Using Multicast Call Admission Control for IPTV Bandwidth Management
|
|
|
- Arabella Robinson
- 10 years ago
- Views:
Transcription
1 Application Note Using Multicast Call Admission Control for IPTV Bandwidth Management Managing Multicast Bandwidth in IPTV Networks Using Multicast Call Admission Control in the Edge Router Juniper Networks, Inc North Mathilda Avenue Sunnyvale, California 9409 USA JUNIPER Part Number: Feb 00
2 Table of Contents Introduction... 3 Scope Design Considerations... 3 IGMP Signaling and MCAC MCAC for IGMP Passthrough Example Scenario Explaining MCAC for IGMP Passthrough Lab Analysis for C-VLAN and Port Multicast Admission Control for IGMP Passthrough MCAC for IGMP Proxy or Snooping Example Scenario Explaining Multicast Admission Control for IGMP Proxy Lab Analysis for C-VLAN and Port Multicast Admission Control for IGMP Proxy/Snooping Group Priorities for Multicast Admission Control Summary About Juniper Networks Copyright 00, Juniper Networks, Inc.
3 Introduction A key requirement in IPTV networks is the ability to deliver high-quality video streams to each household. For linear/broadcast TV in packet networks, IP multicast is used to allow the network to copy and forward copies of the same source stream to a large number of viewers. The set-top box (STB) sends IGMP join messages that terminate at an Access Node (AN) or Broadband Services Router (BSR). In turn, the AN or BSR responds by forwarding the requested multicast group (television channel) to the subscriber who made the request. Frequently, the access network is overbuilt to ensure that every channel can be delivered to every access node. Instead of overbuilding the network, IP multicast can preserve bandwidth by sending multicast groups across the network where required. This is most critical in xdsl networks that can only accommodate a limited number of channels due to bandwidth constraints to the subscriber. In addition, the rise in unicast video such as video on demand (VOD), replay TV or streaming video downloaded from the Internet can result in the link to the AN becoming a congestion point where the bandwidth consumed by multicast IPTV must be restricted. Taking advantage of this feature of IPTV requires that the network be able to prevent an interface between the AN and BSR to become congested, which could happen if the amount of bandwidth consumed by multicast IPTV is not bounded. In addition to protecting the xdsl bandwidth by limiting the IPTV traffic to each subscriber, it may also be necessary to limit the bandwidth consumed by this traffic on other links, such as going to the DSLAM. Scope This document details MCAC, which is implemented in JUNOSe software used in Juniper s E-series BSRs. It prevents network oversubscription due to excessive IPTV traffic by providing an upper limit on the amount of bandwidth available for delivering multicast IPTV to each DSLAM and each subscriber. Its use is described for the cases of both a non-replicating and replicating AN. Each model is a valid deployment option but will affect the BSR s capabilities for MCAC. Design Considerations This application note describes a router-based method for Multicast Call Admission Control (MCAC). Instead of sending all multicast groups to the AN or planning for worst case per-user or per-an bandwidth consumption scenarios, the BSR can help manage resources when there is the possibility of network oversubscription due to multicast joins. The BSR processes each IGMP request, whether on a per-port, per-m-vlan or C-VLAN basis, and determines if network resources remain to accept the join request. If the join request is accepted, the group is replicated and forwarded out the requesting interface. If the join request is denied due to the exhaustion of network resources, the multicast group is not forwarded out the interface. The Juniper Networks E-series Broadband Service Routing Platform (E-series), based on Juniper Networks JUNOSe software, uses its MCAC feature to define multicast group bandwidth and match each join request against this table and the interface limit to determine if a join request should be processed. Copyright 00, Juniper Networks, Inc. 3
4 IGMP Signaling and MCAC One simple design for an IPTV deployment is to make the edge or BSR part of every multicast tree. The edge router then processes IGMP joins to replicate and send copies of video into the access network and ultimately to the home 1. The IGMP protocols are well defined, but how they are implemented in the access network is not. In particular, there are two fundamental models for IGMP that are covered in this document: IGMP passthrough, in which the AN is not part of the multicast replication process and the BSR is the last replication point IGMP transparent snooping/proxy, in which the AN provides distributed replication and receives multicast groups over a shared multicast VLAN or router interface as part of a C-VLAN or S-VLAN architecture The choice of model plays a major role in how bandwidth resources are managed. For example, with IGMP snooping and IGMP proxy, the AN manages join processing on a per-subscriber basis. In these cases, the BSR does not manage per-subscriber replication and therefore cannot provide multicast resource control on a per-user basis. On the other hand, IGMP passthrough multicasting locates per-subscriber IGMP processing and replication decisions in the BSR, which can then manage network resources on both a per-user and per-port basis. Table 1: Edge Architectures and Type of MCAC Supported C-VLAN C-VLAN with M-VLAN S-VLAN Per subscriber Yes No No Per AN/DSLAM Yes Yes Yes Per BSR port Yes Yes Yes Table 1 summarizes the type of MCAC