UNDERSTANDING ETHERNET RING PROTECTION SWITCHING FOR CARRIER NETWORKS

Size: px
Start display at page:

Download "UNDERSTANDING ETHERNET RING PROTECTION SWITCHING FOR CARRIER NETWORKS"

Transcription

1 UNERSTNING ETHERNET RING PROTETION SWITHING FOR RRIER NETWORKS RMSTRONG MTHIYLGN ssistant Vice President, Technology, ricent RJESH KUMR SUNRRJN ssistant Vice President, Product Management, ricent EMREEN F. XVIER Technical Leader, ricent YRLG KISHORE KUMR Principal Systems Engineer, ricent

2 UNERSTNING ETHERNET RING PROTETION SWITHING FOR RRIER NETWORKS Ethernet Ring Protection Switching (ERPS), as defined in the G.8032 recommendation, is an effort from the ITU-T to provide a highly reliable and stable protection mechanism for Ethernet ring networks. It helps transport-network operators design resilient networks with very high quality of service (QoS) characteristics and service level agreements (SLs). Link failures are a common occurrence in networking, so many methods exist to improve network reliability in the event of connectivity loss between network elements. SONET (Synchronous Optical Network) or SH (Synchronous igital Hierarchy) ring is an example of a self-healing network technology that provides a high level of protection in data broadband networks. RPR (Resilient Packet Ring), defined in IEEE , is another technology for the optimized transport of data traffic over optical fiber ring networks that provides a resilience similar to that of SONET/SH rings. With the increasing use of Ethernet in carrier networks, as an alternative to SONET/SH, it is necessary to define similar resiliency mechanisms tailored to Ethernet. The G.8032 recommendation from the ITU-T is a practical and economical mechanism to meet this objective. INTROUTION TO ERPS The ring is a popular topology employed in networks to provide redundant path connectivity between nodes. t the same time, because the ring provides an alternative path between nodes, loops exist in the network. Therefore, the key to using the ring topology in networks has been to harness the redundancy when required while avoiding loops. These very same principles lie at the core of the ITU-T G.8032 Ethernet Ring Protection Switching (ERPS) recommendation. n Ethernet ring consists of ring nodes that form a closed physical loop. Each ring node is connected to two adjacent Ethernet ring nodes via a duplex communications facility. Loop formation in the ring is avoided by ensuring that, at any time, traffic may flow through all but one of the links in the ring. This particular link, through which traffic is normally not allowed to flow, is called the Ring Protection Link (RPL). Under normal conditions, when there are no failures in the ring, the RPL is blocked and therefore does not allow any traffic flow. The node where the RPL is configured is called the RPL owner. The port on the RPL owner, to which the RPL is connected, is called the RPL port. The node, adjacent to the RPL owner node and connected to the RPL owner node through the RPL, is called the RPL neighbor. The RPL owner blocks or unblocks the port connected to the RPL. The RPL neighbor may also participate in blocking or unblocking its end of the RPL. 1

