Redundancy & the Netnod Internet Exchange Points
|
|
- Marcia Debra Gilbert
- 8 years ago
- Views:
Transcription
1 Redundancy & the Netnod Internet Exchange Points The extent to which businesses and consumers use the Internet for critical communication has been recognised for over a decade. Since the rise of the commercial Internet, maturity of processes and best practices for operating IP networks have increased many fold. You ll often hear about the topic of redundancy and its importance in maintaining the reliability, packet delivery, and latency commitments made to your user base. In this paper, we will cover redundancy and its importance in connecting to the Netnod Internet Exchange Points (IXPs) for intra-sweden content. Part 1: Explaining Network Redundancy What is network redundancy? Redundancy is the ability of a network to withstand a component failure without significantly affecting users, usually achieved through the use of secondary resources. For the sake of this paper, we ll define a failure event as an instance of a network component failure. Failure events do not necessarily equate to a loss of service for the network s users. Failure events may be invisible to users, or result in degraded service. Packet loss is one example of degraded service. In the worst case, a failure event results in loss of service, or outage, for all users or a subset of the user base. If the network is designed with redundancy, the network provider can minimise network outages. Network redundancy must be automatic, meaning that manual intervention on the part of a network engineer would not constitute true redundancy. The network availability requirements of modern IP networks are such that automated recovery mechanisms are critical. For example, a Skype VOIP call would be disconnected long before the network operator s engineers received an alarm about a failure event. Depending on the business requirements that underlie the network s design, a network may need to survive a single failure event, or some combination of failure events. Let s examine some common failure events on an IP network in three categories physical, power & environment, and logical. Physical Route processor failure Router card failure Router port failure Cable failure/fibre cut Power & Environment Power loss UPS failure Cooling failure Logical Routing protocol process crash Router inter-process communication failure Incorrect router configuration
2 Network designers use various methods to implement redundancy in packet-switched networks. Preparing for physical failure events is not difficult, although having multiple components in the network increases the cost. Designers can include multiple routers, links, and route processors for example. Possessing secondary resources ensures that the network remains able to offer a packet service to customers. Similar preparations can apply to power and environmental failures. A diesel generator could provide power in the case the main power source fails. Backup cooling systems protect against failure of the primary cooling system. Logical failure events are more challenging to withstand. These could take the form of router/switch software defects. Other than making vendor selections based on software reliability, operators have little ability to prevent software defects. What can be done in many cases is to configure the network such that software failure in one router does not affect the overall functioning of the network. However, human error causes many more problems than software defects. Even with rigorous change control process and configuration automation, mistakes happen. Adjusting processes and training based on each occurrence can help reduce though not eliminate human error. Failure events can affect the network s topology. Routing protocols such as Open Shortest Path First (OSPF) and Routing Information Protocol (RIP) were designed to detect changes in the topology and communicate the changes to the rest of the network. Using this new topology information, the routers determine how to route packets around link and router failures. Figure 1 shows an end user communicating with a server across an IP network. The packets use the north path in normal operating conditions. When a link between routers along that data path fails, the routers that experienced the failure send Link State Packets (LSP) to their neighbours (Figure 2). These LSPs are flooded throughout the network to update the network topology. Figure 3 illustrates how traffic has been re-routed to the south path. Figure 1- End User exchanging data with server
3 Figure 2- OSPF LSPs flooded after link fails Figure 3- Traffic re-routes to another path Routing protocols such as Border Gateway Protocol (BGP) use a simple keep-alive mechanism to detect failure. The routers are configured so that they send keep-alive messages on a specified interval and that they mark a neighbour as unreachable if keep-alives are not received. This scheme functions as designed, although the time it takes to detect failures is significant. Let s use an example. Router A sends Router B a BGP keep-alive message every ten seconds and vice versa. If three successive keep-alives are not received by Router A, Router A tears down the BGP session at the 30 second (10 multipled by 3) mark. Engineers can make the timer more aggressive; however, routing protocols are processed by the route processor, or central brain of the router. Trying to achieve sub-second failure detection would result in the route processor becoming overloaded.
4 Network designers recognised that an improved means of detecting failure was needed. The routers that service providers use in today s networks distribute computing resources rather than having all processing occur in the route processor. Processing is localised with network processor engines on each router card. While some control plane traffic must be sent to the central route processor, many other functions such as packet encapsulation can be performed on the card. Thus, placing a failure detection scheme on the router cards allowed for faster detection without overwhelming the router. Bidirectional Forwarding Detection (BFD) protocol emerged as a simple method for detecting loss of connectivity using IP. The use of BFD is critical on IP networks that do not have built-in failure detection at Layer 2 of the OSI protocol stack. Part 2: Redundancy at the Netnod Internet Exchange Point (IXP) Before delving into redundancy at Netnod, we ll examine the IXP service that Netnod offers. Netnod operates a Layer 2 IXP service in Stockholm, Göteborg, Malmö, Sundsvall, and Luleå. By connecting to an IXP, local ISPs have a common meet-me point to exchange Internet traffic. Keeping intra-country traffic local enables lower latency to reach content and reduces transit costs. Netnod is not involved in peering discussions between its tenants; all arrangement must be worked out between the two parties that want to interconnect. Once these agreements are completed, the two entities can exchange traffic. Figure 4 depicts, from a physical perspective, how ISPs can interconnect using IXPs. Each customer uses the local access provider to reach the IXP. IP packets flow between peers on the IXP as agreed upon by the parties.