granularity or hierarchy that can be supported in JUNOSe software. When the BSR is not the last replication point, in either the C-VLAN with M-VLAN or S-VLAN models, then the BSR can only provide aggregate resource management on a per-an or per-port basis. Therefore, the C-VLAN with M-VLAN and S-VLAN architectures are identical for multicast while varying in how they handle unicast services. For the case of per-user or per-an multicast bandwidth control, JUNOSe software can limit the amount of bandwidth consumed by multicast traffic using its MCAC capability. Multicast admission control maps each IGMP join to a maximum bandwidth limit to determine if replication is allowed. This augments quality of service (QoS) in situations where it is possible to congest the interface by oversubscribing subscriber bandwidth or endpoints issuing joins outside of a predefined service profile. An admission bandwidth is assigned to each multicast group. This multicast admission control engine uses this value to determine whether the next join request would result in the total bandwidth requested exceeding the admission bandwidth limit. Each multicast group can be statically configured with an admission bandwidth or the system can dynamically measure each group bandwidth when received. While it is generally not desired to lock out any TV channel, there could be channels less important than others for which a sporadic block for a limited amount of time might be acceptable. For example, pay TV channels cannot be blocked in any circumstance, while some free channels might be subject to MCAC. To accomplish this, JUNOSe software Release --0 enriched the basic MCAC feature by adding the concept of prioritization of groups. The range of multicast prefixes or multicast addresses that belong to a specific subnet can now be given a priority value different than the default one, which is 0. 1 For more information on use of IGMP in IPTV networks, see Introduction to IGMP for IPTV Networks, For more information on these models, see Wireline Broadband Access Design: IGMP and VLANs, 4 Copyright 00, Juniper Networks, Inc.
5 At the port level, it is now possible to specify two thresholds for the maximum outgoing multicast bandwidth. The first threshold can be reached by honoring and forwarding any multicast group of any priority; the second threshold can be reached by adding only multicast groups with a priority higher than 0. This is to make sure that TV channels that have to be transmitted anyway have a way to go through. That is, the difference in bandwidth between the two thresholds should be greater than or equal to the sum of the equivalent requested bandwidths of the TV channels that cannot be blocked. In the unlikely case that a threshold is hit, note that no more IGMP joins are honored until the sum of the multicast bandwidth falls below a predefined threshold. This is to avoid the circumstance in which subscribers who cannot watch the requested TV channel keep insisting on sending joins for the same channel, resulting in the multicast bandwidth limit being continuously reached. It is expected that subscribers will stop zapping once they find a TV channel that is not blocked. That threshold should help provide relief from such blocking situations. MCAC for IGMP Passthrough The first model detailed for MCAC is IGMP passthrough. In this model, the BSR will receive IGMP joins from each household and do replication on a per-household basis. Since the BSR is processing peruser IGMP, it can determine the amount of multicast sent over each user interface. The BSR can also limit the amount of multicast sent out to all users via the port connected to the AN. Example Scenario Explaining MCAC for IGMP Passthrough Figure 1 highlights this model across two households. The BSR keeps a local mapping of multicast groups and their bandwidth. This table can be statically created or dynamically measured. Bandwidth per Channel Table Home-1 Per Home Congestion Point AN Per AN Congestion Point BSR Group Bandwidth (SD) (HD) (HD) Local Table Update per Join IGMP Join Forward Home-1 Port Home- IGMP Join Forward Home-1 Port IGMP Join Forward Home- Port IGMP Join Forward Home- Port IGMP Join Forwarding Denied Home- Port Figure 1: Example of MCAC Applied to an IGMP Passthrough Scenario The BSR keeps an admission control resource table per user and per port. Each user is set with a limit of 15 Mbps of multicast while the aggregate across all users is set at the port level to 500 Mbps. The user limits can be set based on planned service models, DSL access loop speed or other parameters. The port limit is set based on the planned amount of multicast consumed by all users on a given interface. Copyright 00, Juniper Networks, Inc. 5
6 As each IGMP join request comes in, the BSR sums the amount of currently committed bandwidth and the request amount. As long as this amount is below the configured limit then the interface is sent a copy of the multicast group. The resource state table is then updated with a new committed rate that includes the new multicast group. This is performed for both the home and port entries in the table. The per-home values are unique to each C-VLAN interface while port admission control is shared across all users on the same port. If the bandwidth limit is exceeded, then the BSR will deny the join request and not send a copy of the multicast out of that interface. Note that this capability is at the network level. If a join request is denied, then the STB will not receive any type of feedback notification directly from the router. The router will generate a trap that can be used for future capacity planning or integrated to the video