Migrating a Legacy WAN to TCP/IP Infrastructure
|
|
|
- Baldwin Gilmore
- 10 years ago
- Views:
Transcription
1 Migrating a Legacy WAN to TCP/IP Infrastructure w w w. w a n w a r e. c o m 1
2 Introduction TCP/IP has become a ubiquitous network architecture in both the LAN and WAN environments of many organizations. Coupled with the availability of small, low-cost embedded computer systems, TCP/IP networks provide those organizations with an opportunity to significantly reduce costs. Most legacy WANs use synchronous communications for their wide-area links. This white paper discusses the various types of legacy networks in use today, reasons for converting to TCP/IP networking, considerations for migration to TCP/IP and the use of a new device family - SyncServer - to permit cost-efficient migration to a TCP/IP infrastructure. Legacy Networks The meaning of the term legacy network and the devices and networks to which it applies varies with individual opinion and industry. Generally it is taken to refer to networks, designs and devices which are today difficult to source because they are no longer produced or difficult to maintain because of inherent complexity or lack of design and maintenance expertise. Many older/legacy host computers or data collection devices only implement particular network protocols. Consequently, to meet their communication requirements, those specific protocols are used. Some examples of legacy protocols are SNA, X.25, AX.25 (airline X.25), BX.25 (telephone X.25), HDLC-LAPB, SDLC, Frame Relay, BiSync, and raw synchronous. Companies today are faced with the challenges of controlling equipment and operating costs, protecting their current investments and having the ability to deploy new applications costeffectively. The Software Group provides cost-effective TCP/IP enabling solutions that permit the conversion from legacy networks to TCP/IP infrastructure without major changes to network endpoints or application design. X.25 Networking X.25 is one of the most predominant legacy networks, especially in international applications. The protocol was developed to provide reliable data communications on public data networks. X.25 users are typically large organizations with widely dispersed and communications-intensive applications. X.25 provides very robust error checking. It works well in many older networks that are susceptible to physical interference. LAPB (Link Access Procedure, Balanced) LAPB is the data link layer protocol in the X.25 protocol stack. LAPB is a bit-oriented protocol derived from HDLC. HDLC (High-level Data Link Control) HDLC is a general-purpose data link control protocol defined by ISO for use on both point-to-point and multipoint (multidrop) data links. HDLC supports full-duplex, transparent-mode operation. It is used extensively in both multipoint and computer networks. Some manufacturers and other standards bodies still use their own acronyms for the protocol, e.g., IBM s SDLC. 2
3 SNA (Systems Network Architecture) SNA is IBM's proprietary high level networking protocol standard. SNA is used by IBM and IBMcompatible mainframes for user/host as well as host/host (APPC) interactions. Frame Relay Frame Relay is a successor packet-switching technology to X.25. It uses a fast packet-switching technology that does not provide end-to-end error checking. TCP/IP Networking As corporations become more reliant on Internet protocols, either as Intranet components or interfacing directly with the Internet for corporate communications, they will become more reliant on worldwide IP (Internet Protocol) services. IP will become far more important and ultimately will become the predominant data networking protocol. Managing one type of network based on the most commonly used network protocol (IP) is simpler and less costly than managing many different types of network protocols and devices. Reasons for Converting to TCP/IP Networks Most organizations have several network protocols/infrastructures operating simultaneously, as their network needs and applications have evolved over time. What is cost-effective and efficient to deploy at one time is often not cost-effective even two years later. However, because network applications represent significant investments on the organization's part (staff training, business processes, even organizational design), network replacement cycles do not keep pace with technological evolution. As a result, organizations are often required to maintain rather expensive and varied network infrastructures, simply because the cost of rebuilding an application to take advantage of more modern techniques is too high. Whether or not there is resistance to convert from legacy networks to IP networking varies by organization. Many legacy networks have been in place for more than ten years with few or no updates to the hardware or software. The legacy system works and it is reliable so why change it? There is resistance to converting to anything different if it involves a redesign of the network or installation and setup of new hardware or software. On the other hand, TCP/IP networking has become ubiquitous inside corporations through their LANs. TCP/IP networking has also become ubiquitous because of the business potential of the Internet. Maintaining an internal TCP/IP network (Intranet), a network for Internet connectivity and a network for communication with legacy devices involves considerable management and familiarity with different networking systems and protocols. TCP/IP provides for any-to-any connectivity, as opposed to most legacy protocols, many of which are either implemented for proprietary systems, or are open systems co-opted to proprietary infrastructures. Managing the performance of a single, TCP/IP-based Wide Area Network (WAN) is much simpler than attempting to manage an institutional WAN based on different protocols, facilities, and terminal devices. However, when an existing network functions adequately, there have to be either business or technical reasons to drive the migration to TCP/IP networks. 3
