Software Defined Networking Supported by IEEE 802.1Q
|
|
|
- Camron Hardy
- 10 years ago
- Views:
Transcription
1 Software Defined Networking Supported by IEEE 802.1Q János Farkas, Stephen Haddock, Panagiotis Saltsidis Abstract This paper gives an overview on how Software Defined Networking () principles can be applied to existing Ethernet merchant silicon considering the requirements modern networks face. We show that existing Layer 2 features specified by IEEE 802.1Q support. The bridge architecture [1] supports control plane/data plane split by design and also allows for external control e.g. by an Controller. The data plane provided by existing chips is feature rich for network virtualization and supports even more features like OAM. We outline the principles of over bridges and show a number of possibilities for further research and development. I. INTRODUCTION Software Defined Networking () is an emerging new networking paradigm, which aims to introduce a new approach to the control and design of networks of various kinds. relies on directly programming the packet handling mechanisms of the network nodes by a network controller. That is, the concept allows defining the networking behavior via software tools that are easy to modify as opposed to behavior hard-coded in the equipment by design. It is understood that the behavior of the networking equipment is defined by software today; however, it is often difficult to change the behavior and requires expert knowledge of the equipment. As opposed, provides flexibility along the following three characteristic features: Programmability of the network Separation of the control plane from the data plane A controller that has a view of the entire network and can control the network devices There are a number of ways to implement programming of the network nodes. There are some approaches designed with in mind, such as ForCES [9], OpenFlow [14], OpenDaylight [15] or OpenStack [16]. There are other approaches where the original goal was not but they can be applied for as well, e.g. SNMP or NETCONF. The exact implementation choice is out of scope for this paper. Instead, we focus on the principles and their application on a high level. We note that the term distributed control is used in this paper to denote existing distributed bridge control protocols. Similar to networks under distributed control, networks have to meet several requirements, which depend on the exact application. addresses various network scenarios from enterprise through campus to carrier grade networks, including data center and backhaul networks. Therefore, prospective approaches have to meet a large part of the below requirements: Providing L2 and L3 connectivity services Network virtualization Supporting several customers or tenants Scalability Decoupling logical and physical configuration Address separation Traffic isolation Supporting station mobility, e.g. virtual machine (VM) mobility Quality of Service (QoS) assurance Auto-provisioning and service discovery Operations, Administration and Maintenance (OAM) which are discussed more in detail in the following. Most of these requirements appear whether network virtualization is provided based on L2 [1] or based on L3 [12]. Hosts, servers, network devices and their virtual equivalents are often (if not exclusively) reached via either Internet Protocol (IP) or Ethernet for communication. Therefore, Layer 2 and Layer 3 connectivity is an essential requirement. Network virtualization is crucial for a network or a cloud provider in several ways and represents a high level requirement that is related to several of the remaining requirements. For example, scalability among other thingsrequires the support of a number of customers or tenants. Similarly, scalability requires that physical resources may be re-used across multiple customers. This is an essential characteristic of network virtualization and depends on the ability to decouple logical networks from the physical network as well as the separation of address spaces, which are necessary to eliminate address assignment dependencies among the customers and for the support of mobility, e.g. VM mobility. In order to prevent mis-delivery of one customer's data to other 1
2 customers, traffic for each logical network (or virtual network instance) must be isolated from traffic of all other virtual network instances. Scalability is also a general requirement in order (for instance) to avoid explosive growth in forwarding table size. Creation of a new virtual network instance or modification of an existing one (such as expansion) must be something that the provider can do with relative ease. Difficulty in changing a service impacts on the ability of the provider to increase revenue and/or control the expenses associated with service provisioning especially in a cloud environment. Auto-provisioning and verification of a virtual network must be enabled by network features. For services with traffic classes requiring differentiated Quality of Service (QoS), this must be enabled by the network. In order to support monitoring and diagnosis of services, a solution must support Operations Administration and Maintenance (OAM) capabilities on a per-virtual network (per service) basis. This is a lot of requirements. The good news for early deployments is that there is no need to do it from scratch. Actually, some networking technologies already provide a very good basis for, which could be leveraged by research and development. This paper explores Ethernet networking, i.e. bridging features useful for. The reason to focus on Ethernet is its key role in networking today. The paper shows that the existing Ethernet data plane features form a good basis for systems. Furthermore, the bridging standard [1] supports the separation of the control plane from the data plane by design and also allows control by