Evaluation and Comparison of Spanning Tree Protocol and Rapid Spanning Tree Protocol on Cisco switches via OPNET

Size: px
Start display at page:

Download "Evaluation and Comparison of Spanning Tree Protocol and Rapid Spanning Tree Protocol on Cisco switches via OPNET"

Transcription

1 Evaluation and Comparison of Spanning Tree Protocol and Rapid Spanning Tree Protocol on Cisco switches via OPNET ENSC 427: COMMUNICATION NETWORKS SPRING 2013 FINAL PROJECT Project Group # 2 Joseph Lu zla18@sfu.ca Sen Jiang senj@sfu.ca Tao Xiong txiong@sfu.ca

2 Table of Contents List of Figures...3 List of Tables.4 Abstract Ethernet Ethernet LAN Media Access Control (MAC) addressing Switches Virtual LANs Spanning Tree Protocol (STP) Overview Spanning Tree Protocol (STP) Types of STPs Rapid Spanning Tree Protocol Multiple Spanning Tree Protocol Hypothesis OPNET Simulations Topologies Three Layer Topology Ring Backbone Topology Simulation Setup Simulation with Ring Backbone Topology Simulation with Three Layer Topology Simulation Results Conclusion and Discussion.21 References 23 2

3 List of Figures Figure.1 MAC Address.6 Figure.2 Spanning Tree Interface States [4] Figure.3 STP and Redundant Connectivity [4]..8 Figure.4 Root Port [5]..10 Figure.5 Designated Port [5] 10 Figure.6 Alternate Port [5]...10 Figure.7 Backup Port [5]..10 Figure.8 Multiple Spanning Tree Protocol [7].11 Figure.9 Three Layer Topology [8]..12 Figure.10 Ring Backbone Topology [8]...13 Figure.11 Scenario#1 and #2 14 Figure.12 Application Definition..15 Figure.13 Profile Definition..15 Figure.14 Root Bridge Priority.16 Figure.15 Workstation Attributes.16 Figure.16 Server Attributes..17 Figure.17 Scenario#3 and Scenario#4..17 Figure.18 Scenario#5 and Scenario#6..18 Figure.19 Scenario#7 and Scenario#8..18 Figure.20 Scenario#9 and Scenario#10 18 Figure.21 Scenario#11 and Scenario# Figure.22 Scenario#13 and Scenario# Figure.23 Results and Protocol Visualization of Scenario#1 and Scenario#2.20 Figure.24 Results and Protocol Visualization of Scenario#13 and Scenario#

4 List of Tables Table.1 Port States of STP and RSTP [5]...9 Table.2 Project Specification 14 Table.3 Results of All Scenarios

5 ABSTRACT Spanning Tree Protocol (STP) was based on the algorithm invented by Radia Perlman to prevent loop forming in networks in [1] And in 1990, the IEEE published 802.1D as its first standard. It was introduced to any bridged Ethernet local area network. In 2001, the IEEE published Rapid Spanning Tree Protocol as 802.1w which provides significantly faster loop free paths calculation in response to a topology change. Our project intends to evaluate and compare the performances of STP and RSTP on Cisco switches supported by OPNET. We were planning to do the comparison of STP with more other types such as Multiple Spanning Tree Protocol. However, after searching in OPNET V16.0, we found that in OPNET, Cisco switches only support STP and RSTP. Our project first introduce some background information regarding VLAN, STP, RSTP, Layer Two Switches, Layer Three Switches, Distribution Layer, Access Layer, and so on. Besides the background information, the report discusses some companies that produce switches, especially the one's switches we will be using: Cisco. It then includes our work on OPNET. We build and configure the three layer topology and the ring backbone topology, then analyze and explain some snapshots taken from OPNET. We create STP tree with three layers which totally have approximately ten Cisco switches, and observe the performance of connection coming back up after disconnecting the loop. After finishing the STP evaluation, we run the same procedure for RSTP, and finally compare their results for a conclusion. 1. ETHERNET 1.1. Ethernet LAN Ethernet is the most widely used local area network access model. It is standardized by the Institute of Electrical and Electronics Engineers (IEEE) as [2] standard. An Ethernet environment involves various types of devices, such as hubs, bridges, and switches. A switching Ethernet environment is an Ethernet network that consists of switches instead of hubs. A switch is a more intelligent device than hub. It stores Media Access Control address in lookup table and maintain address at its own. There are switches that are used in different layers, such as layer two switches used in the data link layer which learn MAC address automatically, and are cheap and easy to deploy. Ethernet switches are able to link more than one local area network together Media Access Control (MAC) Addressing Media Access Control address [2] is the physical address of the network device found in the data link layer aside from the logical address that is found in the network layer. A MAC address is a hardware identification serial number that uniquely identifies each device in the 5

