Link Layer Discovery Protocol (LLDP)
|
|
- Trevor Cummings
- 8 years ago
- Views:
Transcription
1 Extreme etworks Technical Brief Link Layer Discovery Protocol () A ew Standard for Discovering and Managing Converged etwork Devices If there is any certainty in the access layer of a network, it is that the number and the complexity of devices that reside in this layer will continue to experience rapid growth. Ethernet access ports are expected to more than triple from 00 to 00 (IDC Research, 00). This exponential growth in the number of devices requiring LA connectivity is due largely to the proliferation of new applications such as IP Telephony and wireless access. From a network management perspective, there are direct implications that come from these changes. In the past, many network equipment vendors have developed proprietary discovery methods in order to incorporate new access devices that they develop. In addition, key infrastructure vendors have developed proprietary discovery protocols, storing the data in an enterprise extension of the Management Information Base () used with Simple etwork Management Protocol (SMP). Today s network management solutions are required to add expanded functionality and, at the same time, reduce complexity. Deployment, configuration, monitoring and other management disciplines must accommodate new technologies and network changes that are necessary to support new applications. Further, management systems must incorporate features that meet or exceed existing TDM voice solutions while providing advanced functionality to take advantage of the data infrastructure. Extreme etworks simplifies today s expanding network environment and management challenges by improving intelligence and automation throughout the network. Extreme etworks now incorporates the recently finalized IEEE standard, 0.AB into its infrastructure products. was recently accepted as the standard open protocol for discovering network topologies and information concerning devices on the network. promises to simplify troubleshooting of enterprise networks and enhance the ability of network management tools to discover and maintain accurate network topologies in multi-vendor environments. It serves to reduce the complexities and expenses involved with convergence driven network changes by greatly simplifying management and connectivity issues. The new standard sets the stage for convergence applications by allowing enterprises to add new access devices in a non-disruptive Plug-and-Play fashion. Voice and wireless services can be easily implemented without major network upgrades.. Today s networks must incorporate best-of-breed solutions at every layer of the network, regardless of which vendor you choose. allows enterprises to build a best-ofbreed open converged network that can easily accommodate new applications, such as voice, while achieving five s availability. The open nature of forms a foundation for co-development of new add-on discovery features that will help enable new Ethernet-based applications and services in the future. Extreme etworks employs not only as a means to simplify deployment of access devices, but also as a troubleshooting and firmware management tool and eventually as a way to legitimize new data services. For instance, in the future, Extreme etworks plans to provide much-needed E emergency call services in Voice-over-IP (VoIP) applications and enable new applications such as Voice over WLA (VoWLA). Benefits The business level benefits that can be realized from deploying in an Extreme etworks device are far-reaching. Lower Operating Costs Increases in automation achieved through can directly contribute to lower operating costs. Management and network maintenance are greatly simplified as a result of management tool consolidation and automation of diagnostic and consistency checking procedures. Automated discovery of access devices also reduce general setup costs of new equipment. simplifies management and network deployment, and as a result, lessens the number and complexity of processes and reduces headcount. Improved Choice and Flexibility in etwork Design helps create an open market and customer choice so that a business can choose the best vendor for a particular network application. helps eliminate the barriers to creating a multi-vendor best-of-breed solution, thus allowing for a more advanced network and reduced capital expenditures due to competitive bidding and increased bargaining power. Open standards benefit the end customer as a result of vendors co-developing technology. This coordination simultaneously advances development cycles on new technology and increases price competition. 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page
2 ` Extreme etworks Technical Brief How Works is essentially a neighbor discovery protocol that defines a method for network access devices using Ethernet connectivity to advertise information about them to peer devices on the same physical LA and store information about the network. It allows a device to learn higher layer management reachability and connection endpoint information from adjacent devices. has been fully implemented in Extreme etworks switches and is accessible from the EPICenter management system. Using, an Extreme etworks device is able to advertise its own identification information, its capabilities and media-specific configuration information, as well as learn the same information from the devices connected to it. advertises this information over Logical Link-Layer Control frames and the information received from other agents in IEEE-defined Management Information Bases () modules. Figure shows this relationship. significantly aids in the deployment of any network device that supports the protocol. As a media independent protocol intended to be run on all IEEE 0 devices, may be used to discover routers, bridges, repeaters, WLA APs, IP telephones, network camera or any -enabled device, regardless of manufacturer. Since runs over the data-link layer only, an Extreme etworks switch running one network layer protocol can discover and learn about an access device running a different network layer protocol. Architecture is a data-link layer protocol, operating above the service layer and, as a result, can be used in any networking device that implements a service. Figure shows where resides in the IEEE 0 Model Layers. OSI Reference Model Layers IEEE 0 Model Layer BlackDiamond 00 Application Higher Protocol Layers Discovery Port Device Info A Switch Intellegent Core PST Presentation Session Transport Client {Bridge Relay Entity, LLC, etc.