Link Layer Discovery Protocol (LLDP)

Size: px
Start display at page:

Download "Link Layer Discovery Protocol (LLDP)"

Transcription

1 Extreme etworks Technical Brief Link Layer Discovery Protocol () A ew Standard for Discovering and Managing Converged etwork Devices If there is any certainty in the access layer of a network, it is that the number and the complexity of devices that reside in this layer will continue to experience rapid growth. Ethernet access ports are expected to more than triple from 00 to 00 (IDC Research, 00). This exponential growth in the number of devices requiring LA connectivity is due largely to the proliferation of new applications such as IP Telephony and wireless access. From a network management perspective, there are direct implications that come from these changes. In the past, many network equipment vendors have developed proprietary discovery methods in order to incorporate new access devices that they develop. In addition, key infrastructure vendors have developed proprietary discovery protocols, storing the data in an enterprise extension of the Management Information Base () used with Simple etwork Management Protocol (SMP). Today s network management solutions are required to add expanded functionality and, at the same time, reduce complexity. Deployment, configuration, monitoring and other management disciplines must accommodate new technologies and network changes that are necessary to support new applications. Further, management systems must incorporate features that meet or exceed existing TDM voice solutions while providing advanced functionality to take advantage of the data infrastructure. Extreme etworks simplifies today s expanding network environment and management challenges by improving intelligence and automation throughout the network. Extreme etworks now incorporates the recently finalized IEEE standard, 0.AB into its infrastructure products. was recently accepted as the standard open protocol for discovering network topologies and information concerning devices on the network. promises to simplify troubleshooting of enterprise networks and enhance the ability of network management tools to discover and maintain accurate network topologies in multi-vendor environments. It serves to reduce the complexities and expenses involved with convergence driven network changes by greatly simplifying management and connectivity issues. The new standard sets the stage for convergence applications by allowing enterprises to add new access devices in a non-disruptive Plug-and-Play fashion. Voice and wireless services can be easily implemented without major network upgrades.. Today s networks must incorporate best-of-breed solutions at every layer of the network, regardless of which vendor you choose. allows enterprises to build a best-ofbreed open converged network that can easily accommodate new applications, such as voice, while achieving five s availability. The open nature of forms a foundation for co-development of new add-on discovery features that will help enable new Ethernet-based applications and services in the future. Extreme etworks employs not only as a means to simplify deployment of access devices, but also as a troubleshooting and firmware management tool and eventually as a way to legitimize new data services. For instance, in the future, Extreme etworks plans to provide much-needed E emergency call services in Voice-over-IP (VoIP) applications and enable new applications such as Voice over WLA (VoWLA). Benefits The business level benefits that can be realized from deploying in an Extreme etworks device are far-reaching. Lower Operating Costs Increases in automation achieved through can directly contribute to lower operating costs. Management and network maintenance are greatly simplified as a result of management tool consolidation and automation of diagnostic and consistency checking procedures. Automated discovery of access devices also reduce general setup costs of new equipment. simplifies management and network deployment, and as a result, lessens the number and complexity of processes and reduces headcount. Improved Choice and Flexibility in etwork Design helps create an open market and customer choice so that a business can choose the best vendor for a particular network application. helps eliminate the barriers to creating a multi-vendor best-of-breed solution, thus allowing for a more advanced network and reduced capital expenditures due to competitive bidding and increased bargaining power. Open standards benefit the end customer as a result of vendors co-developing technology. This coordination simultaneously advances development cycles on new technology and increases price competition. 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page