6 network. It is manufactured into every network adapter that differentiates network cards. Therefore, the MAC address cannot be modified. A MAC address is 48 bits (6 bytes) in length and usually written as a sequence of twelve hexadecimal digits. The first 24 bits (sixdigits) correspond to the organizational unique identifier (OUI) or the manufacturer s unique identifier, while the last 24 bits (six digits) correspond to the device serial number that is assigned by the vendor, as illustrated in the figure below: Figure.1 MAC Address The combination of the OUI and the device serial number logically ensures that any of the network adapters have the different MAC address Switches As bridges add Bridges add a level of intelligence to the network by using the MAC address to build a table of hosts, mapping these hosts to a network segment and containing traffic within these network segments. A switch functions the same as a bridge. When a switch receives a frame, it examines the destination and source MAC addresses and compares them to a table of network segments and addresses. The frame is dropped if the segments are the same, whereas forwarded to the proper segment if the segments are different. In Ethernet LAN, switches are able to link several LANs together and forward frames between these LAN segments. They are used as a more intelligent version of hubs in networks Virtual LANs A Virtual Local Area Network (VLAN) is a group of data exchanging ports of every switch that are chosen specifically for putting logic inside the switches correspondingly. Generally speaking, the function of VLANs is assigning tasks to switches through specific ports. VLANs can also be defined as broadcast domains due to the fact that broadcast packets are sent out all ports that are in the same VLAN. VLAN mapping configures layer two switches to provide the logical connectivity among the VLAN members. VLANs are standardized as IEEE 802.1Q. 6

7 2. SPANNING TREE PROTOCOL (STP) OVERVIEW 2.1. Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) is a link management protocol under the Institute of Electrical and Electronics Engineers (IEEE) standard 802.1D for routing bridges and switches. The idea of Spanning Tree Protocol is using the spanning tree algorithm to provide redundancy to your network without breaking it. When there is one link in the network fails, another way would automatically come up for the traffic to reach its destination. Due to that the network connection forms many loops which make data traffic fails finding the way to its destination, traffic congestion happens as data is transmitted around in circles. By using the STP algorithm, the switches that send bridge protocol data units (BPDUs) are able to identify active redundant links, and block one of these links to prevent any possible network loops. In a network, broadcast storms and constant table changes are created by network loops which bring down the entire network. The spanning tree protocol creates a tree spanning across the entire network and forces redundant paths into a standby or blocking state in establishing path redundancy. In between two network devices such as switches, the spanning tree protocol allows only one active path at one time to prevent network loops. The redundant links that are established are used as a backup option in case that any link in primary path fails. Each spanning tree must have a root bridge that is effectively the root of the tree [3]. All active paths span out from this root. The root bridge is automatically selected by the spanning tree algorithm based on the lowest MAC address of bridges in the network with all bridge priorities are the same default values. Any users can modify the root bridge by setting one specific bridge configurable priority low. Due to the propagation delays that occur when protocol information passes through a switched LAN, topology changes happen randomly in the switched network [4]. Every STP interface exists in one of the following states: Blocking, Listening, Learning, Forwarding, and Disabled. In blocking state, no participation takes place for the interface in frame forwarding. In listening state, the spanning tree protocol determines whether the interface should get involved in frame forwarding or not. In learning state, preparation takes place for the interface to participate in frame forwarding. In forwarding state, the interface forwards frames. Finally, in disabled state, a port is shut down with no active link or no spanning tree instance running on it, which results in no participation for the interface in frame forwarding. The diagram below illustrates how an interface processes between each state: 7

