UNDERSTANDING ETHERNET RING PROTECTION SWITCHING FOR CARRIER NETWORKS
|
|
- Nicholas Hamilton
- 7 years ago
- Views:
Transcription
1 UNERSTNING ETHERNET RING PROTETION SWITHING FOR RRIER NETWORKS RMSTRONG MTHIYLGN ssistant Vice President, Technology, ricent RJESH KUMR SUNRRJN ssistant Vice President, Product Management, ricent EMREEN F. XVIER Technical Leader, ricent YRLG KISHORE KUMR Principal Systems Engineer, ricent
2 UNERSTNING ETHERNET RING PROTETION SWITHING FOR RRIER NETWORKS Ethernet Ring Protection Switching (ERPS), as defined in the G.8032 recommendation, is an effort from the ITU-T to provide a highly reliable and stable protection mechanism for Ethernet ring networks. It helps transport-network operators design resilient networks with very high quality of service (QoS) characteristics and service level agreements (SLs). Link failures are a common occurrence in networking, so many methods exist to improve network reliability in the event of connectivity loss between network elements. SONET (Synchronous Optical Network) or SH (Synchronous igital Hierarchy) ring is an example of a self-healing network technology that provides a high level of protection in data broadband networks. RPR (Resilient Packet Ring), defined in IEEE , is another technology for the optimized transport of data traffic over optical fiber ring networks that provides a resilience similar to that of SONET/SH rings. With the increasing use of Ethernet in carrier networks, as an alternative to SONET/SH, it is necessary to define similar resiliency mechanisms tailored to Ethernet. The G.8032 recommendation from the ITU-T is a practical and economical mechanism to meet this objective. INTROUTION TO ERPS The ring is a popular topology employed in networks to provide redundant path connectivity between nodes. t the same time, because the ring provides an alternative path between nodes, loops exist in the network. Therefore, the key to using the ring topology in networks has been to harness the redundancy when required while avoiding loops. These very same principles lie at the core of the ITU-T G.8032 Ethernet Ring Protection Switching (ERPS) recommendation. n Ethernet ring consists of ring nodes that form a closed physical loop. Each ring node is connected to two adjacent Ethernet ring nodes via a duplex communications facility. Loop formation in the ring is avoided by ensuring that, at any time, traffic may flow through all but one of the links in the ring. This particular link, through which traffic is normally not allowed to flow, is called the Ring Protection Link (RPL). Under normal conditions, when there are no failures in the ring, the RPL is blocked and therefore does not allow any traffic flow. The node where the RPL is configured is called the RPL owner. The port on the RPL owner, to which the RPL is connected, is called the RPL port. The node, adjacent to the RPL owner node and connected to the RPL owner node through the RPL, is called the RPL neighbor. The RPL owner blocks or unblocks the port connected to the RPL. The RPL neighbor may also participate in blocking or unblocking its end of the RPL. 1
3 Figure 1 shows the converged ring under normal conditions with traffic blocked on the RPL. Figure 1: Loop avoidance by blocking RPL under normal conditions In Figure 1, nodes,,, and form a ring. Node is the RPL owner, and the RPL port is Port of Node, and is blocked to avoid the traffic flow. Figure 2 shows the converged ring under normal conditions with both the RPL owner and the RPL neighbor blocking traffic to the RPL. RPL Neighbor Figure 2: Loop avoidance by RPL owner and RPL neighbor blocking RPL under normal conditions In Figure 2, nodes,,, and form a ring. Node is the RPL owner, and the RPL port in node is. Node is the RPL neighbor and port in Node is the RPL neighbor port. Under normal condition, of node and of Node go to a blocking state. allowing traffic flow into it, upon failure of any of the other links or nodes, constitutes protection switching and provides protection to the traffic between the nodes. This mechanism for protection switching being handled by the nodes with no administrator or operator intervention, like with the techniques described in this paper, is known as utomatic Protection Switching (PS). When applied to a ring, it becomes Ring-PS (R-PS) Each node monitors connectivity to its neighbor through the link connecting them. The messages for monitoring and coordination of the PS actions use a dedicated VLN called the R-PS VLN. node triggers the protection switching when it encounters one of the following conditions: > The node detects loss of connectivity on one of the links connected to it > n administrator issues an explicit command to block another link and to move the traffic to the RPL (there are 2 different variations of this situation, called Forced Switch and Manual Switch, which will be covered later in this whitepaper) > When a previous condition of connectivity loss is corrected and connectivity is re-established PROTETION SWITHING ON ETETION OF ONNETIVITY LOSS The nodes on either end of each link send