RPR Topology Discovery Proposal
|
|
- Liliana Skinner
- 5 years ago
- Views:
Transcription
1 RPR Topology Discovery Proposal Italo Busi, Alcatel Jeanne De Jaegher, Alcatel Jason Fan, Luminous Chi-Ping Fu, NEC John Lemon, Lantern Robin Olsson, Vitesse Harry Peng, Nortel Yiming Yao, Luminous 1
2 Components of a complete RPR proposal Topology Discovery jf_topo_0x.pdf Protection Switching RPR MAC OAM and Layer Mgmt Bridging PHY interface jal_prot_0x.pdf cb_layer_0x.pdf ib_oamp_0x.pdf hp_brcom_0x.pdf MAC Service Definition Media Access Control Frame Format Ethernet SONET/SDH am_mrm_0x.pdf rs_frame_0x.pdf rb_phys_0x.pdf hp_grs_0x.pdf Transit Path Bandwidth Mgmt. sa_transi_0x.pdf hp_bwmgnt_0x.pdf 2
3 MAC Components (RMSAP) OAMP MAC Client(s) MAC Client(s) (MSAP) RPR MAC Control Ringlet Selection M L M E (MLSAP) MAC Layer Boundary Rate Control / Policer Protection (Steering DB, State Machine, etc.) RPR Media Access Control Topology (Topology DB, State Machine, etc.) (MLSAP) (PSAP) Transit Data Path (PSAP) Reconciliation Reconciliation Sublayer Sublayer (Ethernet/SONET) (Ethernet/SONET) PHY (Ethernet/SONET) PHY (Ethernet/SONET) FCS 3
4 Information Sharing RPR Topology Image consists of station addresses, link connectivity between stations, and status for each link RPR Topology Image used by other algorithms Steering algorithm uses Topology Image to know for which destinations steering is needed Congestion avoidance uses Topology Image to know where congestion is being experienced Ringlet selection uses Topology Image to know which ringlets are available to reach each destination 4
5 Goals of this Presentation In September the details of the topology discovery proposal were presented Minor modifications made in the written proposal based on discussions with a variety of companies This presentation will cover Discussion of methods for topology discovery Additional simulation results 5
6 Method 1: Neighbor Discovery and Distribution Each station: Discovers neighbors using periodic messaging Broadcasts neighbor information on change Collects neighbor information from stations detecting change Verifies with adjacent stations that discovered topologies match Updates topology database if verification successful On bring-up a station: Follows the steps above with one modification Broadcasts neighbor information with version indication set to 0 to cause other stations to send neighbor information to it 6
7 Method 2: Chaining Each station: Sends a topology message on each ringlet periodically Each station adds its MAC address to each topology message Collects topology information from each ringlet Needs to verify that information is received from each ringlet Updates topology database if verification successful On bring-up a station: Follows the steps above 7
8 Goals Met by Both Methods Scalable from 1 to 100 s of stations Determine/validate connectivity and ordering of stations on ring Topology database updated based on dynamic addition and removal of stations to/from the ring Ensure all stations on the ring have a uniform and current image of the topology Immediate reaction to changes Operate without any master station on the ring Provide means of sharing additional information between stations Operate independently of and in the absence of any management systems 8
9 Additional Goals of Topology Discovery Robustness Minimize messaging overhead Discovery of spans on which there is a single missing link Usable with all supported topologies: multiple ringlet ring, linear (broken ring), and star (single station) 9
10 Robustness (I) Methods for tolerance of message loss Neighbor Discovery Send broadcasts on both directions on the ring Validate discovered topology prior to updating stored topology through version comparison with neighbors Chaining Repeat topology discovery periodically Validate discovered topology prior to updating stored topology (?) or update stored topology after identical topology discovered multiple times consecutively Neighbor Discovery is not restricted to its current validation mechanism 10