application for direct STB feedback messages. Providing feedback to the user is outside the scope of this paper. Lab Analysis for C-VLAN and Port Multicast Admission Control for IGMP Passthrough For subscriber-level admission control, each household maps to a C-VLAN interface that is configured with a maximum amount of multicast bandwidth allowed to be replicated across that interface using the following JUNOSe software command configured under the C-VLAN interface: interface gigabitethernet 15/0/0.600 ip multicast admission-bandwidth-limit The configuration part in common with all the C-VLANs and/or ports where multicast bandwidth has to be checked before accepting the IGMP join is essentially made of three parts: a route-map that maps a multicast address or a range to a bandwidth value (either static or dynamically measured, that is, adaptive ), an access-list that filters the multicast address or a range of them recalled in the route-map and a command to enable the MAC function. Here follows an example of a basic configuration: access-list SDTV permit ip any ! route-map per-group-mcast-bandwidth permit 10 match ip address SDTV set admission-bandwidth adaptive! ip multicast-routing bandwidth-map per-group-mcast-bandwidth In this test, a maximum limit of 9 Mbps is used so that with the 3.75 Mbps SDTV video stream, only two groups can be joined at the same time. The show ip mroute 3 output shows that the first two groups ( , ) were joined successfully. E30_MRA_ER_0#show ip mroute ( , ) uptime 0 00:14:56 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet/1/3 neighbor , owner IsIs (ECMP route) GigabitEthernet/1/3 ( /30), Accept/Pim (RPF IIF) 3 This command is used because the MCAC feature has been implemented in the Multicast Group Table Manager (MGTM) component rather than in the IGMP one. MGTM is the component responsible for protocols such as PIM. 6 Copyright 00, Juniper Networks, Inc.
7 GigabitEthernet15/0/0.600 ( /4), Forward/Pim, 0 00:15:00/never ( , ) uptime 0 03:04:59 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet3/1/ neighbor , owner IsIs (ECMP route) GigabitEthernet3/1/ ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/0.600 ( /4), Forward/Pim, 0 03:05:00/never However, when the third group ( ) join request is received by the BSR, it is not replicated because the configured interface admission limit (intf-adm-limit) has been exceeded: ( , ) uptime 0 00:00:09 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet3/1/ neighbor , owner IsIs (ECMP route) GigabitEthernet3/1/ ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/0.600 ( /4), Blocked (intf-adm-limit)/pim, 0 00:00:09/never This group is shown as blocked, denoting that group replication is not occurring due to an interface administrative limit (intf-adm-limit). This type of blocking only impacts a single subscriber who attempts to join beyond his 9-Mbps C-VLAN bandwidth limit. In addition to the per C-VLAN bandwidth limits, JUNOSe software also provides admission bandwidth hierarchy by allowing port-level bandwidth limits using the following global command: mroute port <# slot #>//<# bay #>/<# port #> admission-bandwidth-limit <# bandwidth #> Instead of an intf-adm-limit, the replication is blocked with a port admission limit (port-adm-limit): ( , ) uptime 0 00:3:0 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet3/1/ neighbor , owner IsIs (ECMP route) GigabitEthernet3/1/ ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/7.10 ( /4), Blocked (port-adm-limit)/igmp, 0 00:3:0/never GigabitEthernet15/0/5.1 ( /4), Forward/Igmp, 0 00:3:0/ never This will affect subscribers sending a join request that exceeds the port limit, regardless of their C-VLAN multicast admission bandwidth. Copyright 00, Juniper Networks, Inc. 7
8 MCAC for IGMP Proxy or Snooping When the AN is replicating multicast, the simplest method for traffic planning is to send a copy of all multicast groups from the BSR to the AN, ensuring there is no congestion at the network edge. For example, if there is 500 Mbps of offered multicast traffic, the entire 500 Mbps is sent to the AN. This works for small multicast group counts or if there is a surplus of bandwidth to the AN. As the network evolves, however, sending all groups to the AN becomes inefficient and can even result in the reduction of bandwidth for revenue-generating unicast applications. This inefficiency is highlighted in the following graphs. Figure shows the offered load of multicast received by the BSR from the core network. The average multicast load is 343 Mbps. This is a steady average across all days of the week and is based solely on the number of multicast groups (aka TV channels) and their corresponding bandwidths. This value only changes based on the number of groups offered, and the encoding rate changes either lower to optimized encoding schemes or higher based on industry adoption of HDTV. This value is independent of user viewing. Figure : Offered Multicast Load for IPTV Actual user multicast consumption was measured at the BSR MVLAN for a user base of 000 households as shown in Figure 3. The average bandwidth is only 141Mbps, about 40 percent of the offered load. The peak is measured at 170 Mbps, still about 50 percent of the offered multicast load. This highlights the bandwidth savings that can be achieved by not planning for all multicast groups to be pushed to the AN at all times. Figure 3: Aggregate Multicast Bandwidth for 000 Households* * The data set used in this graph was selected to illustrate the maximum growth in subscribers over a short period of time (about 3 weeks). Doing so eliminates any seasonal influence on subscriptions. Copyright 00, Juniper Networks, Inc.