8 Figure.2 Spanning Tree Interface States [4] An example of STP with redundant connectivity is provided by Cisco and illustrated in the graph below: Figure.3 STP and Redundant Connectivity [4] It is shown clearly that only one active path is available in the topology above with all other paths disabled. Cisco [4] as well enhanced the original 802.1D standard with three different features to improve the spanning tree convergence speed of a switched network: Port Fast, Backbone Fast, and Uplink fast. The port fast feature allows an interface to skip several spanning tree states. The interface transits into forwarding state immediately after its blocking state. The backbone fast feature speeds up spanning tree convergence by optimizing the max age which is 20 sec as the default setting. The uplink fast feature indicates that the backup link 8

9 comes up and starts forwarding traffic as soon as the forwarding link fails. This feature is only configured on access switches Types of STPs Rapid Spanning Tree Protocol (RSTP) The rapid spanning tree protocol (RSTP) was developed based on the 802.1D spanning tree algorithm. It was first introduced by the Institute of Electrical and Electronics Engineers as 802.1w specification. The RSTP provides a significantly faster spanning tree convergence in response to a topology change. As the STP convergence takes anywhere between 30 to 50 seconds depending on the type of failure to converge the network, the RSTP speeds up the converging process by integrating the first three states of the STP interface into one states: Discarding. As a result, the RSTP takes less convergence time for the port transit from blocking to forwarding during any topology change. For a purpose of clear illustration the differences of the port states between the STP and the RSTP, Cisco provides the table shown below: Table.1 Port States of STP and RSTP [5] Although the original 802.1D specification was enhanced by Cisco with the three features that are mentioned in the previous section, the enhanced version still has a drawback that the mechanisms are proprietary and need additional configuration [5]. In terms of configuring the RSTP, the following port roles now become variables that need to be determined: Root Port, Designated Port, Alternate Port, and Backup Port. Cisco also provides practical illustrations for better understanding of the port roles. [5] The root port is the same as 802.1D which denotes the one port on each switch that has the best root path cost to the root. The exception that is worth mentioning is that the root bridge does not have any root ports. 9

10 Figure.4 Root Port [5] The designated port refers to the one port on a network segment that has the best root path cost to the root. Figure.5 Designated Port [5] The alternate port represents a port that has an alternate path to the root. More useful BPDUs are received by the alternate port from another bridgethat is a port blocked. Figure.6 Alternate Port [5] The backup port denotes a port that provides a redundant connection to a network segment where another switch port connects. Figure.7 Backup Port [5] Any port roles can be in any of the three states indicated in Table.1. 10

11 Multiple Spanning Tree Protocol (MSTP) The Multiple Spanning Tree Protocol (MSTP) is considered as an evolution of the Spanning Tree Protocol and the Rapid Spanning Tree Protocol. It was first standardized in IEEE 802.1s and later merged into 802.1Q It was inspired from the Cisco proprietary Multiple Instances Spanning Tree Protocol (MISTP) [6]. The MSTP allows several VLANs to be mapped to a single spanning tree instance [6]. It forms MST regions which can be seen as a group of switches placed under a common administration sharing the same configuration attributes [6]. MST regions and all other bridges and LANs are connected into a single Common Spanning Tree (CST). The MSTP connects all devices and LANs with a single Common and Internal Spanning Tree (CIST) that supports automatic formation of each MST region, and it assigns frames to different VLANs to follow different paths that are separately based on Multiple Spanning Tree Instances (MSTIs). Cisco provides a simple diagram shown below that illustrates the functionalities and specifications of MSTP: Figure.8 Multiple Spanning Tree Protocol [7] Unfortunately, due to the fact that OPNET does not support MSTP for switches, it is not concerned in the project objectives Hypothesis STP (802.1D) and RSTP (802.1w) can both perform algorithms of creating loop free paths in Ethernet networks. 11