periodic connectivity check messages to each other. The nodes use the lack of reception of such connectivity check messages to detect loss of connectivity. Such a failure of a link, or node, in the ring, results in traffic being switched (protection switched) into the RPL. The RPL owner is responsible for unblocking the RPL, thereby allowing the RPL to be used for traffic. The failed link is blocked in order to avoid loop formation in the event that the failed link becomes functional at any time. In Figure 3, failure of the link between nodes and results in unblocking of the RPL while the ring converges, as shown below. PROTETION SWITHING In Figure 1 and Figure 2, traffic can flow from any of the nodes to any other node through any of the links other than the RPL. The RPL alone does not have any traffic flow. loop is avoided by preventing traffic flow to the RPL. The RPL is maintained ready to be brought into service if any of the other links fail. In the event that one of the other links fails, or if a node fails and the connectivity between two other nodes is thereby lost, the RPL owner and RPL neighbor, after following a protocol, start allowing traffic flow into the RPL. This action of activating the RPL and Figure 3: In the event of failure, RPL link opened up to provide connectivity 2
4 MINISTRTOR-INITITE PROTETION SWITHING network operator can manually trigger the traffic redirection instead of it being triggered by a connectivity failure. This is done by a forced switch or manual switch command, which is useful in situations like maintenance operations or repair. When the administrator issues a forced switch or manual switch command on a specific port at a given node, the node places the administrator-specified port into a blocked state. ased on the protocol working, the RPL owner then unblocks the RPL to allow it thereby allowing the RPL to be used for traffic flow. pplying a force switch in of Switch results in the unblocking of the RPL and the ring converging as shown below. Non-Revertive Mode In the non-revertive mode of operation, when the failed link recovers, the RPL link remains unblocked and one of the failed ports remains in a blocked state. In situations where there is no advantage in immediately reverting to the normal working transport entities, such a mode is preferred. In this case, a second traffic interruption is avoided by not reverting the protection switching. Figure 5: Protection switching on signal recovery in non-revertive mode In the figure above, Nodes,,, and form a ring. Node is the RPL owner and the RPL port in node is. When the link between and fails and then recovers, one of the failed ports (the highest priority port) remains in a blocked state. The RPL port remains in an unblocked state. Figure 4: On initiation of force switch by operator, RPL link opens up to provide connectivity In the figure above, Nodes,,, and form a ring. Node is the RPL owner, and the RPL port in node is. When the forced switch is applied on port of Node, the port is moved to a blocked state and the RPL port ( of Node ) moves to an unblocked state. PROTETION SWITHING ON REOVERY FROM LOSS OF ONNETIVITY fter a protection switching action, when the failed link has been repaired, there is once again a potential loop in the network. This is avoided by the nodes detecting the recovery, and blocking either the repaired link or the RPL, resulting in two possible modes of operation for the ring: > Revertive Mode > Non-Revertive Mode Revertive Mode In the revertive mode of operation, when a failed link recovers, the RPL is blocked and the failed link is unblocked to start carrying traffic. espite it causing an additional momentary traffic interruption, the revertive mode may be desirable in situations where the working transport entity resources can be more optimized. ERPS IN SUTENE (INTERONNETE) RINGS ERPS also supports the protection of services that traverse through interconnected rings. Interconnected rings can be formed using single or dual ring nodes, or a multi-ring/ladder network that consists of conjoined Ethernet rings. For interconnected rings, the protection mechanism ensures that no super loop is formed when there is a link failure between the ring nodes. The protection mechanism specified in the G.8032/Y.1344 standard protects interconnected rings according to the following principles: > R-PS VLNs are not shared across ring interconnections > Traffic and R-PS channel of each link should be controlled (for blocking or flushing) by the ERP control process of only one ring > Each ring or sub-ring must have its own RPL The following figure represents an example of a topology composed of interconnected rings: Ring 1 and Ring 2. The link between the two interconnected nodes is under the control of the ERP control processes of the ring that it is configured to be a part of. In the example below, the ring link between nodes and is under the control of Ring 1. Failure of the link between the interconnected nodes triggers the protection switching event on the ring that contains this link. The sub-ring is not aware of the failure. 3