9 Even as user count grows, it can be seen that the network load is mildly impacted by the increase in user count. In this study, the graph in Figure 4 is based on 350 users. The additional 350 users had the impact of increasing the peak value by only 4 Mbps equivalent to 1 to standard definition channels. So while the user base increased 17.5 percent, the multicast demand was only increased by percent. Figure 4: Aggregate Multicast Bandwidth for 350 Households* This study highlights the benefit of only sending watched channels down to the AN and reusing bandwidth for other applications. Since the bandwidth is reused for traffic with equal or higher priority, then there is a need to make sure the overall multicast traffic does not exceed a specific threshold. Failing to do so could result in congestion with the catastrophic consequence that all multicast channels get affected. Here is where MCAC helps by monitoring multicast bandwidth utilization and denying an IGMP join for a group that would make the overall multicast bandwidth cross a pre-established threshold. Blocking of IGMP joins with MCAC in this aggregate case should almost never occur and should only be deployed after thorough and extended monitoring of the behavior of IPTV subscribers. In fact, MCAC helps if and only if the variance of the multicast bandwidth utilization at a specific hour is not far from the average across different days, weeks or months for the same hour. * The data set used in this graph was selected to illustrate the maximum growth in subscribers over a short period of time (about 3 weeks). Doing so eliminates any seasonal influence on subscriptions. Copyright 00, Juniper Networks, Inc. 9
10 Example Scenario Explaining Multicast Admission Control for IGMP Proxy The second model detailed for MCAC is IGMP proxy or snooping. In this model, the AN will receive and process IGMP joins from each household. Now the BSR is only processing per-an IGMP and can only make resource determinations regarding the amount of multicast sent over each M-VLAN interface to the AN. Figure 5 highlights this model across two households. The BSR keeps a local mapping of multicast groups and their bandwidth. This table can be statically created or dynamically measured. Bandwidth per Channel Table Home-1 AN Per AN Congestion Point BSR Group Bandwidth (SD) (HD) (HD) Local Table Update per Join IGMP Join Forward IGMP Join Forward AN-BSR GE 0 00 IGMP Join Forward Home-N IGMP Join Forward AN-BSR GE IGMP Join Forward IGMP Join Forward IGMP Join IGMP Join Forwarding to AN Denied AN-BSR GE Figure 5: MCAC for Port or M-VLAN Across N Households The BSR keeps an admission control resource table per M-VLAN mapping to an AN. In this example each M-VLAN is set with a limit of 00 Mbps of multicast. The M-VLAN limit can be set based on planned traffic engineering values. As each IGMP join request comes in, the BSR sums the amount of currently committed bandwidth and the request amount. As long as this amount is below the configured limit then the interface is sent a copy of the multicast group. The resource state table is then updated with a new committed rate that includes the new multicast group. If the limit is exceeded, then the BSR will deny the join request and not send a copy of the multicast out that interface. Since the BSR only sees unique join requests per group, the resource admission control only applies to unique groups per AN. If both homes 1 and join the same group, then only a single resource check happens in the BSR. If the bandwidth limit is exceeded, then the BSR will deny the join request and not send a copy of the multicast out of that interface. Note that this capability is at the network level. If a join request is denied, then the STB will not receive any type of feedback notification directly from the router. The router will generate a trap that can be used for future capacity planning or integrated to the video application for direct STB feedback messages. Providing feedback to the user is outside the scope of this paper. 10 Copyright 00, Juniper Networks, Inc.
