How To Make A Multilink Ame Relay Work Faster And More Efficiently

Size: px
Start display at page:

Download "How To Make A Multilink Ame Relay Work Faster And More Efficiently"

Transcription

1 1/16/01 - ick Franks / Tiara etworks nc. / [email protected] / Multilink Frame Relay Prior to the advent of the multilink ame relay () protocol, some ame relay users were experiencing broadband application limits imposed by circuits. These users were approaching the -T3/E3 bandwidth and price gap and were without an affordable, cost-effective option to acquire more bandwidth. Consider the example of a headquarters office collaborating with its branch office. sing a network connection, the two offices could run a video conference application while users in each location download information om the nternet, send and receive , or manage a user's forum on the company website. Eventually the bandwidth in the connection runs out and workflow and productivity are seriously impacted. This example is typical of what is happening in enterprise networks today. Broadband applications, including transferring large files, streaming media, intranets, and extranets have become standard business practice. The fact is that more and more business is being conducted over networks. Bandwidth is in high demand as businesses move into real-time operations and adopt the nternet as a mission-critical tool. While the number of applications running over networks has grown, as has the number of users, bandwidth to the WA has not kept pace. Multilink ame relay was developed to address the need for more access bandwidth to support the ever-increasing number of broadband applications. allows ame relay customers to realize costeffective gains in bandwidth using inexpensive circuits without significant change to their network inastructure. Prior to, service providers resorted to the use of inverse multiplexers to satisfy customers needs for access bandwidth between and T3/E3. This, however, required the use of additional hardware at the customer site and at the carrier s central office. What is? is a packet transport protocol based on the adoption of the Frame Relay Forum s End-to-End (FRF.15) and / (FRF.16) mplementation Agreements. t provides physical interface emulation for ame relay devices by aggregating multiple physical circuits to transport data; however, the aggregation of physical circuits appears as one logical data pipe. While the principles of can apply to bit rates such as xds0 or even xt3, x is garnering the major share of interest because of the cost or unavailability of high-speed circuits such as T3 and E3.

2 Bundling, a technique that combines physical interfaces and/or circuits into one or more logical data pipes, enables access to support more total bandwidth than is available on any single physical interface. Bundling provides the benefits of the combined bandwidth of the aggregated physical interfaces, but with substantially less latency. Figure 1 shows the improved bandwidth and reduced latency that can be attained using a logical pipe consisting of bundled circuits transporting agments under the multilink ame relay protocol. Figure 1: Single T1 vs. an Bundle 1 1.5/2 Mbps latency = x 4 bundle 6/8 Mbps latency = x/4 + negligible overhead Greater service resilience is also provided because the bundle continues to function even when individual links within the bundle fail; the bundle automatically throttles down its bandwidth to the aggregate bandwidth of the remaining active links. n the example shown in Figure 1, the failure of one T1 circuit would result in the bundle throttling down to 4.5 Mbps, thereby keeping the ame relay interface up and the data flowing. When the unavailable link comes back up, it is automatically added back to the bundle, restoring the original bandwidth of 6 Mbps. / (FRF.16) Frame relay and operate in two sub-layers within Layer 2 of the OS model. n the higher sublayer, a ame relay ame is transported over a permanent virtual circuit (PVC). n the lower sublayer, the ame is distributed either in its entirety (Figure 2a) or in agments (Figure 2b) across the T1 or E1 links at the Physical Layer (Layer 1). ames or agments are transported over a T1 or E1 link to the DCE at the Central Office (CO) where agments are resequenced and reassembled in the correct order.

3 Figure 2a: Multilink Frame Relay / (FRF.16) Frame Transport Variable-delay circuits Outgoing Frames Data distributed ame-by-ame to T1 or E1 lines. ncoming Frames Frames are resequenced in proper order. Frame Relay etwork The sequence number in the agmentation controls resequencing. Despite use of the agmentation to resequence ames sent across an link, agmentation is not required by the specification. n many instances, algorithms deployed by vendors optimize the transport of whole ames so that any delays that may occur are minimized. For example, agmenting large ames will certainly lead to lower latency and increased throughput. However, smaller ames are transmitted as whole ame relay ames to avoid agmentation/reassembly overhead. Should the option of agmentation be deployed, however, both ends of the link (the and the DCE) must use the specifications for agmentation used in the Frame Relay Forum FRF.12 mplementation Agreement. Fragmentation tends to add a small amount of additional overhead to the. n the example in Figure 2b, the incoming ame relay ame is broken into three agments. (serconfigurable thresholds determine the number and the size of agments.) The first agment contains a copy of the original ame relay. Each agment contains an (used to reassemble the agments in the correct order by the receiving endpoint), a duplicate of the original FR (which preserves the characteristics of the original ame relay ame), and a agment. The contains sequence numbers and beginning and ending bits. The first sets its beginning bit to one and ending bit to zero, and it establishes a sequence number for the related packets. nterim agments set their beginning and ending bits to zero (to indicate an association with the data stream) and increment their sequence numbers. The last sets its beginning bit to zero and its ending bit to one (to indicate that it is the last agment in the data stream), and it also increments its sequence number.

4 Figure 2b: / Fragmentation (FRF.16) ncoming ame relay ame Outgoing agments ag 1 #1 "beginning" bit is set to 1. "ending" bit is set to 0. ag 2 #2 "beginning" and "ending" bits are set to 0. ag 3 #3 "beginning" bit is set to 0. "ending" bit is set to 1. The ser-to-etwork nterface () transports data between the (data terminal equipment) and the central office DCE (connects users to the ame relay network) residing on the edge of the ame relay network. The etwork-to-etwork nterface () connects any two ame relay networks. Figure 3 shows an example of an application using both and interfaces. The devices at remote user sites send ames or encapsulated agments to the DCE at the local Central Office (DCE) over copper T1 or E1 and x lines (/). At the DCE, the ames are correctly resequenced into their original order (if agmentation is being used, agments are reassembled into ame relay packets). The ames are then forwarded om the DCE to a switch in the network that has an to the second ame relay network. The ames are forwarded across the to the second network and then to the access switch providing service to the CPE over or circuits.

5 Figure 3: Multilink Frame Relay /, /, and / Connections DCE 3 4.5/6 Mbps 3 4.5/6 Mbps DCE ode 2 T3/E3 90 Mbps ode 1 or DS0 DCE n terms of how they transport ames, and connections operate in exactly the same way. Differences between and connections occur in the LM (Local Management nterface) layer, which will not be addressed in this document. FRF.16 (/ ) is implemented either between and DCE or two directly connected nodes in two different networks. This is vastly different om FRF.15 (End-to-End ) implementation, which is configured between two devices that can have any number of ame relay switches between them. End-to-End (FRF.15) n cases where service providers do not support multilink ame relay (FRF.16), users requiring more bandwidth than can be provided by a single may opt for the End-to-End implementation. Because existing ame switch equipment does not know how to handle agments, the ames or agments must be encapsulated into ame relay ames at the originating and sent across the lines connected to the same or different service providers. Reassembly (if using agments) and resequencing only occur at the destination. n an End-to-End (FRF.15) network, ames may also be sent in their entirety or in agments. Figure 4 shows how a ame relay ame is agmented for processing in an End-to- End circuit.

6 Figure 4: End-to-End Fragmentation (FRF.15) Multiprotocol encapsulation ncoming ame relay ame Outgoing agments FR ag 1 PVC #1 "Beginning" bit is set to 1. "ending" bit is set to 0. FR ag 2 PVC #2 "Beginning" and "ending" bits are set to 0. FR ag 3 PVC #3 "Beginning" bit is set to 0. "ending" bit is set to 1. The incoming ame relay ame is broken into three agments, each containing a ame relay, an (used to reassemble the agments in the correct order by the receiving end), and the. The first agment may contain the multiprotocol encapsulation, which carries bits that provide traffic congestion notification across the network. These bits will be Ored om all the agments at the time of reassembly to get the final congestion status. The contains sequence numbers and beginning and ending bits. As in the / example above, the first sets its beginning bit to one and ending bit to zero, and it establishes a sequence number for the related packets. nterim agments set their beginning and ending bits to zero (to indicate an association with the data stream) and increment their sequence numbers. The last sets it s beginning bit to zero and its ending bit to one, and it also increments its sequence number. ntermediate FR switches only examine the 2-byte ame relay and then transparently pass the data on to the next network device. FRF 15 is transparent to the network.

