National Education Network. KAREN School Cluster High-level Design
|
|
|
- Anis Wilkinson
- 10 years ago
- Views:
Transcription
1 National Education Network KAREN School Cluster High-level Design
2 Contents 1 Audience Reference Documents Version control Review and Approval Distribution Background Introduction Regional School Clusters/Loops School Cluster/Loop Trusts Network Services Functions School Cluster Border Router School Cluster Internet Service Provider Physical Last Mile Connectivity School Edge Router/Firewall School Cluster IT Support KAREN School Cluster Design Principles School Cluster Border Router School Edge Router/Firewall Diagram Examples KAREN School Cluster as a single Autonomous System KAREN School Cluster by Function OF 9
3 1 Audience The intended audience for this document are: REANNZ Staff members REANNZ Board members External Interested Parties 2 Reference Documents National Education Network Trial Documentation IP Address Allocation policy Aggregators Policy KAREN Service Portability for the Education Sector Connectivity Standards 3 Version control VERSION DATE REASON FOR UPDATE AUTHOR /08/2011 Document Creation Andrew McKegg /08/2011 Updated Draft Andrew McKegg /08/2011 Second Draft Andrew McKegg /08/2011 Updated & Approved Andrew McKegg 4 Review and Approval This document has been approved for release by the following: NAME ROLE ORGANISATION DATE Mark Cordy Interim Chief Executive REANNZ 09/08/ Distribution This document has been distributed to the following persons or parties: NAME ROLE ORGANISATION Staff Review REANNZ 3 OF 9
4 6 Background 6.1 Introduction The National Education Network (NEN) Trial aimed to provide highperformance network access to a range of learning resources for up to 200 schools, using the backbone infrastructure provided by KAREN (Kiwi Advanced Research and Education Network). School Clusters already connected to open access fibre networks were invited to join the Phase III trial with priority being given to the established loop Clusters in the Manawatu, in Wellington, Nelson-Marlborough, Christchurch and Ashburton. Implementation plans were developed for each geographic Cluster to clarify the actions required and respective responsibilities of the parties involved. This document covers the development of a simple and repeatable KAREN School Cluster high-level design, based on the learnings made as a result of the NEN Trial, in support of the fundamental principles of KAREN, and on designs agreed with the Ministry of Education. The design concept involves considering the KAREN School Cluster as the distributed campus of a single logical entity for the purpose of delivering shared IT services from a variety of Suppliers. 6.2 Regional School Clusters/Loops The rationale behind Regional approach for IP Address allocation is covered in the IP Address Allocation Policy, and also discussed in KAREN Service Portability for the Education Sector. IP address/service Portability is a key design principle; Schools should not be constrained in any way from moving Internet Service Providers. IP addresses that are assigned to the institution will become a unique identifier that does not change when that institution chooses to change Internet Service Provider. The assumption is Schools will move from independently sourcing services, like Internet access, by aggregating their demand on a Local/Regional basis and possibly even a National basis over time. One of the primary goals of the IP Address Allocation policy is to preserve service portability options. 4 OF 9
5 6.3 School Cluster/Loop Trusts Local School Clusters (or loops) are encouraged to form a Trust as a Legal Entity capable of providing the governance, procurement and management of shared resources and services to the constituent members of the Cluster. The formation of a Trust is a straight forward exercise and is critical to the success of local School Clusters realising the full benefit of participation in the School Cluster, National Education Network, and KAREN. Support for this process is available upon request. A School Cluster Trust can be given the authority to enter into commercial arrangements with suppliers to procure Internet connectivity and other services, on the School Cluster s behalf. It is also a prerequisite for the allocation of IP address space and Autonomous System Numbers (ASNs) by REANNZ. 6.4 Network Services Functions The scope of Network Services for the delivery of a KAREN School Cluster can be broken down as follows: School Cluster Border Router The KAREN Distribution Layer has been designed to deliver School Cluster border router functionality. This is to relieve the School Cluster of the administrative burden and cost of delivering a complex routing function. This Service is provided by KAREN, to School Clusters/Loops School Cluster Internet Service Provider The School Cluster Internet Service Provider is procured by the School Cluster Trust. This allows the Cluster to aggregate the individual School s Internet demand/budget, achieve cost savings, and/or other operational benefits Physical Last Mile Connectivity Schools will access KAREN through an Ethernet (preferably optical) connection, delivered by local last mile network service providers. Ideally, each local last mile network service provider will deliver a single shared School Cluster VLAN to both the School Cluster Border Router and 5 OF 9
