How To Make A Multilink Ame Relay Work Faster And More Efficiently
|
|
|
- Deborah Sullivan
- 5 years ago
- Views:
Transcription
1 1/16/01 - ick Franks / Tiara etworks nc. / [email protected] / Multilink Frame Relay Prior to the advent of the multilink ame relay () protocol, some ame relay users were experiencing broadband application limits imposed by circuits. These users were approaching the -T3/E3 bandwidth and price gap and were without an affordable, cost-effective option to acquire more bandwidth. Consider the example of a headquarters office collaborating with its branch office. sing a network connection, the two offices could run a video conference application while users in each location download information om the nternet, send and receive , or manage a user's forum on the company website. Eventually the bandwidth in the connection runs out and workflow and productivity are seriously impacted. This example is typical of what is happening in enterprise networks today. Broadband applications, including transferring large files, streaming media, intranets, and extranets have become standard business practice. The fact is that more and more business is being conducted over networks. Bandwidth is in high demand as businesses move into real-time operations and adopt the nternet as a mission-critical tool. While the number of applications running over networks has grown, as has the number of users, bandwidth to the WA has not kept pace. Multilink ame relay was developed to address the need for more access bandwidth to support the ever-increasing number of broadband applications. allows ame relay customers to realize costeffective gains in bandwidth using inexpensive circuits without significant change to their network inastructure. Prior to, service providers resorted to the use of inverse multiplexers to satisfy customers needs for access bandwidth between and T3/E3. This, however, required the use of additional hardware at the customer site and at the carrier s central office. What is? is a packet transport protocol based on the adoption of the Frame Relay Forum s End-to-End (FRF.15) and / (FRF.16) mplementation Agreements. t provides physical interface emulation for ame relay devices by aggregating multiple physical circuits to transport data; however, the aggregation of physical circuits appears as one logical data pipe. While the principles of can apply to bit rates such as xds0 or even xt3, x is garnering the major share of interest because of the cost or unavailability of high-speed circuits such as T3 and E3.
2 Bundling, a technique that combines physical interfaces and/or circuits into one or more logical data pipes, enables access to support more total bandwidth than is available on any single physical interface. Bundling provides the benefits of the combined bandwidth of the aggregated physical interfaces, but with substantially less latency. Figure 1 shows the improved bandwidth and reduced latency that can be attained using a logical pipe consisting of bundled circuits transporting agments under the multilink ame relay protocol. Figure 1: Single T1 vs. an Bundle 1 1.5/2 Mbps latency = x 4 bundle 6/8 Mbps latency = x/4 + negligible overhead Greater service resilience is also provided because the bundle continues to function even when individual links within the bundle fail; the bundle automatically throttles down its bandwidth to the aggregate bandwidth of the remaining active links. n the example shown in Figure 1, the failure of one T1 circuit would result in the bundle throttling down to 4.5 Mbps, thereby keeping the ame relay interface up and the data flowing. When the unavailable link comes back up, it is automatically added back to the bundle, restoring the original bandwidth of 6 Mbps. / (FRF.16) Frame relay and operate in two sub-layers within Layer 2 of the OS model. n the higher sublayer, a ame relay ame is transported over a permanent virtual circuit (PVC). n the lower sublayer, the ame is distributed either in its entirety (Figure 2a) or in agments (Figure 2b) across the T1 or E1 links at the Physical Layer (Layer 1). ames or agments are transported over a T1 or E1 link to the DCE at the Central Office (CO) where agments are resequenced and reassembled in the correct order.
3 Figure 2a: Multilink Frame Relay / (FRF.16) Frame Transport Variable-delay circuits Outgoing Frames Data distributed ame-by-ame to T1 or E1 lines. ncoming Frames Frames are resequenced in proper order. Frame Relay etwork The sequence number in the agmentation controls resequencing. Despite use of the agmentation to resequence ames sent across an link, agmentation is not required by the specification. n many instances, algorithms deployed by vendors optimize the transport of whole ames so that any delays that may occur are minimized. For example, agmenting large ames will certainly lead to lower latency and increased throughput. However, smaller ames are transmitted as whole ame relay ames to avoid agmentation/reassembly overhead. Should the option of agmentation be deployed, however, both ends of the link (the and the DCE) must use the specifications for agmentation used in the Frame Relay Forum FRF.12 mplementation Agreement. Fragmentation tends to add a small amount of additional overhead to the. n the example in Figure 2b, the incoming ame relay ame is broken into three agments. (serconfigurable thresholds determine the number and the size of agments.) The first agment contains a copy of the original ame relay. Each agment contains an (used to reassemble the agments in the correct order by the receiving endpoint), a duplicate of the original FR (which preserves the characteristics of the original ame relay ame), and a agment. The contains sequence numbers and beginning and ending bits. The first sets its beginning bit to one and ending bit to zero, and it establishes a sequence number for the related packets. nterim agments set their beginning and ending bits to zero (to indicate an association with the data stream) and increment their sequence numbers. The last sets its beginning bit to zero and its ending bit to one (to indicate that it is the last agment in the data stream), and it also increments its sequence number.