7 Figure 5 shows an example of how encapsulation is used for End-to-End transmission. The original ame relay ame is agmented and the subsequent agments are encapsulated into two new ame relay ames in preparation for transmission over the network. Figure 5: End-to-End Encapsulation (FRF.15) ncoming ame relay ame agments Outgoing encapsulated agments in ame relay ames Figure 6, shows an example of End-to-End transmission. n this model, the originating requires more bandwidth than a single T1 can provide and ame switches at point-of-presence (POP) locations cannot provide multilink support. Thus, the must use multiple T1s (provided by the same service provider or two different service providers) to satisfy its bandwidth requirements. Figure 6: End-to-End Transmission Customer POP POP Customer DCE #1 DCE #1 ame relay network DCE #2 DCE #2 ame relay traffic The originating encapsulates ames or agments within ame relay ames and then distributes this new ame traffic among the participating subscribers for transport over the ame relay network to the endpoint. Frames may take varying paths enroute to the final destination and may arrive out of order. The at the endpoint strips the ame relay s and uses the sequencing information stored in the s to determine the correct order for reassembly and resequencing of the data.

8 Summary The price gap between and T3/E3 service is substantial, and service is considerably more available than T3/E3 service. As pricing continues to fall, this price gap is widening. As this trend continues, becomes an even more viable option than T3/E3. The affordable and available characteristics of, combined with the benefits of, give service providers the ability to realize new revenue streams by providing flexible, low-cost network services that match individual customer requirements. also provides techniques that support the dynamic addition and removal of lines to change the total bandwidth available to the subscriber. A secondary result is the added resilience of multiple provisioned interfaces, such that when one interface or circuit fails, the emulated interface continues to support the ame relay service. A key value of this protocol is that in combining multiple physical interfaces or virtual circuits, a network operator can design a ame relay interface supporting more bandwidth than is available for any single physical interface or virtual circuit. And this can be accomplished with minimal change to the existing network inastructure. The introduction of ame relay marked a milestone in the data communications industry. t forever changed the way we think about data networks. The ongoing advancement and refinement of this protocol continues to allow ame relay to remain a prominent and popular data-traffic standard.

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Frame Relay and Frame-Based ATM: A Comparison of Technologies White Paper and -Based : A Comparison of Technologies Larry Greenstein Nuera Communications VP, Technology, Forum June 1995 June 27, 1995 i TABLE OF CONTENTS 1. PREFACE...1 2. INTRODUCTION...1 3. INTERWORKING

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC

MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter

More information

of Network Access ASC Broadband Services Access Platform The New Edge Advanced Switching Communications

of Network Access ASC Broadband Services Access Platform The New Edge Advanced Switching Communications Broadband Services Access Platform The New Edge of Network Access Advanced Switching Communications Market Situation The explosion of the Internet and customer demand for bandwidth is revolutionizing service

More information

Bandwidth Aggregation, Teaming and Bonding

Bandwidth Aggregation, Teaming and Bonding Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet

More information

Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s

Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s The fast path to increased bandwidth for carriers, service providers, and enterprises Printed in the USA.

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

51-10-50 Circuit-Switched Router Connections Nathan J. Muller

51-10-50 Circuit-Switched Router Connections Nathan J. Muller Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible

More information

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

VoIP / SIP Planning and Disclosure

VoIP / SIP Planning and Disclosure VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

Protocol Architecture. ATM architecture

Protocol Architecture. ATM architecture Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,

More information

Network Monitoring White Paper

Network Monitoring White Paper Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com [email protected] Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488

More information

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability. WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Frame Relay vs. IP VPNs

Frame Relay vs. IP VPNs Contents: The Case for Frame Relay The Case for IP VPNs Conclusion Frame Relay vs. IP VPNs 2002 Contents: Table of Contents Introduction 2 Definition of Terms 2 Virtual Privacy and 3 the Value of Shared

More information

T1 Networking Made Easy

T1 Networking Made Easy T1 Networking Made Easy 1 THE T1 CARRIER 3 WHAT DOES A T1 LOOK LIKE? 3 T1 BANDWIDTH 3 T1 PHYSICAL CHARACTERISTICS 4 T1 FRAMING 5 LINE CODE 6 T1 NETWORKING 6 TELCOS 6 PSTN ACCESS WITH A T1 8 SUMMARY OF

More information

Enterprise Business Products 2014

Enterprise Business Products 2014 Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Strategies. Addressing and Routing

Strategies. Addressing and Routing Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that

More information

Site2Site VPN Optimization Solutions

Site2Site VPN Optimization Solutions XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

WAN Traffic Management with PowerLink Pro100

WAN Traffic Management with PowerLink Pro100 Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

WAN Technology. Heng Sovannarith [email protected]

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c

Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way

More information

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous

More information

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits. Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic

More information

Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette

Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Transport for Enterprise VoIP Services

Transport for Enterprise VoIP Services Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP

More information

Multi-protocol Label Switching

Multi-protocol Label Switching An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is

More information

WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes

WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...