3 Figure 1 shows the converged ring under normal conditions with traffic blocked on the RPL. Figure 1: Loop avoidance by blocking RPL under normal conditions In Figure 1, nodes,,, and form a ring. Node is the RPL owner, and the RPL port is Port of Node, and is blocked to avoid the traffic flow. Figure 2 shows the converged ring under normal conditions with both the RPL owner and the RPL neighbor blocking traffic to the RPL. RPL Neighbor Figure 2: Loop avoidance by RPL owner and RPL neighbor blocking RPL under normal conditions In Figure 2, nodes,,, and form a ring. Node is the RPL owner, and the RPL port in node is. Node is the RPL neighbor and port in Node is the RPL neighbor port. Under normal condition, of node and of Node go to a blocking state. allowing traffic flow into it, upon failure of any of the other links or nodes, constitutes protection switching and provides protection to the traffic between the nodes. This mechanism for protection switching being handled by the nodes with no administrator or operator intervention, like with the techniques described in this paper, is known as utomatic Protection Switching (PS). When applied to a ring, it becomes Ring-PS (R-PS) Each node monitors connectivity to its neighbor through the link connecting them. The messages for monitoring and coordination of the PS actions use a dedicated VLN called the R-PS VLN. node triggers the protection switching when it encounters one of the following conditions: > The node detects loss of connectivity on one of the links connected to it > n administrator issues an explicit command to block another link and to move the traffic to the RPL (there are 2 different variations of this situation, called Forced Switch and Manual Switch, which will be covered later in this whitepaper) > When a previous condition of connectivity loss is corrected and connectivity is re-established PROTETION SWITHING ON ETETION OF ONNETIVITY LOSS The nodes on either end of each link send periodic connectivity check messages to each other. The nodes use the lack of reception of such connectivity check messages to detect loss of connectivity. Such a failure of a link, or node, in the ring, results in traffic being switched (protection switched) into the RPL. The RPL owner is responsible for unblocking the RPL, thereby allowing the RPL to be used for traffic. The failed link is blocked in order to avoid loop formation in the event that the failed link becomes functional at any time. In Figure 3, failure of the link between nodes and results in unblocking of the RPL while the ring converges, as shown below. PROTETION SWITHING In Figure 1 and Figure 2, traffic can flow from any of the nodes to any other node through any of the links other than the RPL. The RPL alone does not have any traffic flow. loop is avoided by preventing traffic flow to the RPL. The RPL is maintained ready to be brought into service if any of the other links fail. In the event that one of the other links fails, or if a node fails and the connectivity between two other nodes is thereby lost, the RPL owner and RPL neighbor, after following a protocol, start allowing traffic flow into the RPL. This action of activating the RPL and Figure 3: In the event of failure, RPL link opened up to provide connectivity 2

4 MINISTRTOR-INITITE PROTETION SWITHING network operator can manually trigger the traffic redirection instead of it being triggered by a connectivity failure. This is done by a forced switch or manual switch command, which is useful in situations like maintenance operations or repair. When the administrator issues a forced switch or manual switch command on a specific port at a given node, the node places the administrator-specified port into a blocked state. ased on the protocol working, the RPL owner then unblocks the RPL to allow it thereby allowing the RPL to be used for traffic flow. pplying a force switch in of Switch results in the unblocking of the RPL and the ring converging as shown below. Non-Revertive Mode In the non-revertive mode of operation, when the failed link recovers, the RPL link remains unblocked and one of the failed ports remains in a blocked state. In situations where there is no advantage in immediately reverting to the normal working transport entities, such a mode is preferred. In this case, a second traffic interruption is avoided by not reverting the protection switching. Figure 5: Protection switching on signal recovery in non-revertive mode In the figure above, Nodes,,, and form a ring. Node is the RPL owner and the RPL port in node is. When the link between and fails and then recovers, one of the failed ports (the highest priority port) remains in a blocked state. The RPL port remains in an unblocked state. Figure 4: On initiation of force switch by operator, RPL link opens up to provide connectivity In the figure above, Nodes,,, and form a ring. Node is the RPL owner, and the RPL port in node is. When the forced switch is applied on port of Node, the port is moved to a blocked state and the RPL port ( of Node ) moves to an unblocked state. PROTETION SWITHING ON REOVERY FROM LOSS OF ONNETIVITY fter a protection switching action, when the failed link has been repaired, there is once again a potential loop in the network. This is avoided by the nodes detecting the recovery, and blocking either the repaired link or the RPL, resulting in two possible modes of operation for the ring: > Revertive Mode > Non-Revertive Mode Revertive Mode In the revertive mode of operation, when a failed link recovers, the RPL is blocked and the failed link is unblocked to start carrying traffic. espite it causing an additional momentary traffic interruption, the revertive mode may be desirable in situations where the working transport entity resources can be more optimized. ERPS IN SUTENE (INTERONNETE) RINGS ERPS also supports the protection of services that traverse through interconnected rings. Interconnected rings can be formed using single or dual ring nodes, or a multi-ring/ladder network that consists of conjoined Ethernet rings. For interconnected rings, the protection mechanism ensures that no super loop is formed when there is a link failure between the ring nodes. The protection mechanism specified in the G.8032/Y.1344 standard protects interconnected rings according to the following principles: > R-PS VLNs are not shared across ring interconnections > Traffic and R-PS channel of each link should be controlled (for blocking or flushing) by the ERP control process of only one ring > Each ring or sub-ring must have its own RPL The following figure represents an example of a topology composed of interconnected rings: Ring 1 and Ring 2. The link between the two interconnected nodes is under the control of the ERP control processes of the ring that it is configured to be a part of. In the example below, the ring link between nodes and is under the control of Ring 1. Failure of the link between the interconnected nodes triggers the protection switching event on the ring that contains this link. The sub-ring is not aware of the failure. 3

