Plane
– IS-IS is used to calculate routes that allow routers to later forward data packets, but does not carry data for any application
IP
Control Plane or Data Plane?
Data Plane
– the actual IP packets that are forwarded by routers are the packets that contain application data
UDP
Control Plane or Data Plane?
Data Plane
– with UDP the actual packets contain application data
DHCP
Control Plane or Data Plane?
Control Plane
– DHCP is used to automatically assign IP addresses to end hosts, but DHCP messages do not contain any application data themselves
802.11 (WiFi)
Control Plane or Data Plane?
Data Plane
– 802.11 is a link layer protocol that carries data for applications or higher level protocols (which would be considered “data” by the link layer, even if they are not data at the application layer)
Name some situations/scenarios in which using SDN provides a benefit.
1) When things break
2) Network updates
3) Research or Testbed network
Explain how SDN provides a benefit when it comes to things breaking in a network.
Explain how SDN provides a benefit when it comes to updating a network.
- Updating policies is easier and centralized
Explain how SDN is useful in a research or testbed network.
Name some places where network virtualization is useful.
Name some places where network virtualization is not particularly useful.
- networks that are highly sensitive to latency
Explain how network virtualization provides a benefit in multi-tenant data centers
Multi-tenant data centers are also known as ______.
“The Cloud”
Explain how network virtualization provides a benefit in R&D environments.
Explain how network virtualization provides a benefit in computer networking classes.
When might network virtualization be overkill? Give an example.
Example: Home/small office networks used to connect to ISP
When is network virtualization a bad idea on networks that are highly sensitive to latency?
Why use the Pyretic programming API when the hardware itself exposes the OpenFlow API?
How does a network policy implemented in python and executed on a Pyretic con-troller result in policies on OpenFlow switches?
1) programmer specifies a high level policy using Pyretic API
2) The Pyretic runtime connects via sockets to OpenFlow clients on the network
3) The Pyretic runtime interprets packets and using its socket connection to install OpenFlow rules
- these connections allow the Pyretic runtime to perform other actions, like proactively installing rules to reduce network latency, reading counters, etc
Describe the function of the following pyretic network policy function:
flood()
Returns one packet per local port on the network spanning tree.
Describe the function of the following pyretic network policy function:
match(dstip=‘192.168.1.15’) & match(srcip=‘192.168.1.120’)
Two separate match predicates are composed, the result matches any packet that has destination IP = 192.168.1.15 and source IP – 192.168.1.120
Describe the function of the following pyretic network policy function:
match(dstip=‘10.0.0.8’)»_space; fwd(12)
A single match predicate sequentially composed with another, the result of which matches packets any packet bound for IP 10.0.08 and forwards it along port 12. This effectively “filters out” all traffic not bound for IP 10.0.0.8.
Describe the function of the following pyretic network policy function:
match(dstip= ‘10.0.0.1’) >> ( match(srcip=‘10.0.0.15’) >> drop() + match(srcip= ‘10.0.0.25’) >> modify(dstip=‘10.0.0.30’) )
What are the three steps of traffic engineering?
1) Measure
2) Model
3) Control