enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

Size: px
Start display at page:

Download "enetworks TM IP Quality of Service B.1 Overview of IP Prioritization"

Transcription

1 encor! enetworks TM Version A, March Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority Immediate, High, Medium, or Low that allows packets with higher priority to be passed before traffic with a lower priority. QoS guarantees a specific throughput based on the way you configure its parameters. The Quality of Service feature can be used to ensure that mission-critical traffic is passed before less critical traffic. For example, you might assign traffic a high priority, but assign ISP traffic a medium priority. Or you might assign a lower priority to internet traffic passing over the backup line, and assign a higher priority to mission-critical traffic passing over the same line. This would ensure that, if a primary line failed, the backup line would have sufficient bandwidth to pass the more important traffic. B.1 Overview of IP Prioritization After you enable IP Quality of Service, you must set up quality-of-service rules in the Quality of Service Table, establishing criteria that identify packets to be prioritized. Then you must specify a priority level for traffic meeting those criteria, and a default priority for traffic that does not match any entry in the Quality of Service Table. As an example, the following criteria can identify traffic that you want to prioritize: Packet header information is within specified source IP Address range. Packet header information is within specified source TCP/UDP Port Number range. Packet header information is within specified destination IP Address range. Packet header information is within specified destination TCP/UDP Port Number range. Packet header information has a specified Protocol or Flag. Packet header information has a specified DLCI. In this example, you could use the destination IP Address range field to assign a high priority to traffic going to users and a low priority to traffic going to a printer. Or you could use the DLCI field to assign high priority to a DLCI carrying traffic to an ATM machine, and assign low priority to a different DLCI used to pass traffic to a server. The IP Quality of Service Table in the BANDIT II or in the BANDIT III can hold up to 60 entries. For information on trademarks, safety, limitations of liability, and similar topics, see Notices. Home Module: Routing Document B

2 Page 2 Routing, Document B B.2 Determining the Order of Entry The prioritization mechanism matches packet header information against entries in the IP Quality of Service Table, from the top down. That is, when a packet is checked against the IP Quality of Service Table, it is checked against entry 1 first. If a match is found, the entry s rule is executed, and the prioritization process on that packet is complete. If no match is found against entry 1, the packet is checked against entry 2, and so on. If the packet matches no entry in the table, the packet is assigned the default priority. Note: Only one rule can be executed on any given packet. A packet is assigned priority according to the first entry that it matches, for entries 1, 2, 3,...n. Before you begin configuring IP Quality of Service, you should carefully plan your prioritization strategy. Section B.3, Sample Rules for Prioritization in IP Quality of Service, provides a detailed example of the IP Quality of Service mechanism and a detailed procedure for setting up IP Prioritization. B.3 Sample Rules for Prioritization in IP Quality of Service Figure B-1 shows Unit A connected to an internet service provider (ISP) through a Frame Relay network. Unit A also has an Ethernet LAN with a server, computers, and a printer. Table B-1 specifies the following priorities for Unit A: 1 Traffic destined for the Worldwide Web (connection 1) has low priority. 2 Traffic destined for the server (connection 2) has medium priority. 3 Traffic originating from Dallas, destined for the LAN in Los Angeles (connection 3), has immediate priority.

3 IP Quality of Service Page 3 1 HTTP 2 Dallas FRAD B E N 3 Los Angeles 1 FRAD A N E Frame Relay ISP Computer Computer Computer Computer Computer Server Figure B-1. Private Network with Prioritization Requirements Table B-1. Sample IP Quality of Service Table Field Connection 1 Connection 2 Connection 3 Source Address Source Port Destination Address Destination Port Protocol TCP TCP Port N N 1 Priority Low Medium Immediate How to Configure IP Quality of Service 1 On the Main Menu, select Advanced Configurations. The Advance Configurations menu appears. 2 On the Advanced Configurations menu, select Routing. The Configure Routing menu appears.

4 Page 4 Routing, Document B 3 On the Configure Routing menu, select IP Routing. The IP Routing Configuration menu appears. 4 On the IP Routing Configuration menu, select IP Quality of Service. The IP Priority menu is displayed. IP Priority ) Prioritization 2) Type of Service 5 Select Prioritization. The IP Quality of Service menu is displayed. IP Quality of Service ) Status : Enabled 2) DiffServing : Disabled 3) Quality of Service Table 4) Default Priority : Medium 6 Select Status. The following menu is displayed: IP Quality of Service Status 1) Enable 2) Disable 7 Select Enable. The IP Quality of Service menu re-appears, showing the status Enabled. 8 If the BANDIT device s Quality of Service will include Differentiated Services, select Diffserving. The IP Differentiated Services menu is displayed. Follow the procedure in Section B.5, Differentiated Services.