6 Edge Firewall/Router. The delivery of Ethernet (Layer 2, as oppossed to dark fibre) services by a local last mile network service provider will minimise the number of physical connections required on the School Cluster Border Router. All connections to KAREN must comply meet the KAREN connectivity standards, as described on Local Loop Unbundling (LLU), ADSL, and ADSL2+ present an opportunity to explore alternative last mile connectivity options with the network service provider community, and has not been part of any trials to date. Physical Last Mile connectivity is to be procured by the School Cluster/Loop School Edge Router/Firewall REANNZ RFPs were completed for the bulk procurement of: Compliant edge devices Management of School edge router/firewall This does not preclude the use of alternative compliant edge devices, nor alternative router/firewall management service providers. These Services are to be procured by the School Clusters/Loops either independently, or by contacting REANNZ with regards to the above RFPs School Cluster IT Support Local School Cluster professional IT Support services are expected to be the interface between the KAREN School Cluster and other Service Providers (e.g. KAREN, ISP, Network Device Managers). This would also provide the opportunity to deliver shared services (e.g. Content Filtering, Proxy Servers, Remote Access, SANs, Authentication etc). These Services are to be procured by the School Clusters/Loops. 6 OF 9
7 7 KAREN School Cluster Design Principles 7.1 School Cluster Border Router The School Cluster Border Router is to be delivered via a Virtual Router Instance on the KAREN Distribution Layer MX80. This Virtual Router Instance will be configured for the exclusive purpose of delivering the border router functionality and associated routing policy for the KAREN School Cluster. School Cluster Border Router key design principles: Connected to both the Local Access Service provider and the Internet Service Provider. ibgp peered with each School in the Cluster as a Route Reflector with the KAREN School Cluster ASN. School s private IP prefixes will be redistributed internally. ebgp peered with KAREN, local preference configured in favour of these prefixes. ebgp peered with the ISP, receiving default routes and redistributing them internally. ASN prepending will be configured to prevent asymmetric routing. Management and support provided by the KAREN Help Desk, via the School Cluster IT Support/Wranglers (not end users). 7.2 School Edge Router/Firewall The School edge device key design principles: Ideally connected to a common VLAN to allow direct inter-cluster member connectivity, and in support of BGP 3 rd party next hop (switching as opposed to routing where possible). The School edge router provides the firewalling on behalf of the school. Firewall policy schould be setup on the edge router to ensure all traffic is compliant with the KAREN School Cluster s security & acceptable use policies (e.g. Content Filtering/Proxy Services). Edge router will provide Network Address Translation (NAT) on behalf of the school as an exception only. Kawahiko IP Address allocations used in support of NAT sensitive applications like Video Conferencing etc. 7 OF 9
8 IPv6 allocations to be configured and routed in anticipation of future widespread utilisation. 7.3 Diagram Examples KAREN School Cluster as a single Autonomous System. 8 OF 9
9 7.3.2 KAREN School Cluster by Function. 9 OF 9
NEN Community REANNZ. Design Statement: NEN Edge Device
TO FROM NEN Community REANNZ DATE June 2010 SUBJECT Design Statement: NEN Edge Device Background This National Education Network (NEN) design statement was developed by REANNZ with input from the relevant
Understanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
Campus Network Best Practices: Core and Edge Networks
Campus Network Best Practices: Core and Edge Networks Dale Smith Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Transitioning to BGP. ISP Workshops. Last updated 24 April 2013
Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
Designing Cisco Network Service Architectures ARCH v2.1; 5 Days, Instructor-led
Designing Cisco Network Service Architectures ARCH v2.1; 5 Days, Instructor-led Course Description The Designing Cisco Network Service Architectures (ARCH) v2.1 course is a five-day instructor-led course.
Campus Network Best Practices: Core and Edge Networks
Campus Network Best Practices: Core and Edge Networks Dale Smith University of Oregon/NSRC [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).
ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.
ISP Case Study UUNET UK (1997) ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Acknowledgements Thanks are due to UUNET UK for allowing the use of their configuration information and network
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: December 15 2009 14:00 18:00 1. No help material is allowed - You
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
BGP as an IGP for Carrier/Enterprise Networks
BGP as an IGP for Carrier/Enterprise Networks Presented by: Kevin Myers, SENIOR NETWORK ENGINEER IP ArchiTECHS MANAGED SERVICES Background Kevin Myers 15 + years in IT/Network Engineering Designed and
Methods of interconnecting MPLS Networks
Methods of interconnecting MPLS Networks NANOG31, May 2005 San Francisco Cable & Wireless Internet Engineering Udo Steinegger What this talk is about General This presentation covers technologies on how
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
BGP Routing. Course Description. Students Will Learn. Target Audience. Hands-On
Hands-On Course Description This Hands-On course on (Border Gateway Protocol), from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Address Scheme Planning for an ISP backbone Network
Address Scheme Planning for an ISP backbone Network Philip Smith Consulting Engineering, Office of the CTO Version 0.1 (draft) LIST OF FIGURES 2 INTRODUCTION 3 BACKGROUND 3 BUSINESS MODEL 3 ADDRESS PLAN
How to Configure BGP Tech Note
How to Configure BGP Tech Note This document gives step by step instructions for configuring and testing full-mesh multi-homed ebgp using Palo Alto Networks devices in both an Active/Passive and Active/Active
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ]
s@lm@n Juniper Exam JN0-343 Juniper Networks Certified Internet Specialist (JNCIS-ENT) Version: 10.1 [ Total Questions: 498 ] Topic 1, Volume A Question No : 1 - (Topic 1) How much overhead does the GRE
BGP Best Path Selection Algorithm
BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP
IPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager ([email protected]) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:
Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL: Title: FibreOP Business Internet 5 Static IP Customer Configuration Version 1.1 Summary: This document provides
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
White Paper. Solutions to VoIP (Voice over IP) Recording Deployment
White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright ([email protected]), BSc (Hons) Ultra Electronics AudioSoft, October
NAT Using Source Routing through BGP Gateways
NAT Using Source Routing through BGP Gateways Best Practice Document Produced by the CESNET led Working Group on Network Monitoring (CBPD122) Authors: Pavel Kislinger, Vladimír Záhořík, CESNET September
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
Introduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
Campus IPv6 connection Campus IPv6 deployment
Campus IPv6 connection Campus IPv6 deployment Campus Address allocation, Topology Issues János Mohácsi NIIF/HUNGARNET Copy Rights This slide set is the ownership of the 6DISS project via its partners The
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
nexvortex Setup Template
nexvortex Setup Template ZULTYS, INC. April 2013 5 1 0 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex customers
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net
Peering in Hong Kong Che-Hoo CHENG CUHK/HKIX www.hkix.net How Internet Operates in simple terms Internet is composed of networks of ISPs and users User networks connect to ISPs Small ISPs connect to large
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Fireware How To Dynamic Routing
Fireware How To Dynamic Routing How do I configure my Firebox to use BGP? Introduction A routing protocol is the language a router speaks with other routers to share information about the status of network
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol) Document revision 1.2 (Thu Mar 04 19:34:34 GMT 2004) This document applies to V2.8 Table of Contents Table of Contents General Information Summary Specifications Related Documents
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
BGP1 Multihoming and Traffic Engineering
83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General
Enabling NAT and Routing in DGW v2.0 June 6, 2012
Enabling NAT and Routing in DGW v2.0 June 6, 2012 Proprietary 2012 Media5 Corporation Table of Contents Introduction... 3 Starting Services... 4 Distinguishing your WAN and LAN interfaces... 5 Configuring
Supporting Document PPP
Supporting Document PPP Content 1 Starter Kit... 3 2 Technical Specification Access... 3 2.1 Overview... 3 2.2 Upstream Policing for PPP@ISP... 3 2.3 Supported Protocols... 3 2.4 PPPoA... 3 2.5 PPPoE...