4 Business Reasons for Conversion to an IP Infrastructure Cost control is the key business reason driving migration to IP infrastructure, albeit in a number of different areas. The most obvious item is the cost of the communications facilities interconnecting the organization's sites. For a large organization with hundreds, if not thousands, of locations, this is considerable, and direct savings are available by eliminating legacy leased lines which run parallel to existing IP infrastructure, and carrying legacy traffic on the IP network. In addition to these directly measurable cost reductions, an organization implementing a completely IP-based infrastructure also has the ability to capture savings in the following areas: Human Resources Fewer technical specialists are required to operate a single large TCP/IP-based network than a number of disparate synchronous data networks. Network Support Equipment Large synchronous data networks often require special diagnostic and troubleshooting tools. These devices are expensive, and infrequently used (but availability is critical when a failure occurs). With a TCP-based infrastructure, there is no requirement for such equipment. Technical Reasons to Convert Although cost control is often a key reason for consolidating data traffic to an IP infrastructure, other technical benefits result from such a change. Both reliability and network performance increase with a shift from collections of legacy infrastructures to a single IP-based network. TCP/IP was designed by DARPA, the United States Defence Advanced Research Projects Agency. One of the criteria for the design was resilience and reliability; a properly designed TCP/IP network can tolerate trunk and node failures by automatically routing traffic around the failure. Legacy networks can be designed to handle failures, but often at great cost (redundant equipment) and effort (legacy networks do not usually have resilience built in; it needs to be added during deployment). Overall network performance, or an increase in cost-effectiveness, can result from migrating a network from groups of (relatively low-speed) trunk interconnections to a single high-speed trunk. For typical commercial traffic loads, consolidating several low-speed links into a single link with the same speed as the sum of the bandwidth of the low-speed links improves response times and throughput. Alternately, if the organization chooses to go ahead with a slightly lower-speed link, some ability to capture operational savings is available. Planning for Conversion When an organization s network has evolved over time and the legacy portion of that network has been in place for some time, careful planning is required to ensure smooth infrastructure migration. The current network must be reviewed for placement of SyncServers to result in the maximum financial savings and minimum operational disruption. Migration to a TCP/IP infrastructure can take place at different levels. Synchronous frame switching, which operates at the lowest level, can be implemented with minimal disruption of 4
5 existing applications. However, it requires the highest level of performance from the IP infrastructure and new equipment on both sides of the network. While application-level changes to operate using a different protocol interface API representthe lowest-cost alternative from the point of view of equipment deployment and IP network performance, they can be costly in time and effort and risk.. Reprogramming of applications is unnecessary when SyncServer is used in a switching configuration. A full migration process is not transparent to applications. Both the network and applications it supports need to be taken into consideration when migrating to TCP/IP. Network Considerations In preparing to deploy SyncServers within the network, The Software Group conducts a detailed analysis of the current infrastructure, documents all findings, considers management's administrative policies and procedures, and plans network strategies to migrate to TCP/IP, thereby reducing complexity and operational costs. An analysis of current infrastructure involves identifying the following: Existing physical and virtual legacy connections (number, speed, geographic location) Existing legacy devices for collection of data and hub consolidation of data (number, maximum speed, geographic location) Existing applications and server communications protocols Current use of TCP/IP connectivity (purpose, geographic deployment, future considerations) Existing LAN infrastructure Existing legacy technology suppliers and future availability of products and services Supplied as a synchronous switch, SyncServer migrates any point-to-point synchronous traffic over a TCP-IP Intranet. It handles X.25, SDLC batch traffic, Frame Relay, and other HDLC-based protocols, with no requirement for change in host or terminal systems. Performance Testing End users will expect performance of application functions to be as good as and probably better than the performance of the