G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15"

Transcription

1 G.80 Ethernet Ring Protection Overview March, 008 ITU-T Q9 SG 5

2 genda G.80 Recommendation Introduction G.80 Objectives and Principles G.80 Concepts G.80 Protection Switching G.80 R-PS Messages G.80 Items Under Study

3 ITU-T SG5/Q9 G.80 Recommendation G.80 Recommendation consented February 008 This Recommendation defines the PS protocol and protection switching mechanisms for ETH layer ring topologies. Included are details pertaining to bridged ring protection characteristics, architectures and the ring PS protocol. G.80 Proposals and Contributions G.80 Recommendation Consent G.80 Objective, Principles, and Requirements Setting G.80 Converged Proposals G.80 ERP Work Item pproved in ITU-T J N F E M R P R M Y J U N J U L U G S E P O C T N O V D E C J N F E M R P R M Y J U N J U L U G S E P O C T N O V D E C J N F E M R

4 G.80 Objectives and Principles Use of standard 80 MC and OM frames around the ring. Uses standard 80.Q (and amended Q bridges), but with xstp disabled. Ring nodes supports standard FD MC learning, forwarding, flush behaviour and port blocking/unblocking mechanisms. Prevents loops within the ring by blocking one of the links (either a pre-determined link or a failed link). Monitoring of the ETH layer for discovery and identification of Signal Failure () conditions. Protection and recovery switching within 50 ms for typical rings. Total communication for the protection mechanism should consume a very small percentage of total available bandwidth.

5 G.80 Terms and Concepts Ring Protection Link () Link designated by mechanism that is blocked during Idle state to prevent loop on ridged ring Owner Node connected to that blocks traffic on during Idle state and unblocks during Protected state Link Monitoring Links of ring are monitored using standard ETH CC OM messages (CFM) Signal Fail () Signal Fail is declared when ETH trail signal fail condition is detected No Request (NR) No Request is declared when there are no outstanding conditions (e.g.,, etc.) on the node Ring PS (R-PS) Messages Protocol messages defined in Y.7 and G.80 utomatic Protection Switching (PS) Channel - Ring-wide VLN used exclusively for transmission of OM messages including R-PS messages 5

6 G.80 Timers G.80 specifies the use of different timers to avoid race conditions and unnecessary switching operations WTR (Wait to Restore) Timer Used by the Owner to verify that the ring has stabilized before blocking the after Recovery Hold-off Timers Used by underlying ETH layer to filter out intermittent link faults Faults will only be reported to the ring protection mechanism if this timer expires 6

7 Controlling the Protection Mechanism Protection switching triggered by Detection/clearing of Signal Failure () by ETH CC OM Remote requests over R-PS channel (Y.7) Expiration of G.80 timers R-PS requests control the communication and states of the ring nodes Two basic R-PS messages specified - R-PS() and R-PS(NR) Owner may modify the R-PS(NR) indicating the is blocked: R-PS(NR,R) Ring nodes may be in one of two states Idle normal operation, no link/node faults detected in ring Protecting Protection switching in effect after identifying a signal fault 7

8 Ring Idle State. Physical topology has all nodes connected in a ring. ERP guarantees lack of loop by blocking the (link between 6 & in figure) C. Logical topology has all nodes connected without a loop. Owner D. Each link is monitored by its two adjacent nodes using ETH CC OM messages E. Signal Failure as defined in Y.7, is trigger to ring protection Loss of Continuity Server layer failure (e.g. Phy Link Down) 6 5 Physical topology Logical topology

9 Protection Switching Link Failure. Link/node failure is detected by the nodes adjacent to the failure.. The nodes adjacent to the failure, block the failed link and report this failure to the ring using R-PS () message C. R-PS () message triggers Owner unblocks the ll nodes perform FD flushing D. Ring is in protection state E. ll nodes remain connected in the logical topology. R-PS() 6 R-PS() R-PS() Owner Physical topology R-PS() Logical topology 5

10 Protection Switching Failure Recovery. When the failed link recovers, the traffic is kept blocked on the nodes adjacent to the recovered link. The nodes adjacent to the recovered link transmit R- PS(NR) message indicating they have no local request present C. When the Owner receives R- PS(NR) message it Starts WTR timer D. Once WTR timer expires, Owner blocks and transmits R-PS (NR, R) message E. Nodes receiving the message perform a FD Flush and unblock their previously blocked ports F. Ring is now returned to Idle state R-PS(NR) R-PS(NR) Physical topology Logical topology R-PS(NR, R) R-PS(NR) Owner R-PS(NR, R-PS(NR) R)