5 E P3 Ring 1 Ring 2 P3 F Figure 6: In the figure above, Nodes,,, and form the main ring. Node is the RPL owner and the RPL port in node is. Ring 2 is the sub-ring and consists of ring links ->E->F->. The RPL port of Ring 2 is of Node E and Node E is the RPL owner. ETHERNET RING PROTETION USING RING INSTNES FOR LO LNING Multiple logical ERP ring instances may be supported over a single physical ring. For example, traffic belonging to one VLN may be routed in one direction while traffic belonging to a second VLN may be routed in the opposite direction. When multiple ring instances are configured in a ring, some traffic can pass through one path while other traffic can choose a different path. This division of ring traffic supports load balancing in the system. When ring instances are configured for the ring, each ring instance should have its own RPL owner, RPL neighbor, and R-PS VLN. ERPS VERSION 1 N VERSION 2 The ITU-T first standardized the G.8032 in Today it is known as v1 or version 1 of the standard. Subsequently, more facilities have been incorporated based on feedback from network operators and designers. n updated version of the G.8032 was standardized in 2010, which is now known as v2 or version 2 of the standard. Key improvements and enhancements in ERPS version 2 from version 1 include: > Non-revertive mode of operation (version 1 specifies only the revertive mode of operation) > Forced Switch command for administrators > Manual Switch command for administrators > Increased support for ERP instances to protect multiple logical rings > dditional methods for minimizing segmentation of interconnected rings ERPS N RSTP The Rapid Spanning Tree Protocol (RSTP) and its multipleinstance version Multiple Spanning Tree Protocol (MSTP) are similar protocols to the ERPS and have been serving enterprise networks satisfactorily for many years now. From a protocol perspective, at their core, RSTP and MSTP are based on the same underlying principles as ERPS: (a) providing alternative redundant paths in a network and (b) loop avoidance. So how necessary is ERPS, and can RSTP or MSTP be used instead because they are already widely deployed? oth ERPS and STP are loop-avoidance protocols, but the protection switching performance of ERPS is much better when compared to STP. RSTP and MSTP were developed for a more generic topology than a simple ring. The protocol, therefore, has overheads to deal with complex topologies, and are unnecessary in a simple ring topology. For these reasons, RSTP or MSTP need more time to re-build network topology because they each use various parameters to re-calculate alternate paths. ecause the G.8032 does away with these overheads, and is specifically optimized for ring topologies, the ERPS protocol provides better protection switching performance and much greater levels of availability in carrier networks. ERPS can efficiently and predictably deliver sub- 50-millisecond protection switching, which is not the case with RSTP or MSTP. RIENT ERPS s part of its comprehensive portfolio of networking products, ricent offers a licensable software implementation of the G.8032 specification for ERPS. ricent ERPS is available for licensing as an individual component that can be easily integrated into networking products. It is also available as an integrated part of ricent s industry leading Intelligent 4
6 Element Management Redundancy Framework onnectivity/ Fault Management Example Multi-board System Framework ricent ERPS OS bstraction Layer Hardware bstraction Layer OS Switching Silicon river or ata Path Figure 7: ricent s ERPS in a Switch Stack rchitecture Switching Solution (ISS) for a variety of networking products catering to arrier Ethernet and Metro Ethernet applications. The software is implemented with clearly defined interfaces to other components in the switch, including abstraction layers to the operating system and switching silicon interfaces, allowing a developer or system integrator to integrate it easily. In addition to the mechanism in the G.8032 standard, ricent ERPS implements multiple additional features and extensions to build highly scalable, resilient, and fault-tolerant networks. These include: > Extensive support for configuration and management > Extensions to the protocol for highly available redundancy > Extensions for working on systems composed of multiple individual switching units > Extensions for functioning in a distributed environment, harnessing processing power from multiple PUs View for an overview of ricent ERPS. Network equipment manufacturers can use proven and tested components like ricent ERPS to reduce technology complexity and to optimize product development cycles, thereby accelerating time to market with reduced costs, ONLUSION Implementation of protection switching allows carrier Ethernet networks to meet higher levels of fault tolerance, resilience, and service-level agreement satisfaction. Protection switching in Ethernet networks with ring topologies can be efficiently implemented based on the ITU-T G.8032 specification. 5