an Controller. Additional features, such as OAM or VM migration, are not only described by the standard, but are already supported by merchant silicon today. The paper also demonstrates how Ethernet meshes with and outlines the design principles of a potential Ethernet-based system. The rest of the paper is structured as follows. Section II explains the architecture. Section III provides details on network control. Network virtualization is then explained in Section IV. The puzzles are then put into a big picture in Section V by presenting a hybrid network approach and by providing a network example in Section VI. The paper is finally summarized in Section VII. II. AND BRIDGE ARCHITECTURE Splitting the architecture into separate control and data planes is beneficial for independent scaling and innovation. It allows modularity and helps fractioning the functionality into components that can be well defined. A. Architecture The control and data planes are separated in the architecture as shown in Fig. 1. The data plane is configured with the blueprint of the actions invoked on an incoming packet out of the possible Action Set supported by the device. The control plane has two components: local control and remote control. Typically, there is a central remote controller that performs all the computation required for determining the forwarding paths for the data packets. Furthermore, the Controller determines how the network nodes should be set up in order to achieve the desired forwarding behavior, i.e. exactly Packet Node 1 Local Control Action Set Pkt Fig. 1. Architecture Controller Node 2 Local Control Action Set Pkt Node 3 Local Control Action Set Protocol Control Plane Data Plane Packet which actions are invoked on the packets out of the commands available to the network nodes by means of an Protocol. The programming of the network is then implemented by the local control in the nodes, which interprets the instructions from the remote control and configures the local data plane accordingly. Overall, the data plane consists of generic boxes programmed by the control plane such that the network behavior is determined by the remote Controller controlling several devices. B. Bridge Architecture IEEE standards rely on a model that is based on a clear separation of the data and the control planes. This fact is often overlooked because the control plane was originally distributed and the separation was inside the bridges. The MAC bridge architecture is specified by IEEE 802.1Q [1] 1 ; and is illustrated in Fig. 2. Note that MAC bridges are often referred to as Ethernet switches because IEEE Ethernet is the most common IEEE 802.n media access method for IEEE bridges. The distributed control protocols, e.g. Shortest Path Bridging (SPB) [3], are implemented by the so-called Higher Layer Entities, which then control the data plane as shown in the figure. In addition, the standard also allows control by an External Agent [4], even co-exist with distributed control in the same network. Distributed control is turned off for the packets controlled by External Agents. Control command Control packet Data packet Ingress Port (Action Set 1 ) Fig. 2. Bridge architecture MAC Bridge Higher Layer Entities Relay (Action Set 2 ) Egress Port (Action Set 3 ) External Agent Packet in Packet out LAN 1 LAN 2 Control Plane Data Plane IEEE IEEE 802.n e.g When referring to IEEE 802.1Q one actually refers to the latest approved revision of the standard, which is 802.1Q-2011 today. Note that a revision [2] is ongoing, which e.g. merges [3] and [6] into the main standard. 2
3 External Agents providing topological separation to the already split control and data planes were introduced by 802.1Qay [4], which has been already merged to the bridge standard [1]. The External Agent can for example be an Controller, a Path Computation Element (PCE) [10] or even a protocol like the Generalized Multiprotocol Label Switching (GMPLS) [11]. If the control is provided by one or more External Agents, then the task of the control (Higher Layer Entity) local to the bridge is to implement the instructions of the External Agent. The standard [1] specifies the Information Model and the Data Model that External Agents can rely on. The data plane of a bridge shown in Fig. 2 depicts two ports and a relay in-between them. For the ease of explanation, the ports have a direction in the figure, i.e. Ingress and Egress represent their role for a single packet. Data packets are received by the Ingress Port, which may perform one or more actions on the packet out of its Action Set 1, depending on how it is programmed. Data packets are then sent to the central processing, i.e. to the Relay, which can also perform actions out of its Action Set 2. Finally, the Egress Port carries out actions from Action Set 3. Control packets are sent to Higher Layer Entities by the Ingress Port and the Egress Port may receive them from Higher Layer Entities as shown in the figure. It is either the External Agent or the distributed control that determines what exactly happens to a data packet. The actions are grouped into three sets: ingress, relay and egress action sets. Each action set of a standard bridge provides a wide range of programmable features, which are discussed in the following. Action Set 1 of an Ingress Port of a bridge involves the following actions that can be performed on a data packet: Drop (filter) Tagging, untagging Virtual LAN (VLAN) IDentifier (VID) translation Encapsulation, decapsulation Metering The packet is dropped if Ingress Filtering is turned on and the Ingress Port is not a member of the VLAN the packet belongs to (based on the outermost VLAN tag carried in the packet). In addition, the packet may also be dropped for loop mitigation. Furthermore, the Ingress Port may add a new tag or a new Ethernet header to the packet as outermost header fields; or may