5 E P3 Ring 1 Ring 2 P3 F Figure 6: In the figure above, Nodes,,, and form the main ring. Node is the RPL owner and the RPL port in node is. Ring 2 is the sub-ring and consists of ring links ->E->F->. The RPL port of Ring 2 is of Node E and Node E is the RPL owner. ETHERNET RING PROTETION USING RING INSTNES FOR LO LNING Multiple logical ERP ring instances may be supported over a single physical ring. For example, traffic belonging to one VLN may be routed in one direction while traffic belonging to a second VLN may be routed in the opposite direction. When multiple ring instances are configured in a ring, some traffic can pass through one path while other traffic can choose a different path. This division of ring traffic supports load balancing in the system. When ring instances are configured for the ring, each ring instance should have its own RPL owner, RPL neighbor, and R-PS VLN. ERPS VERSION 1 N VERSION 2 The ITU-T first standardized the G.8032 in Today it is known as v1 or version 1 of the standard. Subsequently, more facilities have been incorporated based on feedback from network operators and designers. n updated version of the G.8032 was standardized in 2010, which is now known as v2 or version 2 of the standard. Key improvements and enhancements in ERPS version 2 from version 1 include: > Non-revertive mode of operation (version 1 specifies only the revertive mode of operation) > Forced Switch command for administrators > Manual Switch command for administrators > Increased support for ERP instances to protect multiple logical rings > dditional methods for minimizing segmentation of interconnected rings ERPS N RSTP The Rapid Spanning Tree Protocol (RSTP) and its multipleinstance version Multiple Spanning Tree Protocol (MSTP) are similar protocols to the ERPS and have been serving enterprise networks satisfactorily for many years now. From a protocol perspective, at their core, RSTP and MSTP are based on the same underlying principles as ERPS: (a) providing alternative redundant paths in a network and (b) loop avoidance. So how necessary is ERPS, and can RSTP or MSTP be used instead because they are already widely deployed? oth ERPS and STP are loop-avoidance protocols, but the protection switching performance of ERPS is much better when compared to STP. RSTP and MSTP were developed for a more generic topology than a simple ring. The protocol, therefore, has overheads to deal with complex topologies, and are unnecessary in a simple ring topology. For these reasons, RSTP or MSTP need more time to re-build network topology because they each use various parameters to re-calculate alternate paths. ecause the G.8032 does away with these overheads, and is specifically optimized for ring topologies, the ERPS protocol provides better protection switching performance and much greater levels of availability in carrier networks. ERPS can efficiently and predictably deliver sub- 50-millisecond protection switching, which is not the case with RSTP or MSTP. RIENT ERPS s part of its comprehensive portfolio of networking products, ricent offers a licensable software implementation of the G.8032 specification for ERPS. ricent ERPS is available for licensing as an individual component that can be easily integrated into networking products. It is also available as an integrated part of ricent s industry leading Intelligent 4

