Zonal Address Partitioning in the Local Space
|
|
|
- Marjorie Blake
- 10 years ago
- Views:
Transcription
1 Zonal Address Partitioning in the Local Space Document Number: IEEE 802-ec EC Date Submitted: Source: Roger B. Marks Voice: capable EthAirNet Associates Montview Blvd Denver, CO USA *< Re: Proposed P802c PAR Venue: Discussion session on 802c, use of the "locally administered address space" and privacy , San Antonio, TX, USA Purpose: To elucidate issues related to the proposed P802c PAR, to clarify the implications of Company ID assignments by the IEEE Registration Authority, to review the factors related to random address assignment, to demonstrate the value of innovation in using the local address space, to demonstrate the need for standardization to enable innovation in using the local address space, and to propose zonal addressing. Notice: This document represents the views of the author and is offered as a basis for discussion. 1
2 Zonal Address Partitioning in the Local Space Roger B. Marks EthAirNet Associates 2
3 Table of Contents 1.Executive Summary 2.Details 3
4 Executive Summary Key Points Proposed P802c PAR proposes partitioning of the local space to incorporate IEEE CID-based address allocation. Some 802 participants advocate a flat 46-bit space to maximize use with random assignment. This proposal suggests that: partitioning has many valuable uses (exemplified here by zonal addressing and switching) P802c PAR should enable use of local addresses, not merely allocation. Truly enabling use will require IEEE 802 standards. IEEE 802 protocol should use clean blocks, not isolated company IDs. Partitioned space in the core can coexist with flat space at the edge and is compatible with fully randomized use. 4
5 Executive Summary CID IEEE RA defines CID to include a 22-bit space. IEEE RA has allocated public CIDs in the 10 quadrant of that 22-bit space. The first 14 CID assignments preclude clean block assignments in the 10 quadrant. IEEE 802 protocol should use clean blocks. Coordination with the RA needed to ensure that CIDs are not assigned in space used by IEEE 802 protocol. 5
6 CID Assignments Local Quadrant 00 xxxx xxxx xxxx xxxx xxxx 01 xxxx xxxx xxxx xxxx xxxx 10* xxxx xxxx xxxx xxxx xxxx 11 xxxx xxxx xxxx xxxx xxxx *Current public CID assignments are in this quadrant, and widely dispersed in this quadrant. 6
7 Executive Summary A Flood becomes a Torrent? Internet of Things (IoT) device access might be rare, so the destination address may frequently be unknown; this could lead to a high proportion of frame flooding. Privacy advocates are suggesting randomized addresses and frequent address changes. This would result in many frames with unknown destination addresses, and therefore to flooding. We need to plan to avoid a torrent of flooding. 7
8 Executive Summary Zonal switching instead of address learning Core Switch Address is partitioned to incorporate a zone identifier. Provides topology-based switching. Switch selects a port based on zone identifier in the zonal DA. Switch learns zones, not addresses, based on zonal SA. Much smaller forwarding tables: one entry per zone. Flooding results from an unknown zone (rare), not an unknown DA. zonal switch Access Point (AP) Zone 1 conventional bridging locally Zone 2 conventional bridging locally Zone 3 conventional bridging locally User User User User User User User User User User 8
9 Executive Summary Example address structures for zonal subnetting Header byte 1 Zone identifier byte up to 256 zones Local (intra-zone) byte CID Space Header byte 2 Zone identifier bytes up to zones Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Header could also be a half-byte, etc. 9
10 Executive Summary Example: One-Byte Header Bytes of Zone ID (if zonal) structure identifier quadrant identifier Local bit Multicast bit 00=1 byte 01=2 bytes 10=3 bytes 11=4 bytes 00=zonal 01=reserved 10 reserved 11 reserved 01 or 11 if RAC agrees to avoid CID allocations (10 is already offlimits, and 00 is slightly problematic )
11 Executive Summary Address Aliasing Core Switch Address is partitioned to incorporate a zone identifier. Switch selects a port based on zone identifier in the zonal DA. Switch learns zones, not addresses, based on zonal SA. Core address Access Point (AP) Local mapping table maps each internal (user-side) address to a corresponding external (core-side) alias address. Access point replaces access address with core alias address in transmissions to core, and vice versa. Access address Core address alias unique within the core alias unique within the core Access address local (could be terminalselected) or global local (could be terminalselected) or global User terminal selects among many (46?) random bits or could use a global address A kind of address translation but, unlike NAT, it's one-to-one. 11
12 Executive Summary Address Updating Core Switch Address is partitioned to incorporate a zone identifier. Switch selects a port based on zone identifier in the zonal DA. Switch learns zones, not addresses, based on zonal SA. Core address Access Point (AP) Local mapping table maps each internal (user-side) address to a corresponding external (core-side) alias address. Access point replaces access address with core alias address in transmissions to core, and vice versa. Access address Core address alias unique within the core alias unique within the core Access address local (could be terminalselected) or global Unique, once assigned by AP; could be Identical to Core address User terminal selects among many (46?) random bits or could use a global address later, AP assigns unique address (could be identical to Core address) 12