} Link Aggregation Sublayer C D F IP Phone PC IP-PBX etwork Data Link Control Control Control Physical Physical Physical Physical BlackDiamond 0 Figure : Architecture Figure : Peer Discovery How it Works The IEEE 0.ab Link Layer Discovery Protocol defines a standard way for Ethernet devices to advertise information about themselves to their network neighbors and store information they discover from other device. Router LA Switch IP Phone. LA switch and router advertise chassis/port ids and system descriptions to each other... The devices store the information they learn about each other in local databases accessible via SMP. A network management system (Extreme etworks EPICenter) retrieves the data stored by each device that builds a network topology map. etwork Management System BlackDiamond 0 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page
3 Extreme etworks Technical Brief will advertise and store messages and will not solicit information or keep state between devices. Each Extreme etworks switch configured with an active agent will send and receive messages on all physical interfaces enabled for transmission. These messages are sent periodically and are typically configured for short time intervals to ensure that accurate information is always available. These messages are then stored for a configurable period of time, determined by the time-to-live (TTL) value set by a user and contained within the received packet. The message information expires and is discarded when the TTL value is met. There is a default recommended time value for the TTL of 0 seconds. The only other time an advertisement would be sent is when a relevant change takes place in the switch. If information values change for any reason, the agent will be notified and will send out and update the new values. Extreme etworks switch ports enabled with basic, the information shown in Table can be transmitted and stored using. Chassis ID Port ID Represents the identification of the specific port that transmitted the frame. The receiving agent combines the Chassis ID and Port to represent the entity connected to the port where the frame was received. Time-to-live (TTL) Represents the length of time that information contained in the receive frame shall be valid. If a value of zero is sent it can also identify a device that has shut down or is no longer transmitting, prompting deletion of the record from the local database. Port description Identifies information about the interface. This will include the name of the manufacturer, the product name and the version of the interface hardware/software (per RFC). System name Identifies the administratively-assigned name for the device (per RFC). System description A textual description of the device. This value typically includes the full name and version identification of the system s hardware type, software operating-system, and networking software (per RFC). System capabilities Identifies the capabilities of the device and its primary function. (e.g. Repeater, Bridge, WLA Access Point, Router, Telephone, DOCSIS cable device, Station only, etc.). Management address Identifies the IP address or address of the device. Organizationally specific The IEEE has further enhanced the value of the protocol by making it possible for other standards organizations and vendors to create custom advertisement messages for other types of endpoints. For Extreme etworks switches, the following based information is maintained: - 0. VLA extensions - 0. LA interface extensions - -MED extensions End of PDU Marks the end of data. o further processing of s after this is necessary. This is a mandatory and must therefore be present at the end of the data stream. Basic functionality is represented in Figure. Advertisements Summit X0 0 0 Summit X0 STACK O STACK O COSOLE 0 0 DESCRIPTIO Represents the chassis identification for the device that transmitted the frame. The receiving agent combines the Chassis ID and Port ID to represent the entity connected to the port where the frame was received. COSOLE STACK O STACK O COSOLE COSOLE SMP Advertisements ` EPICenter etwork Management Figure : Basic Functionality In this example advertisements are exchanged between participating network devices and stored in the. As a result, EPICenter is able to gain access to that information using SMP and build a complete topology and detailed inventory of network devices. These is true even if some network devices, such as IP phones, only advertise messages and are not able to store peer information. Protocol Data Unit Format Table : Basic s supported by Extreme etworks A single Protocol Data Unit ( PDU) is transmitted in a single 0. Ethernet frame. The basic PDU consists of a header, followed by a variable number of information elements known as s that each includes fields for Type, Length, and Value. Type identifies what kind of information is being sent. Length indicates the length of the information string. Value is the actual information sent. Each PDU includes three mandatory s followed by optional s. The three mandatory s are Chassis ID, Port ID and TTL. Other s are optional to advertise. For 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page