remove the outermost tag or header. In addition, VID translation can also be performed based on the VID translation table, i.e. the outermost VID can be replaced by another VID. Metering may result in marking or dropping packets exceeding bandwidth limits. The Relay is responsible for forwarding the packet to output ports based on the VLAN ID and the destination address carried in the packet. The operation of the Relay is based on forwarding tables, which may contain entries of various types. The Relay may also drop the packet. That is Action Set 2 is either forward or drop based on table entries. Action Set 3 of Egress Ports involves the following actions: Drop (filter) Tagging, untagging VID translation Encapsulation, decapsulation Queueing Transmission selection That is, the Egress Port drops the packet if Egress Filtering is turned on and the port is not member of the VLAN that the packet belongs to. The Egress Port may remove or add an outer tag or header. VID translation may be also performed based on the VID translation table. Queuing and transmission selection governs how a packet is sent out. In summary, the bridge architecture provides a wide range of knobs for network programmability. The bridge architecture splits the control plane from the data plane; furthermore, it allows network control or programming by an external entity thus allowing geographical separation. That is, the bridge architecture provided by the standard [1] is in-line with the three main characteristics of. III. NETWORK CONTROL Ethernet networks have multiple topology layers, which are shown in Fig. 3. All these layers can be programmed by or controlled by an appropriate distributed control protocol as illustrated in the figure. The control of the network is based on the control of these layers; therefore, it is discussed in this section. The topology layers lay down the basics for network virtualization, which is discussed in the next section. The physical topology is the bottom layer, which is managed by means of enabling or disabling the ports of the nodes by control or by the network management. On top of the physical topology, there is the loop-free active topology, which is a subset of the physical topology and contains the active links. The active topology is comprised of trees; shortest path trees, spanning trees or explicit trees. Aside from control, the active topology can be controlled by IS- IS or by a spanning tree protocol. An Controller may even leverage the Intermediate System to Intermediate System (IS-IS) [5] routing protocol in order to easily maintain explicit trees [8]. The VLAN topology is practically determined by the VLAN membership of the ports of the nodes, which is Distributed protocols SPB, MMRP source address learning SPB, MVRP SPB, MSTP, RSTP Management (enable/disable port) Address Location Fig. 3. Topology layers in an Ethernet LAN VLAN Topology Active Topology Physical Network Topology 3
4 typically a subset of the active topology. The VLAN membership of the ports can be controlled by aside distributed control. The forwarding table entries, i.e. the location of the addresses destined by the data traffic also define a topology within a VLAN. The sum of the forwarding paths to a unicast destination form a tree rooted at the destination. In case of distributed control, forwarding table population can be performed e.g. by SPB. Furthermore, MAC auto learning, i.e. learning of the source addresses of data packets may be also performed. Naturally, table entries can also be manipulated by External Agents a hook for. MAC learning from data packets can be turned off for external control and for SPB. As we can see the different topology layers provide very flexible control of the forwarding paths with several knobs to manipulate them. Let us investigate the control options a bit more in detail. A. Control An Controller (i.e. an External Agent) can program each topology layer shown in Fig. 3. That is, it is fully up to the controller to determine which manner to program the different topology layers in order to achieve the desired forwarding behavior if the network is under control. For example, VLAN membership of ports can be set and forwarding table entries can be inserted or removed by the Controller. This, in effect will result in controlling filtering and encapsulation behavior of the switches and can potentially lead to new behavior. based on Ethernet can be implemented for example as follows. As Section II explains, a standard data plane model is defined for Ethernet, which involves the packet fields, the sets of actions and their compositions. The standard [1] defines the Information Model and the Data Model that the Protocol shown in Fig. 1 can use for controlling the bridges by an Controller. During the specification of 802.1Qay [4], SNMP was considered as the Protocol. For controlling explicit trees and paths, IS-IS [8] can be used as the protocol for instructing the bridges by an Controller. Other Protocols can be used for the programming of the data plane if for example the Local Control shown in Fig. 1 performs translation between the Protocol and the models specified by the standard [1]. Even though each chip implements a proprietary API to manipulate the data plane, they provide access to program the data plane by the Protocol as they are compliant to the standard. B. Distributed Control SPB is considered as the main form of distributed control in this paper because it is able to control all the topology layers shown in Fig. 3 except for the physical topology. SPB is based on the Intermediate System to Intermediate System (IS-IS) [5] link state routing protocol. As such, SPB has an in-built autodiscovery for topology and for the services or addresses assigned to network nodes. SPB then automatically sets the forwarding paths necessary to provide the connectivity based on its