2 ` Extreme etworks Technical Brief How Works is essentially a neighbor discovery protocol that defines a method for network access devices using Ethernet connectivity to advertise information about them to peer devices on the same physical LA and store information about the network. It allows a device to learn higher layer management reachability and connection endpoint information from adjacent devices. has been fully implemented in Extreme etworks switches and is accessible from the EPICenter management system. Using, an Extreme etworks device is able to advertise its own identification information, its capabilities and media-specific configuration information, as well as learn the same information from the devices connected to it. advertises this information over Logical Link-Layer Control frames and the information received from other agents in IEEE-defined Management Information Bases () modules. Figure shows this relationship. significantly aids in the deployment of any network device that supports the protocol. As a media independent protocol intended to be run on all IEEE 0 devices, may be used to discover routers, bridges, repeaters, WLA APs, IP telephones, network camera or any -enabled device, regardless of manufacturer. Since runs over the data-link layer only, an Extreme etworks switch running one network layer protocol can discover and learn about an access device running a different network layer protocol. Architecture is a data-link layer protocol, operating above the service layer and, as a result, can be used in any networking device that implements a service. Figure shows where resides in the IEEE 0 Model Layers. OSI Reference Model Layers IEEE 0 Model Layer BlackDiamond 00 Application Higher Protocol Layers Discovery Port Device Info A Switch Intellegent Core PST Presentation Session Transport Client {Bridge Relay Entity, LLC, etc.} Link Aggregation Sublayer C D F IP Phone PC IP-PBX etwork Data Link Control Control Control Physical Physical Physical Physical BlackDiamond 0 Figure : Architecture Figure : Peer Discovery How it Works The IEEE 0.ab Link Layer Discovery Protocol defines a standard way for Ethernet devices to advertise information about themselves to their network neighbors and store information they discover from other device. Router LA Switch IP Phone. LA switch and router advertise chassis/port ids and system descriptions to each other... The devices store the information they learn about each other in local databases accessible via SMP. A network management system (Extreme etworks EPICenter) retrieves the data stored by each device that builds a network topology map. etwork Management System BlackDiamond 0 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page

3 Extreme etworks Technical Brief will advertise and store messages and will not solicit information or keep state between devices. Each Extreme etworks switch configured with an active agent will send and receive messages on all physical interfaces enabled for transmission. These messages are sent periodically and are typically configured for short time intervals to ensure that accurate information is always available. These messages are then stored for a configurable period of time, determined by the time-to-live (TTL) value set by a user and contained within the received packet. The message information expires and is discarded when the TTL value is met. There is a default recommended time value for the TTL of 0 seconds. The only other time an advertisement would be sent is when a relevant change takes place in the switch. If information values change for any reason, the agent will be notified and will send out and update the new values. Extreme etworks switch ports enabled with basic, the information shown in Table can be transmitted and stored using. Chassis ID Port ID Represents the identification of the specific port that transmitted the frame. The receiving agent combines the Chassis ID and Port to represent the entity connected to the port where the frame was received. Time-to-live (TTL) Represents the length of time that information contained in the receive frame shall be valid. If a value of zero is sent it can also identify a device that has shut down or is no longer transmitting, prompting deletion of the record from the local database. Port description Identifies information about the interface. This will include the name of the manufacturer, the product name and the version of the interface hardware/software (per RFC). System name Identifies the administratively-assigned name for the device (per RFC). System description A textual description of the device. This value typically includes the full name and version identification of the system s hardware type, software operating-system, and networking software (per RFC). System capabilities Identifies the capabilities of the device and its primary function. (e.g. Repeater, Bridge, WLA Access Point, Router, Telephone, DOCSIS cable device, Station only, etc.). Management address Identifies the IP address or address of the device. Organizationally specific The IEEE has further enhanced the value of the protocol by making it possible for other standards organizations and vendors to create custom advertisement messages for other types of endpoints. For Extreme etworks switches, the following based information is maintained: - 0. VLA extensions - 0. LA interface extensions - -MED extensions End of PDU Marks the end of data. o further processing of s after this is necessary. This is a mandatory and must therefore be present at the end of the data stream. Basic functionality is represented in Figure. Advertisements Summit X0 0 0 Summit X0 STACK O STACK O COSOLE 0 0 DESCRIPTIO Represents the chassis identification for the device that transmitted the frame. The receiving agent combines the Chassis ID and Port ID to represent the entity connected to the port where the frame was received. COSOLE STACK O STACK O COSOLE COSOLE SMP Advertisements ` EPICenter etwork Management Figure : Basic Functionality In this example advertisements are exchanged between participating network devices and stored in the. As a result, EPICenter is able to gain access to that information using SMP and build a complete topology and detailed inventory of network devices. These is true even if some network devices, such as IP phones, only advertise messages and are not able to store peer information. Protocol Data Unit Format Table : Basic s supported by Extreme etworks A single Protocol Data Unit ( PDU) is transmitted in a single 0. Ethernet frame. The basic PDU consists of a header, followed by a variable number of information elements known as s that each includes fields for Type, Length, and Value. Type identifies what kind of information is being sent. Length indicates the length of the information string. Value is the actual information sent. Each PDU includes three mandatory s followed by optional s. The three mandatory s are Chassis ID, Port ID and TTL. Other s are optional to advertise. For 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page