5 IP Quality of Service Page 5 9 Select Quality of Service Table. You set up criteria in this table to prioritize packets traversing the BANDIT. The Quality of Service Table can hold a maximum of 100 entries (1200 entries in the VSR-1200). If the table already has entries, it is displayed. Go to Step 12. If the table has no entries yet, the following prompt is displayed: Empty IP Priority Table Add IP Priority Table Entry Enter Source IP Address Low (N.N.N.N or ) : 10 Do all of the following: a Source IP Address Low. This option allows you to enter the lowest-numbered source IP address for packets subjected to this prioritization rule. Enter the lowest IP address and press Enter. The following prompt is displayed: Enter Source IP Address High (N.N.N.N or ) : Note: The low address you entered in the previous field is displayed. You can backspace over any part of the address and make changes. If you used an asterisk () to indicate a wildcard entry (covering any possibility) for a field that defines one end of a range, you do not need to define the other end of that range, so the system skips entry for that end of the range. For example, if you entered an asterisk () in the Source IP Address Low field, the system skips the prompt for the Source IP Address High field. b Source IP Address High. Enter the highest-numbered source IP address for packets subjected to this prioritization rule, and press Enter. The following prompt is displayed: Enter Source TCP/UDP Port Low (Port Number or ) : c Source TCP/UDP Port Low. Enter the lowest source TCP or UDP port number for packets subjected to this prioritization rule, and press Enter. Note: See Table C-1 for common TCP/UDP port numbers. When you press Enter, the following prompt is displayed: Enter Source TCP/UDP Port High (Port Number or ) :

6 Page 6 Routing, Document B d Source TCP/UDP Port High. Enter the highest source TCP or UDP port number for packets subjected to this prioritization rule, and press Enter. The following prompt is displayed: Enter Destination IP Address Low (N.N.N.N or ) : e Destination IP Address Low. Enter the lowest destination IP address for packets subjected to this prioritization rule, and press Enter. The following prompt is displayed: Enter Destination IP Address High (N.N.N.N or ) : f Destination IP Address High. Enter the highest destination IP address for packets subjected to this prioritization rule, and press Enter. The following prompt is displayed: Enter Destination TCP/UDP Port Low (Port Number or ) : g Destination TCP/UDP Port Low. Enter the lowest destination TCP or UDP port number for packets subjected to this prioritization rule, and press Enter. The following prompt is displayed: Enter Destination TCP/UDP Port High (Port Number or ) : h Destination TCP/UDP Port High. Enter the highest destination TCP or UDP port number for packets subjected to this prioritization rule, and press Enter. The following prompt is displayed: Enter Protocol/Flag (TCP,UDP,ICMP,TCP_ACK,TCP_SYN,ESP,AH - T/U/I/ A/S/E/H or ) i Protocol/Flag. Enter the character corresponding to the protocol or flag for traffic to prioritize according to the criteria in this table entry. Select TCP (T) if this prioritization rule should be executed only on TCP packets. Select UDP (U) if this prioritization rule should be executed only on UDP packets.

7 IP Quality of Service Page 7 Select ICMP (I) if this prioritization rule should be executed only on ICMP packets. Select TCP_ACK (A) if this prioritization rule should be executed only on TCP ACK packets. Select TCP_SYN (S) if this prioritization rule should be executed only on TCP SYN packets. Select ESP (E) if this prioritization rule should be executed only on ESP packets. Select AH (H) if this prioritization rule should be executed only on AH packets. Note: IP has the ability to fragment datagrams that are too large for the network. When datagrams separate, only the header of the first fragment contains port numbers; the remaining fragments do not. Therefore, the remaining fragments are tested against the rules in the Quality of Service Table according to all criteria except port number, and the fragments are assigned a priority, according to the matching entry s priority. Select the asterisk () if this table entry should consider all packets, regardless of associated protocols or flags. When you press Enter, the following prompt is displayed: Note: Use For All Paths Enter Path Name (1 to 10 Characters): j Enter the Global Path Name or an asterisk () and press Enter. If you enter a name that is not already associated with a Global Path, you are prompted to add the path information: Path Name Does Not Exist In GPT Table. To Add Global Path Entry, Press 'Y'. Press Escape Otherwise. k Do one of the following: Enter Y to open the Global Path option and configure a path with that name. See Section 4.3, Defining Global Paths. Press Escape to return to the GPT prompt and enter a different name. Note: You cannot save this configuration if a valid Global Path Name has not been entered. The following prompt is displayed: Priority - (Immediate, High, Medium or Low - I/H/M/L) : l Enter the priority that you want these packets to have. The following prompt appears.

8 Page 8 Routing, Document B Bandwidth (bits/sec) (0 = DON'T CARE, 56000, max = ): mtype the bandwidth to use for packets meeting the criteria, and press Enter. The following prompt appears. Entry Added Then a prompt appears for the next record in the table. Enter Source IP Address Low (N.N.N.N or ) : 11 Do one of the following: a To add another record, return to Step 10. b To signal that you have finished adding records, press Escape. The table appears. Source Src Destination Dest # Address Port Address Port Protocol Path Name Priority Immediate Add, Modify, Insert or Delete an Entry? - (A/M/I/D) : 12 When you have finished making an entry, you can add, change, insert, or delete addresses. Do one of the following: a Press Escape to return to the IP Quality of Service menu. b Select Add, Modify, Insert, or Delete to change the table. Return to Step 10. Note: If you select a to add an entry, the entry is added at the bottom of the list. If you select i to insert an entry, you can specify where in the list you want to place this new entry (see Section B.2, Determining the Order of Entry). 13 Default Priority. If no match is found in the Quality of Service Table for a given packet, the packet is assigned the user-designated default priority. This option allows you to establish a default priority to assign to any traffic that does not match one of the rules in the Quality of Service Table. Do all of the following:

9 IP Quality of Service Page 9 a Select Default Priority. The following prompt is displayed: Enter Default Priority - (Immediate, High, Medium or Low - I/H/M/L) : b Select the default priority for packets not meeting criteria in the table, and press Enter. The IP Quality of Service menu re-appears. Note: To save the new configuration, you must Write and Reset. See Section 1.5, Saving (Writing) a Configuration, and Section 1.6, Resetting the Device. B.4 Type of Service In addition to the Quality of Service criteria that you can configure, each IP packet may carry information regarding its priority. An IP packet s header has four Type of Service (TOS) bits. Each bit indicates a different type of network service. Only one TOS bit at a time may be set in the header; combinations are not allowed. The BANDIT s support of TOS conforms to IETF RFC Transmission of user-set TOS values is transparent. If an IP packet contains a set TOS bit, the router handles the packet according to the specified service. How to Configure the BANDIT s Type of Service 1 On the Main Menu, select Advanced Configurations. 2 On the Advanced Configurations menu, select Routing. 3 On the Configure Routing menu, select IP Routing. 4 On the IP Routing Configuration menu, select IP Quality Of Service. 5 On the IP Priority menu, select Type of Service. The IP Type of Service menu is displayed. IP Type of Service ) Status : Enabled 2) Type of Service 6 On the IP Type of Service menu, select Status and Enable the service. 7 Then, on the IP Type of Service menu, select Type of Service. The IP Type of Service Configuration menu appears.

10 Page 10 Routing, Document B IP Type of Service ) Low : 0 2) Medium : 0 3) High : 0 4) Immediate : 0 Enter Choice 8 On the IP Type of Service Configuration menu, do the following for each level (Low through Immediate) that you wish to configure as TOS bits. a Select the level (for example, Low). The following prompt appears. Enter Type of Service (Hexadecimal) : b Enter a hexadecimal code for the Type of Service, and press Enter. The IP Type of Service Configuration menu re-appears. 9 When you have finished configuring the TOS levels, press Enter to return to the IP Type of Service menu. IP Type of Service ) Status : Enabled 2) Type of Service B.5 Differentiated Services The Differentiated Services (diffserv or DS) protocol is a method for providing quality of service (QoS). Diffserv comprises several aspects, such as forwarding behavior and traffic conditioning, based on DS class. One or more of these aspects are implemented at individual nodes. Diffserv handles network traffic by class. It achieves scalability because packet forwarding by class is quicker and requires less overhead than does service by individual packet requests. A packet is classified, conditioned, and assigned to a DS class when it enters a DS network. An IP packet s DS class is set according to the DS field in the packet header. Within the network, packets are forwarded according to the per-hop behavior (PHB) associated with the DS class. A packet's PHB, based on a packet s DS class, is consistent on all nodes in the DS network.

11 IP Quality of Service Page 11 The PHB constitutes the service properties for the class, such as packet forwarding, priority, throughput, delay, and jitter. There are 64 possible service designations, including no special service (000). Service differentiation accommodates dissimilar application requirements, user demands, and costs for services. Note: Diffserv is asymmetric; it applies to only one direction of traffic flow. B.5.1 Per-Hop Behavior A per-hop behavior is the forwarding action a DS node uses for a specific DS class. A PHB may be defined by its traffic properties or by its priority compared with other PHBs on the node. (A PHB is defined by its service behavior, not by the way the service is implemented. Nodes can use several mechanisms to implement PHBs.) When a packet enters the DS network, a node at the boundary of the DS network maps the packet s DS field to a DS class, and thus to a PHB corresponding to the class. One DS field maps to only one PHB, but several DS fields may map to the same PHB. A DS field not fitting a configured mapping maps to a default PHB. PHBs can be handled individually and can be used to build PHB groups. PHBs in a PHB group usually share a property, such as buffer management. PHBs may reflect absolute or relative priority within the PHB group. A node can implement more than one PHB and more than one PHB group. B.5.2 Traffic Conditioning Traffic conditioning performs actions such as metering, shaping, policing, and re-marking to ensure that traffic entering a DS network conforms to the network s DS policy. The traffic conditioning depends on the services supported in the DS network. One or more DS networks or parts of networks can constitute a DS domain, a network of DS nodes with a common service policy, including traffic conditioning, and a common set of PHBs. Two or more DS domains can constitute a DS region. The domains in a DS region may support different PHBs and different service policies; if so, the domains negotiate traffic conditioning at their common boundaries. B.5.3 Configuring the BANDIT to Use Diffserv The BANDIT products support of differentiated services conforms to RFC 2475 from the Internet Engineering Task Force (IETF). The user can enable or disable diffserv as part of configuration of the BANDIT s quality of service. The BANDIT reads the IP packet s DS field and forwards the packet as the bits indicate, using the PHB to determine the packet s next hop.