5 Figure 4- Physical Connectivity to an IXP From a logical perspective, the customer routers function as though they are connected on a shared Ethernet segment. The interfaces that connect to IXPs on the customer routers would be configured with an IPv4 prefix and an IPv6 prefix. See Figure 5 for an illustration.
6 Figure 5- The logical view of IXP connectivity The technical configuration of the Netnod IXPs is very simple. There are few differences between them and a Gigabit Ethernet LAN. Netnod has a single Ethernet switch in each of its secure bunkers in the six cities. Connectivity relies upon virtual LANs (VLAN) as specified in the IEEE 802.1q standard. The customer router and the IXP switch exchange 802.1qtagged frames between one another. VLANs in an enterprise or service provider environment are often used for traffic separation. But, in this case, the use of VLANs is slightly different. The switch uses two common VLANs to accommodate two different maximum transmission unit (MTU) sizes. One VLAN tag is used for the commonly used 1500 byte MTU. If customers want to send frames between 1501 and 4470 bytes (jumbo frames), they use a second VLAN tag. There is no connection between the two VLANs at the IXP. Let s dispel a common misperception about VLANs and redundancy. When customers configure both VLAN tags on a single connection, the packets traverse a single fibre pair from the customer switch to the Netnod switch (see Figure 6). A fibre cut or network element failure will cause an outage. Therefore, the use of multiple VLANs alone is not a redundant set-up. A redundant set-up would require a physically separate connection to each VLAN.
7 Figure 6- Dual VLANs on Single Connection 1 Netnod has allocated both IPv4 and IPv6 address space for connectivity at the IXP. Each VLAN is assigned a /24 of IPv4 space (254 unique addresses) and a /64 of IPv6 space (2 64 unique addresses). Each IXP location uses different assigned IPv4 and IPv6 prefixes. However, there is no requirement for customers to use both IP protocols. Customer needs in this are driven by the connectivity arrangements with other tenants. How do customers connect to the Netnod IXP switches? The connectivity varies based on the city. The access method in Göteborg, Malmö, Sundsvall, and Luleå is dark fibre only. New customers work with a local access provider listed on the Netnod web site to order dark fibre connectivity to the Netnod IXP. The access provider will have the necessary information including destination point to enable the connection. In Stockholm, customers may connect to the IXP using dark fibre or Dense Wave Division Multiplexing (DWDM). Netnod orders the required dark fibre from Stokab. Alternatively, customers can connect via DWDM in the two Telecity data centres and InterXion s data centre. The customer is responsible for ordering the cross connects within the data centre to Netnod s DWDM transmission equipment. These connections are back hauled to the IXP bunkers. Having provided this information on the Netnod infrastructure and configuration, our focus for the following discussion will be on physical and logical failure events. Implementing power and environmental redundancy is independent of IXP connectivity; information on avoiding such failure events can be found on the Internet. Netnod infrastructure, such as the switches and DWDM switches, uses dual power feeds and is backed up by an uninterrupted power supply (UPS). While Netnod provides a highly available service, the availability experience of an individual customer is dependent on network design decisions made by the customer. The remainder of this paper will discuss Netnod s recommendations for implementing redundancy for IXP connectivity. These recommendations based on industry best practices stem from years of working with customers to minimise downtime for failure events external to the Netnod infrastructure. To help understand how redundancy should be implemented, let s delve into a simple set-up to connect to a Netnod IXP outside of Stockholm (note: Stockholm has a different architecture that will be addressed later). In this example, a customer has a single dark fibre connection between its point-of-presence and the IXP in Göteborg. The customer uses a single router that connects to both the Netnod IXP and the customer s transit provider. See Figure 7 for a depiction. 1 VLANs 15 and 16 are used in the Figures. These identifiers vary based on location.