auto-discovery. The control protocol for a particular VLAN can be selected by allocating the VLAN to the Multiple Spanning Tree Instance (MSTI) dedicated to the control protocol aimed to be used. There is an MSTI dedicated to External Agents, which is referred to as Ext-MSTI (hex FFE) [4] in the following. The rest of the MSTIs are under distributed control as specified today, e.g. three MSTIs are associated with IS-IS control. VLANs that are not touched by distributed control but controlled by an Controller have to be allocated to the Ext-MSTI. Taking a look on the network requirements listed in the introduction, we can see that a couple of them are already met by the features discussed up to this point. The auto-discovery of link state SPB provides service discovery, which is explained more in detail in Section VI. Furthermore, the autodiscovery supports station migration and the mapping of addresses to services and to VLAN tunnels. IV. NETWORK VIRTUALIZATION As the previous section explained, basic Ethernet already provides network virtualization by means of Virtual LANs. The specialty of this virtualization is that the ID of the virtual network is carried in the header of data packets thus making possible to decide which virtual network the packet belongs to. This makes the provisioning of virtual networks easy. Nevertheless, its scalability was limited by the 12-bit VID space. Therefore, further virtualization techniques have been added to Ethernet, thus scalability limitations have been resolved. Fig. 4 depicts all the possible Ethernet header formats available today for network virtualization. The widely-known VLAN tagging standardized in 1998 is referred to as Customer VLAN (C-VLAN) tagging (second column). The next step was the specification of the Service VLAN (S-VLAN) tag introduced by Provider Bridges (PB) [1] which is sometimes referred to as Q-in-Q, due the use of two VLAN tags. Thus, instead of the former 12 bits, 24 bits were provided for network virtualization. After that, full Ethernet header encapsulation was introduced by Provider Backbone Bridges (PBB) [1], which is sometimes referred to as MAC-in- MAC, due to the encapsulation in another full MAC header. Src Addr Dst Addr 802.1D-1990 VID SA DA 802.1Q-1998 C-VID S-VID Provider Bridges (PB) 802.1ad-2005 Fig. 4. Encapsulation formats provided by Ethernet optional C-VID S-VID B-VID B-SA B-DA Provider Backbone Bridges (PBB) 802.1ah-2008 C-tag S-tag I-tag B-tag B-MAC 4
5 Besides keeping the formerly specified VLAN tags, a new 24- bit ID referred to as was introduced for service identification, which in fact provides a 24-bit Layer 2 virtual network ID. This means that 16 million virtual networks can be supported by one Backbone VLAN (B-VLAN). Altogether a 60-bit space is provided for network virtualization by Ethernet today, which removes all scalability concerns. Note, that in case of PBB, the payload with its may immediately follow the I-tag or can optionally be preceded by VLAN tags as illustrated in the figure. Let us now take a look on how the Ethernet packet formats provide network virtualization. In effect, network virtualization means providing overlay networks. A basic overlay is provided by the C-VLAN on top of the physical topology as shown in Fig. 3. Interpreting the overlay as a service provided by the network, the VID is the service ID, which also has a key role in the forwarding of the data packet, i.e. in the transport. The full PBB packet format allows 4 layers of overlays as shown in Fig. 5. Each of these overlays may be used for example if customer networks are connected to PB networks connected to Edge Bridges (EB) of a provider s PBB network or in a PBB Data Center Network (DCN) as illustrated in the figure. A key aspect of PBB is that it separates the service layer from the transport layer. That is, the first overlay provided by the physical network is the B-VLAN for the transport and the service layer is on top of the B-VLANs. A service provided by the backbone is identified by an, which can be point-topoint, multipoint-to-multipoint or rooted multipoint. An can offer different services, i.e. further overlays. In the example shown in Fig. 5, the provides an S-VLAN overlay, which then provides a C-VLAN overlay. All of the overlays, i.e. virtual networks can be controlled by. Customer Network Fig. 5. Layer 2 overlays PB Virtual Machine Server Rack C-VLAN S-VLAN B-VLAN PBB EB EB PBB EB DCN EB Server Rack PB C-VID S-VID B-VID B-SA B-DA Virtual Machine C-tag S-tag I-tag B-tag Customer Network IP is a native overlay for Ethernet according to the ISO layering. It is quite common to associate an IP subnet to a VLAN. In case of PBB, the overlay service provided by the I- SID can be a Layer 3 Virtual Private Network (L3VPN) as illustrated in the DCN example of Fig. 6. In this case, the optional fields of the PBB header are not present. More details on L3 overlays are available e.g. in [13]. Fig. 6. Layer 3 overlay IP Subnet B-VLAN PBB EB DCN EB B-VID B-SA B-DA Flow-based programmability is provided for network wide by means of mapping data flows to a flow ID at edge bridges and programming the forwarding for the flow ID throughout the network. That is, the mapping of data flows to s or B-VIDs can be much more flexible than the direct mapping of an IP subnet or a VLAN to an, and the direct mapping of an to a B-VID as discussed before. In fact, arbitrary mapping can be applied on the data flows in the edge nodes of the networks. A flow, for example, can be mapped to an, a B-VID, or a Flow Hash [7] based on an n-tuple classification or any other field in the packet, e.g. TCP port. Having the classification and the per-flow mapping implemented by the edge bridges, core bridges can perform the forwarding based on the standard Ethernet header without performing deeper packet inspection. As discussed in this section, an controlled network