12 RSTP (802.1w) can response significantly faster to link failures than STP (802.1D) does. 3. OPNET SIMULATIONS 3.1. Topologies The platform we choose for network implementations and simulations is the Optimized Network Engineering Tools (OPNET) that is widely used in research and in industries. By studying the IEEE 802.1D standard, Media Access Control (MAC) Bridges, we discovered two network topologies that can be used to implement our project: the Three Layer Topology inspired by the Cisco Hierarchical Network Model, and the Ring Backbone Topology Three Layer Topology The graph below shows a typical Three Layer Topology: Figure.9 Three Layer Topology [8] The topology consists of three layers: the access layer (bottom), the distribution layer (middle), and the core layer (top). The access layer is on the bottom that includes hubs and layer two switches. Layer two switches are switches used in the data link layer which are relatively cheaper and easier to deploy. The access layer mainly connects client nodes, such as workstations into Ethernet networks. Packets delivery to clients is secured by the functionality of the access layer. 12

13 The distribution layer is in the middle that includes layer three switches and LAN based routers. This layer connects servers into Ethernet networks. This layer confirms that packets are routed properly between subnets and VLANs. Layer three switches are switches used in the network layer which are more intelligent and expensive due to the fact that extra processing power and memory is required for operation comparing to lay two switches. The core layer is on the top that includes high end switches and high speed cables. This layer ensures packets transmitting speed and reliability. However, there are no packet manipulations taking place in the core layer. Therefore, the core layer is not necessary to include in our project topology. The three layer topology is inspired by the Cisco Hierarchical Network Model which optimizes the capacity, features, and functionality of a specific device for its position and role in the network. This fact promotes the network scalability and stability. [9] Ring Backbone Topology There is another topology that is widely used for protocol implementations in research and studies, the ring backbone topology which is also illustrated by the graph in the IEEE 802.1D standard: Figure.10 Ring Backbone Topology [8] The ring backbone topology is highly organized with all traffic flows being able to be transmitted in one direction at high speed. And for end user computers, each of them occupies equal access to resources. Furthermore, adding additional components would not affect the performance of the network. On the other hand, it also has some drawbacks such as the fact that packets must pass through all devices between the source and the destinations which makes it relatively slower than some other topologies. 13

14 3.2. Simulation Setup The configuration, implementation, and simulation in OPNET intend to evaluate and compare the performances in terms of link recovery responding speed of the Spanning Tree Protocol, and the Rapid Spanning Tree Protocol in the two topologies mentioned in previous section Simulation with Ring Backbone Topology A network of the ring backbone topology that consists of five switches, one server, and one client workstation has been built and configured running with STP and RSTP separately. Firstly, a new project was created as the one contains all the scenarios. The settings of the Project Wizard dialog box are shown below in the table: Initial Project Create Empty Project Click Next Network Scale Campus Click Next Specify Size 100 m X 100 m Click Next Model Family Ethernet Click Next Review Check Values Table.2 Project Specification Click Finish The first two scenarios include five switches (bridges) that run STP and RSTP correspondingly. An Application Definition Configuration node and a Profile Definition Configuration node are also added in the scenarios to provide a traffic application. The two scenario topologies are shown below: Figure.11 Scenario#1 and #2 14

15 In order to generate traffic, a video conferencing application has been chosen from the Application Definitions as it is shown below in the Figure 10: Figure.12 Application Definition As well, a Profile Definitions node is configured as follow: Figure.13 Profile Definition Besides the application definition and the profile definition, a Link Failure/Recovery node has also been added into the network. We set the link between Bridge_0 and Bridge_1 to fail at 160 seconds, and recover at 300 seconds. Due to the fact that OPNET default setting of Root Bridge is the first switch that is put into the network, we manually edited the priority of Bridge_0 to 8192 to ensure it is the root bridge of the topology. The configuration dialog box is shown below: 15

16 Figure.14 Root Bridge Priority For the workstation node, we added the video conferencing application in its attributes and manually set its Client Address to Des as shown in Figure 13: Figure.15 Workstation Attributes We then added the video conferencing application in the attributes of the server node and assigned its application destination to address Des as shown in Figure 14: 16