6 Element Management Redundancy Framework onnectivity/ Fault Management Example Multi-board System Framework ricent ERPS OS bstraction Layer Hardware bstraction Layer OS Switching Silicon river or ata Path Figure 7: ricent s ERPS in a Switch Stack rchitecture Switching Solution (ISS) for a variety of networking products catering to arrier Ethernet and Metro Ethernet applications. The software is implemented with clearly defined interfaces to other components in the switch, including abstraction layers to the operating system and switching silicon interfaces, allowing a developer or system integrator to integrate it easily. In addition to the mechanism in the G.8032 standard, ricent ERPS implements multiple additional features and extensions to build highly scalable, resilient, and fault-tolerant networks. These include: > Extensive support for configuration and management > Extensions to the protocol for highly available redundancy > Extensions for working on systems composed of multiple individual switching units > Extensions for functioning in a distributed environment, harnessing processing power from multiple PUs View for an overview of ricent ERPS. Network equipment manufacturers can use proven and tested components like ricent ERPS to reduce technology complexity and to optimize product development cycles, thereby accelerating time to market with reduced costs, ONLUSION Implementation of protection switching allows carrier Ethernet networks to meet higher levels of fault tolerance, resilience, and service-level agreement satisfaction. Protection switching in Ethernet networks with ring topologies can be efficiently implemented based on the ITU-T G.8032 specification. 5

7 RMSTRONG MTHIYLGN is ssistant Vice President, Technology, for ata ommunication products at ricent, focusing on routing and switching solutions, including ricent s ISS. He has over 18 years of experience in architecting software for switching, routing, arrier and Metro Ethernet. armstrong.m@aricent.com EMREEN F. XVIER is a Technical Leader for ata ommunication products at ricent, focusing on ricent s ISS. She has over 6 years of experience in the datacom domain including development and implementation of networking protocols. emreen.xavier@aricent.com RJESH KUMR SUNRRJN is ssistant Vice President for ata ommunication products at ricent, focusing on routing and switching solutions including ricent s ISS. He has over 16 years of industry experience in strategizing and managing software for communications. YRLG KISHORE KUMR is a Principle Systems Engineer for ata ommunication products at ricent, focusing on routing and switching solutions including ricent s ISS. He has over 11 years of experience in developing software for switching, routing, security, arrier and Metro Ethernet. yarlagadda.kumar@aricent.com 6

8 INNOVTION SERVIES FOR THE ONNETE WORL The ricent Group is a global innovation and technology services company that helps clients imagine, commercialize, and evolve products and services for the connected world. ringing together the communications technology expertise of ricent with the creative vision and user experience prowess of frog, the ricent Group provides a unique portfolio of innovation capabilities that seamlessly combines consumer insights, strategy, design, software engineering, and systems integration. The client base includes communications service providers, equipment manufacturers, independent software vendors, device makers, and many other Fortune 500 brands. The company s investors are Kohlberg Kravis Roberts & o., Sequoia apital, The Family Office, elta Partners, and The anadian Pension Plan Investment oard.

9 aricent.com 2012 ricent Group. ll rights reserved. ll ricent brand and product names are service marks, trademarks, or registered marks of ricent Inc. in the United States and other countries.

WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED

WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper

More information

G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15

G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15 G.80 Ethernet Ring Protection Overview March, 008 ITU-T Q9 SG 5 genda G.80 Recommendation Introduction G.80 Objectives and Principles G.80 Concepts G.80 Protection Switching G.80 R-PS Messages G.80 Items

More information

Ethernet Ring Protection for Carrier Ethernet Networks

Ethernet Ring Protection for Carrier Ethernet Networks Ethernet Ring Protection for Carrier Ethernet Networks Jeong-dong Ryoo, ETRI Hao Long and Yang Yang, Huawei Technologies Marc Holness, Nortel Networks Zahir Ahmad and J. Kevin Rhee, Information and Communications

More information

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS

APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS SARO VELRAJAN Director of Technology, Aricent APPLICATION-AWARE ROUTING IN SOFTWARE-DEFINED NETWORKS Service providers are constantly exploring avenues

More information

Data Communication Networks and Converged Networks

Data Communication Networks and Converged Networks Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous

More information

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11

More information

Ethernet Fabrics: An Architecture for Cloud Networking

Ethernet Fabrics: An Architecture for Cloud Networking WHITE PAPER www.brocade.com Data Center Ethernet Fabrics: An Architecture for Cloud Networking As data centers evolve to a world where information and applications can move anywhere in the cloud, classic

