星期日, 十月 29, 2006

VPN types - Secure and Trusted

Via: Wikipedia

Secure VPNs use cryptographic tunneling protocols to provide the intended confidentiality (blocking snooping and thus Packet sniffing), sender authentication (blocking identity spoofing), and message integrity (blocking message alteration) to achieve privacy. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks. This has been the usually intended purpose for VPN for some years.

Because such choice, implementation, and use are not trivial, there are many insecure VPN schemes available on the market.

Secure VPN technologies may also be used to enhance security as a "security overlay" within dedicated networking infrastructures.

Secure VPN protocols include the following:

  • IPsec (IP security) - commonly used over IPv4, and an obligatory part of IPv6.
  • SSL used either for tunneling the entire network stack, as in the OpenVPN project, or for securing what is, essentially, a web proxy. SSL is framework more often associated with e-commerce, but it has been built-upon by vendors like Aventail and Juniper to provide remote access VPN capabilities.
  • PPTP (point-to-point tunneling protocol), developed jointly by a number of companies, including Microsoft.
  • L2TP (Layer 2 Tunnelling Protocol), which includes work by both Microsoft and Cisco.
  • L2TPv3 (Layer 2 Tunnelling Protocol version 3), a new release.
  • VPN-Q The machine at the other end of a VPN could be a threat and a source of attack; this has no necessary connection with VPN designs and has been usually left to system adminstration efforts. There has been at least one attempt to address this issue in the context of VPNs. On Microsoft ISA Server, an applications called QSS (Quarantine Security Suite) is available.

Some large ISPs now offer "managed" VPN service for business customers who want the security and convenience of a VPN but prefer not to undertake administering a VPN server themselves. In addition to providing remote workers with secure access to their employer's internal network, other security and management services are sometimes included as part of the package. Examples include keeping anti-virus and anti-spyware programs updated on each client's computer.

Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single provider's network to protect the traffic. In a sense, these are an elaboration of traditional network and system administration work.

Read More...

星期四, 十月 26, 2006

ATM Traffic contract/Service contract

Another key ATM concept is that of the traffic contract. When an ATM circuit is set up each switch is informed of the traffic class of the connection.

ATM traffic contracts are part of the mechanism by which "Quality of Service" (QoS) is ensured. There are four basic types (and several variants) which each have a set of parameters describing the connection.

  • CBR - Constant bit rate: you specify a Peak Cell Rate (PCR), which is constant.
  • VBR - Variable bit rate: you specify an average cell rate, which can peak at a certain level for a maximum interval before being problematic.
  • ABR - Available bit rate: you specify a minimum guaranteed rate.
  • UBR - Unspecified bit rate: your traffic is allocated all remaining transmission capacity.

VBR has real-time and non-real-time variants, and is used for "bursty" traffic.

Most traffic classes also introduce the concept of Cell Delay Variation Tolerance (CDVT) which defines the "clumping" of cells in time.

Traffic contracts are usually maintained by the use of "Shaping", a combination of queuing and marking of cells, and enforced by "Policing".

Traffic shaping

Traffic shaping is usually done at the entry point to an ATM network and attempts to ensure that the cell flow will meet its traffic contract.

Traffic policing

To maintain network performance it is possible to police virtual circuits against their traffic contracts. If a circuit is exceeding its traffic contract, the network can either drop the cells or mark the Cell Loss Priority (CLP) bit (to identify a cell as discardable further down the line). Basic policing works on a cell by cell basis, but this is sub-optimal for encapsulated packet traffic (as discarding a single cell will invalidate the whole packet). As a result, schemes such as Partial Packet Discard (PPD) and Early Packet Discard (EPD) have been created that will discard a whole series of cells until the next frame starts. This reduces the number of redundant cells in the network, saving bandwidth for full frames. EPD and PPD work with AAL5 connections as they use the frame end bit to detect the end of packets.

Read More...

Connection Admission Control

Via: Wikipedia: http://en.wikipedia.org/wiki/Connection_Admission_Control

Connection admission control is an admission control in ATM networks. It is defined as ‘the set of actions taken by the network during the call set-up phase (or during the call renegotiation phase) to establish whether a VC/VP connection can be accepted’ [2][3].

In principle, in a connection-oriented network, the role of CAC is to decide whether there are sufficient free resources on the requested link to allow a new connection [4]. A connection can only be accepted if sufficient resources are available to establish the connection end-to-end with its required QoS. The agreed QoS of existing connections in the network must not be affected by the new connection [2].

If the network has the required resources, the CAC may allow a connection request to proceed; if not, the CAC will indicate this and notify the originator of the request that the request has been refused [4].