11 Lab Analysis for C-VLAN and Port Multicast Admission Control for IGMP Proxy/Snooping For the IGMP proxy model, only M-VLAN multicast admission control is configured with a maximum amount of multicast bandwidth allowed to be replicated across that interface using the following JUNOSe software command under the M-VLAN subinterface: ip multicast admission-bandwidth-limit Hereafter it is assumed that the AN forwards proxied or snooped IGMP messages onto only the M-VLAN. However, there might be cases where IGMP joins can be received by the BNG on a different interface than that of the M-VLAN. In these cases a port- based command like the following one should be used in order to track all of the IGMP requests: mroute port <# slot #>/<# bay #>/<# port #> admission-bandwidth-limit <# bandwidth #> In this test a maximum limit of 00 Mbps is used so that with the 3.5 to 4.0 Mbps SDTV video streams only three unique groups can be joined, although multiple subscribers can all watch the same three streams. The show ip mroute output shows that the first three groups ( , , ) were joined successfully. E30_MRA_ER_0#show ip mroute ( , ) uptime 0 00:00:3 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet3/1/ neighbor , owner IsIs (ECMP route) GigabitEthernet/1/3 ( /30), Discard/Pim GigabitEthernet3/1/ ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/0. ( /4), Forward/Pim, 0 00:00:3/ never ( , ) uptime 0 00:00:41 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet/1/3 neighbor , owner IsIs (ECMP route) GigabitEthernet/1/3 ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/0. ( /4), Forward/Pim, 0 00:00:41/ never ( , ) uptime 0 00:00:1 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet3/1/ neighbor , owner IsIs (ECMP route) GigabitEthernet/1/3 ( /30), Discard/Pim Copyright 00, Juniper Networks, Inc. 11
12 GigabitEthernet3/1/ ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/0. ( /4), Forward/Pim, 0 00:00:1/ never However, when the fourth group ( ) join request is received by the BSR it will exceed the admission bandwidth limit, resulting in a non-replicated group: ( , ) uptime 0 00:00:04 Admission bandwidth: (adaptive) QoS bandwidth: bps (adaptive) RPF route: /4, incoming interface GigabitEthernet/1/3 neighbor , owner IsIs (ECMP route) GigabitEthernet/1/3 ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/0. ( /4), Blocked (intf-adm-limit)/ Pim, 0 00:00:05/never This group is shown as blocked, denoting that group replication is not occurring due to an interface administrative limit (intf-adm-limit). This type of blocking impacts any subscriber issuing a join request for a new multicast group that must be delivered over the M-VLAN to the AN. If the AN proxy join request is beyond the 15 Mbps M-VLAN bandwidth limit, then AN replication cannot occur. If per-subscriber admission control limits are required, this must be performed in the AN. The AN used in the test scenario does not support this feature and therefore was not tested. The BSR cannot provide per-subscriber multicast control since it is not responsible for per-subscriber replication. Group Priorities for Multicast Admission Control Instead of just using a simple group-bandwidth table for multicast admission control, JUNOSe software provides the extra capability of prioritizing groups that are part of the decision process. By default, any entry in the route-map that is used to map a bandwidth to a multicast address or range of addresses also maps a priority of 0 to those addresses. If some of the groups cannot be blocked in any circumstance, then a priority higher than 0 should be associated with those groups.! route-map per-group-mcast-bandwidth permit 10 match ip address PAY-TV-SDTV set admission-bandwidth adaptive set priority 1 route-map per-group-mcast-bandwidth permit 0 match ip address SDTV set admission-bandwidth adaptive! Note when the port-level command is used: mroute port <# slot #>/<# bay #>/<# port #> admission-bandwidth-limit <# max-bandwidth #> priority-bandwidth-limit <# priority-bandwidth #> hysteresis <# value #> 1 Copyright 00, Juniper Networks, Inc.
13 All groups are accepted until the priority-bandwidth level has been reached. Once that threshold has been hit, only those groups for which the route-map per-group-mcast-bandwidth associates a priority 1 are honored (unless already served below the priority-bandwidth level) until the second bandwidth threshold max-bandwidth is reached. After that all groups are blocked. The hysteresis value is a percentage number and it relates to the priority-bandwidth. Once the priority-bandwidth-limit has been reached, in order to accept again non-prioritized channels multicast bandwidth has to go below that percentage. Please note that there is an implicit, non-configurable hysteresis value also for the admissionbandwidth-limit, which is 5 percent. Show commands are similar to those already seen in this paper. The following is an example of an accepted prioritized group: E30_MRA_ER_0#show ip mroute ( , ) uptime 0 00:14:56 Admission bandwidth: bps (adaptive) QoS bandwidth: bps (adaptive) Priority: 1 RPF route: /4, incoming interface GigabitEthernet/1/3 neighbor , owner IsIs (ECMP route) GigabitEthernet/1/3 ( /30), Accept/Pim (RPF IIF) GigabitEthernet15/0/0.600 ( /4), Forward/Pim, 0 00:15:00/never Summary There are a range of trade-offs involved in designing an IPTV network that delivers content using both unicast and multicast technologies. By choosing the right architecture at key points in the network, service providers can oversubscribe the edge network and still deliver the quality of experience (QoE) needed to satisfy customer demand and thus to compete effectively. The network designer must also be aware of the capabilities that are needed in key network components in both the data and control planes to support the desired architecture. Juniper Networks has the expertise and product portfolio that service providers need to design the next-generation networks that can deliver a high QoE and maximize investment in infrastructure and administrative staff. To learn more, go to Copyright 00, Juniper Networks, Inc. 13