4 Extreme etworks Technical Brief Organizationally-Specific s Extreme etworks implementation of organizationallyspecific s represent a commitment to fully enabling the network for converged applications and provide level of functionality beyond that of most equipment vendors. Organizationally-specific extensions simplify the integration of multi-vendor access networks by assisting in the detection and configuration of IEEE 0. and IEEE 0. information. Additionally, standards organizations as well as vendors such as Extreme etworks will help to drive new functionality in extensions. ew standards, such as -Media Endpoint Discovery (MED), will provide extensibility to fully standardized solutions to other reasonably predictable needs in this area, as well as allowing for vendor-specific extensions. 0. Extensions IEEE 0. extensions deal primarily with describing VLA attributes. They will also be supported in the first release of support on Extreme etworks switches. Supported 0. extensions are the s shown in Table. Port VLA ID Port & Protocol VLA ID VLA ame Protocol Identity DESCRIPTIO 0. Extensions The IEEE 0. extensions describe various attributes associates with the operation of an 0. LA interface. The defined s supported in the first implementation of are shown in Table. /PH Configuration and Status Power-via-MDI Link Aggregation Maximum Frame Size Identifies the VLA identifier associated with an untagged VLA. Only one Port VLA ID can exist in an PDU. Allows the port to advertise if it supports port/protocol based VLAs, and there associated VLA ID. Allows a device to advertise the textual name of any VLA with which it is configured. Provides the protocols that are accessible through the port. Table : 0. Extensions DESCRIPTIO Determines more about the auto negotiation settings of the port, as well as the type of physical interface used. Advertises the power-via-mdi implementations supported by the port. Power Information allows for improved power management for endpoints utilizing IEEE 0.af Power over Ethernet (PoE). Allows the port to send information about its configured link aggregation (whether the link is capable of being aggregated, whether it is currently in an aggregation and if in an ag-- gregation, the port of the aggregation). Reports the maximum supported frame size for the port. Table : 0. Extensions -MED -MED is a new set of standards enhancing the basic protocol, which applies to increased discovery of endpoint devices. In the future, Extreme etworks will implement many of the new -MED standards under development by the Telecommunications Industry Association (TIA). Management Components EPICenter Management provides detailed Layer network information for connected access devices, exposing the entire LA to the EPICenter management system. Layer discovery drills down to the port that access devices are connected to and gives a complete understanding of connectivity and device properties. This granularity of detail is necessary to configure and maintain end-to-end networks from a network management system End-to-end, meaning that network administrators should not have to manually audit a network to discover third-party vendor devices. Instead, allows for centralized management and automated discovery of all wired and wireless devices. This is achieved through flexible management views, with options that can be selected per device, user, action, time or location. Using in Extreme etworks devices, EPICenter manager is able to build a complete topology of the network and make automation a reality. Because messages are stored in the of an Extreme etworks switch, EPICenter is able to obtain complete access to the information through SMP advertisements. Having this control and information availability through EPICenter allows centralized access to accurate and timely network data, enabling simplified device management and troubleshooting. For example, it becomes possible for EPICenter management to discover configuration inconsistencies or malfunctions that can result in impaired communication at higher layers. Most importantly, EPICenter can obtain this information from all network devices, not just Extreme etworks devices. Command Line Interface (CLI) CLI is an optional method of configuration for. CLI can send configuration information per port to Extreme etworks switches via SMP. CLI can also be used to maintain a list of enabled ports and the port mode (i.e. transmit only, receive only or transmit and receive). 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page