providing L2 and L3 connectivity leveraging the existing Ethernet features is able to provide network virtualization fulfilling all network virtualization related requirements. This means that a large number of tenants or customers can be supported due to the scalability provided. Furthermore, the customer or tenant may have its own customers because of the several layers of virtual networks provided. V. HYBRID NETWORKS There are a couple of features already available in Ethernet, today but difficult to do in a software defined manner (or at least not part of centralized solutions). Among these, OAM and fast protection switching are the most important ones for carrier-grade networks. Hybrid networks are comprised of hybrid nodes that support both and distributed control. The hybrid use of and distributed control enables using the existing features and make them available for right now almost for free. Moreover, bootstrapping can rely on distributed control (e.g. IS-IS) in a hybrid network, which ensures a default inband control channel for the Protocol. Some further advantages of hybrid networks are discussed in the following. In order to be able to use existing chips and avoid the need for complete replacement of each network node and host, packet formats should not be changed by, at least not initially. This even allows the data plane interworking of devices controlled along different principles, i.e. one can be under distributed control the other one can be under centralized control; which also provides a smooth migration path. As I-tag B-tag 5
6 a result, hybrid operation becomes just the matter of proper control, i.e. carefully crafted co-existence and operation of and distributed control in the same network. In case of Layer 2, special attention is required to preserve the strict loopfree operation of existing distributed control, since loops can cause network meltdowns. A way for achieving the desired proper coexistence of and distributed control is already supported by the bridging standard [1], which is based on VLAN separation. The clear split of the VLAN space and assigning the VLAN sets to the desired control planes ensures proper operation for both the and the distributed control thus avoiding any state conflict or ambiguity in the operation. The standard ensures that a forwarding table can be only controlled by a single control plane, thus forwarding table separation is also provided besides VLAN separation. The control protocol operation mode for a VLAN can be selected by allocating the VLAN to the MSTI associated with the desired operation mode as discussed before in Section III.B. VLANs and forwarding tables are allocated to the Ext-MSTI, hence the Controller sets up the forwarding paths for these VLANs. Distributed control is completely turned off for the Ext-MSTI. The clean separation ensures that conflict is not possible between and the distributed control. Besides carrier-grade networks, OAM tools are essential for the maintenance of most networks. It is critical to ensure fate sharing between data and OAM packets. In order to achieve fate sharing, the operation of Connectivity Fault Management (CFM), which is the Ethernet OAM, relies on the functionality implemented in the ports, i.e. within Action Set 1 and Action Set 2 of Fig. 2. Thus, CFM can be applied for VLANs too. Furthermore, CFM can be used for the virtual overlay networks as well, e.g. between VMs in a DC. The Controller can instantiate and set up the operation (e.g. time period for monitoring) in the ports that need to be involved. The proper CFM actions out of Action Set 1 and Action Set 2 can be then automatically performed on the OAM packets. That is, hybrid networks make the full blown, proven and already used Ethernet OAM available for too, thus providing the OAM tools at each Layer 2 virtual network overlay. Protection switching state machines based on CFM are also specified by [1] for point-to-point VLANs, hence fast protection switching is available for too. Therefore, the control can instantiate protection switching as well if needed, e.g. for a carrier-grade service. In addition, a hybrid network can leverage further features specified by the standard. For example the features specified by the IEEE Data Center Bridging (DCB) working group are essential in Cloud deployments relying on Ethernet, e.g. support for VM migration [6]. Direct collaboration between and distributed control is required to realize the full potential of the architecture. First, in addition to manipulating the forwarding behavior, has to be able to set up and control the functionality that has distributed components, e.g. OAM in order to use it for traffic. Second, the Controller should be aware of the topology, the service assignments and the load in some form to exercise effective control. This can be achieved by retrieving the necessary information from the distributed control. Then, upon request for establishment of a service, the Controller is able to select the control to be used based on the requirements of the service and/or on the actual state of the network. For instance, the default shortest path is satisfactory for certain services, while other services may require full path control, and may also require OAM and protection switching. For the latter type of services, the Controller programs the forwarding path, sets up and initiates the operation of OAM and protection switching based on the exact service requirements. That is, the level of interaction between the Controller and distributed control depends on the service requirements; therefore, the touch points for service establishment may vary as well. Overall, taking advantage of the hybrid approach allows meeting key network requirements, e.g. OAM. control can implement auto-provisioning based on the auto-discovery of topology and services provided by SPB. In addition, QoS