Deterministic Ethernet and the Intrinsic Value of Synchronization
|
|
|
- Julia Malone
- 10 years ago
- Views:
Transcription
1 Deterministic Ethernet and the Intrinsic Value of Synchronization Norman Finn Cisco Fellow WSTS June 2014 NIST-ATIS WSTS San Jose CA June
2 NIST-ATIS WSTS San Jose CA June
3 IEEE 1588 technology could conquer the world. (Of time.) Growing acceptance, both in use and in experimentation, for: Service provider radio mobile base station Real-time process and machine control Interference reduction in unlicensed radio applications Wireless location services Audio / video production, editing, and presentation Cryptographic security applications Delivering zero-congestion-loss and fixed-latency packet networking Packetizing and generalizing the dedicated digital signal NIST-ATIS WSTS San Jose CA June
4 Let us take a moment to mention that the sync / followup technique of IEEE Std 1588 is brilliant. It gives the choice of two ways to preserve proper layering in the protocol stack: Predict when the packet will emerge on the wire (insertion of transparent clock forwarding delay); or Retrieve the exit time stamp and send a followup message. NIST-ATIS WSTS San Jose CA June
5 We have L2 network nodes (bridges = switches) and L3 network nodes (routers). We add time-awareness to these devices. Time-aware bridges and routers pass PTP PDUs through the network just like data, but with time information. (This is especially true in the various forms of the transparent clock.) Before: After: NIST-ATIS WSTS San Jose CA June
6 The present approach does not violate the sacred principles of ISO Layering. But, neither does it take advantage of them. We are adding a feature to every bridge and router. But, when you look at some of the questions this raises, you realize that there is another approach that will prove much less difficult to specify and to implement. NIST-ATIS WSTS San Jose CA June
7 A time-aware bridge from IEEE Std AS We have noticed, in P802.1ASbt, that the MAC relay in this picture is not actually used by 802.1AS. This makes one suspect that we using a suboptimal layering architecture. NIST-ATIS WSTS San Jose CA June
8 NIST-ATIS WSTS San Jose CA June
9 In 1992, you could look at a box and say, That box is a bridge, or, That box is a router. In 1992 it made more sense to define a time-aware bridge and a timeaware router. But, my network has: NAT engines, firewalls, load balancing appliances, multi-homed hosts, Link Aggregation, TRILL Rbridges, MAC-in-MAC bridges, ITU-T Ethernet protection switches, MPLS label switches, VPNs, bridge-route-bridge switches, etc. VXLANs (virtual networks of virtual bridges and routers connecting virtual hosts) Virtual switches (two boxes claiming to the world to be a single switch) Software Defined Networking that (some use to) blur L2/L3 boundaries. Equal-Cost Multi Pathing at both L2 and L3 Soft switches in server blades and/or virtual computers. Proprietary extensions in Ethernet preambles and/or interframe gaps. NIST-ATIS WSTS San Jose CA June
10 Complex virtual data center networks Physical network Spine Distribution NIST-ATIS WSTS San Jose CA June
11 Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue) NIST-ATIS WSTS San Jose CA June
12 Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green) NIST-ATIS WSTS San Jose CA June
13 Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green), and C (purple). NIST-ATIS WSTS San Jose CA June
14 Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green), and C (purple). Complex encapsulations (e.g. VXLAN) divorce physical & logical. NIST-ATIS WSTS San Jose CA June
15 Complex virtual data center networks Physical network creates multiple virtual network topologies. It simulates Virtual Network A (blue), B (green), and C (purple). Complex encapsulations (e.g. VXLAN) divorce physical & logical. Which topology does time follow?* Which standard? * Add another topology is not an answer the hosts need time! NIST-ATIS WSTS San Jose CA June
16 Typical enterprise networks Three layers Core (routers), Distribution (routers), and Aggregation (switches = bridges or bridge + router). Thousands of Aggregation switches. C C Don t imagine that there is only one layer of Aggregation switch / Wi-Fi Access Point. Why would I want thousands of L regions, one per Aggregation switch? D D A A NIST-ATIS WSTS San Jose CA June
17 Virtual switches Pairs of boxes each pretend (via proprietary protocols) to appear to the world to be a single box. Topology is then a tree no bridging protocols needed! But, how does this work for a timeaware bridge? (Each box has to be visible as a separate entity for time purposes.) C D C D A A NIST-ATIS WSTS San Jose CA June
18 NIST-ATIS WSTS San Jose CA June
19 The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. Each PTPR has multiple ports. PTP Relay NIST-ATIS WSTS San Jose CA June
20 The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. Each PTPR port has an independent protocol stack. PTP over IP over ATM PTP over Ethernet PTP Relay PTP over HTML over RTP over IP over Ethernet over Pseudowire over SONET NIST-ATIS WSTS San Jose CA June