12 Page 12 Routing, Document B How to Configure the BANDIT Products to Use Diffserv BANDIT Plus IP Quality of Service ) Status : Disabled 2) DiffServing : Disabled 3) Quality of Service Table 4) Default Priority : Medium 1 On the IP Quality of Service menu, select DiffServing. The IP Differentiated Services menu is displayed. BANDIT Plus IP Differentiated Services ) Enable 2) Disable 2 Select Enable. The DiffServ options are enabled, and the IP Quality of Service menu is redisplayed. BANDIT Plus IP Quality of Service ) Status : Disabled 2) DiffServing : Enabled 3) Quality of Service Table 4) Default Priority : Medium B.6 VLAN Tagging and Prioritization In packet-switched networks, such as IP networks, Quality of Service (QoS) refers to packet delivery priority. Routers use specific criteria (for example, VLAN information) for policybased control, filtering packets out or passing packets to another node. Because broadcasts go to all devices in a LAN, devices can be overwhelmed with broadcast traffic if the LAN becomes very large. The IEEE Standard 802.1q proposes a solution: Subdivide the LAN into smaller groups for most traffic. The smaller groups, defined via software settings, are known as virtual local area networks (VLANs). By reducing the amount of bandwidth-consuming broadcasts to the entire LAN, the 802.1q standard improves delivery of time-sensitive traffic.

13 IP Quality of Service Page 13 An IP packet s VLAN is identified in a tag (field) in the MAC header or Ethernet header; this tag also indicates the packet s priority within its VLAN. Examples of VLANs include an engineering workgroup, an accounting network that includes members of several departments, or a marketing design team. A device can belong to more than one VLAN. Note: Use of a software ID, such as a VLAN tag, for organizing devices into a group is much simpler than use of physical wiring to delineate groups, especially when you need to change a group. Redefining a software ID is much quicker and more cost-effective than physical rewiring. In addition, two devices on different floors or buildings or regions can be in the same VLAN, regardless of wiring. Usually a VLAN is a subgroup of one LAN, but sometimes a VLAN can include parts of two or more LANs. The VLAN ID lets a VLAN be shared between LANs. B.6.1 The VLAN Tag IEEE Standard 802.1q, a base VLAN standard, defines the VLAN tag format in the MAC header or Ethernet header. Standard 802.1q specifies the use of a VLAN tag (field) and a VLAN ID, to divide the LAN into smaller groups. Per 802.1q, VLANs may be connected via media access control (MAC) bridges. The VLAN tag carries VLAN identification and priority across LAN technologies (such as Ethernet) that do not of themselves indicate priority. The VLAN tag has two parts: the 12-bit VLAN ID (allowing 4095 VLANs; one ID is reserved) and the 3-bit priority field (allowing 8 levels of priority). Note: Standard 802.1q increases the maximum IP packet size from 1518 to 1522 bytes. Ports on routers and other devices must not send VLAN packets to non-vlan-compliant devices, because non-compliant devices might drop VLAN packets. Use of VLANs works best if all switches in the network are VLAN-compliant. B.6.2 VLAN Priority IEEE Standard 802.1p, a supplement to Standard 802.1d, describes the packet s VLAN priority. Standard 802.1p specifies the following features: Up to eight queueing and access traffic priorities Priority assignment per MAC address or by port Dynamic filtering of the priorities B.6.3 Configuring VLAN Tagging and Prioritization VLANs can be configured by MAC address or by port. A user configures VLAN tagging to fit the network specifications. The VLAN tag and priority are used by each router in the LAN to forward or filter the packet, as appropriate. A device can have one VLAN for each MAC address; a device with more than one MAC address (for separate Ethernet ports) can belong to more than one VLAN. The BANDIT products support IEEE standards 802.1q and 802.1p. In the BANDIT products, VLAN tagging is configured by MAC address. VLAN tagging is implemented as part of the BANDIT s Ethernet port configuration.

14 Page 14 Routing, Document B How to Configure a Port for a VLAN 1 On the BANDIT device s Main Menu, select Advanced Configurations. Note: You can instead select Typical Configuration. In that case, select equivalent menu items to configure the ports. The Advanced Configurations menu is displayed. 2 On the Advanced Configurations menu, select Data Configurations. The Logical Port Protocol menu is displayed. 3 On the Logical Port Protocol menu, select an Ethernet port. The selected Ethernet port s Logical Port Attribute menu is displayed. BANDIT Plus Logical Port Attribute Menu ) Protocol : EtherNet 2) DHCP Type : No DHCP 3) VLAN Tagging Parameters : No VLAN Tagging 4) MAC Filters 5) Undefine Current Logical Port 4 Make sure DHCP Type says No DHCP. Warning: You cannot use DHCP and VLAN tagging on the same port. Only one of these features can be enabled on the port. 5 Select MAC Filters. The MAC Filters menu is displayed. BANDIT Plus MAC Filters ) Status : Disabled 2) MAC Table : 3) Default Action : Undefined 6 On the MAC Filters menu, Select Status. The MAC Filter Status menu is displayed.

15 IP Quality of Service Page 15 BANDIT Plus MAC Filter Status ) ENABLE 2) DISABLE 7 If you wish to use MAC filtering, select Enable; otherwise, select Disable. The MAC filter status is set, and the MAC Filter menu is redisplayed. Note: The filter Status applies to all records in the MAC Filter Table. If you change the status, all records in the table will change to the specified status. 8 On the MAC Filters menu, Select MAC Table. A prompt similar to the following is displayed. Empty MAC Filter Table Add an Entry? (Enter A(Add) or <ESC>): 9 Do one of the following: a To exit the MAC table, press the Escape key. The MAC Filter menu is redisplayed. b To add an entry, type a. A prompt requests a MAC address whose packets to allow to enter the port. Enter MAC Filter Address:(12 Hex Digits): c Type a MAC address whose packets to allow into the port, and press Enter. Note: If you wish to allow packets of all models of a product, you can type the hexadecimal digits that identify the product, and finish the MAC address with one asterisk (). All MAC addresses for BANDIT products start with 00a0eb. The address is accepted, and the updated MAC Filter Table is displayed.