More information

Failsafe Protection for Utility Critical Infrastructure

Failsafe Protection for Utility Critical Infrastructure Failsafe Protection for Utility Critical Infrastructure Introduction PUCs maintain a crucial part of the nation s CI that provide essential services to the public, business and government. Reliable CI

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Ethernet The Next Generation WAN Transport Technology

Ethernet The Next Generation WAN Transport Technology White Paper Ethernet The Next Generation WN Transport Technology May 2002 Table of ontents 1.0 Ethernet Transport and its Service Technology...2 3.0 WN: Ethernet s Final Frontier...3 4.0 Ethernet as a

More information

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards Redundancy = Protection from Network Failure. Redundancy Standards WP-31-REV0-4708-1/5 Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards For a very

More information

Systems Integration Track: Network Topology

Systems Integration Track: Network Topology Systems Integration Track: Network Topology Author Jim W. Hammond Technical Consultant, GarrettCom Keywords: Ring, Topology, RSTP, Ethernet, Network, VLAN Industrial networks, like most large networks,

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

How To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP

How To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP How To Configure Multiple Spanning Tree Protocol (MSTP) Introduction This document provides configuration examples and guidelines for configuring Multiple Spanning Tree Protocol on Allied Telesyn switches.

More information

Solutions Guide. High Availability IPv6

Solutions Guide. High Availability IPv6 Solutions Guide High Availability IPv6 Introduction The Internet has forever changed contemporary society, with online access an integral part of our 21st century lifestyles. Finding out what movie is

More information

Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy

Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy Leveraging the Industrial Internet of Things (IOT) to Optimize Renewable Energy Creating More Efficient and Connected Wind Turbines By: Brian Roth, Product Marketing Engineer February 1, 2016 Leveraging

More information

Adapting MPLS Fast Reroute to Create Resilient Rings

Adapting MPLS Fast Reroute to Create Resilient Rings Adapting LS Fast Reroute to Create Resilient Rings Ahmed Abdelhalim Foundry Networks www.mpls.jp Ring Topology: Multiple Scenarios, Multiple Technologies Backbone Backbone Access Cost effective design

More information

Network Structure or Topology

Network Structure or Topology Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik

More information

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since

More information

Resiliency in Ethernet Based Transport Networks

Resiliency in Ethernet Based Transport Networks Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol

More information

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

The functionality and advantages of a high-availability file server system

The functionality and advantages of a high-availability file server system The functionality and advantages of a high-availability file server system This paper discusses the benefits of deploying a JMR SHARE High-Availability File Server System. Hardware and performance considerations

More information

OAM Operations Administration and Maintenance

OAM Operations Administration and Maintenance OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

Solutions Guide. Resilient Networking with EPSR

Solutions Guide. Resilient Networking with EPSR Solutions Guide Resilient Networking with EPSR Introduction IP over Ethernet is now a well-proven technology in the delivery of converged services. Ethernet-based Triple-Play services have become an established

More information

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures WHITE PAPER www.brocade.com IP Network Multi-Chassis Trunking for Resilient and High-Performance Network Architectures Multi-Chassis Trunking is a key Brocade technology in the Brocade One architecture

More information

VMware Virtual SAN Network Design Guide TECHNICAL WHITE PAPER

VMware Virtual SAN Network Design Guide TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER Table of Contents Intended Audience.... 3 Overview.... 3 Virtual SAN Network... 3 Physical Network Infrastructure... 4 Data Center Network... 4 Host Network Adapter.... 5 Virtual

More information

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive

More information

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING

More information

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged

More information

The Economics of Cisco s nlight Multilayer Control Plane Architecture

The Economics of Cisco s nlight Multilayer Control Plane Architecture The Economics of Cisco s nlight Multilayer Control Plane Architecture Executive Summary Networks are becoming more difficult to plan and optimize because of high traffic growth, volatile traffic patterns,

More information

Reducing the Risk, Cost and Frequency of Production Stoppages Using Network Redundancy