5 Extreme etworks Technical Brief Applications Diagnostics/Troubleshooting is a natural diagnostic tool because of its inherent ability to discover and maintain accurate and up-to-date network topologies. The information exposes network mapping, inventory data and network troubleshooting information that may otherwise be unavailable. etwork administrators can use this information to identify outdated hardware and software, speed and duplex mismatches and improperly configured devices. For example, using TTL values, can be used to locate ports that are no longer sending advertisements to determine endpoint devices that have gone out of service. Voice VoIP continues to demand availability standards and advanced functionality from data networks that will help put it on par with TDM systems. takes another step forward in achieving this goal by facilitating multi-vendor IP Telephony networks and enabling these networks to achieve dial-tone reliability. VoIP networks have been relatively slow to adopt voice-class features and have lacked complete integration with existing network management systems. IP telephones typically lack support of management protocols such as SMP, prohibiting MS systems from a complete network view. now brings discovery of VoIP topology information to Extreme etworks Management System. allows an IP phone to be dynamically and fully recognized by an Extreme etworks device. The Extreme etworks device is then able to adapt to the network according to the needs of the IP telephone and information becomes accessible to EPICenter. Extreme etworks acts as an industry innovator by incorporating early-standards -MED functions and by making significant headway in building Plug-and-Play IP Telephony networks. Extreme etworks Implementation vs. Other Discovery Protocols Protocol (CDP); Enterasys etworks, Cabletron Discovery Protocol (CDP); and ortel etworks, ortel Discovery Protocol (DP). However, many network architects building out enterprise and carrier VoIP networks would like a standard means of discovery allowing them to mix best-of-breed equipment from multiple vendors. Most network designs are moving to a best-of-breed strategy where individual components in the network are chosen for their unique ability to handle an application. A standardsbased discovery protocol readies a network for convergence applications without major dependencies concerning the manufacturer of network equipment. See Figure for a comparison between discovery protocols. Industry Standards Based Multi-Vendor etwork Support Chassis & Port ID Port Description System ame System Description System Capabilities Management Address VLA ID Voice VLAs etwork Policy Auto egotiation Requirements Power Information (PoE Capable) Frame Size Requirements Location Advertisements (E capable) -MED Cisco CDP ortel DP Figure : Competitive Discovery Methods Enterasys CDP Many network equipment vendors have developed discovery protocols to operate in homogeneous networks comprised of their own equipment. Cisco Systems has Cisco Discovery com info@extremenetworks. Corporate and orth America Extreme etworks, Inc. Monroe Street Santa Clara, CA 0 USA Phone Europe, Middle East, Africa and South America Phone Asia Pacific Phone + Japan Phone Extreme etworks, Inc. All rights reserved. Extreme etworks, the Extreme etworks Logo, BlackDiamond and EPICenter, are either registered trademarks or trademarks of Extreme etworks, Inc. in the United States and/or other countries. Specifications are subject to change without notice. 0_0 /0 Link Layer Discovery Protocol Technology Brief

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Using Link Layer Discovery Protocol in Multivendor Networks

Using Link Layer Discovery Protocol in Multivendor Networks Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite from Extreme Networks is a scalable full-featured network management tool that simplifies configuration, troubleshooting and status monitoring

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

Configuring LLDP, LLDP-MED, and Location Service

Configuring LLDP, LLDP-MED, and Location Service 27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service