16 Page 16 Routing, Document B MAC Filter Table for Port 4 Entry MAC Address Status Action 1 0:0:19:ab:ae:3d Enabled Allow Add or Delete an Entry? (Enter A(Add), D(Delete), or <ESC>): 10 Do one of the following: a If you have finished entering records for the MAC Filter Table, press Escape. The following message is displayed. Then the MAC Filter menu is redisplayed. MAC Filter Table Handling Complete b To delete an entry, type d. Then follow the instructions on the display. c To add another record to the table, type a. Then go to Step 9c. 11 On the MAC Filters menu, Select Default Action. The Default-Action MAC Filter Status menu is displayed. BANDIT Plus MAC Filter Status ) ALLOW 2) DENY 12 Select the default action for MAC addresses in the MAC Filter Table. The default action is set, and the MAC Filter menu is redisplayed. Note: The Default Action applies to all records in the MAC Filter Table. If you change the default action, all records in the table will change to the specified action. 13 Do one of the following. a When you have finished configuring this port, press Escape until you reach the Main Menu. Then Write (save) this configuration and Reset the BANDIT product. See Section 1.5, Saving (Writing) a Configuration, and Section 1.6, Resetting the Device. b To configure VLAN tagging, select VLAN Tagging Parameters. The VLAN Type menu is displayed.

17 IP Quality of Service Page 17 BANDIT Plus VLAN Type ) Add/Change VLAN Tag 2) Delete VLAN Tag 3) Continue Header as received - Passthru 14 Do one of the following: a If you do not wish to change the VLAN setting, press the Escape key. The VLAN settings for this port remain unchanged, and the Logical Port Attribute menu is redisplayed. Return to Step 13. b To have packets pass through without modifying their VLAN tags (including whether VLAN tags are present), select Continue Header as received - Passthru. Note: Although VLAN tags are sent through unchanged, the BANDIT observes the relationship of a packet s VLAN tag and MAC address, and updates the BANDIT s VLAN table when new or modified VLANs are observed. Passthrough (without VLAN modification) is configured, and the Logical Port Attribute menu is redisplayed. Return to Step 13. c To remove VLAN tagging for this port, select Delete VLAN Tag. This port is configured to remove VLAN tags for all packets that go through this port, and the Logical Port Attribute menu is redisplayed. Return to Step 13. d To add a VLAN tag for packets going out this port, or to change this port s VLAN tag for outgoing packets, select Add/Change VLAN Tag. The following prompt is displayed. Go to Step 15. Enter VLAN ID: 15 To add or change the VLAN tag for this port, do all of the following: a Type the VLAN ID for this port, and press Enter. (VLAN IDs range from 0 to The VLAN ID 0 indicates no VLAN. ) Note: Use of VLAN ID 0 ( no VLAN ) maintains the packet size at 1522 bytes. This differs from deleting the VLAN ID, which results in a packet size of 1518 bytes. The following prompt is displayed. Set CFI(Canonical Format Indicator)?(Enter Y(Yes) or N(No)):

18 Page 18 Routing, Document B b Set the CFI to N (no). (CFI is not used in Ethernet.) The following prompt is displayed. Enter Priority: c Type the priority for this port s VLAN packets, and press Enter. (The VLAN priority ranges from a low of 0 to a high of 7.) The VLAN tag has been configured, and the Logical Port Attribute menu is redisplayed. Packets that go out through this port will receive the indicated VLAN tagging. Incoming packets whose VLAN tags do not match this setting will be discarded. Return to Step 13. Note: Be sure to save (Write) this configuration before leaving the console and before the console times out. See Section 1.5, Saving (Writing) a Configuration, and Section 1.6, Resetting the Device. B.6.4 SNMP for VLAN Use The BANDIT s Simple Network Management Protocol (SNMP) also supports VLAN tagging. For information on using SNMP in the BANDIT products, see Using SNMP in the BANDIT Products.

! encor en etworks TM

! encor en etworks TM ! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on

More information

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture

Section 11.1, Simple Network Management Protocol. Section 11.2, Port Data Capture Chapter 11 SNMP and Port Data Capture This module discusses the Simple Network Management Protocol (SNMP) and the BANDIT device s Port Data Capture feature, and how they can be used to augment or enhance

More information

Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS

Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS What is Quality of Service (QoS)?... 2 Differentiated Services (DiffServ)... 2 Overview... 2 Example XYZ Corporation... 2 Components of

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Configuring a BANDIT Product for Virtual Private Networks

Configuring a BANDIT Product for Virtual Private Networks encor! enetworks TM Version A, March 2008 2013 Encore Networks, Inc. All rights reserved. Configuring a BANDIT Product for Virtual Private Networks O ne of the principal features in the BANDIT family of

More information

This chapter discusses Synchronous Data Link Control (SDLC) protocols that you can configure on a BANDIT device s ports. See the following sections:

This chapter discusses Synchronous Data Link Control (SDLC) protocols that you can configure on a BANDIT device s ports. See the following sections: encor! enetworks TM Version A, September 2010 2010 Encore Networks, Inc. All rights reserved. SDLC Protocol Configuration This chapter discusses Synchronous Data Link Control (SDLC) protocols that you

