1 The Benefits of Layer 3 Routing at the Network Edge Peter McNeil Product Marketing Manager L-com Global Connectivity Abstract This white paper covers where and when to employ Layer 3 routing at the edge of a network. This paper also provides definitions and applications for several widely used routing protocols including RIP, DVMRP, PIM and OSPF.
2 Introduction With the advent of lower cost, widely available Layer 2/3 switching ASICs, the question now becomes when/where to use Layer 3 routing in the LAN. Traditionally, Layer 3 routers were always at the core of the network functioning as gateways to the Wide Area Network. As technology, price points, and off the shelf availability have evolved, Layer 3 routing functionality is coming closer to the edge of the network right to the end user port. With this paradigm in Layer 2/Layer 3 convergence comes the question where and when is it necessary or beneficial to implement Layer 3 routing at the edge of the network? Layer 2 Switching vs. Layer 3 Routing First, let us explore the difference between Layer 2 switching and Layer 3 routing. Switching at Layer 2 (Data Link Layer) of the OSI model involves forwarding or filtering packets based on the MAC Destination Address (DA). A Layer 2 switch will dynamically learn the location of other IP Hosts on the network by logging each learned Source Address and the corresponding switch port it was learned on in the switches Address Table. When implementing Layer 2 switching, all packets are forwarded throughout the network unless specific filters are used to drop certain packets. Communication is open in this mode thus security and bandwidth conservation/containment are not optimized. When routing at Layer 3 of the OSI model (Network Layer), the forwarding and filtering of packets is based on specific protocol information and communication is contained within specific IP Subnets. Layer 3 routing allows intercommunication between different networks/users both geographically local and remote. Due to the more granular nature of Layer 3 routing lookups, as well as the implementation of Access Control Lists and Subnets in Layer 3 mode, Layer 3 routing provides greater security, control and bandwidth conservation than Layer 2 switching. Some of the reasons for utilizing Layer 3 routing are LAN segmentation through subnetting, broadcast firewall security, intelligent wide area route determination/connectivity as well as overall relief from bandwidth congestion. Today, LAN segmentation is done using Layer 2, 802.1Q VLAN s. VLAN s also provide network congestion relief and some level of security since there is no inter- VLAN communication that takes place. One drawback is that you must route at Layer 3 between Layer 2 VLAN s in order for the different VLANs to communicate and share resources. Furthermore, in order to connect to the wide area network (the Internet) you must have knowledge/support of Layer 3 routers, routing tables, subnets and next hop gateways, these things cannot be achieved with a Layer 2 switch.
3 Since the introduction of web based applications and storage systems, the majority of end users must access the Layer 3 core. With 80% of all LAN traffic going through the routed core, whereas the old rule of thumb was 80% local to a Layer 2 VLAN or broadcast domain, implementing Layer 3 closer to the edge takes the burden off the core router as well as providing redundant, highly available, quick failover Layer 3 links via protocols such as VRRP. Additionally, granular security rules can be administered via Layer 3 Access Control Lists on the edge router. Access Control Lists consist of one or more rules describing a particular type of IP or IPX traffic. ACLs can be simple, consisting of only one rule, or complicated with many rules. Each rule tells the Layer 3 switch/router to either permit or deny packets that match selection criteria specified in the rule. Each ACL is identified by a name. The name can be a meaningful string, such as denyftp or noweb or it can be a number such as 100 or 101. Examples of criteria which rules are set on for the IP protocol include: Source IP address Destination IP address Source port number Destination port number Type of Service (ToS) Security features on Layer 2 edge switches are limited to filtering on specific MAC addresses, being filtered on either source or destination. Layer 3 Access lists are more versatile and granular in that more combinations of Layer 3/4 access criteria can be assigned thus creating more flexible, personalized security rules in the network from the edge to the core. Furthermore, Layer 3 Multicast applications have become predominant in the Layer 3 routed world across WAN s and into the LAN. By streaming voice and data, these multicast applications are widely used for distance learning as well as news and entertainment. The ability for multicast routers across the world to communicate requires knowledge/support of Layer 3 protocols such as DVMRP, IGMP and PIM-DM/SM for multicast applications. When Layer 3 multicast routing is supported in the edge switch/router, bandwidth, money and valuable closet space are conserved. Layer 2 IGMP Snooping does not provide multicast routing. Configuration, management and administration of Layer 3 routing services at the edge, is typically less complex than in the core of the network. Today s edge switch/routers provide multiple management access and control gateways including web based Management, Telnet, CLI and SNMP based management access. Although some Layer 3 Routing education is required by the novice LAN administrator, basic concepts and guidelines are usually well documented in most edge product configuration guides. Additionally, many Layer 3 protocols are dynamic once they are enabled. Initial