11 Signaling Channel Information ERP uses R-PS messages to manage and coordinate the protection switching R-PS defined in Y.7 - OM common fields are defined in Y.7. Version for this version of Recommendation OpCode defined to be 0 in Y.7 Flags should be ignored by ERP MEL Version (0) OpCode (R-PS = 0) Flags (0) TLV Offset () 5.. R-PS Specific Information ( octets) 7 [optional TLV starts here; otherwise End TLV] last End TLV (0) Defined by Y.7 Defined by G.80 Non-specified content

12 R-PS Specific Information Specific information (octets) defined by G.80 Request/Status(bits) 0 = 0000 = NR Other = Future Status R (bit) Set when is blocked (used by Owner in NR) Status DNF (bit) Set when FD Flush is not necessary (Future) NodeID (6octets) MC address of message source node (Informational) Reserved(bits), Status Reserved(6bits), Reserved(octets) - Future development Request /State Reserved Status Node ID (6 octets) R D N F Status Reserved (Node ID) Reserved ( octets)

13 Items Under Study G.80 is currently an initial recommendation that will continue to be enhanced. The following topics are under study for future versions of the recommendation: a) Interconnected rings scenarios: shared node, shared links b) blocked at both ends configuration of the ring where both nodes connected to the control the protection mechanism c) Support for Manual Switch administrative decision to close down a link and force a recovery situation are necessary for network maintenance d) Support for Signal Degrade scenarios SD situations need special consideration for any protection mechanism e) Non-revertive mode llows the network to remain in recovery configuration either until a new signal failure or administrative switching f) Displacement Displacement of the role of the to another ring link flexibly in the normal (idle) condition g) In-depth analysis of different optimizations (e.g., FD flushing) h) Etc.

14 Thank You

15 ackup 5

16 G.80 asic Functions Robustness: Source Steering Protection Connectivity: Unicast, MC and C Data Transfers Failure Multicast Flow Unicast Flow 50ms Switch Times 6

17 ERP Functionality Decomposition Local Requests (operator) Local Priority Logic Top Priority Local Request / clear / Clear Local Defect Logic (E) Local Defect Logic (W) ETH_CI_S (E) ETH_CI_S (W) ETH_CI_RPS (E) ETH_CI_RPS (W) Validity Check Request/State + Status Guard Timer Request/State + Status Top Priority Request Priority Logic WTR Running WTR Expire WTR Timer Start/ Stop MI Owner Start/Stop R-PS Request Processing R-PS Request/State + Status Stop Tx R-PS R-PS Message Transmission ETH_CI_RPS (E) ETH_CI_RPS (W) Inputs Local node requests, ETH signals, R-PS messages, WTR Timer. Filters Local Priority Logic, Validity Check, Guard Timer, Priority Logic guarantee that highest priority message arrives for processing. 7 lock/unblock ring ports Flush FD ERP Processing R-PS Request Processing processes filtered message according to State Machine with knowledge of current state and - Owner indication Outputs Node functions (FD Flushing, lock/unblock port), sending (or stopping) R-PS messages

18 State Machine Three node states Initialization when first defining the ring (Idle) the normal state of the ring nodes with blocked and all nodes/ports working (Protecting) when protection switching is in effect, unblocked, other (usually fault) link is blocked. Different input messages assigned priority as appears in the State Machine description. Priority mechanism to allow proper reaction to faults State Machine describes the actions to be taken by the node dependent on current state and input message. Only message with highest priority will pass through the filtering. Different actions include transmission of R- PS message, blocking/unblocking a port, flushing the FD, switching current state of node, and starting/stopping timers. Node State * (Idle) Inputs High Priority request Initialization Local Local Clear R-PS() WTR Expires WTR Running R-PS(NR, R) R-PS(NR) Row # ctions Stop guard timer Stop WTR timer If Owner: lock port Unblock non- port Tx R-PS (NR, R) Else: lock both ports Stop Tx R-PS lock failed port; Unblock non Failed port; Tx R-PS(); Flush FD; No action Unblock non Failed port; Stop Tx R-PS If not DNF Flush FD; No action No action Unblock non- port No action Outputs Next node state 8