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

Chapter 5 Configuring QoS and Security

Chapter 5 Configuring QoS and Security Chapter 5 Configuring QoS and Security This chapter describes how to use the QoS tab and the Security tab: Using the QoS Tab Using the Security Tab Using the QoS Tab The navigation tabs on the top of the

More information

Revising a BANDIT Product s VPN Configuration

Revising a BANDIT Product s VPN Configuration encor! enetworks TM Version A.1, March 2010 2013 Encore Networks, Inc. All rights reserved. Revising a BANDIT Product s VPN Configuration T he BANDIT s standard VPN configuration is developed during the

More information

Chapter 4 Configuring the Switch

Chapter 4 Configuring the Switch Chapter 4 Configuring the Switch The navigation tabs across the top of the user interface provide access to all of the submenu screens which allow you to manage your GS748T Smart Switch. The features under

More information

Using the Telnet Protocol in a BANDIT Product

Using the Telnet Protocol in a BANDIT Product encor! enetworks TM Version A.1, March 2008 2013 Encore Networks, Inc. All rights reserved. Using the Telnet Protocol in a BANDIT Product Telnet is an asynchronous protocol over IP. A BANDIT device s Telnet

More information

his document provides guidelines for configuration of the C2C software.

his document provides guidelines for configuration of the C2C software. encor! enetworks TM Version A.1, January 2012 2012 Encore Networks, Inc. All rights reserved. C2C Configuration Guide T his document provides guidelines for configuration of the C2C software. Note: For

More information

Chapter 2 Quality of Service (QoS)

Chapter 2 Quality of Service (QoS) Chapter 2 Quality of Service (QoS) Software release 06.6.X provides the following enhancements to QoS on the HP 9304M, HP 9308M, and HP 6208M-SX routing switches. You can choose between a strict queuing

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches

Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches 6 Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches Contents Introduction................................................... 6-3 Terminology................................................

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Access Control Lists (ACLs)

Access Control Lists (ACLs) 7 Access Control Lists (ACLs) Contents Overview...................................................... 7-2 Stateful ACLs............................................... 7-2 ACL Types.................................................

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved.

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved. 2004 by NETGEAR, Inc. All rights reserved. Trademarks @2004 NETGEAR, Inc. NETGEAR, the Netgear logo, The Gear Guy and Everybody s connecting are trademarks of Netgear, Inc. in the United States and/or

More information

Quality of Service (QoS) on Netgear switches

Quality of Service (QoS) on Netgear switches Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected

More information

Configuration of the Airline Line Control Protocol

Configuration of the Airline Line Control Protocol encor! enetworks TM Version A, September 2010 2013 Encore Networks, Inc. All rights reserved. Configuration of the Airline Line Control Protocol This chapter discusses other protocols that you can configure

More information

HPE FlexNetwork 5130 HI Switch Series

HPE FlexNetwork 5130 HI Switch Series HPE FlexNetwork 5130 HI Switch Series ACL and QoS Configuration Guide Part number: 5998-8425a Software version: Release 11xx Document version: 6W101-20161221 Copyright 2015, 2016 Hewlett Packard Enterprise

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Motivation. An Architecture for Differentiated Services. Background. DSCP Field. Network Working Group (RFC2475)

Motivation. An Architecture for Differentiated Services. Background. DSCP Field. Network Working Group (RFC2475) Motivation An Architecture for Differentiated Services Network Working Group (RFC2475) S. Blake, D.Black, M. Carlson, E. Davies, Z.Wang, W. Weiss Presented by Tao Zhao To support various types of applications,

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

! encor e networks TM

! encor e networks TM ! encor e networks TM Revision I.2, April 2009 Document Part Number 14973.1001 Copyright 2009 Encore Networks, Inc. All rights reserved. BANDIT, BANDIT IP, and BANDIT Plus Installation Guide for ELIOS

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Information about Network Security with ACLs

Information about Network Security with ACLs This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. Finding Feature Information,

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

- QoS Classification and Marking -

- QoS Classification and Marking - 1 - QoS Classification and Marking - Classifying and Marking Traffic Conceptually, DiffServ QoS involves three steps: Traffic must be identified and then classified into groups. Traffic must be marked

More information

Integrated Service (IntServ) versus Differentiated Service (Diffserv)

Integrated Service (IntServ) versus Differentiated Service (Diffserv) Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook Computer Networking A Top- Down Approach Featuring the Internet ACN: IntServ and DiffServ

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Need management flexibility global vs. local Internet administrative

More information

NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1)

NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1) NB6 Series Quality of Service (QoS) Setup (NB6Plus4, NB6Plus4W Rev1) NB6 Series and Quality of Service (QoS) The following Quality of Service (QoS) settings offer a basic setup example, setting up 3 devices

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Chapter 9. VLANs. Concept Questions

Chapter 9. VLANs. Concept Questions Chapter 9 VLANs This chapter introduces virtual LANs (VLANs) and switched internetworking, compares traditional shared LAN configurations with switched LAN configurations, and discusses the benefits of

More information

Appendix B Virtual Local Area Networks (VLANs)

Appendix B Virtual Local Area Networks (VLANs) Appendix B Virtual Local Area Networks (VLANs) A local area network (LAN) can generally be defined as a broadcast domain. Hubs, bridges, or switches in the same physical segment or segments connect all