4 configuration includes configuring IP Subnets for user groups and services, setting default gateways and enabling protocols such as RIP and DVMRP. The performance and cost advantage of implementing Layer 3 services at the edge of the network far outweighs the initial education process. Defining Layer 3 Routing Protocols To fully understand the operation and benefits of Layer 3 routing one must first have knowledge of the different protocols used. Below are some common Layer 3 routing protocols used in today s edge devices. RIP (Routing Information Protocol) RIP is a distance vector routing protocol that is used for routing IP, IPX, and XNS protocols. The RIP packet includes information such IP address, subnet mask and next hop gateway info which allows communication with other RIP aware devices. OSPF (Open Shortest Path First) OSPF, like RIP is a routing protocol. When implementing OSPF, each router obtains the entire topology database through flooding. Flooding insures a reliable transfer of the information. Each router then runs the OSPF algorithm on its database to build the IP routing table. IGMP (Internet Group Management Protocol). IGMP is a protocol that is used by IP hosts (PCs for example) to report their multicast group memberships to an adjacent multicast routers. DVMRP (Distance Vector Multicast Routing Protocol) - DVMRP routes multicast datagrams, between IP subnets. In addition, it specifies the tunneling of IP multicasts through non-multicast-routing-capable IP domains. PIM (Protocol Independent Multicast) PIM is a multicast routing protocol that runs over an existing unicast infrastructure. Unicast routing protocols include RIP and OSPF. PIM is called protocol independent because it can use the route information that any routing protocol enters into the multicast Routing Information Base (RIB). There are two types of PIM, Dense Mode (DM) and Sparse mode (SM). PIM-DM assumes that when a multicast source starts sending, all downstream systems will want to receive multicast datagrams. Initially, multicast datagrams are flooded to all areas of the network. If some areas of the network do not have group members, PIM-DM will prune off the forwarding branch of the multicast tree. PIM-SM is designed to efficiently establish multicast distribution trees across wide area networks (WANs) by selectively and intelligently sending multicast datagrams only to participating routers, which require them.
5 VRRP (Virtual Router Redundancy Protocol) VRRP is a protocol, which allows several routers on a multi-access link to utilize the same virtual IP/MAC address. One router will be elected as a master with the other routers acting as backups. All routers participating in VRRP will share each others IP/MAC information. Should one of the routers fail, immediate fail over to another active router will occur. The main benefit of using VRRP is that host systems (i.e. PC s) may be configured with a single default gateway and fail over time is at most only several seconds thus there is no effect on the IP Hosts or the applications that they are running. Additionally, VRRP supports load sharing of traffic when Default Gateways are configured appropriately. Utilizing VRRP guarantees network availability. Layer 3 Routing Applications Below are some applications where Layer 3 routing is necessary and/or beneficial at the LAN edge. The following applications are typical for most LAN s. Example 1 Assigning Static IP routes to VLAN s/subnets VLAN 1 IP Layer2/3 switch router VLAN 2 IP WAN ROUTER In the case of basic IP routing at the edge of the network, a VLAN equals an IP Subnet. With static IP routing, each VLAN, or Subnet, is statically assigned an IP address by the network administrator. By statically assigning IP s to VLANs/Subnets, greater control, accuracy and security are guaranteed. In a traditional Layer 2 network, 802.1Q VLANs may be used to segment users groups; this application is similar to IP Subnetting although when using Layer 2 VLANs no communication is allowed between VLANs. When Routing at Layer 3 individual users or subnets may be configured for intercommunication and resource sharing. This is beneficial when several user groups or individual users must access the same server/s but are not allowed to communicate with each other.