19 State Machine FD flushing will clear all of the learned filtering rules within the node. Current Recommendation includes basic optimization only flushing once on fault discovery and once on recovery. DNF status flag is for future definition Node State Inputs High Priority request Local Row # 8 ctions Outputs lock failed port; Unblock non Failed port; Stop WTR; Tx R-PS(); Next node state Local Clear 9 Start guard timer, Tx R-PS(NR), R-PS() 0 Stop WTR, Unblock non Failed port, Stop Tx R-PS (Prote cting) WTR Expires lock port, Unblock non- port Tx R-PS (NR,R) Flush FD, WTR Running No action R-PS(NR, R) If not Owner: Unblock both ports, Stop Tx R-PS, If not DNF Flush FD R-PS(NR) If Owner: Start WTR 9

20 Switching Triggers Detection/Clearing of (Signal Fail): : Loss of CCM, signal passed up from underlying (sub)layer Switching is performed when hold-off timer expires after detection of. Operator s request: Lockout, Forced switch, Manual switch, Clear (for future specification) Remote request: Switching request indicated in received R-PS information from the other node. Protection switching algorithm is based on priorities assigned to all triggers 0

21 Ethernet Rings and the Ethernet nodes connected in a ring topology. Each node connected to two neighbors via links (E & W ports) Deterministic network topology void loops within ring by blocking a designated link () Node responsible to control the blocking state of is owner is unblocked during protection state and may revert to blocked during recovery ETH_FF ETH_C ERP Cntrol Process ERP control ring node ring link ring link ETH_FF ring node ring node C ring protection link () control ETH_C control ERP ERP ERP Control Process ring link connection point (blocked) cont rol ERP ring node D ERP Control Process Owner ETH_FF ETH_C ETH_C ETH_FF ERP Cont rol Process

22 Scenario - Normal to Protection C D E F G Owner Normal failure C D E Flush Flush Flush Flush Flush Flush Flush 50 ms Protection state F G. Normal State. Failure Occurs C. Nodes C and D detect local Signal Failure condition and after respecting hold-off time and lock failed port [row ] D. Node C and D periodically send message, on both ring ports, while condition persists. Each node performs a FD Flush when receiving the message E. Owner receives message and unblocks its end of link [row ] F. Stable State messages on the ring G. Further messages trigger no further action [row0] Message source Client ch block R-PS ch block

23 Scenario recovery Protection state C NR NR D E C D E F G NR failure recovery NR Owner NR NR Confirmation time Normal F G H Flush NR, locked NR, locked Flush Flush Flush Flush Flush NR, locked NR, locked Flush NR, locked NR NR, locked 50 ms. Stable condition Nodes C and D continue to send message every 5 secs.. Recovery of Link failure C. Nodes C and D detect clearing of condition, start guard timer and initiate periodical transmission of NR message on both ring ports. ( Guard timer prevents reception of R-PS messages) [row 9] D. When the Owner receives NR message, it starts the WTR timer [row ] E. When node C and D expire the guard timer, they may accept the new R-PS messages that they receive. [in guard timer] F. t expiration of WTR timer, owner blocks its end of the, sends, NR R message [row ] G. Each node that receives the NR,R message it flushes its FD. When Nodes C and D receive NR R message, they remove block on their blocked ports. [row ] H. Stable normal condition all nodes in Idle state

Ethernet Ring Protection for Carrier Ethernet Networks

Ethernet Ring Protection for Carrier Ethernet Networks Ethernet Ring Protection for Carrier Ethernet Networks Jeong-dong Ryoo, ETRI Hao Long and Yang Yang, Huawei Technologies Marc Holness, Nortel Networks Zahir Ahmad and J. Kevin Rhee, Information and Communications

More information

ITU-T G.8032 Ethernet Ring Protection Switching

ITU-T G.8032 Ethernet Ring Protection Switching The feature implements protection switching mechanisms for Ethernet layer ring topologies. This feature uses the G.8032 Ethernet Ring Protection (ERP) protocol, defined in ITU-T G.8032, to provide protection

More information

TRILL Large Layer 2 Network Solution

TRILL Large Layer 2 Network Solution TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network

More information

The ABCs of Spanning Tree Protocol

The ABCs of Spanning Tree Protocol The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

Remote I/O Network Determinism

Remote I/O Network Determinism Remote I/O Network Determinism September 2011 by David Doggett & Manuel J. Palomino Make the most of your energy Summary Executive Summary... p 3 Introduction... p 4 Network Determinism vs Overall Performance...