legacy network prior to migration. The migration should include performance testing that will verify performance criteria. Generally, TCP/IP is faster than many legacy networks. However, improper consideration of factors affecting conversion of data packets on legacy networks to TCP/IP packets can result in slower performance that will require network troubleshooting to resolve. Concerns About IP Networking via Internet can be Addressed with Available Products IP networking is generally associated with the Internet. As such, the two major concerns about IP networking are security and bandwidth availability. Many organizations have a private IP infrastructure and therefore no concern about security or bandwidth optimization. The data lines are private and bandwidth is known because it has been purchased. But today, even if the Internet is used as the IP network, concerns about security and bandwidth available can be 5
6 addressed through network design and the availability of many products designed specifically for these purposes. Security Considerations If a new TCP/IP network is deployed in part or in whole to permit migration from legacy networks to TCP/IP networks, network security design must be incorporated as part of the overall network rollout. For an internal TCP/IP network, security concerns may be lessened somewhat. However, use of the Internet as the TCP/IP network will require the use of virtual private networking (VPN) and firewalls, and may require intrusion detection systems and data encryption. Bandwidth Considerations If there is an existing internal TCP/IP network, adding data traffic that was formerly on a legacy network will require analysis of total bandwidth requirements, priority and fluctuations in bandwidth requirements for peak periods. Example Migrations Synchronous Frame Switching Over IP Synchronous Leased Line (SDLC) IBM Mainframe Figure 1: File Exchange over a synchronous leased line SNA Batch Terminal Figure 1 illustrates a point-to-point network connection for file exchange with IBM mainframes. A synchronous frame-switching approach is the easiest migration for this type of connection, since the software for terminal devices and host applications is usually not amenable to change. In a frame-switching environment, the IP interface/switching devices have no knowledge of the protocol running over the synchronous leased line illustrated in the diagram. IBM Mainframe SyncSwitch TCP/IP WAN SyncSwitch SNA Batch Terminal Figure 2: SyncSwitches deployed to provide frame switching for file exchange Figure 2 illustrates SyncSwitches deployed to provide frame-switching services. This deployment has a unit at each side of the network. The SyncSwitch and TCP/IP WAN replace the modem/dataset and leased line shown in Figure 1 above. The SyncSwitches interface to the legacy gear using a standard synchronous serial electrical interface (RS-232 or V.35, for example). Synchronous traffic received is forwarded to the remote SyncSwitch over the SyncSwitch's interface, using the organization's TCP/IP infrastructure to reach the remote device. Each SyncSwitch has its own IP address, and the system administrator matches 6
7 the IP addresses of cooperating SyncSwitch devices to achieve a virtual leased line across the IP network. At the host, where there are likely to be many physical connections from different sites terminating, further economies are available by using multiple port SyncSwitches to multiplex traffic from more than one link; SyncSwitch is available as a two-, eight-, or sixteen-port device. As the SyncSwitch has no protocol knowledge, successful implementation of a SyncSwitch migration depends on adequate IP network performance, as measured by end-to-end response time and TCP/IP throughput. Protocol Switching Over IP: X.25 DTEs X.25 DTE (Centra Server) X.25 Leased Line X.25 packet-switched X.25 Leased Line Data Network Figure 3: Information Exchange using an X.25 packet-switched data network X.25 DTE ( Server) Although Figure 3 shows a point-to-point connection very similar to that of the first example, it also illustrates that a connection is achieved using a packet-switched data network rather than a leased line. Packet-switched connection replacement benefits from a different approach to migration from the first example to provide full functionality to end users. X.25 links, like connections carrying TCP/IP, can carry multiple conversations to different endpoints on the same physical piece of wire. Although this example only shows two entities exchanging data, this is a limitation of the drawing, not of the capabilities of the X.25 networking protocol. As with the first example, the SyncSwitch hardware replaces leased line datasets/modems as well as the packetswitched data network. However, the SyncSwitch at each end analyzes the X.25 protocol information it receives, mapping X.25 connection requests to TCP/IP session establishment to remote SyncSwitches. As before, each SyncSwitch has its own unique IP address. In this case, the system administrator configures X.25 packet level address information to map to IP addresses, allowing the SyncSwitches participating in the network to establish connections to appropriate remote locations upon request. SyncSwitch TCP/IP WAN SyncSwitch X.25 DTE (Central server) Figure 4: SyncSwitch implementation for X.25 Information packet switching X.25 DTE (remote server) This packet-switching approach allows designers to use the SyncSwitch and an IP infrastructure to replace both leased lines and the packet-switching network, as illustrated above in Figure 4. Although there are no performance benefits to the end devices, sensitivity to IP network performance is greatly reduced, as the SyncSwitch both buffers information and responds immediately to legacy device protocol sequences. Protocol Switching Over IP: X.25 and X.3/28/29 Connections 7