13 Executive Summary Conclusions Standardization of the local address space structure offers rich opportunities to develop enhanced Layer 2 networking; e.g., topologybased zonal addressing and switching, that is unavailable with the existing global address space. Structuring the local address space need not harm the use of that space for access or inhibit privacy improvements and is compatible with 46-bit random addressing for access, using methods like addressing aliasing. The 10 quadrant of the CID is fine for address allocation using individual RA-assigned CIDs but appears to not be a suitable basis for IEEE 802 to build local address structures for IEEE 802 protocols. IEEE 802 protocols should use of a clean block of addresses outside the 10 quadrant, coordinating with the RAC so that CIDs are not allocated there. 13
14 Executive Summary Recommendations We should applaud the efforts made by the RAC to encourage exploitation of local space. Standardization of the local address space structure should proceed, with 802 working hand-in-hand with the RAC to promote success. The P802c project should be open to both CID and non-cid solutions. CID-based solutions should consider the space outside the 10 quadrant of the CID, and coordination with the RAC should be initiated in preparation to request assignment of a clean block. PAR should be revised to more explicitly support the use as well as the allocation of local addresses. Local address space structure standardization should not be considered in any way mandatory, since local usage should be up to the local administrator. However, standardization will play an enabling role in applications such as new switching methods and new random assignment mechanisms. 14
15 Executive Summary Proposals - Draft P802c PAR 5.2.b: This will allocate a portion of the address space for protocols using an IEEE Registration Authority assigned Company ID. Another portion of the local address space will be allocated for assignment by local administrators. A portion will be allocated for use by IEEE 802 protocols using a partitioned local address. 5.5: This project will enable protocols that automatically configure and use addresses from a portion of the local address space. CSD should be revised to include address usage. 15
16 Details Background materials and details are provided on the following slides. 16
17 Scenario Half of IEEE 802 address space (with the 7th bit set on) is locally administered and not presumed globally unique. The IEEE-SA Registration Authority (RA), managed by the RA Committee (RAC), is assigning 24-bit CIDs with the 7th bit set on, and suggesting that these could be used to form 802 addresses. A proposed P802c PAR would initiate a project to provide recommendations and rules for the 802 local address space, allocating a portion for protocols using the CID and another portion for local administration. Local space is being considered for temporary address assignments to alleviate privacy concerns related to static global addresses based on EUI. 17
18 Divergence of Views Some P802c proponents suggest dividing the local space using the CID, perhaps as an identifier of an address assignment or resolution protocol. Some, considering privacy, wireless, and access issues, prefer a wide-open, unstructured space to maximize entropy and privacy while minimizing collision probability. The two sides have been standing in opposition. Few signs of convergence of views. Should be possible to reach a common understanding, considering: people are addressing different problems the local space is local and does not require a universal solution Can a resolution of the conflict offer lead to better use of the local space? 18
19 What is a CID? a bit confusing; RA documentation does not fully explain RA specifies that a CID is 24 bits, with the last two bits of the first byte set to 1 and 0 if one were to build an 802 MAC address using the CID as the first three bytes, that MAC address would have the local bit on and the multicast bit off But people are talking about a quadrant of the CID space. What s that? 19
20 Public IEEE RA CID Allocations as of Observations: First two LSB in first byte are 802-compatible (local bit set, multicast not). Next two LSB in first byte are all 10 ; RA seems to staying in this quadrant. Structured use of any other bit leads to collision since RA has allocated every option. RA has even allocated every possible PAIR of bits in the first byte. Possible inference: The RA has staked out every corner of this 10 quadrant and does not want any trespassing! Bits will not be designated. Only solo addresses will be assigned. Don t expect a clean block assignment in this quadrant. 20
21 Local OUIs As noted by the RA, A very small number of assignments made prior to adoption of IEEE 802 standards have the X bit equal to one (BlockID assignments). These assignments are documented in the CID registry. However, they do not appear to be included in the CID registry. The list of 18 can be found using a grep developed by Mark Rison: grep '^.[2367abABefEF]\-' oui.txt cut - b6-10 while read f; do echo ==== $f; grep "^..-$f" oui.txt; done 5 are in the 10 quadrant. 13 are in the 00 quadrant