17 Figure.16 Server Attributes For scenario#1, we edited the Bridge Parameters of all the switches under their attributes to STP, and as well for scenario#2 we edited them to RSTP. We chose the relative statistic for collection and analysis. The statistic we chose is the point to point throughput in bit/sec between Bridge_1 and Workstation. The throughput in our project is the measurement of the video traffic passing over the specific link. After finishing building and configuring the first two scenarios, we created ten more scenarios with different numbers of bridges. Scenario#3 and scenario#4 consist of three bridges, scenario#5 and scenario#6 consist of four bridges, scenario#7 and scenario#8 consist of six bridges, scenario#9 and scenario#10 consist of seven bridges, and scenario#11 and scenario#12 nine bridges running STP and RSTP correspondingly for each of the groups of the scenarios. The scenarios are show below: Figure.17 Scenario#3 and Scenario#4 17

18 Figure.18 Scenario#5 and Scenario#6 Figure.19 Scenario#7 and Scenario#8 Figure.20 Scenario#9 and Scenario#10 18

19 Figure.21 Scenario#11 and Scenario# Simulation with Three Layer Topology After creating all the scenarios for the Ring Backbone Topology, we then built two more scenarios: scenario#13 and scenario#14 presenting the three layer topology networks consist of three switches in the access layer and two switches in the distribution layer in order to evaluate and compare the performances of STP and RSTP in the three layer topology. The application definition node, the profile definition node, the server node and the workstation node are using the same setup as the Ring Backbone Topology scenarios. For the Link Failure/Recovery node, we edited the link between Bridge_0 (Root Bridge) and Bridge_4 to fail at 160 seconds and recover at 300 seconds. The statistic chosen is the point to point throughput in bit/sec between Bridge_4 and Workstation. The network topology is shown in Figure 20: Figure.22 Scenario#13 and Scenario#14 19

20 For all the scenarios, the simulation run time is set to 500 seconds total. 4. Simulation Results The aim is to collect and analyze the statistic that we choose. By using the function Visualizing Spanning Tree, OPNET automatically visualizes the traffic flow and failure link on the networks with blue and red emphasizing lines. Also, OPNET generates diagrams that display the point to point throughputs of each scenario. The result diagrams of scenario#1 and scenario#2 (Ring Backbone with five bridges), as well as the results diagrams of scenario#13 and scenario#14 (Three Layer with five bridges), are shown below in Figure 21 and Figure 22: Figure.23 Results and Protocol Visualization of Scenario#1 and Scenario#2 Figure.24 Results and Protocol Visualization of Scenario#13 and Scenario#14 20

21 As we can see clearly from the diagrams, for both topologies, STP (red line) and RSTP (blue line) both responded to the link failure at exactly 160 seconds. However, RSTP responded significantly faster than STP did to the link recovery. From the zoomed in diagrams, the differences between STP and RSTP in recovery time are the same: RSTP responded at 299 seconds, and STP responded at 303 seconds. As well, the loop free paths and failed links are clearly presented in the network topologies. We then simulated all the scenarios, and collected all the results inside the table below: Scenarios Protocols Failure Time (sec) Recovery Time (sec) Scenario#1 and 2 STP RSTP Scenario#3 and 4 STP RSTP Scenario#5 and 6 STP RSTP Scenario#7 and 8 STP RSTP Scenario#9 and 10 STP RSTP Scenario#11 and 12 STP RSTP Scenario#13 and 14 STP RSTP Table.3 Results of All Scenarios 5. Conclusion and Discussion The project implementations and simulations can be considered successful even with some minor errors and technical difficulties occurred during the configuration. In short, the results that we obtained from simulation runs are satisfying. By observing the spanning tree visualized networks, one can promptly conclude that both of the Spanning Tree Protocol (IEEE 802.1D) and the Rapid Spanning Tree Protocol (IEEE 802.1w) can generate loop free paths in networks for traffic to communicate between servers and workstations. For both applicable topologies: the Three Layer Topology and the Ring Backbone Topology, the Rapid Spanning Tree Protocol requires much less calculation time in order to create the loop free paths in networks. Based on the results, the average time difference of recovery time between STP and RSTP is 3 seconds. 21