can be enhanced by the proper assignment of services to the appropriate control, i.e. to or SPB. Further work is going on in the form of P802.1Qca, which aims to better exploit the potential in hybrid networking based on IS-IS. The most important aspect is that by relying on existing packet and tunneling formats, the hybrid approach enables reusing existing chips and avoids the need for complete replacement of the data plane, i.e. it is at most software upgrade to the existing devices. VI. A NETWORK EXAMPLE After exploring the networking principles in the previous sections, let us investigate the operation. A hybrid network example comprising nodes supporting both and SPB is discussed in the following. The example PBB network is shown in Fig. 7. The s provide overlay Virtual Networks (VN) to S-VIDs in the example. Two new virtual networks: VN 1 and VN 2 are just being created in the example by the Controller. Let us assume that the multipoint-to-multipoint VN 1 has no special requirements, thus the Controller decides to use shortest paths for VN 1. Therefore, the Controller only touches the end points, i.e. it programs the proper associations in the Edge Bridges (EB) supporting VN 1. Thus, S-VID 11 is S-VID 11 EB 2 EB 1 2 B-VID 2 CB 5 EB 3 EB 4 Fig. 7. A PBB network example Controller +SPB 6
7 associated with 1, which is then associated with B-VID 1 in EB 1, EB 2 and EB 3. B-VID 1 is allocated to the SPBM MSTI, therefore, it is a non- VLAN controlled by SPB. The rest of actions for the establishment of VN 1 are then performed by the distributed link state SPB; the Controller has no further task. SPB provides the service discovery, thus the Core Bridges (CB) become aware of that EB 1, EB 2 and EB 3 are member of the virtual network identified by 1. Therefore, SPB populates the forwarding tables in the CBs to establish the multipoint-to-multipoint B- VID 1 transport tunnel for 1, which then provides the connectivity service to S-VLAN 11. If a new end point is required for a service due to e.g. a station (VM) movement, then after setting the proper associations at the required EB, SPB automatically establishes the connectivity, thus supporting station (VM) migration. Let us assume that based on its requirements, VN 2 needs full path control, which may deviate from the shortest path. Therefore, the Controller has to program the forwarding at all bridges along the path in addition to performing the proper associations at EB 3 and EB 4. Thus, S-VID 22 is associated with 2, which is then mapped to B-VID 2 in the EBs. B-VID 2 is an VLAN because it is allocated to the Ext-MSTI. Therefore, the distributed control does not touch this service. An interface is required between SPB and the Controller to allow the Controller to retrieve the link state database of SPB, e.g., from one of the bridges. Thus, the Controller can rely on SPB to discover the physical topology; furthermore, the service discovery provided by SPB can be also used by the Controller, at least for verification. VII. SUMMARY This paper has shown that the basic design principles of Ethernet bridging are in-line with and today s network requirements. We set forward three key principles for such architectures: 1) The use of an existing, data plane model (Ethernet). This includes features that require complex processing in the data plane, such as OAM or protection switching. Such features are difficult to implement solely using centralized. 2) Co-existence with and reliance on distributed control plane for useful features, such as topology discovery and path setup, where applicable. Such co-existence can happen by the two control planes controlling different layers or side-by-side controlling different parts of the traffic (e.g., separated by the VLAN space). 3) The coordinated communication between the distributed and control planes. This can be useful, for example, for the control plane to learn the topology already discovered by the distributed control plane. Such communication could also enable the control plane to react to topology changes and to adjust the parameters of the distributed control plane, when needed. The resulting architecture has natural limitations, especially due to the first point above. We argue, however, that for early systems the benefits of readily available features outweigh the limitations. Furthermore, Ethernet provides a good basis for future extensions and for the evolution of, e.g. along the lines of the third point above. Future work may involve the research on the interface between the control planes. REFERENCES [1] IEEE Std Q, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks, [2] IEEE draft Std Q-REV, IEEE Standard for Local and Metropolitan Area Networks: Bridges and Networks, January REV-d2-0.pdf [3] IEEE Std aq, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks Amendment 9: Shortest Path Bridging, March [4] IEEE Std Qay, IEEE Standard for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks Amendment 10: Provider Backbone Bridge Traffic Engineering, August [5] ISO/IEC 10589, Information Technology Telecommunications and Information Exchange Between Systems Intermediate System to Intermediate System Intra-Domain Routing Information Exchange Protocol for Use in Conjunction with the Protocol for Providing the Connectionless- Mode Network Service (ISO 8473), 2nd ed., [6] IEEE Std Qbg, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks Amendment: Edge Virtual Bridging, March [7] IEEE draft Std Qbp D1.6, IEEE Standard for Local and Metropolitan Area Networks: Bridges and Bridged Networks Amendment: Equal Cost Multiple Paths (ECMP), September [8] IEEE draft Std Qca D0.6, IEEE Standard for Local and Metropolitan Area Networks: Bridges and Bridged Networks Amendment: Path Control and Reservation, February [9] IETF RFC 5810, Forwarding and Control Element Separation (ForCES) Protocol Specification, March [10] IETF RFC 4655, A Path Computation Element (PCE)-Based Architecture, August [11] IETF RFC 5828, Generalized Multiprotocol Label Switching (GMPLS) Ethernet Label Switching Architecture and Framework, March [12] Network Virtualization Overlays, [13] P. Unbehagen, R. Lapuh, S. Hares and P. Ashwood-Smith, IP/IPVPN services with IEEE 802.1aq SPB networks, IETF draft, March, [14] ONF Std. ver , OpenFlow Switch Specification, December [15] OpenDaylight, [16] OpenStack, 7