22 What is a CID again? It s important to differentiate the CID space (22 bits) from the currently-allocated 10 CID quadrant (20 bits). The current draft P802c PAR would allocate a portion of the address space for protocols using an IEEE Registration Authority assigned Company ID. The CID is not limited to the 10 quadrant. Utilizing the other portions of the CID space will require early RAC coordination. 22
23 P802c in the Data Center Example: Fiber Channel over Ethernet Possible usage: CID allocated for a protocol (not to a company ) address server allocates addresses built from assigned CID Other users sharing the local space will avoid assignments using that CID and therefore avoid collision consult experts for the correct explanation 23
24 Internet of Things (IoT) The current P802c draft PAR says that Such protocols will allow virtual machines and IoT devices to obtain a local address without local administration. It is not clear that the IoT address acquisition problem is parallel to that of the data center. IoT would represent large numbers of devices at the edge of a network. We generally expect a large number of IoT devices. this may overload switches, as well as overloading address space and address acquisition methods How can we help? 24
25 A Flood becomes a Torrent? IoT device access might be rare, so the destination address may frequently be unknown; this could lead to a high proportion of frame flooding. Privacy advocates are suggesting randomized addresses and frequent address changes. This would result in many frames with unknown destination addresses, and therefore to flooding. We need to plan to avoid a torrent of flooding. 25
26 Sample WLAN Environment Some privacy advocates have argued for the maximum number of available bits (i.e., 46, since two bits of the 802 address space are otherwise designated) to minimize collision possibility in a single large switching domain, particularly when local addresses are assigned randomly. Example of scale: Santa Clara CA football stadium wireless LAN: 68,500 seats 1,200 access points 1 access point per 57 seats 26
27 Collision-Free Probability for Random Assignment A = number of addresses available U = number of users 1 address assigned randomly per user Collision-Free Probability: P(U,A) Source: E. W. Weisstein, CRC Concise Encyclopedia of Mathematics, Second Edition 27
28 Collision in Stadium Scenario terminal selects from among 2 46 available addresses terminal associates with an AP address collision with any other terminal is possible over the air (not only within the core), even if the other terminal associates with a different AP, because frame over the air may be heard anywhere special problem for shared medium 28
29 What else can we do with partitioning? Partitioning of the 46 bits available in the local space is advocated as means of differentiating address acquisition methods by protocol (e.g., in data center). If we are going to partition, let s see what else it s good for. Let s consider partitioning local addresses by topology. 29
30 Bridging gets messy in a large zone Single zone i bits to work with d=2 i addresses Switch uses bridge learning and stores (e.g.) 2 16 = 65,536 addresses in filtering database. 30
31 Zonal switching with a topology-based hierarchical address instead of address learning Core Switch Address is partitioned to incorporate a zone identifier. Provides topology-based switching. Switch selects a port based on zone identifier in the zonal DA. Switch learns zones, not addresses, based on zonal SA. Much smaller forwarding tables: one entry per zone. Flooding results from an unknown zone (rare), not an unknown DA. zonal switch Access Point (AP) Zone 1 conventional bridging locally Zone 2 conventional bridging locally Zone 3 conventional bridging locally User User User User User User User User User User 31
32 Some advantages of zonal addresses Switches need learn only the association between the port and the zone, instead of the association between the port and the address. the zone is less costly to store, since it is shorter than the entire address. the switch needs to learn only one port association for each zone, instead of one per address, so forwarding tables are much shorter and less frequently updated far less flooding, because an unstored address need not be flooded as long as the zone is known Note: the zone ID has significance only within the switching domain all the zones in the switching domain need unique IDs 32
33 Example address structures for zonal subnetting Header byte 1 Zone identifier byte up to 256 zones Local (intra-zone) byte CID Space Header byte 2 Zone identifier bytes up to zones Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Local (intra-zone) byte Header could also be a half-byte, etc. 33
34 Requires a standard partitioning plan In order to support zonal subnetting, the switch needs to ascertain whether the address is zonal and if so, parse the address 34
35 Example: One-Byte Header Bytes of Zone ID (if zonal) structure identifier quadrant identifier Local bit Multicast bit 00=1 byte 01=2 bytes 10=3 bytes 11=4 bytes 00=zonal 01=reserved 10 reserved 11 reserved 01 or 11 if RAC agrees to avoid CID allocations (10 is already offlimits, and 00 is slightly problematic )