More information

IPedge System. Switch 1 Switch 2 VLAN ENABLED

IPedge System. Switch 1 Switch 2 VLAN ENABLED OVERVIEW To maintain Quality of Service (QoS) for VoIP, it is required that the network be designed to prioritize voice traffic over data traffic as voice quality is very sensitive to packet loss, delay

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No

More information

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone. Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 231 Chapter 20 Access Control Lists Network administrators face a dilemma: They must figure out how to deny unwanted access while allowing appropriate access. Although security tools such as passwords,

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

1. Firewall Configuration

1. Firewall Configuration 1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets

More information

Marking - DiffServ. CoS, IPP, & DSCP

Marking - DiffServ. CoS, IPP, & DSCP Marking - DiffServ CoS, IPP, & DSCP (C) Herbert Haas 2009/05/02 Differentiated Services The basic idea is the Per-Hop Behavior which is controlled by a QoS-tag within the IP packet header Stateless, connection-less

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

LAN Wizard CHAPTER2. Interface. Configure

LAN Wizard CHAPTER2. Interface. Configure CHAPTER2 The Cisco Router and Security Device Manager (Cisco SDM) LAN wizard guides you in the configuration of a LAN interface. The screen lists the LAN interfaces on the router. You can select any of

More information

IP Filter/Firewall Setup

IP Filter/Firewall Setup IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Course Overview Basics of Computer Networks Internet & Protocol

More information

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ)

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ) QoS in IP networks Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001 IETF Integrated Services (IntServ) Connection-oriented solution (end-to-end) QoS guarantees

More information

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics: Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged

More information

18: Enhanced Quality of Service

18: Enhanced Quality of Service 18: Enhanced Quality of Service Mark Handley Traditional best-effort queuing behaviour in routers Data transfer: datagrams: individual packets no recognition of flows connectionless: no signalling Forwarding:

More information

Thank you for purchasing a Panasonic Pure IP-PBX. Please read this manual carefully before using this product and save this manual for future use.

Thank you for purchasing a Panasonic Pure IP-PBX. Please read this manual carefully before using this product and save this manual for future use. IP Networking Guide Model No. Pure IP-PBX KX-NCP500 KX-NCP1000 Thank you for purchasing a Panasonic Pure IP-PBX. Please read this manual carefully before using this product and save this manual for future

More information

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has

More information

QoS in Axis Video Products

QoS in Axis Video Products Table of contents 1 Quality of Service...3 1.1 What is QoS?...3 1.2 Requirements for QoS...3 1.3 A QoS network scenario...3 2 QoS models...4 2.1 The IntServ model...4 2.2 The DiffServ model...5 2.3 The

More information

16-PORT POWER OVER ETHERNET WEB SMART SWITCH

16-PORT POWER OVER ETHERNET WEB SMART SWITCH 16-PORT POWER OVER ETHERNET WEB SMART SWITCH User s Manual (DN-95312) - 0 - Content Web Smart Switch Configure login ---------------------------------- 2 Administrator Authentication Configuration ---------------------------------------------

More information

E The TCP/IP Protocol Architecture

E The TCP/IP Protocol Architecture APPENDIX E The TCP/IP Protocol Architecture E.1 TCP/IP LAYERS...2 E.2 TCP AND UDP...3 E.3 OPERATION OF TCP/IP...4 E.4 TCP/IP APPLICATIONS...6 William Stallings Copyright 2008 Supplement to Computer Security:

More information

Access Control Lists (ACLs)

Access Control Lists (ACLs) Access Control Lists (ACLs) FEATURE OVERVIEW AND CONFIGURATION GUIDE Introduction This guide describes Access Control Lists (ACLs), and general ACL configuration information. For detailed command information

More information

Ethernet Switch ZyNOS 4.0

Ethernet Switch ZyNOS 4.0 IPv6 Address Architecture and New Header Ethernet Switch ZyNOS 4.0 Support Notes October 2011 Overview of IPv6 Address Architecture This specification defines the addressing architecture of the IP Version

More information

VLAN-Based Network Segmentation

VLAN-Based Network Segmentation PowerConnect Application Note #8 January 2004 VLAN-Based Network Segmentation This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect 52xx Abstract This

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

02-QOS-ADVANCED-DIFFSRV

02-QOS-ADVANCED-DIFFSRV IP QoS DiffServ Differentiated Services Architecture Agenda DiffServ Principles DS-Field, DSCP Historical Review Newest Implementations Per-Hop Behaviors (PHB) DiffServ in Detail DiffServ in other Environments

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Spanning Tree Protocol

Spanning Tree Protocol Spanning Tree Protocol And Other Advanced Ethernet Topics 2E1623 Data Links and Local Area Networks Learning Bridges Loop Problem From B. A. Forouzan: Data Communications and Networking, 3rd ed, McGraw-Hill

More information

Abstract. SGS; Reviewed: WCH/MIC 2/20/2003. Solution & Interoperability Test Lab Application Notes 2003 Avaya Inc. All Rights Reserved.