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

Chapter 46 Link Layer Discovery Protocol (LLDP)

Chapter 46 Link Layer Discovery Protocol (LLDP) Chapter 46 Link Layer Discovery Protocol (LLDP) Introduction...46-3 LLDP Overview...46-3 Type Length Values... 46-4 Transmission and Reception... 46-5 Storing LLDP Information... 46-7 Configuring LLDP...46-9

More information

Can PowerConnect Switches Be Used in IP Multicast Networks?

Can PowerConnect Switches Be Used in IP Multicast Networks? PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect

More information

Token-ring local area network management

Token-ring local area network management Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area

More information

Link Layer Discovery Protocol

Link Layer Discovery Protocol 12 Link Layer Discovery Protocol Contents Overview..................................................... 12-2 LLDP..................................................... 12-2 LLDP Messages............................................

More information

June 2006. Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2

June 2006. Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2 Bridge & Switch Pietro Nicoletti Piero[at]studioreti.it Bridge-Switch-Engl - P. Nicoletti: see note pag. Copyright note These slides are protected by copyright and international treaties. The title and

More information

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs Channel Bonding in DOCSIS 3.0 Greg White Lead Architect Broadband Access CableLabs Agenda DS Channel Bonding Protocol Receive Channel Profiles US Channel Bonding Protocol HFC Plant Topologies & Resolution

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Resilient Network Interconnect using Distributed Link Aggregation Version 2. Stephen Haddock August 31, 2010

Resilient Network Interconnect using Distributed Link Aggregation Version 2. Stephen Haddock August 31, 2010 Resilient Network Interconnect using Distributed Link Aggregation Version 2 Stephen Haddock August 31, 2010 1 Premise and Basic Questions Adapting Link Aggregation to be a Resilient Network Interconnect

More information

OAM Operations Administration and Maintenance

OAM Operations Administration and Maintenance OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the

More information

2.0 System Description

2.0 System Description 2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

Giving life to today s media distribution services

Giving life to today s media distribution services Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of

More information

Accelerating Development and Troubleshooting of Data Center Bridging (DCB) Protocols Using Xgig

Accelerating Development and Troubleshooting of Data Center Bridging (DCB) Protocols Using Xgig White Paper Accelerating Development and Troubleshooting of The new Data Center Bridging (DCB) protocols provide important mechanisms for enabling priority and managing bandwidth allocations between different

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

How To. Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops. Introduction

How To. Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops. Introduction How To Configure Ethernet Protection Switching Ring (EPSR) to Protect a Ring from Loops Introduction Putting a ring of Ethernet switches at the core of a network is a simple way to increase the network

More information

Ajay Gummalla-July 2001

Ajay Gummalla-July 2001 DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way

More information

COMPUTER NETWORKS - LAN Interconnection

COMPUTER NETWORKS - LAN Interconnection LAN interconnection Telecommunication s Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS - LAN interconnection- 1 Copyright Quest opera è protetta dalla licenza Creative

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks

More information

Chapter 4. Distance Vector Routing Protocols

Chapter 4. Distance Vector Routing Protocols Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

FOUNDATION Fieldbus High Speed Ethernet Control System

FOUNDATION Fieldbus High Speed Ethernet Control System FOUNDATION Fieldbus High Speed Ethernet Control System Sean J. Vincent Fieldbus Inc. Austin, TX, USA KEYWORDS Fieldbus, High Speed Ethernet, H1, ABSTRACT FOUNDATION fieldbus is described in part by the

More information

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Ring Span Bandwidth Management in RPR

Ring Span Bandwidth Management in RPR RPR Ring Span Bandwidth Management in RPR Pankaj K Jha Cypress Semiconductor pkj@cypress.com pkj_bwmgt_01.pdf 1 802-17-01-0032 A High traffic density B Different BW on RPR Spans H G RPR In a mid/large