7 RMSTRONG MTHIYLGN is ssistant Vice President, Technology, for ata ommunication products at ricent, focusing on routing and switching solutions, including ricent s ISS. He has over 18 years of experience in architecting software for switching, routing, arrier and Metro Ethernet. armstrong.m@aricent.com EMREEN F. XVIER is a Technical Leader for ata ommunication products at ricent, focusing on ricent s ISS. She has over 6 years of experience in the datacom domain including development and implementation of networking protocols. emreen.xavier@aricent.com RJESH KUMR SUNRRJN is ssistant Vice President for ata ommunication products at ricent, focusing on routing and switching solutions including ricent s ISS. He has over 16 years of industry experience in strategizing and managing software for communications. YRLG KISHORE KUMR is a Principle Systems Engineer for ata ommunication products at ricent, focusing on routing and switching solutions including ricent s ISS. He has over 11 years of experience in developing software for switching, routing, security, arrier and Metro Ethernet. yarlagadda.kumar@aricent.com 6
8 INNOVTION SERVIES FOR THE ONNETE WORL The ricent Group is a global innovation and technology services company that helps clients imagine, commercialize, and evolve products and services for the connected world. ringing together the communications technology expertise of ricent with the creative vision and user experience prowess of frog, the ricent Group provides a unique portfolio of innovation capabilities that seamlessly combines consumer insights, strategy, design, software engineering, and systems integration. The client base includes communications service providers, equipment manufacturers, independent software vendors, device makers, and many other Fortune 500 brands. The company s investors are Kohlberg Kravis Roberts & o., Sequoia apital, The Family Office, elta Partners, and The anadian Pension Plan Investment oard.
9 aricent.com 2012 ricent Group. ll rights reserved. ll ricent brand and product names are service marks, trademarks, or registered marks of ricent Inc. in the United States and other countries.
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper
More informationG.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15
G.80 Ethernet Ring Protection Overview March, 008 ITU-T Q9 SG 5 genda G.80 Recommendation Introduction G.80 Objectives and Principles G.80 Concepts G.80 Protection Switching G.80 R-PS Messages G.80 Items
More informationEthernet Ring Protection for Carrier Ethernet Networks
Ethernet Ring Protection for Carrier Ethernet Networks Jeong-dong Ryoo, ETRI Hao Long and Yang Yang, Huawei Technologies Marc Holness, Nortel Networks Zahir Ahmad and J. Kevin Rhee, Information and Communications
More informationAPPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS
APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS SARO VELRAJAN Director of Technology, Aricent APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS Service providers are constantly exploring avenues
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationCONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist
CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11
More informationEthernet Fabrics: An Architecture for Cloud Networking
WHITE PAPER www.brocade.com Data Center Ethernet Fabrics: An Architecture for Cloud Networking As data centers evolve to a world where information and applications can move anywhere in the cloud, classic
More informationFailsafe Protection for Utility Critical Infrastructure
Failsafe Protection for Utility Critical Infrastructure Introduction PUCs maintain a crucial part of the nation s CI that provide essential services to the public, business and government. Reliable CI
More informationEVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
More informationEthernet The Next Generation WAN Transport Technology
White Paper Ethernet The Next Generation WN Transport Technology May 2002 Table of ontents 1.0 Ethernet Transport and its Service Technology...2 3.0 WN: Ethernet s Final Frontier...3 4.0 Ethernet as a
More informationIndustrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards
Redundancy = Protection from Network Failure. Redundancy Standards WP-31-REV0-4708-1/5 Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards For a very
More informationSystems Integration Track: Network Topology
Systems Integration Track: Network Topology Author Jim W. Hammond Technical Consultant, GarrettCom Keywords: Ring, Topology, RSTP, Ethernet, Network, VLAN Industrial networks, like most large networks,
More informationVirtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
More informationCHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
More informationChapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
More informationHow To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP
How To Configure Multiple Spanning Tree Protocol (MSTP) Introduction This document provides configuration examples and guidelines for configuring Multiple Spanning Tree Protocol on Allied Telesyn switches.