21 The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. The PTPRs are peers over their links, but each link is totally independent, just as bridges and routers connect different media. PTP Relay PTP Relay Ethernet PTP over HTML over RTP over IP over Ethernet over Pseudowire over SONET Complex network PTP over HTML over RTP over IP over Ethernet over Pseudowire over SONET IP over Ethernet NIST-ATIS WSTS San Jose CA June
22 The PTP Relay (PTPR) It doesn t matter what else is in the box. A router + PTP Relay can use PTP over Ethernet! A bridge + PTP Relay can use PTP over IP! Not understanding this is why the transparent clock causes so much confusion and controversy. PTP Relay PTP Relay PTP over IP (Bridge relay) PTP over Ethernet PTP over IP (Some complex virtual route /bridge function) PTP over Ethernet MAC MAC MAC MAC PHY PHY PHY PHY NIST-ATIS WSTS San Jose CA June
23 The PTP Relay (PTPR) PTP is a user of the network(s), not integrated inside the networking functions. IEEE 1588, or even a 1588 profile, is concerned only with a network of PTPRs. PTP Relay PTP Relay PTP Relay PTP Relay NIST-ATIS WSTS San Jose CA June
24 The PTPR operates on Protocol Data Units (PDUs), not packets or frames! It eats PDUs on one port and spews PDUs on another port (or ports). The PTPR does not depend on a co-resident router or bridge to forward its transparent clock PDUs. It has its own rules. The box holding the PTP Relay can be a multi-port PC host without any bridging or routing, it can be a bridge, a router, an FCOE switch, a complex virtual combination, or anything else. No standard cares! A time aware TRILL brouter is not undefined. It s not punted by 1588 to some other standard. The PTP Relay is simply independent of whatever else is in the box. (It s called, Layering.) PTP is its own network! (I d call it over the top, except that the PTP network is closer to the hardware than the underlying net!) NIST-ATIS WSTS San Jose CA June
25 Four jobs Link discovery. The PTP Relays must find out, through configuration, management, and/or discovery protocols, about their neighboring PTP Relays, and for each one, select which addresses and protocols to use to reach that neighbor. Boundary management. Almost all the computers in the world are connected somehow. The PTP Relays must limit the link discovery process to appropriate bounds. Are the boundaries permeable or not? Time routing. The PTP Relays must elect various grades of master and slave clocks, provide or not provide for losses or errors, and compute one or more distribution paths for the time sync messages, through some combination of configuration, management, and/or routing protocols independently of any L2/L3 network routing protocols. Time. Almost forgot. All that cool syntonization and millihertz bandwidth stuff. :) NIST-ATIS WSTS San Jose CA June
26 I m sure that I m the first to think of this has already started down this path, by specifying that the source MAC address changes at each hop. The existing PTP translation device is perhaps another way of looking at what I m talking about. Look carefully; I hope that this layering model requires no changes to the the packet formats. You can still integrate the transparent clock into a router in your implementation. There is little or no change to the existing protocols. (Although more are needed!) But, unless we adopt proper layering, we will continue to argue over the wrong problems, and leave the right problems unsolved. Worst case, a better-layered solution will supersede NIST-ATIS WSTS San Jose CA June
27 Virtual X is a very bad thing, when it comes to PTP, for all values of X. Trying to piggyback on the L2 and L3 networks produces far more questions than answers, and generates far more work than it saves. Instead of having 1588 and/or profiles define a time-aware X for every X under the sun: We let PTP Relays do their job on time. We let networks do their job connecting real and virtual devices, among which are PTP Relays. They do that really, really well, already. We get on with defining the protocols we need to do the time synchronization job. Yes, some of them look similar to routing protocols. That gives us a boost. NIST-ATIS WSTS San Jose CA June
28 That standard will be adopted when pigs can fly. Of course, anyone who works in the standards world knows that, given enough thrust, pigs certainly can fly. NIST-ATIS WSTS San Jose CA June
29 We have been trying to make the pig fly by genetically engineering a pig-bird (by defining time-aware bridges, routers, Rbridges, etc.). At best, the result will be non-kosher chicken soup. At worst, we ll have feathers in our bacon. NIST-ATIS WSTS San Jose CA June
30 Behold! The ISO-layered flying pig. You can strap a rocket to his back and light it. You can crate the pig in a box and ship him in a 747. You can tranquilize him, put him in a Cessna, and hope he stays asleep until the pilot can land the plane. NIST-ATIS WSTS San Jose CA June