8 X.25 DTE (Central server) synchronous leased line X.3/X.29 PAD X.25 packet-switched data network X.3/X.29 PAD X.3/X.29 PAD Figure 5: Information exchange using the X.25 data network and PAD facilities async dialup As illustrated in Figure 5 above, public packet-switched data networks often provide conversion services that allow other devices and protocols seamless connection to the packet network. The asynchronous Triple-X (X.3, X.28 and X.29) PAD (Packet Assembler/Disassembler) is a typical example of such a conversion. In this scenario, a server with a few X.25 connections to the packet-switched network (only one is illustrated) uses those connections to handle connections with many remote asynchronous devices (hundreds, if not thousands). Each remote device has an asynchronous connection to the packet-switched data network, and uses an agreed-upon procedure (usually based on the X.3/28/29 protocols) to establish an X.25 connection with the server. PAD/IP Interpreter X.25 DTE (Central server) SyncSwitch TCP/IP WAN PAD/IP Interpreter Figure 6: Information exchange using the X.25 data network and PAD facilities PAD/IP Interpreter This environment requires two types of device: a low-power, single port asynchronous device to handle individual terminal traffic, and a higher-power device with one or more synchronous ports for concentrating traffic from asynchronous remotes to X.25 datastreams at the central server. In the diagram below, the asynchronous modem is replaced with TSG's PAD emulator. It interprets the serial data stream from the remote device as a modem/pad combination would, establishing a TCP/IP connection across the network to a SyncServer attached to the customer's host. As far as both the host and remote application are concerned, there is no change to the network; the only change is the reduction in the customer's cost of operating the network. Application Migration Although not transparent to applications and existing networking hardware like the switching examples described above, application migration holds the potential for the most significant cost 8
9 savings over switching alternatives. Cost savings accrue directly, in that less equipment is required for a network implementation, and indirectly, in that synchronous protocol processing is offloaded to TSG-supplied SyncServer devices and applications become more portable. Further indirect cost savings are available in terms of the system's insensitivity to operating system and/or computer platform changes - since a SyncServer implementation does not involve adapters, device drivers, or protocol stack add-ons. X.25 synchronous leased line, or packetswitched data network connection Call record collector/ telephone fraud detector Figure 7: X.25 Application: Telephone switch data collection Telephone switch In the scenario illustrated in Figure 7, a computer system collects billing data from one or more telephone switches (Figure 7 only illustrates one). The collector uses a synchronous serial leased line and X.25 protocol to connect to the switch and control the flow of data from it. To make the X.25 connections, the organization either implements a private synchronous leased-line based network (illustrated here), or rents leased line and X.25 packet-switching facilities from a public carrier. In the public packet-switched network case, the customer pays both for leased lines and use of the packet network (packet-switched data network charges are usually based on the amount of data transferred, but there may also be additional time-based charges). X.25 synchronous leased line, or packetswitched data network connection SyncServer Figure 8: Partially migrated X.25 Application: Telephone switch data collection Telephone switch Call record collector/ telephone fraud detector To begin the migration, a SyncServer can be deployed to replace the collector computer's X.25 implementation and synchronous interface hardware, as illustrated above in Figure 8. The X.25 implementation runs on an outboard device (the SyncServer) and the collector application uses a socket-based API to communicate with it in order to exchange X.25 information with the telephone switch. Although this partial migration does not exploit the availability of a TCP/IP WAN infrastructure, it does have an important benefit for systems expected to have a long lifetime in the field: the X.25 implementation is not sensitive to the bus architecture of the collector computer, or what operating system version (or operating system) it is running. As the API operates in process space, and there are no drivers or protocol modules required in the collector, the application can be moved to another machine without having to worry about the availability of OS drivers or appropriate hardware to plug into the computer bus. 9