14 About Juniper Networks Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at CORPORATE HEADQUARTERS AND SALES HEADQUARTERS FOR NORTH AND SOUTH AMERICA Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA 9409 USA Phone:.JUNIPER ( ) or Fax: EUROPE, MIDDLE EAST, AFRICA REGIONAL SALES HEADQUARTERS Juniper Networks (UK) ed Building 1 Aviator Park Station Road Addlestone Surrey, KT15 PG, U.K. Phone: 44.(0) Fax: 44.(0) EAST COAST OFFICE Juniper Networks, Inc. 10 Technology Park Drive Westford, MA USA Phone: Fax: ASIA PACIFIC REGIONAL SALES HEADQUARTERS Juniper Networks (Hong Kong) Ltd. 6/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: Copyright 00 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JUNOS and JUNOSe are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. To purchase Juniper Networks solutions, please contact your Juniper Networks sales representative at or authorized reseller. 14
Limitation of Riverbed s Quality of Service (QoS)
Application Note Limitation of Riverbed s Quality of Service (QoS) Riverbed s Quality of Service (QoS) configuration and limitations Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Identity-Based Traffic Logging and Reporting
Application Note Identity-Based Traffic Logging and Reporting Using UAC in Conjunction with NSM and Infranet Enforcers to Give Additional, User-Identified Visibility into Network Traffic Juniper Networks,
Identity-Based Application and Network Profiling
Application Note Identity-Based Application and Network Profiling Using UAC in Conjunction with NSM, IDP and Infranet Enforcers Permits User-Identified Application and Network Profiling Juniper Networks,
JUNOScope IP Service Manager
Datasheet JUNOScope IP Service Manager Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the enhancement of operational efficiencies
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Implementing Firewalls inside the Core Data Center Network
Implementation Guide Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Juniper Networks, Inc. 1194 North
Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3
Virtual Private LAN Service (VPLS)
White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000
MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
Deploying IP Telephony with EX-Series Switches
Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Juniper Networks WX Series Large. Integration on Cisco
APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure
Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches
APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,
Juniper Networks Solution Portfolio for Public Sector Network Security
Solution Brochure Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance STRM NS-Security
PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY
APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................
WXOS 5.5 SSL Optimization Implementation Guide for Configuration and Basic Troubleshooting
1 WXOS 5.5 SSL Optimization Implementation Guide for Configuration and Basic Troubleshooting Table of Contents 1. Introduction...1 1.1. How Does the SSL Optimization Feature Work...2 1.2. What Happens
Traffic load and cost analysis for different IPTV architectures
Traffic load and cost analysis for different IPTV architectures SKENDER RUGOVA, ARIANIT MARAJ Post and Telecommunication of Kosova-PTK Dardania, p.nr., Prishtina, Republic of Kosova [email protected],
The necessity of multicast for IPTV streaming
The necessity of multicast for IPTV streaming ARIANIT MARAJ, ADRIAN SHEHU Telecommunication Department Faculty of Information Technology, Polytechnic University of Tirana Tirana, Republic of Albania [email protected],
Introduction to Automatic Multicast Tunneling as a Transition Strategy for Local Service Providers
WHITE PAPER Unlocking Video Over the Internet with MX Series Routers Introduction to Automatic Multicast Tunneling as a Transition Strategy for Local Service Providers Copyright 2011, Juniper Networks,
Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)
White Paper Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM) When It Comes To Monitoring and Validation It Takes More Than Just Collecting Logs Juniper
DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES
APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
diversifeye Application Note
diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Voice Modules for the CTP Series
DATASHEET Voice Modules for the CTP Series Product Overview Enterprise organizations are leveraging the cost savings associated with IP transport for a variety of new packet based multimedia services.
Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET
DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,
Juniper Networks Education Services
Datasheet Education Services Deploying networks that can securely and reliably deliver high-speed services is a must for setting your business apart from the competition. But how do you keep pace with
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Web Filtering For Branch SRX Series and J Series
APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table
Implementing Firewalls inside the Core Data Center Network
IMPLEMENTATION GUIDE Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Copyright 2010, Juniper Networks,
Simplifying the Data Center Network to Reduce Complexity and Improve Performance
SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,
SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
Network Configuration Example
Network Configuration Example Configuring Multiple Port Mirroring Sessions on EX4200 Switches Published: 2014-04-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Understanding Fundamental Issues with TRILL
WHITE PAPER TRILL in the Data Center: Look Before You Leap Understanding Fundamental Issues with TRILL Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Executive Summary........................................................................................................