22 Besides the fact that the results successfully evident the hypothesis we proposed in section 2, we also encountered some strange phenomenon from the result diagrams. We observed that for all the scenarios with different numbers of bridges, the same recovery time values were presented for STP and RSTP correspondingly. According to our research, the number of bridges in networks would definitely vary the calculation speed of spanning tree algorithm. We analyzed the case and concluded that the cause might be the topologies are simple enough for OPNET to minimize the delay for calculating loop free paths. Unfortunately, there have not been any chances for us to examine our supposition. In the future, we would also like to evaluate the performance of the Multiple Spanning Tree Protocol in terms of calculating loop free paths using different regions of Spanning Tree Protocol, and compare it with the original STP (IEEE 802.1D) and RSTP (IEEE 802.1w). We did not implement MSTP because of OPNET lacking supportability of MSTP. Some other platforms such as NS 3 could be used for realization of MSTP implementation. 22

23 References [1] Perlman. R (1985). An Algorithm for Distributed Computation of a Spanning Tree in an Extended LAN, ACM SIGCOMM Computer Communication Review 15(4): doi: / Retrieved on Apr 17 th, [2] Gerald W.B (Sep 25 th, 2003), The Second Information Revolution, Harvard University Press. P ISBN Retrieved on Apr 17 th, [3] Perlman. R (1985). Interconnections, Second Edition USA: Addison Wesley. ISBN: Retrieved on Apr 17 th, [4] Cisco, Configuring STP, Catalyst 2950 Desktop Switch Software Configuration Guide, 12.1(6)EA2c. Retrieved on Apr 17 th, Internet: guration/guide/swgstp.html [5] Cisco, Understanding Rapid Spanning Tree Protocol (802.1w), Spanning Tree Protocol, Document ID: 24062, Oct 24 th, Retrieved on Apr 17 th, Internet: ml [6] Cisco, Understanding Multiple Spanning Tree Protocol (802.1s), Spanning Tree Protocol, Document ID: 24248, Apr 17 th, Retrieved on Apr 17 th, Internet: ml [7] Cisco, Understanding and Configuring Multiple Spanning Trees, Catalyst 4500 Series Switch Cisco ISO software Configuration Guide, 12.2(25)EW. Retrieved on Apr 17 th, Internet: html [8] IEEE Standards for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges," IEEE Std 802.1D-1990, vol., no., pp.1,, doi: /IEEESTD Retrieved on Apr 17 th, [9] Torki, F.; Mirjalily, G.; saadat, R. "An Efficient Fast Algorithm to Select the Best Spanning Tree in Metro Ethernet Networks". 18 Jul, Retrieved on Apr 17 th, Internet: [10] Azcorra, A.; Ibanez, G. "Application of Rapid Spanning Tree Protocol for Automatic Hierarchical Address Assignment to Bridges". 25 Oct, Retrieved on Apr 17 th, Internet: 23

24 [11] Mirjalily, G.; Karimi, M.H.; Adibnia, F.; Rajai, S. "An Approach to Select the Best Spanning Tree in Metro Ethernet Networks". 08 Aug, Retrieved on Apr 17 th, Internet: [12] Marchese, M.; Mongelli, M.; Portomauro, G. "Simple Protocol Enhancements of Rapid Spanning Tree Protocol over Ring Topology". 10 Jan, Retrieved on Apr 17 th, Internet: [13] He Peng; Pan Heng; Li Xiangdong; ZhengQiusheng. "Physical Topology Discovery Based on Spanning Tree Protocol". 04 Nov, Retrieved on Apr 17 th, Internet: [14] Cisco. Troubleshooting LAN Switching Environments. Document ID: Oct, Retrieved on Apr 17 th, Internet: #backinfo, 24

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged

More information

The ABCs of Spanning Tree Protocol

The ABCs of Spanning Tree Protocol The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved. Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

Resiliency in Ethernet Based Transport Networks

Resiliency in Ethernet Based Transport Networks Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

RESILIENT NETWORK DESIGN

RESILIENT NETWORK DESIGN Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, igregr@fit.vutbr.cz Campus Best Practices - Resilient network design Campus