10 TCP/IP WAN Call record collector/ telephone fraud detector Figure 9: X.25 Application migrated to TCP/IP WAN SyncServer 1000 Telephone switch Figure 9 illustrates a complete migration to the SyncServer, which captures all of the potential benefits of this architecture. In this illustration, the collector computer becomes a client (a user of the remotely located X.25 services that SyncServer provides). It uses an -based /IP connection to move X.25 information to the SyncServer, which operates the X.25 connection to the telephone switch. (Any medium which supports TCP/IP connectivity may be used; it need not be -based.) Unlike the scenarios already described, this SyncServer approach eliminates both the synchronous hardware adapter in the collector and leased lines between the collector and telephone switch. Conclusion Many legacy networks are still in place today because they function adequately to suit production environments. Support for legacy protocols and the underlying physical network elements is decreasing. Making the transition from legacy networks to TCP/IP network can result in significant operational savings. The transition need not involve significant redesign, capital expenditure or application recoding if SyncServers are deployed. With consideration of objectives and careful network planning, the transition from legacy to TCP/IP network can be accomplished quickly and efficiently. 10
WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.
WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect
ethernet services for multi-site connectivity security, performance, ip transparency
ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished
51-10-50 Circuit-Switched Router Connections Nathan J. Muller
Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible
Electronic Transaction Market Industry Whitepaper. Systech Corporation Internet Payment Gateways
Electronic Transaction Market Industry Whitepaper Systech Corporation Internet Payment Gateways John Stafford Director, Payment Systems [email protected] 800-800-8970 x483 Systech IPG/7000 Series Internet
Transporting Legacy Switched Digital Circuits Using a Packet Network
Transporting Legacy Switched Digital Circuits Using a Packet Network Engage Communication is the manufacturer of high-speed data communications products, specifically targeting the growing market for converting
WAN Technology. Heng Sovannarith [email protected]
WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Introduction to WAN Technologies
CHAPTER 3 Chapter Goals Become familiar with WAN terminology. Learn about different types of WAN connections. Become familiar with different types of WAN equipment. This chapter introduces the various
MPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Introduction to WAN Technologies
CHAPTER 3 Introduction to WAN Technologies This chapter introduces the various protocols and technologies used in wide- area network (WAN) environments. Topics summarized here include point-to-point links,
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
The BANDIT Device in the Network
encor! enetworks TM Version A.1, March 2010 2013 Encore Networks, Inc. All rights reserved. The BANDIT Device in the Network The BANDIT II and the BANDIT III, ROHS-compliant routers in the family of BANDIT
A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
MANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
APPLICATION NOTE. Benefits of MPLS in the Enterprise Network
APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.
CoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3
Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched
The Evolution of Ethernet
June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction
White paper. Business Applications of Wide Area Ethernet
White paper Business Applications of Wide Area Ethernet 1 Introduction When enterprises use Ethernet as a wide area networking solution, they have the potential to realize significant gains in network
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Introduction to Meg@POP
Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c
EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
This chapter discusses Synchronous Data Link Control (SDLC) protocols that you can configure on a BANDIT device s ports. See the following sections:
encor! enetworks TM Version A, September 2010 2010 Encore Networks, Inc. All rights reserved. SDLC Protocol Configuration This chapter discusses Synchronous Data Link Control (SDLC) protocols that you
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
NETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
The Critical Role of an Application Delivery Controller
The Critical Role of an Application Delivery Controller Friday, October 30, 2009 Introduction In any economic environment a company s senior management expects that their IT organization will continually
Frame Relay vs. IP VPNs
Contents: The Case for Frame Relay The Case for IP VPNs Conclusion Frame Relay vs. IP VPNs 2002 Contents: Table of Contents Introduction 2 Definition of Terms 2 Virtual Privacy and 3 the Value of Shared
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
Network Monitoring White Paper
Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com [email protected] Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
Understand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
Succession Solutions. Voice over IP enabled Meridian
Succession Solutions Voice over IP enabled Meridian Evolution with Continuity With Nortel Networks Succession Internet-enabled Solutions for Meridian, you can evolve to Internet Telephony at a pace in
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
WANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman
WANPIPE TM Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L Author: Nenad Corbic/Alex Feldman Copyright (c) 1995-2002 Sangoma Technologies Inc. Introduction WANPIPE from Sangoma Technologies Inc.