4 Figure 2b: / Fragmentation (FRF.16) ncoming ame relay ame Outgoing agments ag 1 #1 "beginning" bit is set to 1. "ending" bit is set to 0. ag 2 #2 "beginning" and "ending" bits are set to 0. ag 3 #3 "beginning" bit is set to 0. "ending" bit is set to 1. The ser-to-etwork nterface () transports data between the (data terminal equipment) and the central office DCE (connects users to the ame relay network) residing on the edge of the ame relay network. The etwork-to-etwork nterface () connects any two ame relay networks. Figure 3 shows an example of an application using both and interfaces. The devices at remote user sites send ames or encapsulated agments to the DCE at the local Central Office (DCE) over copper T1 or E1 and x lines (/). At the DCE, the ames are correctly resequenced into their original order (if agmentation is being used, agments are reassembled into ame relay packets). The ames are then forwarded om the DCE to a switch in the network that has an to the second ame relay network. The ames are forwarded across the to the second network and then to the access switch providing service to the CPE over or circuits.
5 Figure 3: Multilink Frame Relay /, /, and / Connections DCE 3 4.5/6 Mbps 3 4.5/6 Mbps DCE ode 2 T3/E3 90 Mbps ode 1 or DS0 DCE n terms of how they transport ames, and connections operate in exactly the same way. Differences between and connections occur in the LM (Local Management nterface) layer, which will not be addressed in this document. FRF.16 (/ ) is implemented either between and DCE or two directly connected nodes in two different networks. This is vastly different om FRF.15 (End-to-End ) implementation, which is configured between two devices that can have any number of ame relay switches between them. End-to-End (FRF.15) n cases where service providers do not support multilink ame relay (FRF.16), users requiring more bandwidth than can be provided by a single may opt for the End-to-End implementation. Because existing ame switch equipment does not know how to handle agments, the ames or agments must be encapsulated into ame relay ames at the originating and sent across the lines connected to the same or different service providers. Reassembly (if using agments) and resequencing only occur at the destination. n an End-to-End (FRF.15) network, ames may also be sent in their entirety or in agments. Figure 4 shows how a ame relay ame is agmented for processing in an End-to- End circuit.
6 Figure 4: End-to-End Fragmentation (FRF.15) Multiprotocol encapsulation ncoming ame relay ame Outgoing agments FR ag 1 PVC #1 "Beginning" bit is set to 1. "ending" bit is set to 0. FR ag 2 PVC #2 "Beginning" and "ending" bits are set to 0. FR ag 3 PVC #3 "Beginning" bit is set to 0. "ending" bit is set to 1. The incoming ame relay ame is broken into three agments, each containing a ame relay, an (used to reassemble the agments in the correct order by the receiving end), and the. The first agment may contain the multiprotocol encapsulation, which carries bits that provide traffic congestion notification across the network. These bits will be Ored om all the agments at the time of reassembly to get the final congestion status. The contains sequence numbers and beginning and ending bits. As in the / example above, the first sets its beginning bit to one and ending bit to zero, and it establishes a sequence number for the related packets. nterim agments set their beginning and ending bits to zero (to indicate an association with the data stream) and increment their sequence numbers. The last sets it s beginning bit to zero and its ending bit to one, and it also increments its sequence number. ntermediate FR switches only examine the 2-byte ame relay and then transparently pass the data on to the next network device. FRF 15 is transparent to the network.
7 Figure 5 shows an example of how encapsulation is used for End-to-End transmission. The original ame relay ame is agmented and the subsequent agments are encapsulated into two new ame relay ames in preparation for transmission over the network. Figure 5: End-to-End Encapsulation (FRF.15) ncoming ame relay ame agments Outgoing encapsulated agments in ame relay ames Figure 6, shows an example of End-to-End transmission. n this model, the originating requires more bandwidth than a single T1 can provide and ame switches at point-of-presence (POP) locations cannot provide multilink support. Thus, the must use multiple T1s (provided by the same service provider or two different service providers) to satisfy its bandwidth requirements. Figure 6: End-to-End Transmission Customer POP POP Customer DCE #1 DCE #1 ame relay network DCE #2 DCE #2 ame relay traffic The originating encapsulates ames or agments within ame relay ames and then distributes this new ame traffic among the participating subscribers for transport over the ame relay network to the endpoint. Frames may take varying paths enroute to the final destination and may arrive out of order. The at the endpoint strips the ame relay s and uses the sequencing information stored in the s to determine the correct order for reassembly and resequencing of the data.
8 Summary The price gap between and T3/E3 service is substantial, and service is considerably more available than T3/E3 service. As pricing continues to fall, this price gap is widening. As this trend continues, becomes an even more viable option than T3/E3. The affordable and available characteristics of, combined with the benefits of, give service providers the ability to realize new revenue streams by providing flexible, low-cost network services that match individual customer requirements. also provides techniques that support the dynamic addition and removal of lines to change the total bandwidth available to the subscriber. A secondary result is the added resilience of multiple provisioned interfaces, such that when one interface or circuit fails, the emulated interface continues to support the ame relay service. A key value of this protocol is that in combining multiple physical interfaces or virtual circuits, a network operator can design a ame relay interface supporting more bandwidth than is available for any single physical interface or virtual circuit. And this can be accomplished with minimal change to the existing network inastructure. The introduction of ame relay marked a milestone in the data communications industry. t forever changed the way we think about data networks. The ongoing advancement and refinement of this protocol continues to allow ame relay to remain a prominent and popular data-traffic standard.
Frame Relay and Frame-Based ATM: A Comparison of Technologies
White Paper and -Based : A Comparison of Technologies Larry Greenstein Nuera Communications VP, Technology, Forum June 1995 June 27, 1995 i TABLE OF CONTENTS 1. PREFACE...1 2. INTRODUCTION...1 3. INTERWORKING
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC
MLPPP Deployment Using the PA-MC-T3-EC and PA-MC-2T3-EC Overview Summary The new enhanced-capability port adapters are targeted to replace the following Cisco port adapters: 1-port T3 Serial Port Adapter
of Network Access ASC Broadband Services Access Platform The New Edge Advanced Switching Communications
Broadband Services Access Platform The New Edge of Network Access Advanced Switching Communications Market Situation The explosion of the Internet and customer demand for bandwidth is revolutionizing service
Bandwidth Aggregation, Teaming and Bonding
Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet
Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s
Building a Bigger Pipe: Inverse Multiplexing for Transparent Ethernet Bridging over Bonded T1/E1s The fast path to increased bandwidth for carriers, service providers, and enterprises Printed in the USA.
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
51-10-50 Circuit-Switched Router Connections Nathan J. Muller
Previous screen 51-10-50 Circuit-Switched Router Connections Nathan J. Muller Payoff LAN managers will find that routers supporting dial backup, bandwidth-on-demand, and dial-on-demand enable more flexible
Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning
Converged TDM and IP- Based Broadband Solutions White Paper OnSite -10 Multi-Service over SDH Provisioning Copyright Copyright 2009, Patton Electronics Company. All rights reserved. Printed in the USA.
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
VoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Protocol Architecture. ATM architecture
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,
Network Monitoring White Paper
Network ing White Paper ImageStream Internet Solutions, Inc. 7900 East 8th Road Plymouth, Indiana 46563 http://www.imagestream.com [email protected] Phone: 574.935.8484 Sales: 800.813.5123 Fax: 574.935.8488
WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.
WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect
Truffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
Frame Relay vs. IP VPNs
Contents: The Case for Frame Relay The Case for IP VPNs Conclusion Frame Relay vs. IP VPNs 2002 Contents: Table of Contents Introduction 2 Definition of Terms 2 Virtual Privacy and 3 the Value of Shared
T1 Networking Made Easy
T1 Networking Made Easy 1 THE T1 CARRIER 3 WHAT DOES A T1 LOOK LIKE? 3 T1 BANDWIDTH 3 T1 PHYSICAL CHARACTERISTICS 4 T1 FRAMING 5 LINE CODE 6 T1 NETWORKING 6 TELCOS 6 PSTN ACCESS WITH A T1 8 SUMMARY OF
Enterprise Business Products 2014
Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications
Virtual Leased Line (VLL) for Enterprise to Branch Office Communications Reliable high throughput data connections with low-cost & diverse transport technologies Executive Summary: The Truffle Broadband
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Strategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
Site2Site VPN Optimization Solutions
XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
CTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
WAN Technology. Heng Sovannarith [email protected]
WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c
EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way
ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS
SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous
Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
Customer White paper. SmartTester. Delivering SLA Activation and Performance Testing. November 2012 Author Luc-Yves Pagal-Vinette
SmartTester Delivering SLA Activation and Performance Testing November 2012 Author Luc-Yves Pagal-Vinette Customer White paper Table of Contents Executive Summary I- RFC-2544 is applicable for WAN and
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
Transport for Enterprise VoIP Services
Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP
Multi-protocol Label Switching
An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is
WHITE PAPER. Enabling 100 Gigabit Ethernet Implementing PCS Lanes
WHITE PAPER Enabling 100 Gigabit Ethernet Implementing PCS Lanes www.ixiacom.com 915-0909-01 Rev. C, January 2014 2 Table of Contents Introduction... 4 The IEEE 802.3 Protocol Stack... 4 PCS Layer Functions...
Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)
Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international
APPLICATION NOTE 183 RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK. www.exfo.com Telecom Test and Measurement. What is RFC 2544?
RFC 2544: HOW IT HELPS QUALIFY A CARRIER ETHERNET NETWORK Bruno Giguère, Member of Technical Staff, Transport and Datacom Business Unit Service providers worldwide are actively turning up new services
Connection Services. Hakim S. ADICHE, MSc
Connection Services Hakim S. ADICHE, MSc [email protected] Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity
Solving the Big Dilemma of Big Data
shaping tomorrow with you Our thirst for information and communication is, it seems, insatiable. This is particularly apparent in the online world, where data sets are getting steadily larger. These massive
Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
The Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
Wireless Backhaul Solutions
A White Paper from Telco Systems Wireless Backhaul Solutions www.telco.com According to Infonetics, there are 3 major factors forcing a migration to packet backhaul. The first is found in the rapidly increasing
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Mesh VPN Link Sharing (MVLS) Solutions
XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions
Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport
By: Mohsen Aminifar Fall 2014
By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: [email protected] [email protected] Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175
Glossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
Analyzing MPLS from an ROI Perspective
WHITE PAPER ANALYZING MPLS FROM AN ROI PERSPECTIVE Analyzing MPLS from an ROI Perspective Site Interconnection In most cases, a Virtual Private Network (VPN) is considered a means of connecting various
The term Virtual Private Networks comes with a simple three-letter acronym VPN
Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Analog vs. Digital Transmission
Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission
Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks
Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare
How To Run A Telephony System Over An Ip Or Ipmux (Tcmux) On A Network (Ipmux) With A Pbip) Or Ipip (Ipip) On An Ip/Ethernet/Mp
Transport Voice, Video and Data Transparently over IP/Ethernet/MPLS Networks TDMoIP IPmux product family TDMoIP IPmux The Evolutionary Approach to Convergence over IP/Ethernet/MPLS Connecting traditional
Relationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
How To Get More Bandwidth From Your Business Network
Choosing Ethernet Services IS ETHERNET THE RIGHT CHOICE FOR YOUR NETWORK? Business Ethernet Including Ethernet over Copper (EoC) and Ethernet over Digital Signal Cross-connect (EoDSx) Delivers Cost- Effective,
Understanding Mobile Wireless Backhaul
Understanding Mobile Wireless Backhaul Understanding Mobile Wireless Backhaul 1 Introduction Wireless networks are evolving from voice-only traffic to networks supporting both voice and high-speed data
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
Lecture Computer Networks
Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Asynchronous
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
MITEL. NetSolutions. Flat Rate MPLS VPN
MITEL NetSolutions Flat Rate MPLS VPN A Comprehensive, Intelligent Network-based Solution Businesses today demand an ever-evolving list of requirements of their networks. From connecting branch locations
White Paper: Virtual Leased Line
Executive Summary: Virtual Leased Line (VLL) for high throughput and high reliability Enterprise Branch Office Communications The Truffle Broadband Bonding Network Appliance enables enterprise branch offices
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
Carrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
Fibre Channel over Ethernet in the Data Center: An Introduction
Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification
REMOTE MONITORING MATRIX
802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best
Plain-old-telephone-service (POTS) networks
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt., 8, 227 234 (1998) Transporting Voice Traffic Over Packet Networks POTS networks are being rapidly superceded by newer, packet-based ones,
Optimal Network Connectivity Reliable Network Access Flexible Network Management
Aggregating Links For Maximum Performance Optimal Network Connectivity Reliable Network Access Flexible Network Management Enterprises are increasingly relying on the internet for delivery of critical
Voice Over IP Per Call Bandwidth Consumption
Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Virtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
Building integrated services intranets
Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4
Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS
THE IMPORTANCE OF TESTING TCP PERFORMANCE IN CARRIER ETHERNET NETWORKS 159 APPLICATION NOTE Bruno Giguère, Member of Technical Staff, Transport & Datacom Business Unit, EXFO As end-users are migrating
A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