More information

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,

More information

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

Deploying IP Telephony with EX-Series Switches

Deploying IP Telephony with EX-Series Switches Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

L2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide

L2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide L2 / L3 Switches Link Layer Discovery Protocol (LLDP) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes

More information

802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones

802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones 802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones Abstract The purpose of this document is to discuss 802.1X Authentication and Link Layer Discovery Protocol (LLDP) in

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series

More information

LLDP-MED and Cisco Discovery Protocol

LLDP-MED and Cisco Discovery Protocol White Paper LLDP-MED and Cisco Discovery Protocol DEVICE DISCOVERY PROTOCOLS Device discovery protocols enable directly connected devices to discover information about each other. They advertise information

More information

Simplifying Data Center Network Architecture: Collapsing the Tiers

Simplifying Data Center Network Architecture: Collapsing the Tiers Simplifying Data Center Network Architecture: Collapsing the Tiers Abstract: This paper outlines some of the impacts of the adoption of virtualization and blade switches and how Extreme Networks can address

More information

MS Series: VolP Deployment Guide

MS Series: VolP Deployment Guide Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using

More information

A Link Layer Discovery Protocol Fuzzer

A Link Layer Discovery Protocol Fuzzer The University of Texas at Austin, Department of Computer Sciences, Technical Report TR-07-24 A Link Layer Discovery Protocol Fuzzer Jeremy Hollander Department of Computer Sciences The University of Texas

More information

Power over Ethernet (PoE) Power Requirements FAQ

Power over Ethernet (PoE) Power Requirements FAQ Power over Ethernet (PoE) Power Requirements FAQ Document ID: 97869 Questions Introduction What is Power over Ethernet? What is the difference between inline power and PoE? What is the difference between

More information

SummitStack in the Data Center

SummitStack in the Data Center SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution Extreme Networks offers a highly virtualized, centrally manageable

More information

Ridgeline Network and Service Management Software

Ridgeline Network and Service Management Software Extreme Networks Data Sheet Ridgeline Network and Service Management Software Security Feature Pack 1 The IT and network organizations within enterprises are challenged more than ever to serve users with

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Chapter 46 Link Layer Discovery Protocol (LLDP)

Chapter 46 Link Layer Discovery Protocol (LLDP) Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9

More information

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones

More information

Configuring PROFINET

Configuring PROFINET CHAPTER 9 This chapter describes how to configure the PROFINET feature on the Cisco IE 3000 switch. Understanding PROFINET, page 9-1, page 9-4 Displaying the PROFINET Configuration, page 9-5 Troubleshooting

More information

Carrier Ethernet: New Game Plan for Media Converters

Carrier Ethernet: New Game Plan for Media Converters Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet

More information

Link Layer Discovery Protocol

Link Layer Discovery Protocol 12 Link Layer Discovery Protocol Contents Overview..................................................... 12-2 LLDP..................................................... 12-2 LLDP Messages............................................

More information

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 Revision C 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Passive Link State Auto Configuration (A/P)...

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report February 2007 Report 070228 Product Category: SMB IP-PBX Vendor Tested: Cisco Systems Product Tested: Cisco Unified Communications 500 Series Key findings and conclusions: Complete

More information

Meraki Stacking. White Paper

Meraki Stacking. White Paper White Paper Meraki Stacking OCTOBER 2015 This document describes the benefits of Meraki Stacking technology and how it can be used to manage a distributed network. In addition, this document will cover

More information

Advanced Transportation Management Systems

Advanced Transportation Management Systems Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements

More information

SummitStack in the Data Center

SummitStack in the Data Center SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution that Extreme Networks offers a highly virtualized, centrally manageable

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Physical Infrastructure Management Solutions

Physical Infrastructure Management Solutions Physical Infrastructure Management Solutions Physical Infrastructure Challenges Require Innovative Solutions The Need for In-Depth Network Intelligence. With increased acceptance of virtualization, cloud