36 Switching based on mixed conventional and zonal addresses Frame Read source address (SA) and destination address (DA) Examine SA and DA bit patterns to determine if zonal topology is encoded. Use normal bridging no Zonal DA? Zonal SA? no Use normal learning yes yes Read zone ID Read zone ID Look up egress port in zone table Forward to port Store zone ID and ingress port in zone table Zone ID zone zone Port port port 36
37 RAC Coordination Use of the header in conjunction with an RA-assigned CID would require coordination with the RAC. The suggestion would require, in effect, a block of CIDs, not just a CID. e.g., a block of CIDs two or four bits wide to be used in header as well as zonal and local addresses So far, the RA has been assigning CIDs in the 10 quadrant of the CID space. The 10 quadrant could not be used without affecting current assignments. 37
38 Reminder of why 10 quadrant is Off Limits Public IEEE RA CID Allocations (as of ) Conclusion: Any structuring should be done in another quadrant, or else structuring should be achieved without using the CID. 38
39 Is this consistent with random assignment? Some have proposed that devices randomly select a local address from the 46 bits not already specified by 802. Is a structured local address consistent? Would the structure limit the size of the random space and lead to unacceptable collision rate? How would the device know how much of the space is allocated to zonal addresses? 39
40 Zonal Address Aliasing Core Switch Address is partitioned to incorporate a zone identifier. Switch selects a port based on zone identifier in the zonal DA. Switch learns zones, not addresses, based on zonal SA. Core address Access Point (AP) Local mapping table maps each internal (userside) address to a corresponding external (coreside) zonal alias address, assigned by AP using AP zone ID and arbitrary but unique local bits. Access point replaces access address with zonal core alias address in transmissions to core, and vice versa. Access address Core address Zonal: Zonal bits + AP-Assigned local alias bits Zonal: Zonal bits + AP-Assigned local alias bits Access address local (could be terminalselected) or global local (could be terminalselected) or global User terminal selects among many (46?) random bits or could use a global address 40
41 Example: Stadium WLAN 2 16 = 65,536 users 2 10 = 1024 APs 1 AP per 2 6 = 64 users 1 zone per AP 2 10 = 1024 zones 2 16 zone IDs (enough to support 65,536 zones) 2 24 local IDs (each AP can support 16 M users) 41
42 Improving Collision-Free Probability in Stadium Scenario If each terminal choose one address, collision-free probability is: Becomes worse if devices change addresses. To improve the odds, use the random address as only a temporary one. Could provide a protocol for the AP to assign a guaranteedunique zonal address, such as, for example, the Core address. Send a message to the terminal, using the temporary address, ordering a change to the assigned zonal address. Terminal acknowledges, and AP updates database. 42
43 Zonal Address Aliasing, rev Core Switch Address is partitioned to incorporate a zone identifier. Switch selects a port based on zone identifier in the zonal DA. Switch learns zones, not addresses, based on zonal SA. Core address Access Point (AP) Local mapping table maps each internal (userside) address to a corresponding external (coreside) zonal alias address, assigned by AP using AP zone ID and arbitrary but unique local bits. Access point replaces access address with zonal core alias address in transmissions to core, and vice versa. Access address Core address Zonal: Zone ID + AP-Assigned local alias bits Zonal: Zone ID + AP-Assigned local alias bits Access address terminalselected (for new terminal) Unique and Zonal, once assigned by AP; includes AP Zone ID; could be Identical to Core address User terminal selects among many (46?) random bits at association later, AP assigns unique Zonal Access address (could be identical to Core address) 43
44 Conclusions Standardization of the local address space structure offers rich opportunities to develop enhanced Layer 2 networking; e.g., topology-based zonal addressing and switching, that is unavailable with the existing unstructured global address space. Structuring the local address space need not harm the use of that space for access or inhibit privacy improvements and is compatible with 46-bit random addressing for access, using methods like addressing aliasing. The 10 quadrant of the CID appears to not be a suitable basis for IEEE 802 to build local address structures. If 802 is to make use of the CID, it should seek an allocation of a clean block of addresses outside the 10 quadrant. 44
45 Recommendations We should applaud the efforts made by the RAC to encourage exploitation of local space. Standardization of the local address space structure should proceed, with 802 working hand-in-hand with the RAC to promote success. The P802c project should be open to both CID and non-cid solutions. CID-based solutions should consider the space outside the 10 quadrant of the CID, and coordination with the RAC should be initiated in preparation to request assignment of a clean block. Local address space structure standardization should not be considered in any way mandatory, since local usage should be up to the local administrator. However, standardization will play an enabling role in applications such as new switching methods and new random assignment mechanisms. 45