Demonstration of Internet Protocol Television(IPTV) Khai T. Vuong, Dept. of Engineering, Oslo University College.
Demonstration of Internet Protocol Television(IPTV) 1 What is IPTV? IPTV is a general term of IP+TV = IPTV Delivery of traditional TV channels and video-ondemand contents over IP network. 2 IPTV Definition
WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES
APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1
ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS
SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous
Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS)
APPLICATION NOTE CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) Discover Which Juniper Networks ScreenOS Rule Search Works for Your Network Copyright 2010, Juniper
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
Technology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc.
Technology Overview Class of Service Overview Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos,
WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1
WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Juniper Networks Unified Access Control (UAC) and EX-Series Switches
White Paper Juniper Networks Unified Access Control (UAC) and EX-Series Switches Meeting Today s Security Challenges with End-to-End Network Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue
MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS
APPLICATION NOTE MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS Migrating Advanced Security Policies to SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc.
Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and NetApp Storage Systems
APPLICATION NOTE Network Attached Storage Interoperability Testing Interoperability Test Results for Juniper Networks EX Series Ethernet Switches and Storage Systems Copyright 2012, Juniper Networks, Inc.
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network
Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network Executive Summary The dramatic rise of multimedia applications in residential, mobile, and business networks is continuing
Integrating Continuity of Operations (COOP) into the Enterprise Architecture
Volume 1, Issue 2 August 2007 Continuity of Operations Leadership Series for Government Integrating Continuity of Operations (COOP) into the Enterprise Architecture Pillar COOP Leadership Series for Government
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available
Configuring and Implementing A10
IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this
NETWORK AND SECURITY MANAGER
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
Agilent N2X. Solution Note
Agilent N2X MEF 9 Testing IPTV Channel Zapping Solution Note IPTV channel zapping is a key element of the user's QoE (Quality of Experience). Agilent N2X provides the most accurate and reliable channel
Can PowerConnect Switches Be Used in IP Multicast Networks?
PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
Solutions Focus: IPTV
Zhone delivers the world s most complete IPTV solutions MALC offers more provisioning options for multicast, more capability for mixed multicast and unicast video, and more fiber and copper subscriber
Introduction to Carrier Ethernet VPNs: Understanding the Alternatives
WHITE AR Introduction to Carrier Ethernet VNs: Understanding the Alternatives Copyright 2009, Juniper Networks, Inc. WHITE AR - Introduction to Carrier Ethernet VNs: Understanding the Alternatives Table
Network Configuration Example
Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California
Wideband: Delivering the Connected Life
White Paper Wideband: Delivering the Connected Life Subscribers are increasingly demanding many services to many screens. They want the convenience of having services available anytime, anywhere, and on
Cisco ASR 9000 Series: Carrier Ethernet Architectures
Cisco ASR 9000 Series: Carrier Ethernet Architectures The initial phase of network migrations in the past several years was based on the consolidation of networks over the IP/Multiprotocol Label Switching
Juniper Networks Solution Portfolio for Public Sector Network Security
SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper
Junos OS. DDoS Protection Configuration Guide. Release 12.1. Published: 2012-02-29. Copyright 2012, Juniper Networks, Inc.
Junos OS DDoS Protection Configuration Guide Release 12.1 Published: 2012-02-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)
DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential
Junos OS. DDoS Protection Configuration Guide. Release 12.3. Published: 2012-12-11. Copyright 2012, Juniper Networks, Inc.
Junos OS DDoS Protection Configuration Guide Release 12.3 Published: 2012-12-11 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product
- Multicast - Types of packets
1 Types of packets - Multicast - Three types of packets can exist on an IPv4 network: Unicast A packet sent from one host to only one other host. A hub will forward a unicast out all ports. If a switch
Reasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
E-series Broadband Services Routers
Page 1 Datasheet E-series Broadband Services Routers The Juniper Networks E-series platform is a central component of the broadband edge, with a proven architecture that has been deployed in many different
Application Note: Junos NAT Configuration Examples
: Junos NAT Configuration Examples January 2010 Juniper Networks, Inc. 1 Table of Contents Junos NAT Configuration Examples...1 Introduction...3 Requirements...3 Configuration Examples...3 Source NAT...3
Network Configuration Example
Network Configuration Example Configuring DCBX Application Protocol TLV Exchange Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Competitive Performance Testing Results Carrier Class Ethernet Services Routers
Competitive Performance Testing Results Carrier Class Ethernet Services Routers Cisco Aggregation Services Router 9000 Series v Juniper MX 960 Ethernet Services Router 27 August 2009 Table of Contents
Multicast primer. Per Jensen, [email protected] December 2006. Session Number Presentation_ID. 2005 Cisco Systems, Inc. All rights reserved.