Via: 赛迪网

中文译名: 连接接纳控制

解释: 异步转移模式(ATM)技术的一种流量控制标准。在开始建立连接时分配网络资源,判断是否可以满足连接申请的各种要求并达成某种协约。用户也可以根据连接接纳控制(CAC)期间达成的协约中分析网络的拥塞情况。

Read More...

星期二, 十月 24, 2006

Circuit switching

Via: Circuit switching - Wikipedia, the free encyclopedia

In telecommunications, a circuit switching network is one that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate. Each circuit that is dedicated cannot be used by other callers until the circuit is released and a new connection is set up. Even if no actual communication is taking place in a dedicated circuit then, that channel still remains unavailable to other users. Channels that are available for new calls to be set up are said to be idle.

Read More...

Virtual Circuit 虚电路

虚电路是在分组交换散列网络上的两个或多个端点站点间的链路。它为两个端点间提供临时或专用面向连接的会话。它的固有特点是,有一条通过多路径网络 的预定 路径。提前定义好一条路径,可以改进性能,并且消除了帧和分组对头的需求,从而增加了吞吐率。从技术上看,可以通过分组交换网络的物理路径进行改变,以避 免拥挤和失效线路,但是两个端系统要保持一条连接,并根据需要改变路径描述。

具有永久性和交换型的虚电路如下所述:

永久性虚电路(PVC)是一种提前定义好的,基本上不需要任何建立时间的端点站点间的连接。在公共-长途电信服务,例如异步传输模式(ATM)或帧 中继 中,顾客提前和这些电信局签订关于PVC的端点合同,并且如果这些顾客需要重新配置这些PVC的端点时,他们就必须和电信局联系。
交换型虚电路(SVC)是端点站点之间的一种临时性连接。这些连接只持续所需的时间,并且当会话结束时就取消这种连接。虚电路必须在数据传送之前建立。一些电信局提供的分组交换服务允许用户根据自己的需要动态定义SVC。

在ATM环境,在端点站点之间的逻辑连接称为虚拟信道(VC)。虚拟路径(VP)是一个或多个VC通过一个散列网络到达相同目的地的一条定义好的路 径,虽 然每个VC可以连接到不同的端系统或在这个目的地的应用处理。可以将VP想象为包含一束电线的电缆。在这个比喻中,该电缆将两点和此电缆 连接端系统内的独立电路相连。它的优点是,共享穿越网络的相同路径的连接被组织在一起,并使用相同的管理功能。如果已经建立了VP,就可以很轻易地增加新 的VC,这时因为已经完成了定义穿越这个网络路径的工作。另外,如果这个网络为了避免拥挤或失效的线路而需要改变一条路径时,所有为这个VP建立的VC都 被定向到这个新的路径。

PVC是在帧中继环境中传统的连接方式,虽然1993年末SVC被支持加入这个规范。PVC具有特定服务特点。在与提供商建立了服务时,就定义 PVC和这 里列出的服务特点。这个链路的服务特点:承约信息大小(committed burst size)、承约信息率(committed information rate)、过量信息大小(excess burst size)和帧大小(frame size)。它们是在协商时定义的。

承约信息大小(CBS)是网络提供商同意在时间间隔内的正常网络状态进行传输的最大数据(按位)的数量。

承约信息率(CIR)是网络提供商同意的在一个PVC的正常网络状态期间传输CBS承约数据的传输率。

过量信息大小(EBS)是最大允许的超出CBS的未承约数据(按位)的数量,这个网络将试图在一个时间间隔期间传送它们。EBS数据将在网络拥挤期间被网络按照可抛弃数据对待。

帧大小是传送顾客数据穿越分组交换网络的帧的体积。

参考资料:
1.赛迪网 http://www0.ccidnet.com/school/dict/explain/V_408.html

Read More...

Exponential backoff

Exponential backoff is an algorithm that uses feedback to multiplicatively decrease the rate of some process, in order to gradually find an acceptable rate. It is often used in network congestion avoidance to help determine the correct sending rate. For example, a sender might send a message, set a timer to wait 0.25 seconds for an acknowledgment, and if none arrives, retransmit the message and wait 0.5 seconds for an acknowledgment. It will continue to retry until it receives an acknowledgement and will wait, 1s, 2s, 4s, 8s, etc. each time before retrying.

Via: Wikipedia

Read More...

Collision

collision (冲突)—– 以太网中两个节点同时发送传输的结果。当它们在物理介质上相遇时,每个节点的帧相碰撞并被损坏。

collision domain (冲突域)—– 以太网中发生碰撞的帧将传播的网络区域。冲突通过集线器和转发器传播,但不通过LAN交换机、路由器或网桥传播。

Read More...