6 With Layer2/3 switch-routers, any VLAN configured on the switch that is not assigned an IP subnet, will act as a Layer 2 VLAN and will not be routed, even if the switch is in IP Routing mode. Typically, Layer 2/3 edge switches will support between 2k to 16k IP addresses per switch. Furthermore Layer 3 Subnet/IP interface support is usually between 32 and 250 subnets per switch. Since Layer 2/3 edge devices are connected to finite users/services, the above support is acceptable. For Core Layer 3 routing solutions, larger tables are needed due the aggregation of many switches, routers, server farms and multiple geographically displaced devices/users. Again, routing is necessary to communicate between disparate Layer Q VLANs. Example 2 Routing between Layer 2 VLAN s Layer2/3 switch router VLAN A VLAN B In order for communication and resource sharing between Layer 2, 802.1Q VLANs, Layer 3 routing is required. The advantage of today s Layer 2/3 switches is that no external Layer 3 router is required saving money and valuable wiring closet space. Additionally, bandwidth is conserved due to the fact that multiple inter switch links do not need to be traversed for core Layer 3 routing decisions, all of this activity occurs in the same ASIC/backplane of the edge switch/router. The protocol used in this scenario for basic Layer 3 routing between VLAN s is RIP (Routing Information Protocol). RIP is a distance vector routing protocol that is used for routing of IP, IPX, and XNS protocols. The RIP packet includes information such IP address, subnet mask and next hop gateway info.
7 Example 3 Routing on high speed uplinks to the core Layer 3 Gigabit uplinks Layer2/3 switch router WAN In this example, all Layer 2 users connected to the switch/router access high speed Layer 3 Gigabit ports connected to the backbone router which is in turn connected to the WAN. The benefit of Layer 3 on the Gigabit uplinks in the edge switch/ router is that less network bandwidth is used traversing links between the core router end edge switch. All Layer 3 look-ups and routing decisions are determined within the ASIC contained in the edge switch/router closest to the end users. More importantly, redundant, highly available quick fail over links are established via VRRP. Because of this, total system availability is ensured when routing on the uplinks at the edge of the network. Traditional Layer 2 Spanning Tree reconvergence time can take up to 45 seconds. The typical Layer 3 VRRP reconvergence time is generally sub two seconds.
8 Example 4 IP Multicast routing with IGMP and DVMRP IP Hosts sending IGMP information DVMRP Router Multicast Server DVMRP Router Multicast Server IP Hosts sending IGMP information In the example above, individual IP Hosts, or laptops in this scenario, use IGMP to send data about which multicast groups they are members of or would like to join. The DVMRP routing function in the Layer 2/3 switch routers then route IGMP information (joins, leaves etc.) between different IP subnets in the LAN. By supporting both IGMP and DVMRP multicast routing, today s switch/routers save time and bandwidth by not having to traverse multiple links to a traditional core router, which up until recently, provided this intelligence. In contrast, IGMP snooping at Layer 2 provides intelligent multicast scoping and awareness by determining exactly which users groups are located off each port on the switch. This provides bandwidth control by not flooding all requests and advertisements to ports/users that are not members of specific multicast groups requesting the multicast stream. The drawback is that routing between IGMP multicast groups is not supported with Layer 2 IGMP Snooping. The Layer 2 switch must send IGMP requests and reports across multiple inter-switch links and into the Layer 3 Multicast router somewhere in the core of the network in order to communicate with other Layer 3 Multicast routers and servers which contain the requested multicasts. By employing Layer 3 multicast routing at the edge, within the switch/router, bandwidth conservation is realized since all multicast routing decisions are made locally within the edge switch/ router. Additionally, a separate multicast router does not have to be purchased saving both cost and closet space.
9 Example 5 This example illustrates the use of PIM-DM multicast routing in the LAN PIM-DM IP Hosts using IGMP PIM-DM PIM-DM is similar to DVMRP in that it is a Layer 3 Multicast routing protocol. PIM-DM is flooded to all PIM-DM aware routers in the LAN to share multicast sender and receiver information. This flooding approach guarantees that all senders and receivers are accounted for and added/deleted from multicast routing tables accordingly. PIM-DM is less efficient in WAN applications where multicast senders and receivers may be widely dispersed. Again, multicast routing is not supported by a Layer 2 only switch. Example 6 This example illustrates the use of PIM-SM multicast routing protocol WAN PIM-SM WAN PIM-SM IP Hosts sending IGMP join and leave requests Here, the Switch /Router is directly connected to the WAN. PIM-SM was designed to operate very efficiently across wide area networks, where multicast groups are sparsely
10 distributed. PIM-SM uses join requests that transmit from router to router from requesting IP Hosts to directly connected routers that share the same multicast groups being requested. PIM-DM on the other hand uses the flooding mechanism to build its tables. Such mass flooding to few, geographically dispersed routers in the WAN would be very inefficient, this is why Sparse Mode was created. Again, the benefits for using PIM -DM or SM, depending on the application, LAN or WAN, are the same as those found when implementing DVMRP Multicast routing. All of these protocols allow for IGMP communication between subnets, this is something a that Layer 2 switch cannot do. Example 7 In this example, OSPF is used to route IP traffic through the LAN and into the Core router Shared Server OSPF uses an algorithm that selects the shortest open path between routers. The laptop users above are in different IP subnets, each with different IP addresses. In order to communicate with shared resources (i.e. printers/servers) as well as the WAN via the core router, Layer 3 routes must be established. OSPF will determine the best, fastest route to those resources. Each OSPF router maintains routing tables of all other OSPF routers for best route determination.