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report November 2011 Report 111018 Product Category: Supervisor Engine Vendor Tested: Product Tested: Catalyst 4500E Supervisor Engine 7L-E Key findings and conclusions: Cisco Catalyst

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Virtual Stacking. White Paper

Virtual Stacking. White Paper White Paper Virtual Stacking November 2012 This document describes the benefits of Meraki s Virtual Stacking technology and how you can use it to manage a distributed network. In addition, this document

More information

Link Layer Discovery Protocol and MIB

Link Layer Discovery Protocol and MIB Link Layer Discovery Protocol and MIB v0.0 Paul Congdon 3/7/02 Acknowledgements This document is heavily leveraged from an Internet-Draft developed for the IETF PTOPO working group. The original draft,

More information

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your

More information

LANs and VLANs A Simplified Tutorial

LANs and VLANs A Simplified Tutorial Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name

More information

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks 1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

network infrastructure: getting started with VoIP

network infrastructure: getting started with VoIP hp procurve networking business may 2003 network infrastructure: getting started with VoIP technical brief table of contents introduction 2 network optimization for VoIP 2 bandwidth provisioning 3 end-to-end

More information

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.

More information

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11

More information

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port 1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

More information

Fibre Channel over Ethernet: Enabling Server I/O Consolidation

Fibre Channel over Ethernet: Enabling Server I/O Consolidation WHITE PAPER Fibre Channel over Ethernet: Enabling Server I/O Consolidation Brocade is delivering industry-leading oe solutions for the data center with CNAs, top-of-rack switches, and end-of-row oe blades

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

HP Networking and Aastra

HP Networking and Aastra HP Networking and Aastra Solution whitepaper Table of contents Executive Summary... 2 Introduction... 3 HP Networking and Aastra: A true alliance... 4 Commitment to open standards... 4 Session Initiation

More information

MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC

MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter

More information

Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009

Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009 Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results September 25, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

Combining Voice over IP with Policy-Based Quality of Service

Combining Voice over IP with Policy-Based Quality of Service TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Empirix OneSight for VoIP: Avaya Aura Communication Manager

Empirix OneSight for VoIP: Avaya Aura Communication Manager Datasheet Empirix OneSight for VoIP: Avaya Aura Communication Manager Perform. Increase visibility and ensure the availability and quality of critical communications systems. Benefits Speed the deployment

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Setting up of a Wireless Distribution System (WDS)

Setting up of a Wireless Distribution System (WDS) Setting up of a Wireless Distribution System (WDS) - a user s perspective Sudipto Das Co worker: Rajesh Roy Department of Computer Science & Engineering Jadavpur University Kolkata 32 {sudipto.das,rajesh.roy}@rediffmail.com

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009 Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Extreme Physical Security

Extreme Physical Security Extreme Networks White Paper Extreme Physical Security Abstract Extreme Networks takes a holistic view of the Physical Security market, leveraging Ethernet technology and features with go-to-market sellers

More information

640-460. IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo. Page <<1/9>>

640-460. IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo. Page <<1/9>> 640-460 IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo Page 1. You are CCNA VOICE associate in XXXX.com. You need configure a voice port that will allow the gateway to

More information

Extreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER

Extreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER Extreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER WHITE PAPER Building Cloud- Scale Networks Abstract TABLE OF CONTENTS Introduction 2 Open Fabric-Based

More information

Optimizing Networks for NASPI

Optimizing Networks for NASPI Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

Cisco EtherSwitch Network Modules

Cisco EtherSwitch Network Modules Cisco EtherSwitch Network Modules 16- and 36-Port 10/100 Ethernet Modules for Cisco 2600/2800/3600/3700/3800 Series Routers Figure 1. Cisco 16-Port and 36-Port EtherSwitch Network Modules The Cisco 16-