31 Thank you.
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Computer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Resiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen [email protected] Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
NComputing L-Series LAN Deployment
NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION
Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
SDN and Data Center Networks
SDN and Data Center Networks 10/9/2013 1 The Rise of SDN The Current Internet and Ethernet Network Technology is based on Autonomous Principle to form a Robust and Fault Tolerant Global Network (Distributed)
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Virtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
Using 2 nd router as Wireless Access Point (AP)
Introduction It is possible to purchase dedicated wireless extenders that can be used to extend a Wi-Fi signal to areas of poor reception. These come in various forms & often are combined with powerline
Agilent N2X Layer 2 MPLS VPN Emulation Software
Agilent N2X Layer 2 MPLS VPN Emulation Software E7884A Technical Data Sheet An easy-to-use solution specifically designed for measuring the scalability and performance of Layer 2 MPLS VPNs and pseudo wire
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Designing Reliable IP/MPLS Core Transport Networks
Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Monitoring Service Delivery in an MPLS Environment
Monitoring Service Delivery in an MPLS Environment A growing number of enterprises depend on (or are considering) MPLS-based routing to guarantee high-bandwidth capacity for the real-time applications
Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire
Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,
Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems. DBA & QoS on the PON - Commonalities with Switching & Routing
Joint ITU-T/IEEE Workshop on Next Generation Optical Access Systems DBA & QoS on the PON - Commonalities with Switching & Routing Howard Frazier, Technical Director Broadcom Corporation Agenda Passive
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
VoIP over MPLS & Voice Services over MPLS. Jim McEachern [email protected]
VoIP over & Voice Services over Jim McEachern [email protected] Voice Services over Standards IETF RFC 3032 () draft-ietf-pwe3-requirements-08.txt draft-ietf-pwe3-arch-07.txt and Frame Relay Alliance
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS Supervisor: Prof. Jukka Manner Instructor: Lic.Sc. (Tech) Markus Peuhkuri Francesco Maestrelli 17
DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch
DATA CENTER Best Practices for High Availability Deployment for the Brocade ADX Switch CONTENTS Contents... 2 Executive Summary... 3 Introduction... 3 Brocade ADX HA Overview... 3 Hot-Standby HA... 4 Active-Standby
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Quality of Service in Industrial Ethernet Networks
György Kálmán, ABB Corporate Research Norway, [email protected] Quality of Service in Industrial Ethernet Networks February 10, 2013 Slide 1 Can we provide appropriate Quality of Service for industrial
CORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Typical example of Ethernet local networks Mostly based
IP and Ethernet Communication Technologies and Topologies for IED networks
IP and Ethernet Communication Technologies and Topologies for IED networks Authors Navindra Yadav Principal Engineer, Cisco Systems, Inc. [email protected] Eruch Kapadia Sr. Solutions Architect/Technical
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Advanced Internetworking
Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
John Ragan Director of Product Management. Billy Wise Communications Specialist
John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode
WHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
A New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University [email protected] ABSTRACT This paper
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair
Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Telephone Company Lease Line Elimination. Dewey Day Principal Operational Technology Architect Pacific Gas & Electric
Telephone Company Lease Line Elimination Dewey Day Principal Operational Technology Architect Pacific Gas & Electric Lease Line Elimination What s Happening? Telephone Companies Eliminating Lease Line
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Precision Time Protocol (PTP/IEEE-1588)
White Paper W H I T E P A P E R "Smarter Timing Solutions" Precision Time Protocol (PTP/IEEE-1588) The Precision Time Protocol, as defined in the IEEE-1588 standard, provides a method to precisely synchronize
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
GregSowell.com. Mikrotik Basics
Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
Fibre Channel over Ethernet: Enabling Server I/O Consolidation
WHITE PAPER Fibre Channel over Ethernet: Enabling Server I/O Consolidation Brocade is delivering industry-leading oe solutions for the data center with CNAs, top-of-rack switches, and end-of-row oe blades
10 Gigabit Ethernet: Scaling across LAN, MAN, WAN
Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