11 Robustness (II) Neighbor discovery uses broadcast, which has minimum interaction with the MAC as it is sent on the ring Chaining requires the MAC of every station to be able to update topology packets correctly for any station to discover the topology B A D Chaining Msg Path, Ringlet 1 C Chaining Msg Path, Ringlet 0 E 11
12 Minimize Messaging Overhead M stations on ring Neighbor Discovery is very efficient 1 broadcast per ringlet only on topology change, sent only by stations detecting a neighbor change 1 unicast per ringlet only on topology change, sent by each station directly to a new station Total of 3 broadcasts and M-1 unicasts per ringlet, only on topology change Chaining is less efficient 1 broadcast per ringlet per station, sent every topology discovery period Total of M broadcasts per ringlet, every topology period Choice of mechanism for tolerance of message loss can come at the cost of efficiency 12
13 Discovery of Spans with Single Missing Link Neighbor discovery enables discovery of single missing link Bandwidth efficiency consideration for steering protection: rings with steering can utilize spans with single available link Chaining does not enable discovery of single missing link Bandwidth efficiency cost for steering protection No bandwidth efficiency cost for wrapping protection 13
14 Multiple Ringlet Support Neighbor Discovery enables discovery of more than two ringlets, and does not preclude RPR from supporting these scenarios 14
15 Set up 256 stations 200 km circumference Dual ringlet ring Simulation Results (I) 1 Gbps ring rate Processing times for messages set to exponentially distributed times around mean of 200 usec for Neighbor_Hello and 500 usec for Topology_Status Neighbor_Hello_Timer: 0.5 seconds Topology_Stabilization_Timer: 2.5 seconds 15
16 Scenarios Simulation Results (II) (0) Bring up all 256 stations at once (1) Starting with link 0->1 removed, then add it back (2) Two failures: links 0->1 and 127->128 are removed, then add 0->1 back (3) Three Failures: span plus links in (2) are removed, then add span back In all the scenarios above, the new topology (for adding link or span back) is discovered within 2.5 seconds. 16
17 Simulation Results (III) Scenarios with lost Topology_Status messages (4) Two messages lost in (1) (5) Two messages lost in (2) (6) Four messages lost in (3) In scenarios (4)-(6), the new topology is discovered within 5 seconds. 17
18 Topology Discovery Summary Many topology discovery objectives are met by both neighbor discovery and chaining methods Neighbor discovery method: Is more efficient than chaining method Can be designed to have lower failure probability than chaining method, at cost of efficiency Increases bandwidth availability in rings using steering protection through usage of all available links Has been simulated to show robustness to loss of multiple messages Has been simulated to show topology discovery in rings with multiple link/span failures 18
RPR Topology Discovery Proposal
RPR Topology Discovery Proposal John Lemon Italo Busi, Alcatel Jason Fan, Luminous Pietro Vittorio Grandi, Alcatel David James, Cypress Jim Kao, Cisco Vittorio Mascolo, Alcatel Thierry Paiemen, Cisco Harry
More informationOAM Proposal Italo Busi, Alcatel (Presenter) Leon Bruckman, Corrigent (Presenter)
OAM Proposal Italo Busi, Alcatel (Presenter) Leon Bruckman, Corrigent (Presenter) Costantinos Bassias, Lantern Jason Fan, Luminous Henry Hsiaw, NEC Wai-Chau Hui, Nortel Angela Faber, Telcordia Robin Olsson,
More informationComponents of a complete RPR proposal
OAM in RPR Italo Busi, Alcatel Frederic Thepot, Dynarc Constantinos Bassias, Lantern Jason Fan, Luminous Henry Hsiaw, NEC Wai-Chau Hui, Nortel Robin Olsson, Vitesse Components of a complete RPR proposal
More informationImproving Bandwidth Efficiency When Bridging on RPR. November 2001
Improving Bandwidth Efficiency When Bridging on RPR November 2001, Nortel Networks Anoop Ghanwani, Lantern Communications Raj Sharma, Luminous Robin Olsson, Vitesse CP Fu, NEC 11/1/01 Page 1 Components
More informationLayer Management Proposal
Layer Management Proposal Italo Busi, Alcatel (Presenter) Wai-Chau Hui, Nortel (Presenter) Costantinos Bassias, Lantern Jason Fan, Luminous 1 Components of a complete RPR proposal Topology Discovery jcf_topo_0x.pdf
More informationA Study of Protection Switching: Wrapping or Steering
Study of Protection Switching: Wrapping or Steering Jason Fan Luminous Networks, Inc. March 2001, IEEE 802.17 Luminous Networks/Jason Fan 1 Wrapped Protection Wrapped protection is analogous to LSR Wrapping
More informationOAM&P Requirements for RPR. Portland IEEE Meeting July 2001 Italo Busi Alcatel
OAM&P Requirements for RPR Portland IEEE 802.17 Meeting July 2001 Italo Busi Alcatel IEEE 802.17 RPRWG 802-17-01-00009 / ib_oamp_02 Table of Contents Introduction In-band OAM Configuration Management Fault
More informationEncapsulated Bridging Support of November 2001
Encapsulated Bridging Support of 802.17 November 2001, Nortel Networks Anoop Ghanwani, Lantern Communications Raj Sharma, Luminous Robin Olsson, Vitesse CP Fu, NEC 11/2/01 Page 1 Components of a Complete
More informationIntroduction to Resilient Packet Rings. Raj Sharma Luminous Networks, Inc Working Group
Introduction to Resilient Packet Rings Raj Sharma Luminous Networks, Inc. 802.17 Working Group History March/00: RPR Tutorial and call for interest May & July: Vendors and Users present August: Agreed
More informationSonet/SDH Virtual Concatenation for RPR. San José IEEE Meeting September 2001 Italo Busi Alcatel
Sonet/SDH Virtual Concatenation for RPR San José IEEE 802.17 Meeting September 2001 Italo Busi Alcatel IEEE 802.17 RPRWG 802-17-01-00074 / ib_vconc_01 Table of Contents Introduction Summary on Sonet/SDH
More informationMetro technologies GE, SRP, RPR and more abbreviations. Lars Hanson, Stefan Lindeberg,
Metro technologies GE, SRP, RPR and more abbreviations Lars Hanson, lha@cisco.com Stefan Lindeberg, stefan@lindeberg.net Agenda Introduction Gigabit Ethernet Cisco Spatial Reuse Protocol, SRP Building
More informationRPR Bandwidth Management
RPR Bandwidth Management Sajay Agawal: Luminus Jeanne De Jaegher: Alcatel Henry Hsiaw: NEC Adisak Mekkittikul: Lantern Rbin Olssn: Vitesse Harry Peng (presenter): Nrtel Frederic Thept: Dynarc Sept 2001
More informationIEEE Resilient Packet Ring (RPR) Standards Update
IEEE 802.17 Resilient Packet Ring (RPR) Standards Update NANOG Feb 2003 Andrew Brown, Cisco Systems (browna@cisco.com) 1 What is a Resilient Packet Ring?. An L2 Network Architecture that has: Dual counter
More informationIssues in Automatic Topology Discovery for RPR
PMC-Sierra, Inc. Issues in Automatic Topology Discovery for RPR July 2001, 802.17 Meeting Portland OR Brian Holden PMC-Sierra, Inc. 1 Outline Requirement Questions Taxonomy of solutions An example algorithm
More information802.1D/Q Compliance and Spatial Reuse
802.1D/Q Compliance and Spatial Reuse Bridging Adhoc Spatial Reuse Subteam Li Mo William Dai John Coulter Robert Castellano 5/2/2002, Version 2.3 bah_spat_01.pdf Outline Objective Definitions Overall Spatial
More informationBridging. Robert Castellano David James Bob Sultan Spencer Dawkins. 1/22/2002 rc_brdg_02.pdf
802.17 Bridging Robert Castellano David James Bob Sultan Spencer Dawkins 1/22/2002 rc_brdg_02.pdf 802-17-02-00152 Outline Bridging Requirements Simple Bridging Bridging with Destination Stripping Reference
More informationIEEE Resilient Packet Ring Feature Guide
IEEE 802.17 Resilient Packet Ring Feature Guide This feature guide describes how to configure the Cisco implementation of the IEEE 802.17 Resilient Packet Ring (RPR) protocol on supported Cisco routers
More informationEncapsulation Bridging and
Encapsulation Bridging and 802.17 Robert Castellano, Jedai Broadband Networks 9/10/2001 rc_ebridge_02.pdf 802-17-02-00051 Outline 802.17 Bridging 802.17 Compatibility Requirements 802.1D Bridging Architecture
More informationSpatially aware sublayer support of VRRP. Marc Holness, Nortel Networks IEEE WG b SG San Antonio, Texas November, 2004
Spatially aware sublayer support of VRRP Marc Holness, Nortel Networks IEEE 802.17 WG 802.17b SG San Antonio, Texas November, 2004 Marc Holness - 1 Agenda Objectives Problem overview Solution overview
More informationRPR Bandwidth Management
RPR Bandwidth Management Sajay Agawal: Luminus Jean DeJaegher: Alcatel Adisak Mekkittikul: Lantern Harry Peng (presenter): Nrtel Frederic Thept: Dynarc Sept 2001 802-17-hp_bwmgnt_02 Harry Peng 1 Cmpnents
More informationH3C S9500E Routing Switch Series RPR Interface Card Datasheet
H3C S9500E Routing Switch Series RPR Interface Card Datasheet Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationData Communications. Connecting Devices
Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use
More informationSecondary Address Support
Secondary Address Support Peter Jones July 21, 2003 7/21/2003 3:19 PM pj_sec_addr_02.ppt 1 Secondary Addresses Allows for more efficient support of protocols like RFC 2338 Virtual Router Redundancy Protocol.
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationIEEE Resilient Packet Ring Tutorial
ETHERNET TRANSPORT OVER WIDE AREA NETWORKS IEEE 802.17 Resilient Packet Ring Tutorial Fredrik Davik, Simula Research Laboratory and Ericsson Research Mete Yilmaz, Cisco Systems Stein Gjessing, Simula Research
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationConfiguring IEEE b Resilient Packet Ring
18 CHAPTER This chapter describes the IEEE 802.17b-based resilient packet ring (RPR-IEEE) and how to configure it on the ML-Series cards. This chapter contains the following major sections: Understanding
More informationSource-Route Bridging
25 CHAPTER Chapter Goals Describe when to use source-route bridging. Understand the difference between SRB and transparent bridging. Know the mechanism that end stations use to specify a source-route.
More informationRPR Seminar Report Introduction
1. Introduction The nature of the public network has changed. Demand for Internet Protocol (IP) data is growing at a compound annual rate of between 100% and 800%1, while voice demand remains stable. What
More information6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay
6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may
More informationOverview of the Evolving IEEE Resilient Packet Rings Standard
Overview of the Evolving IEEE 802.17 Resilient Packet Rings Standard Khaled M. F. Elsayed (khaled@ieee.org) Department of Electronics and Communications Engineering Faculty of Engineering, Cairo University,
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationNetwork-Level High Availability
This chapter describes Cisco NX-OS network high availability and includes the following sections: Information About, page 1 Licensing Requirements, page 2 Spanning Tree Protocol, page 2 Virtual Port Channels,
More informationP D1.1 RPR OPNET Model User Guide
P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationResilient Packet Ring 5 Criteria (2. Compatibility)
Resilient Packet Ring 5 Criteria (2. Compatibility) - 802. Overview and Architecture - 802.1D, 802.1Q, 802.1f - Systems management standards Byoung-Joon (BJ) Lee IEEE 802 RPRSG, July 10-14, 2000 2000,
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationCisco Managing Industrial Networks for Manufacturing wit...
Cisco 200-601 Managing Industrial Networks for Manufacturing wit... http://killexams.com/pass4sure/exam-detail/200-601 QUESTION: 80 If the Link Fault alarm is connected to the minor relay and the FCS Bit
More informationConfiguring Cisco Proprietary Resilient Packet Ring
17 CHAPTER Configuring Cisco Proprietary Resilient Packet Ring Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS
More informationConfiguring VLANs. Understanding VLANs CHAPTER
7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN
More informationChapter 16: Switched Ethernet in Automation. Wenbo Qiao
Chapter 16: Switched Ethernet in Automation Wenbo Qiao Ethernet Basics What is Ethernet? Why Ethernet? ( not FieldBus?) Flexibility, Scalability and Performance Key Strength: many protocols running simultaneously
More informationNetworks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009
Networks Distributed Systems Philipp Kupferschmied Universität Karlsruhe, System Architecture Group May 6th, 2009 Philipp Kupferschmied Networks 1/ 41 1 Communication Basics Introduction Layered Communication
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationLAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic
1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade
More informationAccess Technologies. Fabio Martignon
Access Technologies Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration
More informationPath MTU Discovery in Bridged Network
www.huawei.com Path MTU Discovery in Bridged Network Authors: Hesham ElBakoury Version: 1.0 HUAWEI TECHNOLOGIES CO., LTD. GOAL Discuss different ideas to discover the Path MTU in Bridged Ethernet Network
More informationHighly Available Networks
Highly Available Networks Pamela Williams Dickerman Advanced Technology Consultant Michael Hayward Hewlett-Packard Company Copyright 1996 Hewlett-Packard Co., Inc. Table of Contents Abstract Single Points
More informationPass4sures. Latest Exam Guide & Learning Materials
Pass4sures http://www.pass4sures.top/ Latest Exam Guide & Learning Materials Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get Latest & Valid 200-125
More informationConfiguring Port-Based Traffic Control
CHAPTER 18 This chapter describes how to configure port-based traffic control features on the Catalyst 3750 Metro switch. For complete syntax and usage information for the commands used in this chapter,
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationMetro Ethernet Forum OAM. Matt Squire Hatteras Networks
Metro Ethernet Forum OAM Matt Squire Hatteras Networks 1 The Problem Significant inhibitor of large scale Ethernet deployments is lack of OAM capabilities Compared with SONET, ATM, etc. These other technologies
More informationRESILIENT PACKET RING TECHNOLOGY
1 RESILIENT PACKET RING TECHNOLOGY INTRODUCTION 1. An important trend in networking is the migration of packet-based technologies from Local Area Networks to Metropolitan Area Networks (MANs). The rapidly
More informationIntroduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and
High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More informationVLAN Configuration. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership
More informationLocal Addresses and SAS
Local Addresses and SAS Robert Castellano 10/25/04 rc_saslocal_01 Page 1 Local Addresses What kinds of local address considerations needs to be handled by SAS? Whether or not an RPR station is SAS capable
More informationSwitching and Forwarding
Switching and Forwarding Outline Store-and-Forward Switches Bridges and Extended LANs Spring 7 CSE64 Switch Switching protocol T T STS- Spring 7 CSE64 Scalable Networks Switch forwards packets from input
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationH3C S7500E-XS Switch Series FAQ
H3C S7500E-XS Switch Series FAQ Copyright 2016 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior
More informationConnecting to the Network
Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.
More informationHUAWEI TECHNOLOGIES CO., LTD. Quidway CX200/300 Metro Services Platform
HUAWEI TECHNOLOGIES CO., LTD. Quidway 200/300 Metro Services Platform Contents 1 Introduction...1 2 Product Feature...3 3 Product Specification...4 4 Deployment Scenario...7 Copyright 2007 by Huawei Technologies
More information3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?
Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationEdge Control Transport for LRP
Edge Control Transport for LRP September 2017 Paul Bottorff, Network System Architect, Aruba CTO s Office Paul.Bottorff@hpe.com Link-local Registration Protocol Choices Draft 1.0 is based on an IS-IS-like
More informationConfiguring Resilient Packet Ring on the ML-Series Card
15 CHAPTER Configuring Resilient Packet Ring on the ML-Series Card Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco
More informationExam Questions
Exam Questions 642-997 DCUFI Implementing Cisco Data Center Unified Fabric (DCUFI) v5.0 https://www.2passeasy.com/dumps/642-997/ 1.Which SCSI terminology is used to describe source and destination nodes?
More informationConfiguring Resilient Packet Ring
17 CHAPTER Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring
More informationEIGRP Stub Routing. Finding Feature Information. Information About EIGRP Stub Routing. EIGRP Stub Routing
The EIGRP stub routing feature improves network stability, reduces resource utilization, and simplifies the stub device configuration. Stub routing is commonly used in hub-and-spoke network topologies.
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationResilient Packet Rings with Heterogeneous Links
Resilient Packet Rings with Heterogeneous Links Mete Yilmaz Edge Routing Business Unit Cisco CA 95134, USA myilmaz@cisco.com Nirwan Ansari Department of Electrical and Computer Engineering New Jersey Institute
More informationINGRESS RATE CONTROL IN RESILIENT PACKET RINGS
ABSTRACT THOMBARE, ASAVARI ANIL. Ingress Rate Control in Resilient Packet Rings. (Under the direction of Dr. Ioannis Viniotis.) Resilient Packet Ring (RPR) Protocol is becoming popular in Metro Networks
More informationHigh Availability Architectures for Ethernet in Manufacturing
High Availability Architectures for Ethernet in Manufacturing Written by: Paul Wacker, Advantech Corporation, Industrial Automation Group Outside of craft manufacture, like blacksmithing, or custom jewelry
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer
More informationNetwork Infrastructure
Network Infrastructure For building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
More informationJoint ITU-T/IEEE Workshop on Carrier-class Ethernet
Joint ITU-T/IEEE Workshop on Carrier-class Ethernet Ethernet Access OAM & Management (EFM OAM and TPMR) David W. Martin Packet Optical Architect Nortel Networks Geneva, 31 May 01 June 007 Agenda Reference
More informationIPv6 Feature Facts
12.1.2 IPv6 Feature Facts The current IP addressing standard, version 4, will eventually run out of unique addresses, so a new system is being developed. It is named IP version 6 or IPv6. You should know
More informationCisco SGE Port Gigabit Switch Cisco Small Business Managed Switches
Cisco SGE2010 48-Port Gigabit Switch Cisco Small Business Managed Switches Performance and Reliability to Support Small Business Networks Highlights 48 high-speed ports optimized for the network core or
More informationPaper Number: Architecting Highly Available Networking Environments. Pamela Williams Dickerman. Advanced Technology Consultant.
Paper Number: 2004 Architecting Highly Available Networking Environments Pamela Williams Dickerman Advanced Technology Consultant Michael Hayward Hewlett-Packard Company 19111 Pruneridge Avenue Cupertino,
More informationChapter 3 Packet Switching
Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationIEEE Bridge Model
IEEE 802.1 Bridge Model Glenn Parsons John Messenger Presentation supporting TD6/WP3 Figures based on L2CP layering - MEF42033 by Steve Haddock WD07r1 Q13/15 Paris January 2013 1 802 Reference Model ISO/IEC
More informationCHAPTER 2 - NETWORK DEVICES
CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,
More informationHSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal www.computerscijournal.org ISSN: 0974-6471 December 2011, Vol. 4, No. (2): Pgs. 399-404
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationAudio Video Bridging (AVB) Assumptions IEEE AVB Plenary Jan 28 & 29, 2008 Los Gatos
Audio Video Bridging (AVB) Assumptions Plenary Jan 28 & 29, 2008 Los Gatos Green Text = Agreed to on Various AVB Calls/Meetings Black Text = Not Decided Changes Marked with Red from last version Don Pannell
More informationIEEE RPR Working Group Meeting Minutes Interim Session, May 14-18, 2001 Radisson Hotel Universal Orlando, Orlando, FL
IEEE 802.17 RPR Working Group Meeting Minutes Interim Session, May 14-18, 2001 Radisson Hotel Universal Orlando, Orlando, FL Reporter: B.J. Lee and Mannix O Conner Note: Attendance list is attached as
More informationEIGRP Features and Operation
EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as
More informationBridging Solution for the MAN: Address Separation
Page 1 Bridging Solution for the MAN: Address Separation October 2002 Marc Holness, Nortel Networks Page 2 Problem Context An Ethernet Service Provider supplies Ethernet Layer 2 services among customer
More information