More information

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009 Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208

More information

Provider Link State Bridging

Provider Link State Bridging ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1

More information

Extending Networking to Fit the Cloud

Extending Networking to Fit the Cloud VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at

More information

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone. Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over

More information

Resiliency in Ethernet Based Transport Networks

Resiliency in Ethernet Based Transport Networks Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

IxNetwork TM MPLS-TP Emulation

IxNetwork TM MPLS-TP Emulation IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers

More information

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Sample Configuration for using Link Layer Discovery Protocol (LLDP) with Cisco Catalyst 4500 or 3750 Switches for VLAN assignment to Avaya 4600 Series IP Telephones

More information

Automatic device configuration for Ethernet ring redundancy protocols

Automatic device configuration for Ethernet ring redundancy protocols Automatic device configuration for Ethernet ring redundancy protocols Oliver Kleineberg, Michael Ries, Markus Rentschler Hirschmann Automation & Control GmbH Stuttgarter Straße 45-51 DE-72654 Neckartenzlingen

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Designing Reliable IP/MPLS Core Transport Networks

Designing Reliable IP/MPLS Core Transport Networks Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Tutorial. www.ccontrols.com

Tutorial. www.ccontrols.com Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services

More information

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged

More information

SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED

SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL

More information

LIN (Local Interconnect Network):

LIN (Local Interconnect Network): LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Virtual PortChannel Quick Configuration Guide

Virtual PortChannel Quick Configuration Guide Virtual PortChannel Quick Configuration Guide Overview A virtual PortChannel (vpc) allows links that are physically connected to two different Cisco Nexus 5000 Series devices to appear as a single PortChannel

More information

Bridgewalling - Using Netfilter in Bridge Mode

Bridgewalling - Using Netfilter in Bridge Mode Bridgewalling - Using Netfilter in Bridge Mode Ralf Spenneberg, ralf@spenneberg.net Revision : 1.5 Abstract Firewalling using packet filters is usually performed by a router. The packet filtering software

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led

Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

Data Center Quantized Congestion Notification (QCN): Implementation and Evaluation on NetFPGA. 2010 June 14th

Data Center Quantized Congestion Notification (QCN): Implementation and Evaluation on NetFPGA. 2010 June 14th Data Center Quantized Congestion Notification (QCN): Implementation and Evaluation on NetFPGA 2010 June 14th Masato Yasuda (NEC Corporation) Abdul Kader Kabanni (Stanford University) Background In data

More information

Juniper / Cisco Interoperability Tests. August 2014

Juniper / Cisco Interoperability Tests. August 2014 Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

How Much Broadcast and Multicast Traffic Should I Allow in My Network?

How Much Broadcast and Multicast Traffic Should I Allow in My Network? PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

IEEE 802.1Q. Voice VLAN

IEEE 802.1Q. Voice VLAN 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus. Two types of messages are used: Token messages T ID, nextid ID

Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus. Two types of messages are used: Token messages T ID, nextid ID Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass

More information

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM

Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes

More information

Gigabit-capable Passive Optical Networks (GPON): General characteristics

Gigabit-capable Passive Optical Networks (GPON): General characteristics Gigabit-capable Passive Optical Networks (GPON): General characteristics SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital sections and digital line system Optical line systems

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Using FPGAs to Design Gigabit Serial Backplanes. April 17, 2002

Using FPGAs to Design Gigabit Serial Backplanes. April 17, 2002 Using FPGAs to Design Gigabit Serial Backplanes April 17, 2002 Outline System Design Trends Serial Backplanes Architectures Building Serial Backplanes with FPGAs A1-2 Key System Design Trends Need for.

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Based on Time- Triggered Ethernet with Multiple Ring Topologies University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Need for mixed-criticality systems due to

More information

PCTV Systems Requirements for using DistanTV mobile

PCTV Systems Requirements for using DistanTV mobile PCTV Systems Requirements for using DistanTV mobile PCTV Systems Requirements for using DistanTV mobile GB/US February 2010 2010 PCTV Systems S.à r.l. All rights reserved. No part of this manual may be

More information

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer ECE 358: Computer Networks Solutions to Homework #4 Chapter 4 - The Network Layer P 4. Consider the network below. a. Suppose that this network is a datagram network. Show the forwarding table in router

More information