4 Extreme etworks Technical Brief Organizationally-Specific s Extreme etworks implementation of organizationallyspecific s represent a commitment to fully enabling the network for converged applications and provide level of functionality beyond that of most equipment vendors. Organizationally-specific extensions simplify the integration of multi-vendor access networks by assisting in the detection and configuration of IEEE 0. and IEEE 0. information. Additionally, standards organizations as well as vendors such as Extreme etworks will help to drive new functionality in extensions. ew standards, such as -Media Endpoint Discovery (MED), will provide extensibility to fully standardized solutions to other reasonably predictable needs in this area, as well as allowing for vendor-specific extensions. 0. Extensions IEEE 0. extensions deal primarily with describing VLA attributes. They will also be supported in the first release of support on Extreme etworks switches. Supported 0. extensions are the s shown in Table. Port VLA ID Port & Protocol VLA ID VLA ame Protocol Identity DESCRIPTIO 0. Extensions The IEEE 0. extensions describe various attributes associates with the operation of an 0. LA interface. The defined s supported in the first implementation of are shown in Table. /PH Configuration and Status Power-via-MDI Link Aggregation Maximum Frame Size Identifies the VLA identifier associated with an untagged VLA. Only one Port VLA ID can exist in an PDU. Allows the port to advertise if it supports port/protocol based VLAs, and there associated VLA ID. Allows a device to advertise the textual name of any VLA with which it is configured. Provides the protocols that are accessible through the port. Table : 0. Extensions DESCRIPTIO Determines more about the auto negotiation settings of the port, as well as the type of physical interface used. Advertises the power-via-mdi implementations supported by the port. Power Information allows for improved power management for endpoints utilizing IEEE 0.af Power over Ethernet (PoE). Allows the port to send information about its configured link aggregation (whether the link is capable of being aggregated, whether it is currently in an aggregation and if in an ag-- gregation, the port of the aggregation). Reports the maximum supported frame size for the port. Table : 0. Extensions -MED -MED is a new set of standards enhancing the basic protocol, which applies to increased discovery of endpoint devices. In the future, Extreme etworks will implement many of the new -MED standards under development by the Telecommunications Industry Association (TIA). Management Components EPICenter Management provides detailed Layer network information for connected access devices, exposing the entire LA to the EPICenter management system. Layer discovery drills down to the port that access devices are connected to and gives a complete understanding of connectivity and device properties. This granularity of detail is necessary to configure and maintain end-to-end networks from a network management system End-to-end, meaning that network administrators should not have to manually audit a network to discover third-party vendor devices. Instead, allows for centralized management and automated discovery of all wired and wireless devices. This is achieved through flexible management views, with options that can be selected per device, user, action, time or location. Using in Extreme etworks devices, EPICenter manager is able to build a complete topology of the network and make automation a reality. Because messages are stored in the of an Extreme etworks switch, EPICenter is able to obtain complete access to the information through SMP advertisements. Having this control and information availability through EPICenter allows centralized access to accurate and timely network data, enabling simplified device management and troubleshooting. For example, it becomes possible for EPICenter management to discover configuration inconsistencies or malfunctions that can result in impaired communication at higher layers. Most importantly, EPICenter can obtain this information from all network devices, not just Extreme etworks devices. Command Line Interface (CLI) CLI is an optional method of configuration for. CLI can send configuration information per port to Extreme etworks switches via SMP. CLI can also be used to maintain a list of enabled ports and the port mode (i.e. transmit only, receive only or transmit and receive). 00 Extreme etworks, Inc. All rights reserved. Link Layer Discovery Protocol Page
5 Extreme etworks Technical Brief Applications Diagnostics/Troubleshooting is a natural diagnostic tool because of its inherent ability to discover and maintain accurate and up-to-date network topologies. The information exposes network mapping, inventory data and network troubleshooting information that may otherwise be unavailable. etwork administrators can use this information to identify outdated hardware and software, speed and duplex mismatches and improperly configured devices. For example, using TTL values, can be used to locate ports that are no longer sending advertisements to determine endpoint devices that have gone out of service. Voice VoIP continues to demand availability standards and advanced functionality from data networks that will help put it on par with TDM systems. takes another step forward in achieving this goal by facilitating multi-vendor IP Telephony networks and enabling these networks to achieve dial-tone reliability. VoIP networks have been relatively slow to adopt voice-class features and have lacked complete integration with existing network management systems. IP telephones typically lack support of management protocols such as SMP, prohibiting MS systems from a complete network view. now brings discovery of VoIP topology information to Extreme etworks Management System. allows an IP phone to be dynamically and fully recognized by an Extreme etworks device. The Extreme etworks device is then able to adapt to the network according to the needs of the IP telephone and information becomes accessible to EPICenter. Extreme etworks acts as an industry innovator by incorporating early-standards -MED functions and by making significant headway