More informationSolutions Guide. High Availability IPv6
Solutions Guide High Availability IPv6 Introduction The Internet has forever changed contemporary society, with online access an integral part of our 21st century lifestyles. Finding out what movie is
More informationLeveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy
Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy Creating More Efficient and Connected Wind Turbines By: Brian Roth, Product Marketing Engineer February 1, 2016 Leveraging
More informationAdapting MPLS Fast Reroute to Create Resilient Rings
Adapting LS Fast Reroute to Create Resilient Rings Ahmed Abdelhalim Foundry Networks www.mpls.jp Ring Topology: Multiple Scenarios, Multiple Technologies Backbone Backbone Access Cost effective design
More informationNetwork Structure or Topology
Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik
More informationRedundant Serial-to-Ethernet Data Connections for Mission-critical Devices
Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since
More informationResiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
More informationInfrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch
Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
More informationThe functionality and advantages of a high-availability file server system
The functionality and advantages of a high-availability file server system This paper discusses the benefits of deploying a JMR SHARE High-Availability File Server System. Hardware and performance considerations
More informationOAM Operations Administration and Maintenance
OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label
More informationTRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
More informationData Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
More informationSwitching in an Enterprise Network
Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of
More informationSolutions Guide. Resilient Networking with EPSR
Solutions Guide Resilient Networking with EPSR Introduction IP over Ethernet is now a well-proven technology in the delivery of converged services. Ethernet-based Triple-Play services have become an established
More informationDell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More informationMulti-Chassis Trunking for Resilient and High-Performance Network Architectures
WHITE PAPER www.brocade.com IP Network Multi-Chassis Trunking for Resilient and High-Performance Network Architectures Multi-Chassis Trunking is a key Brocade technology in the Brocade One architecture
More informationVMware Virtual SAN Network Design Guide TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER Table of Contents Intended Audience.... 3 Overview.... 3 Virtual SAN Network... 3 Physical Network Infrastructure... 4 Data Center Network... 4 Host Network Adapter.... 5 Virtual
More informationWHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1
WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive
More informationDEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING
DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING
More informationObjectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged
More informationThe Economics of Cisco s nlight Multilayer Control Plane Architecture
The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,
More informationReducing the Risk, Cost and Frequency of Production Stoppages Using Network Redundancy
Introduction Reducing the Risk, Cost and Frequency of Production Stoppages Using Network Redundancy By Mike Miclot, Vice President of Marketing, Industrial Solutions Division at Belden and John Mower,
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationObjectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
More informationIP SAN BEST PRACTICES
IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...
More informationFiber Distributed Data Interface
CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI
More informationVoice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
More informationEMC Data Domain Boost and Dynamic Interface Groups
EMC Data Domain Boost and Dynamic Interface Groups Maximize the Efficiency of Multiple Network Interfaces ABSTRACT EMC delivers dynamic interface groups to simplify the use of multiple network interfaces
More informationNon-blocking Switching in the Cloud Computing Era
Non-blocking Switching in the Cloud Computing Era Contents 1 Foreword... 3 2 Networks Must Go With the Flow in the Cloud Computing Era... 3 3 Fat-tree Architecture Achieves a Non-blocking Data Center Network...
More informationAPPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
More informationExpert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center
Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center info@globalknowledge.net www.globalknowledge.net Planning for the Redeployment of
More informationBroadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
More informationH3C SR8800 RPR Technology White Paper
H3C 00 RPR Technology White Paper Keywords: RPR, IP ring network Abstract: Resilient Packet Ring (RPR) is an international standard for establishing IP ring networks, offering a highly efficient and reliable
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationJuniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationSolutions Focus: IPTV
Zhone delivers the world s most complete IPTV solutions MALC offers more provisioning options for multicast, more capability for mixed multicast and unicast video, and more fiber and copper subscriber
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationThe Edge-Core Networks ISP/Metro Ethernet Solution:
The Edge-Core Networks ISP/Metro Ethernet Solution: Achieving Performance and Reliability through the Use of Standard Protocols Alessandro Fiaschi alessandro_fiaschi@edge-core.com What we provide now Edge-Core
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More informationContents. Load balancing and high availability
White Paper Load Balancing in GateDefender Performa The information contained in this document represents the current view of Panda Software International, S.L on the issues discussed herein as of the
More informationData Center Fabrics and Their Role in Managing the Big Data Trend
Data Center Fabrics and Their Role in Managing the Big Data Trend The emergence of Big Data as a critical technology initiative is one of the driving factors forcing IT decision-makers to explore new alternatives
More informationAT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60
More informationCisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
More informationHow To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
More informationProvider Backbone Bridging Traffic Engineering of Carrier Ethernet Services
Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology,
More informationJuniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
More informationBrocade VCS Fabrics: The Foundation for Software-Defined Networks
WHITE PAPER DATA CENTER Brocade VCS Fabrics: The Foundation for Software-Defined Networks Software-Defined Networking (SDN) offers significant new opportunities to centralize management and implement network
More informationLinear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III
Electric Drives and Controls Hydraulics Linear Motion and Assembly Technologies Pneumatics Service profile Drive & Control Industrial Ethernet: The key advantages of SERCOS III SERCOS III is the open,
More informationTRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview
More informationUsing & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
More informationWhite paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
More informationHARTING Ha-VIS Management Software
HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded
More informationNetwork Virtualization
Network Virtualization Petr Grygárek 1 Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on shared physical infrastructure Total
More informationVMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R
VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage
More informationAbstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.
Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application
More informationA dual redundant SIP service. White paper
A dual redundant SIP service White paper Ian Colville, Product Manager, Aculab Introduction The Session Initiation Protocol (SIP) eco-system: a unit of interdependent protocols functioning together within
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationRedundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks
Adds Speed and Reliability to Industrial Networks by Harry Hsiao, MOXA Product Manager harry.hsiao@moxa.com Introduction Gigabit network applications are becoming more and more popular in the modern networking
More informationCisco Virtual SAN Advantages and Use Cases
Cisco Virtual SAN Advantages and Use Cases The Challenge Application data is accumulating at an increasingly fast pace, and to control costs, IT departments are looking at the benefits of economies of
More informationRing Protection: Wrapping vs. Steering
Ring Protection: Wrapping vs. Steering Necdet Uzun and Pinar Yilmaz March 13, 2001 Contents Objectives What are wrapping and steering Single/dual fiber cut Comparison of wrapping and steering Simulation
More informationTechnical Specification MEF 2. Requirements and Framework for Ethernet Service Protection in Metro Ethernet Networks. Feb 8, 2004
Technical Specification Requirements and Framework for Ethernet Service Protection in Metro Ethernet Networks Feb 8, 2004 Disclaimer The information in this publication is freely available for reproduction
More informationTÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical
More informationDual Chassis Fault and the Advantages of Designing a SS7 Network
Achieving dual chassis fault tolerance for SS7 solutions White paper Ian Colville, Product Manager, Aculab Introduction When deploying equipment onto public telephony networks, operators and service providers
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationFlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology. August 2011
FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology August 2011 Page2 Executive Summary HP commissioned Network Test to assess the performance of Intelligent Resilient
More informationThe Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
More informationBroadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.
Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about
More informationWhitepaper. 802.11n The Next Generation in Wireless Technology
Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More informationITU-T G.8032 Ethernet Ring Protection Switching
The feature implements protection switching mechanisms for Ethernet layer ring topologies. This feature uses the G.8032 Ethernet Ring Protection (ERP) protocol, defined in ITU-T G.8032, to provide protection
More informationHow To. Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops. Introduction
How To Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops Introduction Putting a ring of Ethernet switches at the core of a network is a simple way to increase the network
More informationWDM Passive Optical Networks: Protection and Restoration
OECC 2009 Workshop: Next-generation Broadband Optical Access Future Challenges Session 1: Broadband Network Architectures, WDM PON Evolution Strategies and Future Ultra-high- bandwidth Services WDM Passive
More informationSTATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS Supervisor: Prof. Jukka Manner Instructor: Lic.Sc. (Tech) Markus Peuhkuri Francesco Maestrelli 17
More informationContents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
More informationNetwork Design. Yiannos Mylonas
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
More informationHow to Monitor a FabricPath Network
How to Monitor a FabricPath Network an owiasz Mar., 0 enefits Monitor FabricPath and other physical networks with one solution Preserve tool investment, increase tool allocation and use Increase network
More informationMRV EMPOWERS THE OPTICAL EDGE.
Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com
More informationCORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based
More informationFlush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection
lush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection Kwang-Koog Lee and Jeong-dong Ryoo Ethernet ring protection (ERP) technology, which is defined in ITU-T Recommendation
More informationCourse 12 Synchronous transmission multiplexing systems used in digital telephone networks
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the
More informationRESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, igregr@fit.vutbr.cz Campus Best Practices - Resilient network design Campus
More informationHow To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
More information