Shortest Path Bridging IEEE 802.1aq Overview
Shortest Path Bridging IEEE 802.1aq Overview Don Fedyk IEEE Editor 802.1aq Alcatel-Lucent IPD Product Manager Monday, 12 July 2010 Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE
APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
How To Make A Network Cable Reliable And Secure
ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1
Joint ITU-T/IEEE Workshop on Carrier-class Ethernet
Joint ITU-T/IEEE Workshop on Carrier-class Ethernet Carrier Bridge Architecture Stephen Haddock Chief Technology Officer Extreme Networks 802.1 Bridging Architecture for Carrier Ethernet from D & Q bridges
Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services
Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology,
Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture
Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff Version 1.0 July 12, 2004 Page 1 A Provider Bridge Scaling Solution Backbone Provider Bridging 802.1ad
Carrier Grade Ethernet. Ethernet in service provider networks, MAN/WAN
Carrier Grade Ethernet Ethernet in service provider networks, MAN/WAN Carrier grade The term Carrier Ethernet implies that Ethernet services are carrier grade. Carrier grade is a system that is extremely
Understanding PBB-TE for Carrier Ethernet
Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
Resiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen [email protected] Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
WHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
Avaya VENA Fabric Connect
Avaya VENA Fabric Connect Executive Summary The Avaya VENA Fabric Connect solution is based on the IEEE 802.1aq Shortest Path Bridging (SPB) protocol in conjunction with Avaya extensions that add Layer
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
Cloud Networking: Framework and VPN Applicability. draft-bitar-datacenter-vpn-applicability-01.txt
Cloud Networking: Framework and Applicability Nabil Bitar (Verizon) Florin Balus, Marc Lasserre, and Wim Henderickx (Alcatel-Lucent) Ali Sajassi and Luyuan Fang (Cisco) Yuichi Ikejiri (NTT Communications)
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
TRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
Carrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
Network Virtualization for Large-Scale Data Centers
Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Eric Choi < [email protected]> Senior Manager, Service Provider Business Unit, APJ 2012 Brocade Communications Systems, Inc. EPF 7 2012/09/17 Software-Defined Networking
Carrier Ethernet: The native approach
Carrier Ethernet: The native approach Howard Green, Sylvain Monette, Jonathan Olsson, Panagiotis Saltsidis and Attila Takács This article reviews the developments and emerging standards of native Ethernet
How To. Configure Multiple Spanning Tree Protocol (MSTP) Introduction. Overview of MSTP. Extension of RSTP
How To Configure Multiple Spanning Tree Protocol (MSTP) Introduction This document provides configuration examples and guidelines for configuring Multiple Spanning Tree Protocol on Allied Telesyn switches.
Provider Backbone Bridging Networks A Highly Scalable VLAN (Multicast) Architecture
Provider Backbone Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff, Mark Holness, Norival Figueira, Michael Chen, Dinesh Mohan, Glenn Parsons Version 2.0 Page 1 A Provider
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
SDN. WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking. Recep Ozdag Intel Corporation
WHITE PAPER Intel Ethernet Switch FM6000 Series - Software Defined Networking Intel Ethernet Switch FM6000 Series - Software Defined Networking Recep Ozdag Intel Corporation Software Defined Networking
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
Carrier Ethernet 2.0: A Chipmaker s Perspective
WHITE PAPER Carrier Ethernet 2.0: A Chipmaker s Perspective Tal Mizrahi Uri Safrai Marvell June 2015 ABSTRACT Over the past decade Ethernet has increasingly become a common and widely deployed technology
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS
SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks
Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
White Paper: Carrier Ethernet
White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research
Data Center Convergence. Ahmad Zamer, Brocade
Ahmad Zamer, Brocade SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
DCB for Network Virtualization Overlays. Rakesh Sharma, IBM Austin IEEE 802 Plenary, Nov 2013, Dallas, TX
DCB for Network Virtualization Overlays Rakesh Sharma, IBM Austin IEEE 802 Plenary, Nov 2013, Dallas, TX What is SDN? Stanford-Defined Networking Software-Defined Networking Sexy-Defined Networking Networking
An Introduction to Open vswitch
An Introduction to Open vswitch Netfilter Workshop, Seville, Spain Simon Horman Horms Solutions Ltd., Tokyo October 2010 Open vswitch Server Open vswitch Datapath Open vswitch Controller
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
How To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS
STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS Supervisor: Prof. Jukka Manner Instructor: Lic.Sc. (Tech) Markus Peuhkuri Francesco Maestrelli 17
TD 271 Rev.1 (PLEN/15)
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
Marc Lasserre Wim Henderickx Alcatel-Lucent. Ali Sajassi Luyuan Fang Cisco. Yuichi Ikejiri NTT Communications. Mircea Pisica BT.