in building Plug-and-Play IP Telephony networks. Extreme etworks Implementation vs. Other Discovery Protocols Protocol (CDP); Enterasys etworks, Cabletron Discovery Protocol (CDP); and ortel etworks, ortel Discovery Protocol (DP). However, many network architects building out enterprise and carrier VoIP networks would like a standard means of discovery allowing them to mix best-of-breed equipment from multiple vendors. Most network designs are moving to a best-of-breed strategy where individual components in the network are chosen for their unique ability to handle an application. A standardsbased discovery protocol readies a network for convergence applications without major dependencies concerning the manufacturer of network equipment. See Figure for a comparison between discovery protocols. Industry Standards Based Multi-Vendor etwork Support Chassis & Port ID Port Description System ame System Description System Capabilities Management Address VLA ID Voice VLAs etwork Policy Auto egotiation Requirements Power Information (PoE Capable) Frame Size Requirements Location Advertisements (E capable) -MED Cisco CDP ortel DP Figure : Competitive Discovery Methods Enterasys CDP Many network equipment vendors have developed discovery protocols to operate in homogeneous networks comprised of their own equipment. Cisco Systems has Cisco Discovery com info@extremenetworks. Corporate and orth America Extreme etworks, Inc. Monroe Street Santa Clara, CA 0 USA Phone Europe, Middle East, Africa and South America Phone Asia Pacific Phone + Japan Phone Extreme etworks, Inc. All rights reserved. Extreme etworks, the Extreme etworks Logo, BlackDiamond and EPICenter, are either registered trademarks or trademarks of Extreme etworks, Inc. in the United States and/or other countries. Specifications are subject to change without notice. 0_0 /0 Link Layer Discovery Protocol Technology Brief
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationUsing Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
More informationEPICenter Network Management Software
EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.
More informationEPICenter Network Management Software
EPICenter Network Management Software EPICenter management suite from Extreme Networks is a scalable full-featured network management tool that simplifies configuration, troubleshooting and status monitoring
More informationHow To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
More informationConfiguring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
More informationOptimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches
APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,
More informationDEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES
APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
More informationDeploying IP Telephony with EX-Series Switches
Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
More informationL2 / L3 Switches. Link Layer Discovery Protocol (LLDP) Configuration Guide
L2 / L3 Switches Link Layer Discovery Protocol (LLDP) Configuration Guide Revision 1.0 The information in this USER S MANUAL has been carefully reviewed and is believed to be accurate. The vendor assumes
More information802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones
802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones Abstract The purpose of this document is to discuss 802.1X Authentication and Link Layer Discovery Protocol (LLDP) in
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN Assignment for Avaya 9600 and 1600 Series
More informationLLDP-MED and Cisco Discovery Protocol
White Paper LLDP-MED and Cisco Discovery Protocol DEVICE DISCOVERY PROTOCOLS Device discovery protocols enable directly connected devices to discover information about each other. They advertise information
More informationSimplifying Data Center Network Architecture: Collapsing the Tiers
Simplifying Data Center Network Architecture: Collapsing the Tiers Abstract: This paper outlines some of the impacts of the adoption of virtualization and blade switches and how Extreme Networks can address
More informationMS Series: VolP Deployment Guide
Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using
More informationA Link Layer Discovery Protocol Fuzzer
The University of Texas at Austin, Department of Computer Sciences, Technical Report TR-07-24 A Link Layer Discovery Protocol Fuzzer Jeremy Hollander Department of Computer Sciences The University of Texas
More informationPower over Ethernet (PoE) Power Requirements FAQ
Power over Ethernet (PoE) Power Requirements FAQ Document ID: 97869 Questions Introduction What is Power over Ethernet? What is the difference between inline power and PoE? What is the difference between
More informationSummitStack in the Data Center
SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution Extreme Networks offers a highly virtualized, centrally manageable
More informationRidgeline Network and Service Management Software
Extreme Networks Data Sheet Ridgeline Network and Service Management Software Security Feature Pack 1 The IT and network organizations within enterprises are challenged more than ever to serve users with
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationChapter 46 Link Layer Discovery Protocol (LLDP)
Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9
More informationConfigure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones
More informationConfiguring PROFINET
CHAPTER 9 This chapter describes how to configure the PROFINET feature on the Cisco IE 3000 switch. Understanding PROFINET, page 9-1, page 9-4 Displaying the PROFINET Configuration, page 9-5 Troubleshooting
More informationCarrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
More informationLink Layer Discovery Protocol
12 Link Layer Discovery Protocol Contents Overview..................................................... 12-2 LLDP..................................................... 12-2 LLDP Messages............................................
More informationHigh Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0
High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0 Revision C 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Passive Link State Auto Configuration (A/P)...
More informationLab Testing Summary Report
Lab Testing Summary Report February 2007 Report 070228 Product Category: SMB IP-PBX Vendor Tested: Cisco Systems Product Tested: Cisco Unified Communications 500 Series Key findings and conclusions: Complete
More informationMeraki Stacking. White Paper
White Paper Meraki Stacking OCTOBER 2015 This document describes the benefits of Meraki Stacking technology and how it can be used to manage a distributed network. In addition, this document will cover
More informationAdvanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
More informationSummitStack in the Data Center
SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution that Extreme Networks offers a highly virtualized, centrally manageable
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationCisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
More informationPhysical Infrastructure Management Solutions
Physical Infrastructure Management Solutions Physical Infrastructure Challenges Require Innovative Solutions The Need for In-Depth Network Intelligence. With increased acceptance of virtualization, cloud
More informationLab Testing Summary Report
Lab Testing Summary Report November 2011 Report 111018 Product Category: Supervisor Engine Vendor Tested: Product Tested: Catalyst 4500E Supervisor Engine 7L-E Key findings and conclusions: Cisco Catalyst
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationVirtual Stacking. White Paper
White Paper Virtual Stacking November 2012 This document describes the benefits of Meraki s Virtual Stacking technology and how you can use it to manage a distributed network. In addition, this document
More informationLink Layer Discovery Protocol and MIB
Link Layer Discovery Protocol and MIB v0.0 Paul Congdon 3/7/02 Acknowledgements This document is heavily leveraged from an Internet-Draft developed for the IETF PTOPO working group. The original draft,
More informationThe WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
More informationLANs and VLANs A Simplified Tutorial
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
More informationCurrent Trends of Topology Discovery in OpenFlow-based Software Defined Networks
1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion
More informationSFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
More informationnetwork infrastructure: getting started with VoIP
hp procurve networking business may 2003 network infrastructure: getting started with VoIP technical brief table of contents introduction 2 network optimization for VoIP 2 bandwidth provisioning 3 end-to-end
More informationExample: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure
More informationThe Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial
More informationMeeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE
White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.
More informationCONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist
CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11
More informationVLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
More informationFibre Channel over Ethernet: Enabling Server I/O Consolidation
WHITE PAPER Fibre Channel over Ethernet: Enabling Server I/O Consolidation Brocade is delivering industry-leading oe solutions for the data center with CNAs, top-of-rack switches, and end-of-row oe blades
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
More informationHP Networking and Aastra
HP Networking and Aastra Solution whitepaper Table of contents Executive Summary... 2 Introduction... 3 HP Networking and Aastra: A true alliance... 4 Commitment to open standards... 4 Session Initiation
More informationMLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter
More informationJuniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results September 25, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between
More informationHow To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
More informationCombining Voice over IP with Policy-Based Quality of Service
TechBrief Extreme Networks Introduction Combining Voice over IP with Policy-Based Quality of Service Businesses have traditionally maintained separate voice and data networks. A key reason for this is
More informationConfiguring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationEmpirix OneSight for VoIP: Avaya Aura Communication Manager
Datasheet Empirix OneSight for VoIP: Avaya Aura Communication Manager Perform. Increase visibility and ensure the availability and quality of critical communications systems. Benefits Speed the deployment
More informationApple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
More informationManagement Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
More informationSetting up of a Wireless Distribution System (WDS)
Setting up of a Wireless Distribution System (WDS) - a user s perspective Sudipto Das Co worker: Rajesh Roy Department of Computer Science & Engineering Jadavpur University Kolkata 32 {sudipto.das,rajesh.roy}@rediffmail.com
More informationConfiguring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationJuniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationAvaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationExtreme Physical Security
Extreme Networks White Paper Extreme Physical Security Abstract Extreme Networks takes a holistic view of the Physical Security market, leveraging Ethernet technology and features with go-to-market sellers
More information640-460. IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo. Page <<1/9>>
640-460 IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo Page 1. You are CCNA VOICE associate in XXXX.com. You need configure a voice port that will allow the gateway to
More informationExtreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER
Extreme Networks: Building Cloud-Scale Networks Using Open Fabric Architectures A SOLUTION WHITE PAPER WHITE PAPER Building Cloud- Scale Networks Abstract TABLE OF CONTENTS Introduction 2 Open Fabric-Based
More informationOptimizing Networks for NASPI
Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks
More informationJuniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
More informationCisco EtherSwitch Network Modules
Cisco EtherSwitch Network Modules 16- and 36-Port 10/100 Ethernet Modules for Cisco 2600/2800/3600/3700/3800 Series Routers Figure 1. Cisco 16-Port and 36-Port EtherSwitch Network Modules The Cisco 16-
More informationConfiguration Management: Best Practices White Paper
Configuration Management: Best Practices White Paper Document ID: 15111 Contents Introduction High Level Process Flow for Configuration Management Create Standards Software Version Control and Management
More informationThe Four Pillar Strategy for Next Generation Data Centers
The Four Pillar Strategy for Next Generation Data Centers Abstract: The transformation from a dedicated, or siloed, application-specific infrastructure to a shared and outsourced cloud infrastructure is
More informationAvaya Fabric Attach. avaya.com 1. Table of Contents. Fabric Attach the Ecosystem and Solution
Avaya Fabric Attach Table of Contents Fabric Attach the Ecosystem and Solution... 1 Fabric Attach Avaya Identity Engines with an FA solution... 2 Fabric Attach the key elements... 3 Fabric Attach in an
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informationData Center Manager (DCM)
DATA SHEET Data Center Manager (DCM) Unified Virtual/Physical Data Center Fabric Management Benefits LOWER OPERATIONAL COSTS High degree of automation within physical and virtual environments to streamline
More informationAuditing the LAN with Network Discovery
Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationFocused Vendor Module Avaya Aura Communication Manager (ACM)
Focused Vendor Module Avaya Aura Communication Manager (ACM) A CTiQ FVM operates like a team of highly skilled engineers. SYSTEM OVERVIEW: HOW THE ACM FVM FITS Focused Vendor Modules (FVMs) THE BRIDGE
More informationEVALUATING INDUSTRIAL ETHERNET
EVALUATING INDUSTRIAL ETHERNET WHAT IS STANDARD? Written by: Shuo Zhang Networks Marketing Rockwell Automation As industrial automation systems evolve, industrial Ethernet is becoming increasingly popular
More informationThis document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
More informationOracle Communications Network Discovery Overview. Updated June 2007
Oracle Communications Network Discovery Overview Updated June 2007 Oracle Communications Network Discovery Overview Oracle Communications Network Discovery provides automated discovery of the network including
More informationRidgeline Network and Service Management Software
Extreme Networks Data Sheet Ridgeline Network and Service Management Software IT and network management are challenged more than ever to serve end users with a diverse set of applications and service requirements.
More informationCisco Configuration Assistant
Cisco Configuration Assistant Configuring a Small Business s Entire Routing, Switching, Wireless, Security, and Voice Network with a Single, Easy-to-Use Tool. Today s businesses depend more than ever on
More informationRidgeline Network and Service Management Software
Extreme Networks Data Sheet Ridgeline Network and Service Management Software IT and network management are challenged more than ever to serve end users with a diverse set of applications and service requirements.
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationContents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
More informationProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
More informationThe Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions
The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone
More informationExpert Reference Series of White Papers. The Evolution of Cisco Switching
Expert Reference Series of White Papers The Evolution of Cisco Switching 1-800-COURSES www.globalknowledge.com The Evolution of Cisco Switching Joe Rinehart, MBA, CCIE #14256, CCNP/DP/VP Introduction Cisco
More informationData Center Solutions
Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying
More informationObjectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
More informationMeraki MS22 / MS42 Cloud Managed Gigabit PoE Switch Family
DATASHEET Meraki MS22 / MS42 Cloud Managed Gigabit PoE Switch Family Overview The Meraki MS line of cloud-managed access switches bring the benefits of cloud computing, including management simplicity,
More information