The Looming Ethernet MAC Address Crisis
The Looming Ethernet MAC Address Crisis Don Pannell Principal Systems Architect [email protected] Ethernet & IP Automotive Tech Day October 2014 What Ethernet MAC Address Crisis? Didn t IPv6 solve the
MAC Address Issues in IEEE 802.1
MAC Address Issues in IEEE 802.1 Don Pannell Principal Systems Architect [email protected] San Antonio, TX IEEE 802.1 Meeting November 2014 Agenda Start out with my The Looming Ethernet MAC Address
Local Address Management in IoT environments
Local Address Management in IoT environments Pat Thaler, Senior Technical Director, Broadcom 29 September 2014 3 rd IEEE 802 and IETF Leadership Meeting 1 PROBLEM STATEMENT 2 MAC address consumption ramps
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Chapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
NComputing L-Series LAN Deployment
NComputing L-Series LAN Deployment Best Practices for Local Area Network Infrastructure Scope: NComputing s L-Series terminals connect to a host computer through an Ethernet interface and IP protocol.
The IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.
Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application
Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
How To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP
How To Configure Multiple Spanning Tree Protocol (MSTP) Introduction This document provides configuration examples and guidelines for configuring Multiple Spanning Tree Protocol on Allied Telesyn switches.
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos [email protected] 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos [email protected] 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that
The ABCs of Spanning Tree Protocol
The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,
Candidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
Fiber Channel Over Ethernet (FCoE)
Fiber Channel Over Ethernet (FCoE) Using Intel Ethernet Switch Family White Paper November, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
VLAN and QinQ Technology White Paper
VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
Auditing the LAN with Network Discovery
Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
How Much Broadcast and Multicast Traffic Should I Allow in My Network?
PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
Chapter 2 TCP/IP Networking Basics
Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)
VLAN for DekTec Network Adapters
Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs
Design and Verification of Nine port Network Router
Design and Verification of Nine port Network Router G. Sri Lakshmi 1, A Ganga Mani 2 1 Assistant Professor, Department of Electronics and Communication Engineering, Pragathi Engineering College, Andhra
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
Ten top problems network techs encounter
Ten top problems network techs encounter Networks today have evolved quickly to include business critical applications and services, relied on heavily by users in the organization. In this environment,
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing
Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University
Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts
Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
TD 271 Rev.1 (PLEN/15)
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
WHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
Planning for Information Network
Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
TCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
LAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
ProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No
White Paper. Using VLAN s in Network Design. Kevin Colo
White Paper Using VLAN s in Network Design Kevin Colo December, 2012 1. Background To this day, end users still ask if VLANs (Virtual LANs) are a fundamentally secure technique for isolating networks.
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Communication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]
Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail [email protected] Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
Joint ITU-T/IEEE Workshop on Carrier-class Ethernet
Joint ITU-T/IEEE Workshop on Carrier-class Ethernet Carrier Bridge Architecture Stephen Haddock Chief Technology Officer Extreme Networks 802.1 Bridging Architecture for Carrier Ethernet from D & Q bridges
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
White Paper Three Simple Ways to Optimize Your Bandwidth Management in Video Surveillance
White Paper Three Simple Ways to Optimize Your Bandwidth Management in Video Surveillance Table of Contents Executive Summary 3 Getting the Most from Your Network Resources 4 Uncovering Common Methods
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged
Set Up a VM-Series Firewall on the Citrix SDX Server
Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1
Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
Burning Bridges - Routing Your Bridged WISP Network With MikroTik
Burning Bridges - Routing Your Bridged WISP Network With MikroTik Introduce Yourself Name Company & position there About Me Steve Discher 1987 graduate of Texas A&M University, in IT for more than 20 years
Can PowerConnect Switches Be Used in IP Multicast Networks?
PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