Multicast primer Per Jensen, [email protected] December 2006 Session Number Presentation_ID 1 Agenda IP multicast why SSM Resiliency Channel changing Admission control / CAC 2 IP multicast primer (SSM) as
AlliedWare Plus OS How To. Configure QoS to prioritize SSH, Multicast, and VoIP Traffic. Introduction
AlliedWare Plus OS How To Configure QoS to prioritize SSH, Multicast, and VoIP Traffic Introduction This How To Note explains how to create a QoS policy that prioritizes SSH, multicast, and VoIP traffic
Solution Brief. Migrating to Next Generation WANs. Secure, Virtualized Solutions with IPSec and MPLS
Solution Brief Migrating to Next Generation WANs Secure, Virtualized Solutions with IPSec and MPLS Migrating to Next Generation WANs Page 2 Migration Drivers for Ethernet and Virtual Private Networking
REAL TIME VISIBILITY OF IPTV SUBSCRIBER EXPERIENCE AND VIEWING ACTIVITY. Alan Clark CEO, Telchemy Incorporated
REAL TIME VISIBILITY OF IPTV SUBSCRIBER EXPERIENCE AND VIEWING ACTIVITY Alan Clark CEO, Telchemy Incorporated Outline STB centric performance management? Measuring IPTV subscriber experience how and why?
JUNIPER CARE PLUS ADVANCED SERVICES CREDITS
DATASHEET JUNIPER CARE PLUS ADVANCED SERVICES CREDITS Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments
Adaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite. We Deliver the Future of Television
Adaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite We Deliver the Future of Television Satellites provide a great infrastructure for broadcasting live content to large
Cable and Satellite Digital Entertainment Networks. Moving toward an Integrated Digital Media Experience
Cable and Satellite Digital Entertainment Networks Moving toward an Integrated Digital Media Experience Independent Data and Analysis by S2 Data Corporation April 2007 INTRODUCTION Traditional broadcast
Meeting PCI Data Security Standards with
WHITE PAPER Meeting PCI Data Security Standards with Juniper Networks STRM Series Security Threat Response Managers When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes
Building Next Generation DSL Networks with the Redback Service Gateway
Building Next Generation DSL Networks with the Redback Service Gateway Providers must respond to the growing adoption of DSL by building an advanced architecture that supports a diversity of services,
Fast Reroute for Triple Play Networks
Building Smart Broadband Networks TM Fast Reroute for Triple Play Networks Sachin Natu Product Management March 2006 IPTV Service Requirements IPTV Network Design Fast Reroute / Convergence Solutions -
Impacts of the Operating System on the Performance of Enterprise Networks
White Paper Impacts of the Operating System on the Performance of Enterprise Networks JUNOS Software Delivers Continuous Systems Availability, Automated Operational Efficiencies and Greater Flexibility
VLAN and QinQ Technology White Paper
VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
MULTICAST AS A MANDATORY STEPPING STONE FOR AN IP VIDEO SERVICE TO THE BIG SCREEN
MULTICAST AS A MANDATORY STEPPING STONE FOR AN IP VIDEO SERVICE TO THE BIG SCREEN AMIT ESHET, ENGINEERING FELLOW, ADVERTISING SOLUTIONS JOHN ULM, ENGINEERING FELLOW, NETWORK SOLUTIONS UZI COHEN, PRINCIPAL
Case Study How network conditions impact IPTV QoE
Case Study How network conditions impact IPTV QoE This case study examines the importance of validating IPTV service quality under realistic Multiplay network conditions. Introduction Telecommunication
Juniper Networks VPN Decision Guide
White Paper Juniper Networks VPN Decision Guide Examining the Criteria for Deciding Whether IPSec or SSL VPN Best Fits Your Business Need Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Internet Protocol Television (IPTV)
International Journal of Electronics and Computer Science Engineering 2221 Available Online at www.ijecse.org ISSN- 2277-1956 Internet Protocol Television (IPTV) Lokesh Mittal 1, Ritika Mittal 2 Lecturer
SRX SERIES AND J SERIES NETWORK ADDRESS TRANSLATION
APPLICATION NOTE SRX SERIES AND J SERIES NETWORK ADDRESS TRANSLATION Configuring Next-Generation NAT on Juniper Networks SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper
Southwest Arkansas Telephone Cooperative Network Management Practices
Southwest Arkansas Telephone Cooperative Network Management Practices Page 1 of 11 Release Date 05/18/15 INTRODUCTION... 3 CORE NETWORK OVERVIEW... 3 DISTRIBUTION NETWORK OVERVIEW... 3 ACCESS NETWORK OVERVIEW...
What s Behind Network Downtime?
White Paper What s Behind Network Downtime? Proactive Steps to Reduce Human Error and Improve Availability of Networks Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA
