Lecture 20: Automated Fault Management

Size: px
Start display at page:

Download "Lecture 20: Automated Fault Management"

Transcription

1 Lecture 20: Automated Fault Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG Fault Management Fault Management consists of 5 steps: 1. Fault detection 2. Fault location 3. Service restoration 4. Identification of the problem s root 5. Problem resolution Service restoration has a higher priority than 4 and 5, but this is not always possible Steps 4 and 5 can be complex, and is the subject of this lecture After the successful completion of step 4, a trouble ticket will be generated. These steps can be made automatic for many cases, but not always. Prof. Shervin Shirmohammadi CEG

2 Correlation and Filtering Before a failure is registered by an agent, typically some correlation and filtering are done. Correlation: to ensure that if a fault is the result of one or more other faults, the former is not reported. Otherwise too many faults would be unnecessarily reported E.g., a Loss of Connection, would also generate a Loss of Signal, a Degradation in Signal, and perhaps an Excessive Loss fault Filtering: For most faults, they should only be reported if the persist. In other words, if something is very temporary, we do not need to bother the manager. Very temporary must of course be defined for the given context. Filtering is used to catch and suppress these temporary conditions Prof. Shervin Shirmohammadi CEG Example (1/2) ITU-T G.784: Synchronous Digital Hierarchy (SDH) management Related to management of high-speed fiber optics systems The diagram shows the inside of the agent (not all of it though): G.783 G.784 Another document, G.783, specifies the correlation rules, in addition to specifying many other things. Prof. Shervin Shirmohammadi CEG

3 Example correlation rule from G.783: clof dlof and (not dlos) ctim dtim and MON etc Example (2/2) Filter rule from G.784: A transmission failure (fxxx) shall be declared if the fault cause persists continuously for 2.5 ± 0.5 s. The failure shall be cleared if the fault cause is absent continuously for 10 ± 0.5 s. timer expired Wait 2.5 sec fault Fault no fault no fault No Fault fault Wait 10 sec timer expired Prof. Shervin Shirmohammadi CEG Management Correlation Techniques The correlations we saw in the previous slides happen within the agent and are simple. Management correlation, which happens at the manager, is used for steps 4 and 5 of Fault Management to identify a problem and take appropriate action can be more complicated. Typically, one of the following techniques are used for that purpose: Rule-Based Reasoning Model-Based Reasoning Case-Based Reasoning Codebook Correlation Model State Transition Graph Model Finite State Machine Model Prof. Shervin Shirmohammadi CEG

4 Rule Based Reasoning (1/2) The earliest correlation technique, a.k.a. expert system. Used in HP OpenView. Knowledge base consists of 1) problem definition and 2) action to be taken In the form of if-then or conditionaction Working memory contains the actual topology and state information of the network. When something happens, the Inference engine compares it against the knowledge base and picks the closest match and takes appropriate action on the working memory, as pre-defined for that rule. Prof. Shervin Shirmohammadi CEG Rule Based Reasoning (2/2) Rules are established from the expertise of people in the field. If a rule does not exist, it can be added. But this increases the size of the knowledge base to an unscalable level, causing a knowledge acquisition bottleneck. Also, actions are too specific, causing unwanted behaviour. An adaptation of HP s OpenView is shown in Figure Similar to G.783 correlation Prof. Shervin Shirmohammadi CEG

5 Model Based Reasoning The event correlator is built on an object-oriented model associated with each managed object. Used by Cabletron s Spectrum The correlator in NMS has the model shown in b, which is an objectoriented model of the actual network in a. Each object in the model corresponds to its own managed object. For example, the hub 1 model periodically pings Hub 1 to see if it s alive. If not, it checks with the Router s model to see if the router is alive. If yes, it generates an alarm for Hub 1; otherwise, it doesn t do anything. Prof. Shervin Shirmohammadi CEG Case-Based Reasoning (CBR) Unlike Rule Based Reasoning, where the until of Knowledge is a rule, CBR s unit of knowledge is a case. It is based on the intuition that situations repeat themselves, and that what was done in one case is applicable to another similar case, although not exactly identical. Hence, solutions are adapted to the case. Used in SpectroRx. Adaption techniques: Parameterized adaptation Abstraction/respecialization adaptation Critic-based adaptation Prof. Shervin Shirmohammadi CEG