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected]
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected] 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class
The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class Executive Summary Network-based applications such as Voice over IP (VoIP), cloud, collaboration services
LEASED-LINE REPLACEMENT
WHITE PAPER LEASED-LINE REPLACEMENT 10 Things to Consider Before Choosing Your IP Gateway WWW.OMNITRONICSWORLD.COM Outline Leased-lines are still being used in many parts of the world to carry voice communications
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Small Business Stackable Switch White Paper January 16, 2001
4500 Great America Parkway Santa Clara, CA 95054 Small Business Stackable Switch White Paper January 16, 2001 Today s fast-paced global business arena, spurred by the Internet and World Wide Web (WWW),
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,
TCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
FatPipe Networks www.fatpipeinc.com
XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Fundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
An Introduction to SIP
SIP trunking, simply put, is a way for you to accomplish something that you already do, for less money, with equal or better quality, and with greater functionality. A Guide to SIP V4 An Introduction to
The Hybrid Enterprise. Enhance network performance and build your hybrid WAN
The Hybrid Enterprise Enhance network performance and build your hybrid WAN ABOUT ELFIQ NETWORKS With today s growing Internet demands, Elfiq Networks enhances network performance and business continuity
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
White Paper. Complementing or Migrating MPLS Networks
White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating
AppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
Auspex Support for Cisco Fast EtherChannel TM
Auspex Support for Cisco Fast EtherChannel TM Technical Report 21 Version 1.0 March 1998 Document 300-TC049, V1.0, 980310 Auspex Systems, Inc. 2300 Central Expressway Santa Clara, California 95050-2516
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
Achieving Mainframe-Class Performance on Intel Servers Using InfiniBand Building Blocks. An Oracle White Paper April 2003
Achieving Mainframe-Class Performance on Intel Servers Using InfiniBand Building Blocks An Oracle White Paper April 2003 Achieving Mainframe-Class Performance on Intel Servers Using InfiniBand Building
Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management
WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve
How to choose the right IP gateway for your VoIP migration strategy. Deployment note
How to choose the right IP gateway for your VoIP migration strategy Deployment note Introduction The purpose of this document is to understand the role a TDM to IP gateway has in providing a migration
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller
White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller
SITEL Voice Architecture
SITEL Voice Architecture www.sitel.com SIP Voice Architecture: What is it? And how contact center operators can save money using it. By: Kevin Weier, Director, Global Voice Infrastructure and Architecture,
Convergence: The Foundation for Unified Communications
Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing
Voice over IP Networks: Ensuring quality through proactive link management
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
The Role of Carrier Ethernet in Business Applications
The Role of Carrier Ethernet in Business Applications Examining the Choices for your Business Applications February 2012 Positioning Paper Page 1 of 11 Table of Contents 1 Introduction... 3 2 Characteristics
MPLS VPN basics. E-Guide
E-Guide In this eguide discover the differences between MPLS VPNs and traditional virtual private networks, as well as the advantages and disadvantages of the latest in service provider offerings. While
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning
Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.
Efficient remote access to machines and plants with SIMATIC
Efficient remote access to machines and plants with SIMATIC Telecontrol and teleservice solutions modular, flexible and secure SIMATIC NET siemens.com/industrial-remote-access Industrial remote access
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
The Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
Cloud Networking: A Novel Network Approach for Cloud Computing Models CQ1 2009
Cloud Networking: A Novel Network Approach for Cloud Computing Models CQ1 2009 1 Arista s Cloud Networking The advent of Cloud Computing changes the approach to datacenters networks in terms of throughput