L2VPN Working Group Internet Draft Intended status: Informational Expires: April 2012 Nabil Bitar Verizon Florin Balus Marc Lasserre Wim Henderickx Alcatel-Lucent Cloud Networking: Framework and VPN Applicability
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
Virtual Private LAN Service
Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : [email protected] Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place
ConnectX -3 Pro: Solving the NVGRE Performance Challenge
WHITE PAPER October 2013 ConnectX -3 Pro: Solving the NVGRE Performance Challenge Objective...1 Background: The Need for Virtualized Overlay Networks...1 NVGRE Technology...2 NVGRE s Hidden Challenge...3
Network Virtualization
Network Virtualization Using Shortest Path Bridging and IP/SPB Table of Contents Section 1: Introduction...1 Section 2: Benefits of Shortest Path Bridging...3 2.1 Network Service Enablement...3 2.2 Time
Data Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
OpenDaylight Project Proposal Dynamic Flow Management
OpenDaylight Project Proposal Dynamic Flow Management Ram (Ramki) Krishnan, Varma Bhupatiraju et al. (Brocade Communications) Sriganesh Kini et al. (Ericsson) Debo~ Dutta, Yathiraj Udupi (Cisco) 1 Table
An Overview of OpenFlow
An Overview of OpenFlow By Jim Metzler, Ashton Metzler & Associates Distinguished Research Fellow and Co-Founder, Webtorials Editorial/Analyst Division The OpenFlow Protocol Figure 1 depicts the Open Networking
Scalability Analysis of Metro Ethernet
Scalability Analysis of Metro Ethernet Heikki Mahkonen Helsinki University of Technology Email: [email protected] Abstract This document gives a scalability analysis of Metro Ethernet architecture.
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
SDN and Data Center Networks
SDN and Data Center Networks 10/9/2013 1 The Rise of SDN The Current Internet and Ethernet Network Technology is based on Autonomous Principle to form a Robust and Fault Tolerant Global Network (Distributed)
> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET
> ADDING SCALE, QoS AND OPERATIONAL SIMPLICITY TO ETHERNET White Paper Provider Backbone Transport Market overview For many years, Ethernet has been the dominant networking protocol in the LAN. Its simplicity
Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail [email protected] Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
SOFTWARE DEFINED NETWORKING: A PATH TO PROGRAMMABLE NETWORKS. Jason Kleeh September 27, 2012
SOFTWARE DEFINED NETWORKING: A PATH TO PROGRAMMABLE NETWORKS Jason Kleeh September 27, 2012 What if you could Build your next data center optimized for highest demands in flexibility, reliability, and
VMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Software Defined Networking
Software Defined Networking Dr. Nick Feamster Associate Professor In this course, you will learn about software defined networking and how it is changing the way communications networks are managed, maintained,
Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.
Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
Virtual Leased Lines - Martini
Virtual Lease Lines - Martini Virtual Leased Lines - Martini Martini Drafts draft -martini-l2circuit-encap-mpls -04.txt defines the handling and encapsulation of layer two packets. draft -martini-l2circuit-trans-mpls
The bridging virtualization approach to Next Generation Broadband Access Networks
SPECIAL ISSUE The bridging virtualization approach to Next Generation Broadband Access Networks JON MATIAS, EDUARDO JACOB, MARINA AGUADO, JASONE ASTORGA University of the Basque Country, Department of
Carrier Ethernet A Wave is Building. Provider Backbone Bridges with Traffic Engineering (PBB-TE)
Carrier Ethernet A Wave is Building Provider Backbone Bridges with Traffic Engineering (PBB-TE) D. Kent Stevens Western Region Optical Architect [email protected] 714-803-1050 Next Generation Packet
TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
How To Understand The Concept Of Redundancy In A Network (Uni, Enni)
E-NNI Redundancy (Considerations and Musings) Stephen Haddock November 19, 2009 802.1 Plenary, Atlanta 1 Introduction This presentation is kind of a random walk considering aspects of providing redundancy
Carrier Class Transport Network Technologies: Summary of Initial Research
Carrier Class Transport Network Technologies: Summary of Initial Research This document is a summary of the JRA1 Task 1 Carrier Class Transport Network Technologies deliverable [DJ1.1.1], which presents
Data Center Infrastructure of the future. Alexei Agueev, Systems Engineer
Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports
Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
LANs and VLANs A Simplified Tutorial
Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name
Ten Things to Look for in an SDN Controller
Ten Things to Look for in an SDN Controller Executive Summary Over the last six months there has been significant growth in the interest that IT organizations have shown in Software-Defined Networking
Pre$SDN era: network trends in data centre networking
Pre$SDN era: network trends in data centre networking Zaheer Chothia 27.02.2015 Software Defined Networking: The Data Centre Perspective Outline Challenges and New Requirements History of Programmable
The Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
IxNetwork TM MPLS-TP Emulation
IxNetwork TM MPLS-TP Emulation Test the Functionality, Performance, and Scalability of an MPLS-TP Ingress, Egress, or Transit Node MPLS has come a long way since its original goal to allow core routers
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
802.1Qbv: Dynamic Configuration of Scheduling Windows
802.1Qbv: Dynamic Configuration of Scheduling Windows Rodney Cummings National Instruments Franz-Josef Goetz Siemens AG Agenda Need for dynamic configuration of 802.1Qbv Which existing protocol? Technical
Frame Metering in 802.1Q Version 01
Frame Metering in 802.1Q Version 01 Stephen Haddock January 15, 2013 1 Overview Frame metering introduced in 802.1ad-2005 in conjunction with the DEI bit of the S-VLAN tag. The DEI bit was introduced to
White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