8 Figure 7: Single connection to Göteborg site Failure events are inevitable in any network. This simple set-up to connect to the Göteborg site is not immune from such events. The potential failure events and outcomes should be documented for planning purposes. Since redundancy often involves back-up components or circuits, adding redundancy does involve costs. A provider can make the necessary business decisions on whether or not to invest in redundancy for a given failure event by prioritizing a failure event list by severity of the outcome. The table below depicts potential failure events, outcomes, and severities for the Göteborg example. Severities range from one (highest) to five (lowest). Failure Event ROUTER- 1 router crashes ROUTER- 1 router port fails for port to IXP ROUTER- 1 router port fails for port to transit provider Outcome Customer A network cannot reach Internet via IXP or transit provider Customer A network can still reach Internet via transit provider (likely more expensive per bit) Customer A network will only have access to local content from the IXP Severity (1 to 5) 1 3 1
9 Netnod switch's port to Customer A fails Netnod switch fails Customer A network can still reach Internet via transit provider Customer A network can still reach Internet via transit provider 3 3 Table 1: Failure Events for Non-redundant Scenario Redundancy can be added to Customer A s connectivity to the IXP by installing a second Internet-facing router and adding a second connection to Göteborg and the transit provider. Now the customer s ability to reach the IXP switch is unaffected if one of the two tail circuits is affected by failure events such as router crashes, router card crashes, and fibre cuts. Any single one of these events would result in the routing protocol routing around the failure. Customer A would continue to reach the IXP for any of these, though not necessarily a combination of them. For this reason, customer should consider the probability of multiple failures and invest or not invest as required. A redundant connection to the Göteborg IXP is depicted in Figure 8
10 Figure 8 Redundant connection to the Göteborg IXP Here are some of the corresponding failure events for the redundant scenario. Failure Event ROUTER- 1 router crashes ROUTER- 2 router crashes ROUTER- 1 router port fails for port to IXP or port to transit provider Netnod switch's port to Customer A fails Netnod switch fails Outcome Traffic bound for the Internet uses transit link or IXP link on ROUTER- 2 Traffic bound for the Internet uses transit link or IXP link on ROUTER- 1 Traffic re- routes that used the failed port re- routes to ROUTER- 2 Customer A network can still reach Internet via transit provider Customer A network can still reach Internet via transit provider Severity (1 to 5) Table 2: Failure Events for Redundant Scenario Netnod s infrastructure in Stockholm differs from other locations in that there are two switches located at separate facilities. This adds resiliency to IXP connectivity for customers that are connected to both switches. The switches each have two VLANs like all Netnod switches. There is no connection between the two Stockholm switches. A customer could connect to one Stockholm switch in a basic, non-redundant set-up. This is depicted in Figure 9.
11 Figure 9- Non-redundant connection to one Stockholm switch For redundant access to Netnod in Stockholm, customers should connect to both switches (preferably using different routers at the customer premises). This dual connectivity to peers in Stockholm will deliver higher availability for access to local content. Figure 10 illustrates redundant access in Stockholm.
12 Figure 10- Redundant Access to Both Stockholm Netnod Switches Let s return to the subject of the two VLANs for different MTUs discussed earlier in the paper. While configuring both VLANs from a customer router to a switch is not redundant in itself, the configuration of two VLANs between customer routers and Netnod switches adds redundancy to IXP connectivity. See Figure 11 for a depiction of two VLANs on two physical connections to the IXP switch.
13 Figure 11- Dual VLANs per connection Adding redundancy in IXP connectivity design is not a configure and forget operation. Network environments are very dynamic: configurations change, hardware is augmented, hardware is removed, and engineers may change positions. For these reasons, verifying redundancy is crucial. Many ISPs have scheduled times during maintenance windows to manually force failure events. If redundancy exists, no outage should result. This regular testing prevents engineers from having to explain to stakeholders (for example, management and customers) why redundancy was claimed but did not prevent an outage.