Abstract. SGS; Reviewed: WCH/MIC 2/20/2003. Solution & Interoperability Test Lab Application Notes 2003 Avaya Inc. All Rights Reserved. Deploying a Virtual Router Redundancy Protocol (VRRP) Strategy Between an Avaya P330 Multilayer Switch and an Avaya P580/P882 MultiService Switch with Multiple Masters - Issue 1.0 Abstract Network Managers

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

NQA Technology White Paper

NQA Technology White Paper NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics

More information

Ed. 00 GWIM. Firewall Handbook

Ed. 00 GWIM. Firewall Handbook Ed. 00 GWIM Firewall Handbook COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied, translated, transcribed

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Chapter 8. Internet Protocol (IP)

Chapter 8. Internet Protocol (IP) Chapter 8 Internet Protocol (IP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS DATAGRAM FRAGMENTATION OPTIONS CHECKSUM IP PACKAGE The McGraw-Hill Companies, Inc., 2000 2 Introduction to IP Connectionless

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

IEEE 802.1Q. Voice VLAN

IEEE 802.1Q. Voice VLAN 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

Getting Started. 16-Channel VoIP Gateway Card. Model No. KX-TDA0490

Getting Started. 16-Channel VoIP Gateway Card. Model No. KX-TDA0490 16-Channel VoIP Gateway Card Getting Started Model No. KX-TDA0490 Thank you for purchasing a Panasonic 16-Channel VoIP Gateway Card. Please read this manual carefully before using this product and save

More information

Grandstream Networks, Inc. VLAN (Virtual Local Area Network) Guide

Grandstream Networks, Inc. VLAN (Virtual Local Area Network) Guide Grandstream Networks, Inc. VLAN (Virtual Local Area Network) Guide Table of Contents SUPPORTED DEVICES... 4 INTRODUCTION... 5 ABOUT VLAN... 6 General... 6 Voice VLAN... 7 VLAN CONFIGURATION... 8 LLDP (Link

More information

IP - The Internet Protocol

IP - The Internet Protocol IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Getting Started KX-TDA5480

Getting Started KX-TDA5480 4-Channel VoIP Gateway Card Getting Started KX-TDA5480 Model KX-TDA0484 Thank you for purchasing the Panasonic 4-Channel VoIP Gateway Card, KX-TDA5480/KX-TDA0484. Please read this manual carefully before

More information

Routing Between VLANs Overview

Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs. This chapter describes VLANs.

More information

After completing this lesson, you will be able to do the following: Describe the basic process of IP routing.

After completing this lesson, you will be able to do the following: Describe the basic process of IP routing. Lesson 3-2: Routing At a Glance Routers perform many functions on a network, from segmenting large networks so that they work more efficiently to interconnecting networks that use different LAN or WAN

More information

20. Switched Local Area Networks

20. Switched Local Area Networks 20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 24 CHAPTER This chapter describes how to configure quality of service (QoS) by using standard QoS commands. With QoS, you can give preferential treatment to certain types of traffic at the expense of others.

More information

Chapter 4 Rate Limiting

Chapter 4 Rate Limiting Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or

More information

IEEE 802.1q - VLANs. Nick Poorman

IEEE 802.1q - VLANs. Nick Poorman IEEE 802.1q - VLANs Nick Poorman dot1q IEEE standard can be found here: http://standards.ieee.org/getieee802/802.1.h tml RFC 3069 can be found here: http://www.faqs.org/rfcs/rfc3069.html dot1q VLAN Tagging

More information

ETHERNET PACKET FILTERING for FTI PART II

ETHERNET PACKET FILTERING for FTI PART II ETHERNET PACKET FILTERING for FTI PART II Ø. Holmeide 1, J-F. Gauvin 2 1 OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com 2 OnTime Networks AS, Oslo, Norway jean.frederic@ontimenet.com Abstract:

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Voice Over IP Performance Assurance

Voice Over IP Performance Assurance Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance

More information

White Paper. Filtering in Distributed Taps TM

White Paper. Filtering in Distributed Taps TM Filtering in Distributed Taps TM White Paper Copyright 2003 2009. VSS Monitoring Inc. All rights reserved. By default, VSS Distributed Taps copy traffic received on the network input port(s) and forward

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Thank you for purchasing a Panasonic Pure IP-PBX. Please read this manual carefully before using this product and save this manual for future use.

Thank you for purchasing a Panasonic Pure IP-PBX. Please read this manual carefully before using this product and save this manual for future use. Panasonic Telephone Systems KX-TDE100 KX-TDE200 KX-TDE600 www.voicesonic.com Phone: 877-289-2829 IP Networking Guide Pure IP-PBX Panasonic KX-TDE100, KXTDE100, TDE100, KX-TDE200, KXTDE200, TDE200, KX-TDE600,

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

802.11n/b/g Wireless Outdoor. High Power Access Point. System

802.11n/b/g Wireless Outdoor. High Power Access Point. System 802.11n/b/g Wireless Outdoor High Power Access Point System version 1.0 User Manual 1 U Revision History Version Date Notes 0.2.4 August, 2013 Initial Version 0.2.8 January, 2014 Add some features 0.3.2

More information

Chapter 4 Configuring Switching Settings

Chapter 4 Configuring Switching Settings Chapter 4 Configuring Switching Settings Configuring Switching Settings The navigation pane at the top of the web browser interface contains a Switching tab that enables you to manage your GS700AT Series

More information

William Stallings Data and Computer Communications. Chapter 2 Protocols and Architecture

William Stallings Data and Computer Communications. Chapter 2 Protocols and Architecture William Stallings Data and Computer Communications Chapter 2 Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Direct

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information