11 Example 8 Using VRRP in the LAN Shared Gateway A and B addresses Router 1 IP Hosts With Default Gateway A configured Router 2 Shared Gateway A and B addresses IP Hosts With Default Gateway B configured The above example shows how VRRP enabled on the two Chassis based Switch routers as well as the core router. In the case where a link to the chassis based switch router were to fail, all traffic destined to the already configured default gateway on the LAN IP Hosts will be diverted to the other, operational chassis based switch/router. In order to gain load balancing as well as redundancy, one half of the users (PCs) on the standalone switch are given a specific IP gateway and the other half are given a different IP gateway. This ensures that a single interface will not be over run and congested due to high volumes of traffic, Also, this ensures that if one IP gateway were to fail, the other will take over ensuring total network availability. Furthermore, VRRP supports a sub -two second fail over time, which insures critical applications will not time out and there is no impact to the end user/host systems. In contrast, Spanning Tree Protocol used in Layer 2 networks will typically take up to 45 seconds to respan after a link is disabled. This could cause critical network applications, to time out. Additionally, Layer 2 Switches, when connected to each other, send BPDU (Bridge Protocol Data Unit) packets as broadcasts throughout the entire network. All switches/bridges in the LAN send and receive these BPDU s. This adds to overall network congestion in the LAN. In contrast, when utilizing Layer 3 VRRP, BPDU broadcasts are not propagated throughout the LAN.
12 Conclusion By implementing Layer 3 at the edge of the LAN, many benefits are realized. These benefits include greater network security via access control lists, Layer 3 protocol filtering and IP Subnetting, availability through high speed, redundant fail over uplinks via protocols such as VRRP, intercommunication between Layer 2 VLAN s, WAN connectivity, and increased bandwidth conservation by limiting the need for users to traverse multiple inter- switch links into a core router for Layer 3 decision making. Additionally, money is saved since it is not necessary to purchase an external Layer 3 router in addition to a Layer 2 switch. Furthermore, wiring closet space is conserved since all Layer 2/3 functions are performed in a single unit. With lowering price points and off the shelf support for Layer 3 routing in today s ASICs it is a must to factor in Layer 3 support through the entire LAN,edge to core, for future investment protection. By supporting Layer 2/3 functionality in today s network edge devices, future expandability, functionality and efficiencies are guaranteed. As more applications and resources depend on Layer 3 support, installation of Layer 2/3 switch routers today guarantees investment protection for tomorrow. Moreover, by implementing Layer 3 at the edge, the overall Service Enabled Edge is enhanced. By adding Layer 3 protocol filters, Access Control Lists and IP Subnetting, more granular user requirements and levels of access are addressed. In the traditional Layer 2 environment, individual user requirements, access and control are limited. By implementing Layer 3 routing at the edge, greater security, availability and network utilization are realized.