Reducing the Risk, Cost and Frequency of Production Stoppages Using Network Redundancy Introduction Reducing the Risk, Cost and Frequency of Production Stoppages Using Network Redundancy By Mike Miclot, Vice President of Marketing, Industrial Solutions Division at Belden and John Mower,

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

IP SAN BEST PRACTICES

IP SAN BEST PRACTICES IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone. Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over

More information

EMC Data Domain Boost and Dynamic Interface Groups

EMC Data Domain Boost and Dynamic Interface Groups EMC Data Domain Boost and Dynamic Interface Groups Maximize the Efficiency of Multiple Network Interfaces ABSTRACT EMC delivers dynamic interface groups to simplify the use of multiple network interfaces

More information

Non-blocking Switching in the Cloud Computing Era

Non-blocking Switching in the Cloud Computing Era Non-blocking Switching in the Cloud Computing Era Contents 1 Foreword... 3 2 Networks Must Go With the Flow in the Cloud Computing Era... 3 3 Fat-tree Architecture Achieves a Non-blocking Data Center Network...

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center

Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center info@globalknowledge.net www.globalknowledge.net Planning for the Redeployment of

More information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

H3C SR8800 RPR Technology White Paper

H3C SR8800 RPR Technology White Paper H3C 00 RPR Technology White Paper Keywords: RPR, IP ring network Abstract: Resilient Packet Ring (RPR) is an international standard for establishing IP ring networks, offering a highly efficient and reliable

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009 Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Solutions Focus: IPTV

Solutions Focus: IPTV Zhone delivers the world s most complete IPTV solutions MALC offers more provisioning options for multicast, more capability for mixed multicast and unicast video, and more fiber and copper subscriber

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

The Edge-Core Networks ISP/Metro Ethernet Solution:

The Edge-Core Networks ISP/Metro Ethernet Solution: The Edge-Core Networks ISP/Metro Ethernet Solution: Achieving Performance and Reliability through the Use of Standard Protocols Alessandro Fiaschi alessandro_fiaschi@edge-core.com What we provide now Edge-Core

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Contents. Load balancing and high availability

Contents. Load balancing and high availability White Paper Load Balancing in GateDefender Performa The information contained in this document represents the current view of Panda Software International, S.L on the issues discussed herein as of the

More information

Data Center Fabrics and Their Role in Managing the Big Data Trend

Data Center Fabrics and Their Role in Managing the Big Data Trend Data Center Fabrics and Their Role in Managing the Big Data Trend The emergence of Big Data as a critical technology initiative is one of the driving factors forcing IT decision-makers to explore new alternatives

More information

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

How To Understand The Benefits Of An Mpls Network

How To Understand The Benefits Of An Mpls Network NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade

More information

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology,

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

Brocade VCS Fabrics: The Foundation for Software-Defined Networks

Brocade VCS Fabrics: The Foundation for Software-Defined Networks WHITE PAPER DATA CENTER Brocade VCS Fabrics: The Foundation for Software-Defined Networks Software-Defined Networking (SDN) offers significant new opportunities to centralize management and implement network

More information

Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III

Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III Electric Drives and Controls Hydraulics Linear Motion and Assembly Technologies Pneumatics Service profile Drive & Control Industrial Ethernet: The key advantages of SERCOS III SERCOS III is the open,

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

HARTING Ha-VIS Management Software

HARTING Ha-VIS Management Software HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded

More information

Network Virtualization

Network Virtualization Network Virtualization Petr Grygárek 1 Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on shared physical infrastructure Total

More information

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage

More information

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved. Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application

More information

A dual redundant SIP service. White paper

A dual redundant SIP service. White paper A dual redundant SIP service White paper Ian Colville, Product Manager, Aculab Introduction The Session Initiation Protocol (SIP) eco-system: a unit of interdependent protocols functioning together within

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Redundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks

Redundant Gigabit Backbone Adds Speed and Reliability to Industrial Networks Adds Speed and Reliability to Industrial Networks by Harry Hsiao, MOXA Product Manager harry.hsiao@moxa.com Introduction Gigabit network applications are becoming more and more popular in the modern networking