6 Codebook Correlation Model (CCM) Previous methods are all based on algorithms, and hence do not expertly associate events with problems. In CCM, problems are messages generated by the system and are encoded in sets of alarms that they cause. The correlator than decodes those messages to identify the problems. This is done in two phases: 1. Produce a problem-symptom matrix 2. Compare the stream of alarms with the codebook to identify the problem Prof. Shervin Shirmohammadi CEG CCM Example We can now generate a problem-symptom matrix codebook from the labeled causality graph from figure Usually the number of symptoms exceeds the number of problems, so the matrix is reduced to a correlation matrix which uniquely identifies a problem given specific symptoms. This matrix gives us the correlation graph. Used in System Management ARTS (SMARTS) InCharge. Prof. Shervin Shirmohammadi CEG

7 State Transition Graph Model Can be used instead of or as a complement to other techniques. A state transition graph, similar to a sequence diagram, is followed to detect problems and make decisions. Used in Seagate s NerveCenter Prof. Shervin Shirmohammadi CEG Finite State Machine Models the behaviour of the system as s set of finite number of states, and makes decisions based on this model. Prof. Shervin Shirmohammadi CEG

8 Monitoring for Event Notification Event: something that occurs in the network that is noteworthy. Most of the time this is a problem or a failure in a network element. Threshold may be set on end-to-end or element characteristics for notification of events. This is know as real time analysis. Real time analysis usually involves short polling intervals: capacity, CPU, memory, storage needed. Traffic not insignificant! Rule of thumb: This should not be more than 10% of the capacity. For Ethernet keep this at 2-5%. Prof. Shervin Shirmohammadi CEG Traffic Example A network has 100 routers, each with 4 interfaces, each with 8 characteristics. Polling is every 5 seconds. How much is the monitoring overhead traffic? 100 network elements x 4 interfaces / network device x 8 characteristics = 3200 characteristics. Assume Each characteristic = 8 bytes of data + 60 bytes of overhead. (why so much overhead?) Total traffic = 3200 x (8 + 60) = KB = 1.74 Mb If we poll every 5 seconds ~ 1.74Mb / 5s = 384 Kbps. (not likely!) More likely it is a bursty rush of 1.74 Mbps every 5 seconds. Over a period of a day we have: 1.74Mbps * 720 polls per hour* 24 hours per day =30 Gb of traffic and we have 3200 * 8 * 720 * 24 = 442 MB of data are stored per day. Prof. Shervin Shirmohammadi CEG

9 In-Band and Out-of-Band (1/2) In-band: having the NM data flow over the same network that the user network traffic uses Simple network management architecture In case of network problems monitoring and troubleshooting may be difficult Out-of-band monitoring: providing different paths for NM traffic and user network traffic ISDN D-channel Separate Frame Relay/ATM virtual circuit Telephone lines Prof. Shervin Shirmohammadi CEG In-Band and Out-of-Band (2/2) In-band cons: troubleshooting is adversely affect if data flows are delayed or blocked, which can happen during trouble times. Event monitoring when the network is under stress, such as during congestion, can also be impacted negatively. Out-of-band cons: Extra equipment and networking resources are needed. Speed of monitoring might not be the same as the speed of the actual network (specially if costs were reduced in the installation of the management network) A separate method to check availability of the management network is needed Compromise: Hybrid approach. Prof. Shervin Shirmohammadi CEG

Automated Fault Management. Lecture 20: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG

Automated Fault Management. Lecture 20: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG Lecture 20: Automated Fault Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 20-1 Fault Management Fault Management consists of 5 steps: 1. Fault detection

More information

Lecture 8: Flow Analysis

Lecture 8: Flow Analysis Lecture 8: Flow Analysis Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 8-1 Network Analysis Requirement Analysis Gather Requirements Develop Service Metrics

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Internet Protocol (IP) Lecture 2: Prof. Shervin Shirmohammadi CEG Lecture 2: Internet Protocol (IP) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 2-1 Network Layer Provides the upper layers with independence from the data

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

More information

Lecture 3: The Transport Layer: UDP and TCP

Lecture 3: The Transport Layer: UDP and TCP Lecture 3: The Transport Layer: UDP and TCP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 3-1 The Transport Layer Provides efficient and robust end-to-end

More information

Configuring POS interfaces

Configuring POS interfaces Contents Configuring POS interfaces 1 Overview 1 SONET 1 SDH 1 POS 1 Configuration procedure 1 Displaying and maintaining POS interfaces 3 POS interface configuration examples 4 Directly connecting switches

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

Network Management Functions - Fault. Network Management

Network Management Functions - Fault. Network Management Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures

More information

Lecture 4: Basic Internet Operations

Lecture 4: Basic Internet Operations Lecture 4: Basic Internet Operations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 4-1 LAN View A LAN 2 B Hub 2 Gateway to Internet Hub 1 Z (Gateway) LAN 1

More information

Lecture 14: Multimedia Communications

Lecture 14: Multimedia Communications Lecture 14: Multimedia Communications Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 14-1 Multimedia Characteristics Bandwidth Media has natural bitrate, not very flexible. Packet

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Network Analysis: Process Part 1. Lecture 6: Prof. Shervin Shirmohammadi CEG Lecture 6: Network Analysis: Process Part 1 Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 6-1 Overview The principles, guidelines, and procedures for requirements

More information

Lecture 4: Introduction to Computer Network Design

Lecture 4: Introduction to Computer Network Design Lecture 4: Introduction to Computer Network Design Instructor: Hussein Al Osman Based on Slides by: Prof. Shervin Shirmohammadi Hussein Al Osman CEG4190 4-1 Computer Networks Hussein Al Osman CEG4190 4-2

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS SYNCHRONOUS OPTICAL NETWORK (SONET) Synchronous Optical Network (SONET) is a standard for optical telecommunications transport. SONET defines optical carrier (OC) levels

More information

For internal circulation of BSNL only

For internal circulation of BSNL only E3-E4 E4 (CFA) Overview of SDH AGENDA SDH & PDH Hierarchy SDH Network Survivability Synchronous All elements are synchronized with one master clock. DIGITAL Information is in binary. SDH OVERVIEW HIERARCHY

More information

Distributed Video Systems Chapter 3 Storage Technologies

Distributed Video Systems Chapter 3 Storage Technologies Distributed Video Systems Chapter 3 Storage Technologies Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 3.1 Introduction 3.2 Magnetic Disks 3.3 Video

More information

Network Topologies & Error Performance Monitoring in SDH Technology

Network Topologies & Error Performance Monitoring in SDH Technology Network Topologies & Error Performance Monitoring in SDH Technology Shiva Sharma Electronics and Communications Department Dronacharya College of Engineering Gurgaon, Haryana Shiva.92@hotmail.com Abstract

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Introduction to Capacity and Performance Management

Introduction to Capacity and Performance Management 1 Introduction to Capacity and Performance Management Session 2 Presentation_ID.scr 1 Agenda Introductions/Goals Capacity Planning Model Capacity Data Collection Tools and Reporting Best Practices for

More information

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG

Architectural Considerations. Lecture 16: Prof. Shervin Shirmohammadi SITE, University of Ottawa. Prof. Shervin Shirmohammadi CEG Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network Architecture Architecture: high-level, end-to-end structure

More information

Lecture 16: Architectural Considerations

Lecture 16: Architectural Considerations Lecture 16: Architectural Considerations Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 16-1 Network : high-level, end-to-end structure for the network. Relationships

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Peer evaluations 2 Homework #5 Due Thursday, Nov 17 th Homework #6 Presentation on security/ privacy Project

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

EVENT CORRELATION IN SPECTRUM. AND OTHER COMMERCIAL PRODUCTS September 2000

EVENT CORRELATION IN SPECTRUM. AND OTHER COMMERCIAL PRODUCTS September 2000 EVENT CORRELATION IN SPECTRUM AND OTHER COMMERCIAL PRODUCTS September 2000 Introduction S P E C T R U M 6. 0 Event correlation over the enterprise has become an issue of paramount importance in enterprise

More information

(Refer Slide Time: 2:20)

(Refer Slide Time: 2:20) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture -23 X.25 and Frame Relay Hello and welcome to today s lecture on X.25 and

More information

Fundamentals of Networking Types of Topologies

Fundamentals of Networking Types of Topologies Fundamentals of Networking Types of Topologies Kuldeep Sonar 1 Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two

More information

15: OS Scheduling and Buffering

15: OS Scheduling and Buffering 15: OS Scheduling and ing Mark Handley Typical Audio Pipeline (sender) Sending Host Audio Device Application A->D Device Kernel App Compress Encode for net RTP ed pending DMA to host (~10ms according to

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. OSI Management. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. OSI Management. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: OSI Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 17-1 OSI Characteristics OSI: International Standards Organizations (ISO OSI) Deals

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Table of Contents 1 E-CPOS Interface Configuration 1-1

Table of Contents 1 E-CPOS Interface Configuration 1-1 Table of Contents 1 E-CPOS Interface Configuration 1-1 Overview 1-1 SONET 1-1 SDH 1-1 E-CPOS 1-5 Configuring an E-CPOS Interface 1-6 Configuring an E-CPOS Interface 1-6 Configuring the Operating Mode of

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,

More information

Lecture 6: Network Analysis: Process Part 1

Lecture 6: Network Analysis: Process Part 1 Lecture 6: Network Analysis: Process Part 1 Instructor: Hussein Al Osman Based on Slides by: Profs Makrakis and Shirmohammadi Hussein Al Osman CEG4190 6-1 Overview The principles, guidelines, and procedures

More information

Lecture 15: Multiplexing (2)

Lecture 15: Multiplexing (2) Lecture 15: Multiplexing (2) Last Lecture Multiplexing (1) Source: chapter 8 This Lecture Multiplexing (2) Source: chapter8 Next Lecture Circuit switching (1) Source: chapter9 Digital Carrier Systems Hierarchy

More information

Ethernet interface configuration commands

Ethernet interface configuration commands Contents Ethernet interface configuration commands 1 General Ethernet interface and subinterface configuration commands 1 alarm-detect 1 bandwidth 2 combo enable 2 default 3 description 4 display counters

More information

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1 Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Layer 2 - LAN Switching Configuration Guide Part number: 5998-1807 Software version: Release 1513 Document version: 6W100-20130830 Legal and notice information Copyright 2013 Hewlett-Packard

More information

NerveCenter 3.6: An Overview

NerveCenter 3.6: An Overview NerveCenter 3.6: An Overview NerveCenter is a suite of tools that help you monitor and manage a complex heterogeneous network. This document describes the components of NerveCenter and explains how these

More information

Table of Contents 1 MSTP Configuration 1-1

Table of Contents 1 MSTP Configuration 1-1 Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction

More information

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services 1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking

More information

NET311 Computer Network Management Tools, Systems and Engineering

NET311 Computer Network Management Tools, Systems and Engineering NET311 Computer Network Management Tools, Systems and Engineering Dr. Mostafa H. Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

Synchronous Ethernet (SyncE) ESMC and SSM

Synchronous Ethernet (SyncE) ESMC and SSM This module describes Synchronization Status Message (SSM), Ethernet Synchronization Message Channel (ESMC), and generating the Simple Network Management Protocol (SNMP) traps on the SyncE feature. With

More information

Management Software. SmartView TM EMS (Element Management System) Management Software. Management Software SmartView TM EMS. Polled Network Elements

Management Software. SmartView TM EMS (Element Management System) Management Software. Management Software SmartView TM EMS. Polled Network Elements LAN PWR PWR 2 PoE Fault Fiber 00 LAN ON OFF Force Auto 0 00 Half Full LFP Flow Pass SW TX RX Ethernet Media Converter FIBER LAN PWR PWR 2 Fault Fiber 00 LAN ON OFF Force Auto 0 00 Half Full LFP Flow Pass

More information

Synchronous Optical Networks (SONET) Advanced Computer Networks

Synchronous Optical Networks (SONET) Advanced Computer Networks Synchronous Optical Networks (SONET) Advanced Computer Networks SONET Outline Brief History SONET Overview SONET Rates SONET Ring Architecture Add/Drop Multiplexor (ADM) Section, Line and Path Virtual

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Computer Networks and The Inter Sec 1.3 Prof. Lina Battestilli Fall 2017 Outline Computer Networks and the Inter (Ch 1) 1.1 What is the Inter? 1.2 work

More information

G.8032 and CFM Support for Microwave Adaptive Bandwidth

G.8032 and CFM Support for Microwave Adaptive Bandwidth G.8032 and CFM Support for Microwave Adaptive Bandwidth The feature enables the G.8032 Ethernet Protection Ring (ERP) mechanism to be used as a trigger in response to bandwidth degradation occurrences

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

QoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology

QoS provisioning. Lectured by Alexander Pyattaev. Department of Communications Engineering Tampere University of Technology QoS provisioning Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 6, 2012 Outline 1 Introduction 2 QoS support elements

More information

HP 6125G & 6125G/XG Blade Switches

HP 6125G & 6125G/XG Blade Switches HP 6125G & 6125G/XG Blade Switches Layer 2 - LAN Switching Configuration Guide Part number:5998-3155a Software version: Release 2103 and later Document version: 6W102-20141218 Legal and notice information

More information

Device Manager Software Release 3.x

Device Manager Software Release 3.x Device Manager Software Release 3.x MICROSENS Introduction The Device Manager software is used for the comfortable configuration of MICROSENS components as well as for easy monitoring of the complete network.