More information

Configuration Management: Best Practices White Paper

Configuration Management: Best Practices White Paper Configuration Management: Best Practices White Paper Document ID: 15111 Contents Introduction High Level Process Flow for Configuration Management Create Standards Software Version Control and Management

More information

The Four Pillar Strategy for Next Generation Data Centers

The Four Pillar Strategy for Next Generation Data Centers The Four Pillar Strategy for Next Generation Data Centers Abstract: The transformation from a dedicated, or siloed, application-specific infrastructure to a shared and outsourced cloud infrastructure is

More information

Avaya Fabric Attach. avaya.com 1. Table of Contents. Fabric Attach the Ecosystem and Solution

Avaya Fabric Attach. avaya.com 1. Table of Contents. Fabric Attach the Ecosystem and Solution Avaya Fabric Attach Table of Contents Fabric Attach the Ecosystem and Solution... 1 Fabric Attach Avaya Identity Engines with an FA solution... 2 Fabric Attach the key elements... 3 Fabric Attach in an

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Data Center Manager (DCM)

Data Center Manager (DCM) DATA SHEET Data Center Manager (DCM) Unified Virtual/Physical Data Center Fabric Management Benefits LOWER OPERATIONAL COSTS High degree of automation within physical and virtual environments to streamline

More information

Auditing the LAN with Network Discovery

Auditing the LAN with Network Discovery Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

Focused Vendor Module Avaya Aura Communication Manager (ACM)

Focused Vendor Module Avaya Aura Communication Manager (ACM) Focused Vendor Module Avaya Aura Communication Manager (ACM) A CTiQ FVM operates like a team of highly skilled engineers. SYSTEM OVERVIEW: HOW THE ACM FVM FITS Focused Vendor Modules (FVMs) THE BRIDGE

More information

EVALUATING INDUSTRIAL ETHERNET

EVALUATING INDUSTRIAL ETHERNET EVALUATING INDUSTRIAL ETHERNET WHAT IS STANDARD? Written by: Shuo Zhang Networks Marketing Rockwell Automation As industrial automation systems evolve, industrial Ethernet is becoming increasingly popular

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

Oracle Communications Network Discovery Overview. Updated June 2007

Oracle Communications Network Discovery Overview. Updated June 2007 Oracle Communications Network Discovery Overview Updated June 2007 Oracle Communications Network Discovery Overview Oracle Communications Network Discovery provides automated discovery of the network including

More information

Ridgeline Network and Service Management Software

Ridgeline Network and Service Management Software Extreme Networks Data Sheet Ridgeline Network and Service Management Software IT and network management are challenged more than ever to serve end users with a diverse set of applications and service requirements.

More information

Cisco Configuration Assistant

Cisco Configuration Assistant Cisco Configuration Assistant Configuring a Small Business s Entire Routing, Switching, Wireless, Security, and Voice Network with a Single, Easy-to-Use Tool. Today s businesses depend more than ever on

More information

Ridgeline Network and Service Management Software

Ridgeline Network and Service Management Software Extreme Networks Data Sheet Ridgeline Network and Service Management Software IT and network management are challenged more than ever to serve end users with a diverse set of applications and service requirements.

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

Expert Reference Series of White Papers. The Evolution of Cisco Switching

Expert Reference Series of White Papers. The Evolution of Cisco Switching Expert Reference Series of White Papers The Evolution of Cisco Switching 1-800-COURSES www.globalknowledge.com The Evolution of Cisco Switching Joe Rinehart, MBA, CCIE #14256, CCNP/DP/VP Introduction Cisco

More information

Data Center Solutions

Data Center Solutions Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

Meraki MS22 / MS42 Cloud Managed Gigabit PoE Switch Family

Meraki MS22 / MS42 Cloud Managed Gigabit PoE Switch Family DATASHEET Meraki MS22 / MS42 Cloud Managed Gigabit PoE Switch Family Overview The Meraki MS line of cloud-managed access switches bring the benefits of cloud computing, including management simplicity,

More information