More information

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)

Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN) Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international

More information

APPLICATION NOTE 183 RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK. www.exfo.com Telecom Test and Measurement. What is RFC 2544?

APPLICATION NOTE 183 RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK. www.exfo.com Telecom Test and Measurement. What is RFC 2544? RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK Bruno Giguère, Member of Technical Staff, Transport and Datacom Business Unit Service providers worldwide are actively turning up new services

More information

Connection Services. Hakim S. ADICHE, MSc

Connection Services. Hakim S. ADICHE, MSc Connection Services Hakim S. ADICHE, MSc [email protected] Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity

More information

Solving the Big Dilemma of Big Data

Solving the Big Dilemma of Big Data shaping tomorrow with you Our thirst for information and communication is, it seems, insatiable. This is particularly apparent in the online world, where data sets are getting steadily larger. These massive

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

UK Interconnect White Paper

UK Interconnect White Paper UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Wireless Backhaul Solutions

Wireless Backhaul Solutions A White Paper from Telco Systems Wireless Backhaul Solutions www.telco.com According to Infonetics, there are 3 major factors forcing a migration to packet backhaul. The first is found in the rapidly increasing

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]

More information

Mesh VPN Link Sharing (MVLS) Solutions

Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport

More information

By: Mohsen Aminifar Fall 2014

By: Mohsen Aminifar Fall 2014 By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: [email protected] [email protected] Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175

More information

Glossary of Telco Terms

Glossary of Telco Terms Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business

More information

Analyzing MPLS from an ROI Perspective

Analyzing MPLS from an ROI Perspective WHITE PAPER ANALYZING MPLS FROM AN ROI PERSPECTIVE Analyzing MPLS from an ROI Perspective Site Interconnection In most cases, a Virtual Private Network (VPN) is considered a means of connecting various

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Analog vs. Digital Transmission

Analog vs. Digital Transmission Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission

More information

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare

More information

How To Run A Telephony System Over An Ip Or Ipmux (Tcmux) On A Network (Ipmux) With A Pbip) Or Ipip (Ipip) On An Ip/Ethernet/Mp

How To Run A Telephony System Over An Ip Or Ipmux (Tcmux) On A Network (Ipmux) With A Pbip) Or Ipip (Ipip) On An Ip/Ethernet/Mp Transport Voice, Video and Data Transparently over IP/Ethernet/MPLS Networks TDMoIP IPmux product family TDMoIP IPmux The Evolutionary Approach to Convergence over IP/Ethernet/MPLS Connecting traditional

More information

Relationship between SMP, ASON, GMPLS and SDN

Relationship between SMP, ASON, GMPLS and SDN Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

How To Get More Bandwidth From Your Business Network

How To Get More Bandwidth From Your Business Network Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,

More information

Understanding Mobile Wireless Backhaul

Understanding Mobile Wireless Backhaul Understanding Mobile Wireless Backhaul Understanding Mobile Wireless Backhaul 1 Introduction Wireless networks are evolving from voice-only traffic to networks supporting both voice and high-speed data

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Lecture Computer Networks

Lecture Computer Networks Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Asynchronous

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

MITEL. NetSolutions. Flat Rate MPLS VPN

MITEL. NetSolutions. Flat Rate MPLS VPN MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations

More information

White Paper: Virtual Leased Line

White Paper: Virtual Leased Line Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

Carrier Ethernet: New Game Plan for Media Converters

Carrier Ethernet: New Game Plan for Media Converters Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet

More information

Fibre Channel over Ethernet in the Data Center: An Introduction

Fibre Channel over Ethernet in the Data Center: An Introduction Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification

More information

REMOTE MONITORING MATRIX

REMOTE MONITORING MATRIX 802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best

More information

Plain-old-telephone-service (POTS) networks

Plain-old-telephone-service (POTS) networks INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt., 8, 227 234 (1998) Transporting Voice Traffic Over Packet Networks POTS networks are being rapidly superceded by newer, packet-based ones,

More information

Optimal Network Connectivity Reliable Network Access Flexible Network Management

Optimal Network Connectivity Reliable Network Access Flexible Network Management Aggregating Links For Maximum Performance Optimal Network Connectivity Reliable Network Access Flexible Network Management Enterprises are increasingly relying on the internet for delivery of critical

More information

Voice Over IP Per Call Bandwidth Consumption

Voice Over IP Per Call Bandwidth Consumption Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Building integrated services intranets

Building integrated services intranets Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS

THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information