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Ethernet Switch ZyNOS 4.0

Ethernet Switch ZyNOS 4.0 RMON Ethernet Switch ZyNOS 4.0 Support Notes Version 4.00 July 2011 Overview Remote Monitoring (RMON) is a standard monitoring specification that enables various network monitors and console systems to

More information

HP A6600 Routers Interface. Configuration Guide. Abstract

HP A6600 Routers Interface. Configuration Guide. Abstract HP A6600 Routers Interface Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration procedures. These configuration

More information

Synchronous Optical Networks SONET. Computer Networks: SONET

Synchronous Optical Networks SONET. Computer Networks: SONET Synchronous Optical Networks SONET 1 Telephone Networks {Brief History} Digital carrier systems The hierarchy of digital signals that the telephone network uses. Trunks and access links organized in DS

More information

ITSF 2011 Testing the PDV tolerance of PTPv2 slave clocks, an approach from an operator

ITSF 2011 Testing the PDV tolerance of PTPv2 slave clocks, an approach from an operator ITSF 2011 Testing the PDV tolerance of PTPv2 slave clocks, an approach from an operator Sébastien JOBERT R&D expert France Télécom Orange Orange Labs sebastien.jobert@orange.com Baba TABOURE Yannick LAGADEC

More information

Ethernet interface commands

Ethernet interface commands Contents Ethernet interface commands 1 Common Ethernet interface commands 1 default 1 description 2 display counters 2 display counters rate 4 display interface 5 display interface brief 12 display packet-drop

More information

Communication Networks

Communication Networks Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency

More information

Network Management. Network Management: Goals, Organization and Functions

Network Management. Network Management: Goals, Organization and Functions Network Management Network Management: Goals, Organization and Functions Telecomm/Data Network A telecommunication/data network is composed from many network elements (switching systems, terminals, circuits

More information

SONET. By Sadhish Prabhu. Unit II

SONET. By Sadhish Prabhu. Unit II SONET By Sadhish Prabhu History Digital carrier systems The hierarchy of digital signals that the telephone network uses. Trunks and access links organized in DS (digital signal) hierarchy Problem: rates

More information

SmartView EMS. Central EMS. SmartConfig. Fault, Configuration, Accounting, Performance & Security Management (FCAPS)

SmartView EMS. Central EMS. SmartConfig. Fault, Configuration, Accounting, Performance & Security Management (FCAPS) SmartView EMS TM Fault, Configuration, Accounting, Performance & Security Management (FCAPS) Central EMS Expand EMS platform up to 50 SmartViewTM and 25,000 devices management SmartConfig TM Tool for quick

More information

Spanning Tree Protocol

Spanning Tree Protocol For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1

More information

Introduction to Networks

Introduction to Networks Introduction to Networks Network Topology How we interconnect network users Network Hierarchy The connection between network topology and geographical size Telecommunication (Phone Networks) Circuit Switching

More information

2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.

2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching. 2 Network Basics types of communication service how communication services are implemented switching multiplexing network performance measures 1 2.1 Types of service in a layered network architecture connection-oriented:

More information

Short answer (35 points)

Short answer (35 points) CPSC 360 Fall 2017 Exam 1 Version 2 Solutions (last updated 10/19/2017) This exam is closed book, closed notes, closed laptops. You are allowed to have one 8.5x11 sheet of paper with whatever you like

More information

HP 6600/HSR6600 Routers

HP 6600/HSR6600 Routers HP 6600/HSR6600 Routers Interface Configuration Guide Part number: 5998-1499 Software version: A6602-CMW520-R3103 A6600-CMW520-R3102-RPE A6600-CMW520-R3102-RSE HSR6602_MCP-CMW520-R3102 Document version:

More information

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook

More information

end systems, access networks, links 1.3 network core

end systems, access networks, links 1.3 network core Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

VERITAS NerveCenter: Downstream Alarm Suppression

VERITAS NerveCenter: Downstream Alarm Suppression VERITAS NerveCenter: Downstream Alarm Suppression The new NerveCenter downstream alarm suppression behavior model monitors nodes in a complex network. Using topology information either from HP OpenView