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

A New Approach to Developing High-Availability Server

A New Approach to Developing High-Availability Server A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University jyu@cs.depaul.edu ABSTRACT This paper

More information

AlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP

AlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP AlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP Introduction Spanning trees that protect networks from loops can provide better traffic load balancing if traffic in different

More information

June 2006. Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2

June 2006. Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2 Bridge & Switch Pietro Nicoletti Piero[at]studioreti.it Bridge-Switch-Engl - P. Nicoletti: see note pag. Copyright note These slides are protected by copyright and international treaties. The title and

More information

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Visio Enabled Solution: One-Click Switched Network Vision

Visio Enabled Solution: One-Click Switched Network Vision Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft

More information

LiveAction Application Note

LiveAction Application Note LiveAction Application Note Layer 2 Monitoring and Host Location Using LiveAction to monitor and identify inter-/intra-switch VLAN configurations, and locating workstations within the network infrastructure.

More information

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards Redundancy = Protection from Network Failure. Redundancy Standards WP-31-REV0-4708-1/5 Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards For a very

More information

RSTP to MST Spanning Tree Migration in a Live Datacenter. NANOG47 October 20, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com

RSTP to MST Spanning Tree Migration in a Live Datacenter. NANOG47 October 20, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com RSTP to MST Spanning Tree Migration in a Live Datacenter NANOG47 October 20, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com Introductions Slide 1 What Is This Talk About? We found ourselves

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R

VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R VMware ESX Server 3 802.1Q VLAN Solutions W H I T E P A P E R Executive Summary The virtual switches in ESX Server 3 support VLAN (IEEE 802.1Q) trunking. Using VLANs, you can enhance security and leverage

More information

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices

Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND

More information

IP SAN BEST PRACTICES

IP SAN BEST PRACTICES IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

How To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP

How To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP How To Configure Multiple Spanning Tree Protocol (MSTP) Introduction This document provides configuration examples and guidelines for configuring Multiple Spanning Tree Protocol on Allied Telesyn switches.

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Network Topology. White Paper

Network Topology. White Paper White Paper Network Topology JANUARY 2015 This document describes the benefits of Cisco Meraki s Network Topology technology and how you can use it to visualize and troubleshoot your network. In addition,

More information

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.

More information

Packet Tracer 3 Lab VLSM 2 Solution

Packet Tracer 3 Lab VLSM 2 Solution Packet Tracer 3 Lab VLSM 2 Solution Objective Create a simulated network topology using Packet Tracer Design an IP addressing scheme using a Class B subnetwork address and VLSM Apply IP addresses to the

More information

CORPORATE NETWORKING

CORPORATE NETWORKING CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based

More information

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven

More information

BLADE PVST+ Spanning Tree and Interoperability with Cisco

BLADE PVST+ Spanning Tree and Interoperability with Cisco BLADE PVST+ Spanning Tree and Interoperability with Cisco Technical Brief Industry-standard PVST+ Spanning Tree Protocol with Cisco interoperability Introduction...1 Spanning Tree Protocol (IEEE 802.1d)...1

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson

Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson Switching Basics and Intermediate Routing CCNA 3 Labs and Allan Johnson Introduction Switching Basics and Intermediate Routing CCNA 3 Labs and s is a supplement to your classroom and laboratory experience

More information

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone. Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) ( You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009 Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208

More information

16-PORT POWER OVER ETHERNET WEB SMART SWITCH

16-PORT POWER OVER ETHERNET WEB SMART SWITCH 16-PORT POWER OVER ETHERNET WEB SMART SWITCH User s Manual (DN-95312) - 0 - Content Web Smart Switch Configure login ---------------------------------- 2 Administrator Authentication Configuration ---------------------------------------------

More information

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

Howstuffworks How LAN Switches Work Click here to go back to the normal view! Page 1 of 17 Search ComputerStuff AutoStuff ElectronicsStuff ScienceStuff HomeStuff EntertainmentStuff MoneyStuff TravelStuff Main > Computer > Hardware Click here to go back to the normal view! How LAN

More information

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60

More information

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center

More information

LANs and VLANs A Simplified Tutorial

LANs and VLANs A Simplified Tutorial Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name

More information

ANZA Formación en Tecnologías Avanzadas

ANZA Formación en Tecnologías Avanzadas INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) Temario This new assoicate level course has been designed to introduce delegates to the three primary technologies that are used in the Cisco Data Center.