More information

Cisco Virtual SAN Advantages and Use Cases

Cisco Virtual SAN Advantages and Use Cases Cisco Virtual SAN Advantages and Use Cases The Challenge Application data is accumulating at an increasingly fast pace, and to control costs, IT departments are looking at the benefits of economies of

More information

Ring Protection: Wrapping vs. Steering

Ring Protection: Wrapping vs. Steering Ring Protection: Wrapping vs. Steering Necdet Uzun and Pinar Yilmaz March 13, 2001 Contents Objectives What are wrapping and steering Single/dual fiber cut Comparison of wrapping and steering Simulation

More information

Technical Specification MEF 2. Requirements and Framework for Ethernet Service Protection in Metro Ethernet Networks. Feb 8, 2004

Technical Specification MEF 2. Requirements and Framework for Ethernet Service Protection in Metro Ethernet Networks. Feb 8, 2004 Technical Specification Requirements and Framework for Ethernet Service Protection in Metro Ethernet Networks Feb 8, 2004 Disclaimer The information in this publication is freely available for reproduction

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical

More information

Dual Chassis Fault and the Advantages of Designing a SS7 Network

Dual Chassis Fault and the Advantages of Designing a SS7 Network Achieving dual chassis fault tolerance for SS7 solutions White paper Ian Colville, Product Manager, Aculab Introduction When deploying equipment onto public telephony networks, operators and service providers

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology. August 2011

FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology. August 2011 FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology August 2011 Page2 Executive Summary HP commissioned Network Test to assess the performance of Intelligent Resilient

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai.

Broadband Networks. Prof. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Mumbai. Broadband Networks Prof. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Mumbai Lecture - 32 Metro Ethernet Access Networks So, in today s lecture we will talk about

More information

Whitepaper. 802.11n The Next Generation in Wireless Technology

Whitepaper. 802.11n The Next Generation in Wireless Technology Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

ITU-T G.8032 Ethernet Ring Protection Switching

ITU-T G.8032 Ethernet Ring Protection Switching The feature implements protection switching mechanisms for Ethernet layer ring topologies. This feature uses the G.8032 Ethernet Ring Protection (ERP) protocol, defined in ITU-T G.8032, to provide protection

More information

How To. Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops. Introduction

How To. Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops. Introduction How To Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops Introduction Putting a ring of Ethernet switches at the core of a network is a simple way to increase the network

More information

WDM Passive Optical Networks: Protection and Restoration

WDM Passive Optical Networks: Protection and Restoration OECC 2009 Workshop: Next-generation Broadband Optical Access Future Challenges Session 1: Broadband Network Architectures, WDM PON Evolution Strategies and Future Ultra-high- bandwidth Services WDM Passive

More information

STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS

STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS Supervisor: Prof. Jukka Manner Instructor: Lic.Sc. (Tech) Markus Peuhkuri Francesco Maestrelli 17

More information

Contents. Foreword. Acknowledgments

Contents. Foreword. Acknowledgments Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

How to Monitor a FabricPath Network

How to Monitor a FabricPath Network How to Monitor a FabricPath Network an owiasz Mar., 0 enefits Monitor FabricPath and other physical networks with one solution Preserve tool investment, increase tool allocation and use Increase network

More information

MRV EMPOWERS THE OPTICAL EDGE.

MRV EMPOWERS THE OPTICAL EDGE. Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com

More information

CORPORATE NETWORKING

CORPORATE NETWORKING CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based

More information

Flush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection

Flush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection lush Optimizations to Guarantee Less Transient Traffic in Ethernet Ring Protection Kwang-Koog Lee and Jeong-dong Ryoo Ethernet ring protection (ERP) technology, which is defined in ITU-T Recommendation

More information

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the

More information

RESILIENT NETWORK DESIGN

RESILIENT NETWORK DESIGN Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, igregr@fit.vutbr.cz Campus Best Practices - Resilient network design Campus

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information