13 L-com, a global leader in the manufacture of wired and wireless connectivity products, offers a wide range of solutions and unmatched customer service for the electronics and data communications industries. The company s product portfolio includes cable assemblies, connectors, adapters, computer networking components, and custom products, as well as their HyperLink line of wireless products which include Antennas, RF Amplifiers, Coaxial lightning and surge protectors, and NEMA rated enclosures. L-com s HyperLink wireless products are designed for WiFi, WiMAX, SCADA, a/b/g/n, RFID and Bluetooth applications. Trusted for over 30 years, L-com, which is headquartered in North Andover, MA, is ISO 9001:2008 certified and many of its products are UL recognized. For more information, contact your L-com sales representative at or Corporate Headquarters and Fulfillment Facility 45 Beechwood Drive North Andover, MA Cable Assembly Manufacturing Facility 1755 Osgood Street North Andover, MA Far East Manufacturing and Fulfillment Facility 7 ChunHui Road, SIP Building 1 Suzhou, Jiangsu, China P.C.: Wireless Manufacturing and Fulfillment Facility 1201 Clint Moore Road Boca Raton, FL 33487
Wireless Network Applications Overview Choosing the Right WiFi Antenna for your Application Peter McNeil Product Marketing Manager L-com Global Connectivity Abstract This white paper discusses the types
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
TechBrief Introduction Leveraging Redundancy to Build Fault-Tolerant Networks The high demands of e-commerce and Internet applications have required networks to exhibit the same reliability as the public
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
Delivers Industry Leading Price, Performance and Flexibility to Wiring Closets, Desktops and Server Farms Provides High-density 10/100 Mbps Ethernet and Gigabit Ethernet Copper Connectivity to Workstations
Cisco CCNP 642 901 Optimizing Converged Cisco Networks (ONT) Course Number: 642 901 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Cisco CCNP Exam 642 901:
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
Chapter 6 Configuring IP This chapter describes the Internet Protocol (IP) parameters on HP ProCurve routing switches and switches and how to configure them. After you add IP addresses and configure other
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
1 Types of packets - Multicast - Three types of packets can exist on an IPv4 network: Unicast A packet sent from one host to only one other host. A hub will forward a unicast out all ports. If a switch
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
hp procurve networking business may 2003 network infrastructure: getting started with VoIP technical brief table of contents introduction 2 network optimization for VoIP 2 bandwidth provisioning 3 end-to-end
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail email@example.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on
CHAPTER 10 IP MULTICAST This chapter is about IP multicast, the network layer mechanisms in the Internet to support applications where data is sent from a sender to multiple receivers. The first section
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and
BDCOM S3900 Switch High Performance 10Gigabit Ethernet Switch BDCOM S3900 is a standard L3 congestion-less switch series, which are capable of multi-layer switching and wire-speed route forwarding. Its
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham Congduc.Pham@univ-pau.fr Typical example of Ethernet local networks Mostly based
Multicast for Enterprise Video Streaming Protocols and Design Guide This document provides a network equipment neutral, technical overview of multicast protocols and a discussion of techniques and best
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
WiFi Antenna Installation Best Practices Design Guide Choosing the right antenna The first step to building a wireless network is choosing the correct antenna for your application. Coverage and range will
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
GTL-2691 Version: 1 Modules are to be ordered separately. 20 GE + 4 GE Combo SFP + 2 10G Slots L3 Managed Stackable Switch The LevelOne GEL-2691 is a Layer 3 Managed switch with 24 x 1000Base-T ports associated
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (firstname.lastname@example.org) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (email@example.com) Senior Architect, Limelight
Abdullah Jameel Mahdi 1 and Anas Ali Hussain 2 1 Information and Communication department, Information Engineering Collage, Al-Nahrin University 2 Computer department, Engineering Collage, Al-Nahrin University
Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Juniper Networks Certified Internet Specialist Fast Track Varighet: 1.00 Days Kurskode: JNCIS-ENT Beskrivelse: Prepare to operate Juniper based networks and pass the JNCIA-Junos exam. Gain the foundation
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
PowerConnect Application Note #6 January 2004 Can PowerConnect Switches Be Used in IP Multicast Networks? This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx PowerConnect
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
Burning Bridges - Routing Your Bridged WISP Network With MikroTik Introduce Yourself Name Company & position there About Me Steve Discher 1987 graduate of Texas A&M University, in IT for more than 20 years
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
Training Proposal Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1 Training Proposal CONTENTS CONTENTS... 2 1 Training Solution... 7 1.1 Routing and Switching Certification Training
John Ragan Director of Product Management Billy Wise Communications Specialist Current Substation Communications Physical Infrastructure Twisted Pair, 4 Wire, COAX, Cat5 & Cat6, 9 Pin Serial Cable, Single-mode
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
Datasheet AlliedWare Operating System AlliedWare Layer 3 Fully Featured Operating System AlliedWare is ' feature-rich first generation operating system. It serves as the foundation for ' original Layer