More information

Performance Monitor Administrative Options

Performance Monitor Administrative Options CHAPTER 12 Effective network management requires the fastest possible identification and resolution of events that occur on mission-critical systems. Performance Monitor administrative options enable you

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

Lecture 4: The Transport Layer and UDP

Lecture 4: The Transport Layer and UDP Lecture 4: The Transport Layer and UDP Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4183 4-1 The Transport Layer Provides efficient and robust end-to-end service

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Backbone network technologies. T Jouni Karvo, Timo Kiravuo

Backbone network technologies. T Jouni Karvo, Timo Kiravuo Backbone network technologies T-110.300 Jouni Karvo, Timo Kiravuo Backbone network technologies This lecture tells about backbone networks After this lecture, you should know WDM, PDH, SDH and ATM understand

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM

Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM Configuring ITU-T Y.1731 Fault Management Functions in IEEE CFM This document describes the implementation of the ITU-Y.1731 fault management functions Ethernet Alarm Indication Signal (ETH-AIS) and Ethernet

More information

SDH. Protected monitoring point or dedicated monitor access

SDH. Protected monitoring point or dedicated monitor access CMA 3000 ATM Test Options SPECIFICATIONS Testing ATM connections has never been easier CMA 3000 is Anritsu s next-generation portable and futureproof field tester for the installation and maintenance of

More information

Lecture 10: Protocol Design

Lecture 10: Protocol Design Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

Reference Access and Interconnection Offer

Reference Access and Interconnection Offer 1. Commercial Proposal for Reference Access and Interconnection Offer Sub Annex E Technical Specification Table of Contents 1 General... 3 2 Physical and Electrical Interface... 4 3 Transmission... 7 4

More information

S5 Communications. Rev. 1

S5 Communications. Rev. 1 S5 Communications Rev. 1 Page 1 of 15 S5 Communications For a complete understanding of the S5 Battery Validation System (BVS) communication options, it is necessary to understand the measurements performed

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Troubleshooting Physical Layer Alarms on SONET and SDH Links

Troubleshooting Physical Layer Alarms on SONET and SDH Links Troubleshooting Physical Layer Alarms on SONET and SDH Links Document ID: 16154 Introduction Prerequisites Requirements Components Used Conventions Alarms at SONET's Layers Alarm Indicators Troubleshooting

More information

Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee

Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee Agenda Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee Packet switching technique Packet switching protocol layers (X.25) Frame Relay ١ Dr. Ahmed ElShafee, ACU Fall 2011,

More information

Lecture (04 & 05) Packet switching & Frame Relay techniques

Lecture (04 & 05) Packet switching & Frame Relay techniques Lecture (04 & 05) Packet switching & Frame Relay techniques Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I Agenda Packet switching technique Packet switching protocol layers (X.25)

More information

Standard 1.2 September 2001

Standard 1.2 September 2001 555-8421-103 Remote Office Network Engineering Guidelines Standard 1.2 September 2001 Copyright 2000 2001 Nortel Networks, All Rights Reserved. Printed in Canada. All information contained in this document

More information

Adaptive Data Burst Assembly in OBS Networks

Adaptive Data Burst Assembly in OBS Networks Adaptive Data Burst Assembly in OBS Networks Mohamed A.Dawood 1, Mohamed Mahmoud 1, Moustafa H.Aly 1,2 1 Arab Academy for Science, Technology and Maritime Transport, Alexandria, Egypt 2 OSA Member muhamed.dawood@aast.edu,

More information

Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands

Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Utility networks are going through massive transformations towards next

More information

Cisco Cable Manager 1.0

Cisco Cable Manager 1.0 Cisco Cable Manager 1.0 Product Overview 1 Agenda Solution Context Product Overview Features Configuration Management Fault Management Performance Management 2 Challenges Reduce maintenance and operations

More information

COPYRIGHTED MATERIAL INTRODUCTION AND OVERVIEW

COPYRIGHTED MATERIAL INTRODUCTION AND OVERVIEW 1 INTRODUCTION AND OVERVIEW The past few decades have seen the merging of computer and communication technologies Wide-area and local-area computer networks have been deployed to interconnect computers

More information

WAN Technologies (to interconnect IP routers) Mario Baldi

WAN Technologies (to interconnect IP routers) Mario Baldi WAN Technologies (to interconnect IP routers) Mario Baldi www.baldi.info WAN_Technologies - 1 Copyright: see page 2 Copyright Notice This set of transparencies, hereinafter referred to as slides, is protected

More information