14 Conclusion Redundancy is a fundamental component of sound network design. This use of secondary network resources both physical and logical prevents failure events from causing customer-affecting outages. For the Netnod IXPs, redundancy helps ensure the availability of the IXP service. A vital take-away from this paper is that availability of IXP connectivity is predicated on customer design decisions. Making decisions with redundancy in mind will increase availability of local content
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
More informationJuniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
More informationJuniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
More informationLeased Line + Remote Dial-in connectivity
Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer
More informationAPPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
More informationMPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
More informationVoice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
More informationFibre Channel over Ethernet in the Data Center: An Introduction
Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification
More informationData Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationNetwork Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology jili@cc.hut.fi Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
More informationVocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationTechBrief Introduction
TechBrief Introduction Leveraging Redundancy to Build Fault-Tolerant Networks The high demands of e-commerce and Internet applications have required networks to exhibit the same reliability as the public
More informationAddressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
More informationVirtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationTRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
More informationLAB TESTING SUMMARY REPORT
Key findings and conclusions: Cisco Nonstop Forwarding with Stateful Switchover drastically reduces mean time to repair (MTTR) Delivered zero route flaps with BGP, OSPF, IS-IS and static routes during
More informationDemonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
More informationVLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
More informationWAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
More informationEnterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,
More informationData Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
More informationJive Core: Platform, Infrastructure, and Installation
Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive
More informationBFD. (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45
BFD (Bidirectional Forwarding Detection) Does it work and is it worth it? Tom Scholl, AT&T Labs NANOG 45 What is BFD? BFD provides a method to validate the operation of the forwarding plane between two
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationWHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationSwitching in an Enterprise Network
Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of
More informationICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks
ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks Release: 1 ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks Modification
More informationIntroduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
More informationTroubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
More informationRohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
More informationThe Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
More informationAdvanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
More informationCisco Data Centre: Introducing Cisco Data Center Networking
coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationVPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationAWS Direct Connect. User Guide API Version 2013-10-22
AWS Direct Connect User Guide AWS Direct Connect: User Guide AWS Direct Connect User Guide Table of Contents What is AWS Direct Connect?... 1 Requirements... 1 How Do I...?... 2 Getting Started... 3 Getting
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationDesigning Reliable IP/MPLS Core Transport Networks
Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture
More informationDisaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada (shigeki@nii.ac.jp)
More informationMikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More information- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationCisco Catalyst 3750 Metro Series Switches
Cisco Catalyst 3750 Metro Series Switches Product Overview Q. What are Cisco Catalyst 3750 Metro Series Switches? A. The Cisco Catalyst 3750 Metro Series is a new line of premier, customer-located switches
More informationTransport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
More informationWANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska
WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.
More informationCHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
More information51-30-10 Selecting a Firewall Gilbert Held
51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More informationMPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
More informationCCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationRedundancy for Corporate Broadband
Redundancy for Corporate Broadband WHITE PAPER December, 2012 Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless
More informationObjectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
More informationSoftware Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
More informationIsilon IQ Network Configuration Guide
Isilon IQ Network Configuration Guide An Isilon Systems Best Practice Paper August 2008 ISILON SYSTEMS Table of Contents Cluster Networking Introduction...3 Assumptions...3 Cluster Networking Features...3
More informationHow To Build A Network For Storage Area Network (San)
White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationHigh Availability. PAN-OS Administrator s Guide. Version 7.0
High Availability PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationIP interconnect interface for SIP/SIP-I
Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...
More informationThe Complete IS-IS Routing Protocol
Hannes Gredler and Walter Goralski The Complete IS-IS Routing Protocol 4y Springer Contents Foreword Credits and Thanks vii ix 1 Introduction, Motivation and Historical Background 1 1.1 Motivation 1 1.2
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationWhitepaper. A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity
Whitepaper A Practical Guide to ISP Redundancy and Uninterrupted Internet Connectivity Table of Content Executive Overview 1 The Challenge 1 The Solution: Multi-Link Technology 3 Making Your VPNs Reliable
More informationNetwork Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationDatacenter Rack Switch Redundancy Models Server Access Ethernet Switch Connectivity Options
Datacenter Rack Switch Redundancy Models Server Access Ethernet Switch Connectivity Options NANOG46 June 16, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com Introductions Slide 1 Server
More informationTÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical
More informationCisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
More informationCustomer Managed Connectivity - Milan
Customer Managed Connectivity - Milan Service and Technical Description December 2015 Version 1 Table of Contents 1.0 Document Scope 3 1.1 1.2 1.3 1.4 Structure of this document 3 Version History 3 Use
More informationIXP Member connection Best Practice. Kittinan Sriprasert BKNIX kittinan@bknix.co.th
IXP Member connection Best Practice Kittinan Sriprasert BKNIX kittinan@bknix.co.th Agenda Prerequisites How to Connect to BKNIX Topology Overview Logical Connection Physical Connection Best Connection
More informationRanch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
More informationUsing High Availability Technologies Lesson 12
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
More informationApplication Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationMPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationHigh Availability. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
High Availability Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationMPLS Architecture for evaluating end-to-end delivery
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-
More informationWhite paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationMathatma Gandhi University
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
More informationWhat is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
More informationThe OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
More informationSolutions Guide. Ethernet-based Network Virtualization for the Enterprise
Solutions Guide Ethernet-based Network Virtualization for the Enterprise Introduction The concept of Tunnelling Layer 2 and Layer 3 connections across a shared Layer 2 network used to be the preserve of
More informationLayer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationThis chapter covers four comprehensive scenarios that draw on several design topics covered in this book:
This chapter covers four comprehensive scenarios that draw on several design topics covered in this book: Scenario One: Pearland Hospital Scenario Two: Big Oil and Gas Scenario Three: Beauty Things Store
More informationNEN Community REANNZ. Design Statement: NEN Edge Device
TO FROM NEN Community REANNZ DATE June 2010 SUBJECT Design Statement: NEN Edge Device Background This National Education Network (NEN) design statement was developed by REANNZ with input from the relevant
More information