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

More information

Simulation of High Availability Internet Service Provider s Network

Simulation of High Availability Internet Service Provider s Network Abdullah Jameel Mahdi 1 and Anas Ali Hussain 2 1 Information and Communication department, Information Engineering Collage, Al-Nahrin University 2 Computer department, Engineering Collage, Al-Nahrin University

More information

Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic

Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic Technical report, IDE1002, February 2010 Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic Master s Thesis in Computer Network Engineering ALI AKBAR EISAZADEH & NORA ESPAHBODI

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

Can PowerConnect Switches Be Used in IP Multicast Networks?

Can PowerConnect Switches Be Used in IP Multicast Networks? PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect

More information

Introduction to Networking

Introduction to Networking 1 CHAPTER ONE Introduction to Networking Objectives 2.3 Identify common physical network topologies. Star. Mesh. Bus. Ring. Point to point. Point to multipoint. Hybrid 2.7 Explain common logical network

More information

Ethernet (LAN switching)

Ethernet (LAN switching) Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1 Bridges/ switches Interconnect multiple, possibly with different type

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000

Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000 Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000 Document ID: 19642 Contents Introduction Before You Begin Conventions Prerequisites Components Used Background Theory Difference

More information

Spring 2014. Final Project Report

Spring 2014. Final Project Report ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca

More information

Easy Smart Configuration Utility

Easy Smart Configuration Utility Easy Smart Configuration Utility REV1.1.0 1910010977 CONTENTS Chapter 1 About this Guide...1 1.1 Intended Readers... 1 1.2 Conventions... 1 1.3 Overview of This Guide... 1 Chapter 2 Getting Started...4

More information

COMPUTER NETWORKS - LAN Interconnection

COMPUTER NETWORKS - LAN Interconnection LAN interconnection Telecommunication s Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza Creative

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

Using WhatsConnected Layer 2 Discovery About, configuring, installing, and using the Layer 2 discovery features in WhatsUp Gold

Using WhatsConnected Layer 2 Discovery About, configuring, installing, and using the Layer 2 discovery features in WhatsUp Gold Using WhatsConnected Layer 2 Discovery About, configuring, installing, and using the Layer 2 discovery features in WhatsUp Gold Contents CHAPTER 1 WhatsConnected Overview Welcome to WhatsConnected... 1

More information

Systems Integration Track: Network Topology

Systems Integration Track: Network Topology Systems Integration Track: Network Topology Author Jim W. Hammond Technical Consultant, GarrettCom Keywords: Ring, Topology, RSTP, Ethernet, Network, VLAN Industrial networks, like most large networks,

More information

OSPF Routing Protocol

OSPF Routing Protocol OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design

More information

Cisco Data Centre: Introducing Cisco Data Center Networking

Cisco Data Centre: Introducing Cisco Data Center Networking coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â

More information

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port 1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Easy Smart Configuration Utility

Easy Smart Configuration Utility Easy Smart Configuration Utility REV1.0.0 1910010939 CONTENTS Chapter 1 About this Guide...3 1.1 Intended Readers... 3 1.2 Conventions... 3 1.3 Overview of This Guide... 3 Chapter 2 Getting Started...6

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

RIP: Routing Information Protocol

RIP: Routing Information Protocol Laboratory 6 RIP: Routing Information Protocol A Routing Protocol Based on the Distance-Vector Algorithm Objective The objective of this lab is to configure and analyze the performance of the Routing Information

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

The OSI Model: Understanding the Seven Layers of Computer Networks

The OSI Model: Understanding the Seven Layers of Computer Networks Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

HARTING Ha-VIS Management Software

HARTING Ha-VIS Management Software HARTING Ha-VIS Management Software People Power Partnership HARTING Management Software Network Management Automation IT - with mcon Switches from HARTING With the Ha-VIS mcon families, HARTING has expanded

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information