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
Simple Multihoming. ISP Workshops. Last updated 30 th March 2015
Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006
S-38.3192 ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006 Original version: Johanna Nieminen and Timo Viipuri (2005) Modified: Timo-Pekka Heikkinen, Juha Järvinen and Yavor Ivanov (2006) Task
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
How To Build A Lightpath Network For Multiple Lightpath Projects
Building a LAN to Support Multiple Lightpath Projects Ronald van der Pol About SARA Computing and Networking services Houses and operates national supercomputer Huygens Houses and operates national
Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support
Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Title: Single Static IP Customer Owned LAN Router Support Version 1.0 Summary: Use the following method to
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
ICTNPL5071A Develop planning strategies for core network design
ICTNPL5071A Develop planning strategies for core network design Release: 1 ICTNPL5071A Develop planning strategies for core network design Modification History Not Applicable Approved Page 2 of 15 Unit
Cisco Certified Network Professional - Routing & Switching
Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:
Simple Multihoming. ISP/IXP Workshops
Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Advanced Higher Computing. Computer Networks. Homework Sheets
Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards
RESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, [email protected] Campus Best Practices - Resilient network design Campus
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
Internet Resiliency and Recovery
Internet Resiliency and Recovery Scott Hofer Executive Network Architect Scott Hofer, Executive Network Architect, IBM IBM Certified Executive Network IT Specialist M.S. Telecommunications 11 years with
Elfiq Link Load Balancer Frequently Asked Questions (FAQ)
lin Elfiq Link Load Balancer Frequently Asked Questions (FAQ) For Elfiq Operating System (EOS) version 3.1.x Document Revision 1.8 May 2006 Elfiq Solutions www.elfiq.com Page 2 / 14 Table of contents 1
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor
642-902 Route: Implementing Cisco IP Routing Course Introduction Course Introduction Module 01 - Planning Routing Services Lesson: Assessing Complex Enterprise Network Requirements Cisco Enterprise Architectures
Doing Don ts: Modifying BGP Attributes within an Autonomous System
Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium
Understanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
Cisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
BGP Basics. BGP Uses TCP 179 ibgp - BGP Peers in the same AS ebgp - BGP Peers in different AS's. 64512-65535 Private BGP ASN. BGP Router Processes
BGP Basics BGPv4 - RFC 4271 - IPv6 support Path vector routing protocol EGP Routing between AS'es Classless Transit Area - Area used to reach other areas. Requires full routing table (no default routes).
Understanding Large Internet Service Provider Backbone Networks
Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey [email protected] Purpose
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Border Gateway Protocol Best Practices
Border Gateway Protocol Best Practices By Clifton Funakura The Internet has grown into a worldwide network supporting a wide range of business applications. Many companies depend on the Internet for day-to-day
MPLS VPN Implementation
MPLS VPN Implementation Overview Virtual Routing and Forwarding Table VPN-Aware Routing Protocols VRF Configuration Tasks Configuring BGP Address families Configuring BGP Neighbors Configuring MP-BGP Monitoring
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Building Trusted VPNs with Multi-VRF
Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
IXP Member connection Best Practice. Kittinan Sriprasert BKNIX [email protected]
IXP Member connection Best Practice Kittinan Sriprasert BKNIX [email protected] Agenda Prerequisites How to Connect to BKNIX Topology Overview Logical Connection Physical Connection Best Connection
Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.
Where MPLS part I explains the basics of labeling packets, it s not giving any advantage over normal routing, apart from faster table lookups. But extensions to MPLS allow for more. In this article I ll
Group Member Access LCH.Clearnet Ltd Network Connectivity Guide (BT Radianz)
Group Member Access LCH.Clearnet Ltd Network Connectivity Guide () Owner: Director, Commercial Services Document Version Number: 1.0 Issue Date: 22 June 2009 COPYRIGHT The copyright in this work is vested
Internet Routing Protocols Lecture 04 BGP Continued
Internet Routing Protocols Lecture 04 BGP Continued Advanced Systems Topics Lent Term, 008 Timothy G. Griffin Computer Lab Cambridge UK Two Types of BGP Sessions AS External Neighbor (EBGP) in a different
Polycom. RealPresence Ready Firewall Traversal Tips
Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you
