ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS

Size: px
Start display at page:

Download "ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS"

Transcription

1 DATA COMMUNICATIONS MANAGEMENT ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS Richard J. Tobacco INSIDE Talking Transport; By Air, Land, or Sea: Link Selection; Taking Familiar Routes: Connection Oriented; First Class or Coach: Priority Queuing; Registered Shipments: Reliable Transport; Packaging: Encapsulation; What is Enterprise Extender? Larger Number of SNA Users; No Single Point of Failure; Traffic Priority; Efficient Message Sequencing; Choosing Between Enterprise Extender or DLSw INTRODUCTION Most businesses rely on legacy applications residing on mainframes. Access to these applications and databases were through networks based on Systems Network Architecture (SNA). Newer application development is often aimed at E-business, and these applications are generally based on TCP/IP networks. Initially, business created and supported these SNA and TCP/IP networks separately. Today s cost-conscious network managers are seeking ways to consolidate their SNA traffic onto the TCP/IP network. Rewrite of the estimated $3 billion dollar investment in legacy SNA-based applications is clearly not justified. Many businesses use TN3270e as their method of accessing those SNA applications. The TN3270e client communicates over a TCP/IP network to a TN3270e server that transforms the IP data-gram into an SNA data flow. The TN3270e server can be located within the application server, on a device channel attached to the application server, or on a branch office router. Unless the TN3270e server resides within the application server, there is a SNA data flow between the TN3270e and application servers. 1 This SNA data flow can be transported across an IP network. In 1992, IBM introduced Data Link Switching (DLSw) as a means for transporting Systems Network Architecture (SNA) data across a TCP/IP PAYOFF IDEA Data Link Switching is commonly used to transport SNA traffic over an IP network. Enterprise Extender is a newer alternative that offers some compelling advantages. This article compares and contrasts the two technologies, providing the network manager with assistance in deciding which is more appropriate for his or her environment.

2 DATA COMMUNICATIONS MANAGEMENT network. As the only nonproprietary TCP/IP encapsulation scheme, DLSw 2 gained widespread acceptance by all routing vendors, and many customers use this as their method for accessing SNA applications across a TCP/IP network. Five years later, IBM created Enterprise Extender as an open alternative way to integrate SNA applications onto an IP network. Recently, Cisco Systems, Inc., announced 3 that its routers will also provide the enterprise extender function called SNA Switching Services (SNASw). Enterprise Extender is a network integration technology that provides the flexibility to build the networks that cost-conscious network managers demand. It is a technology that extends the reach of SNA applications and data across IP networks to IP-attached clients, while providing users with the levels of reliability, scalability, and control they have come to expect from mission-critical SNA-based applications. Enterprise Extender provides this integration using standard IP technology and requires no new hardware or software in the IP backbone network. The following is a quick look at the nomenclature of protocol transport and some of the differences between DLSw and Enterprise Extender. TALKING TRANSPORT A few transport analogies may aid network managers trying to describe the transport differences to fellow workers. By Air, Land, or Sea: Link Selection Companies have long had the option of selecting the mode of product shipment. Perishable goods might go by air, normal deliveries by truck, and bulky products via barge or container ship. SNA provides a similar selection; part of class-of-service, where different types of data can be transported across different links, for example, satellite, modems, or fiber. The capability to select network links based on application-specified class-of-service is only provided by SNA networking. Recent Internet Engineering Task Force (IETF) work on Differential Services has improved the ability to affect the link selection; however, Enterprise Extender allows the link to be selected. Taking Familiar Routes: Connection Oriented One drives to a favorite vacation spot along familiar roads, not altering one s route unless an unexpected detour is encountered. One knows the travel time and progress toward the final destination is readily apparent. If delayed, concerned friends might be able to ascertain one s progress by checking at one s favorite stopping spots. In networking terms, one is connection oriented. 4 Had one been out joyriding and decided the route at each intersection, one would (in networking terms) be connection-less. Data path consistency, provided by a connection-oriented network, provides similar benefits to network managers. They can view data

3 ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS EXHIBIT 1 SNA and TCP/IP Transport First versions of SNA, designed to support networks with unreliable links, were very tightly coupled with data integrity checked at each path step. Improved link quality enabled SNA to be restructured with data verification only at the endpoints. This advanced SNA High Performance Routing (HPR) separates transport functions from data integrity functions. The similarity of HPR an improved Advanced Peer-to-Peer Networking (APPN) SNA routing protocol with TCP/IP may be apparent; end stations ensure data integrity and intermediate devices forward traffic. The intermediate Automatic Network Routing (ANR) nodes forward packets, have no session awareness, and rely on the endpoints for error recovery. The endpoint Rapid Transport Protocol (RTP) nodes provide end-to-end error recovery, nondisruptive rerouting, and selective retransmission of lost packets. People familiar with TCP/IP networks will relate RTP to the TCP portion and ANR to IP part of the TCP/IP stack. Both transports are valid and leading networking products will continue to support TCP/IP and SNA. A key difference between SNA and TCP/IP transport is that HPR sessions use the same path as long as it is available, whereas TCP/IP sessions may often change paths. Because the HPR endpoints establish a path and maintain it until a failure occurs, the intermediate routing devices use routing information contained within the transmitted packets. This eliminates the need for the routing devices to make routing decisions. If there is a path change, the packet labels are changed by the RTP endpoints. Separating transport and integrity functions also means that SNA messaging characteristics can be applied to SNA applications crossing an IP network. Enterprise Extender code provides priority queuing for SNA sessions, making IP transport appropriate for business-critical applications. progress, check for congestion roadblocks, and monitor and plan for increases in traffic. High performance routing (HPR), a lower-overhead less-complex SNA, creates connection-oriented networks by providing the data path information to the routers and virtually eliminating router overhead for the SNA sessions. With Enterprise Extender, HPR-capable endpoints provide connection-oriented routes for the UDP/IP datagrams forwarded by the intermediate network routers (see Exhibit 1). First Class or Coach: Priority Queuing We have become accustomed to priorities in business. CEO air-travel arrangements are made first; they travel first class and avoid having to wait in long lines boarding or exiting the aircraft. Likewise, some data transmissions are more important to a business than others. Being able to assign priority based on the data type (e.g., interactive or batch) can mean business-critical data gets transmitted first. Access devices such as routers often create queues for data placed on the network. And IP networks can provide Type of Service (TOS) or port prioritization such that both SNA networks and the new application transport, Enterprise Extender, can provide priority transmission throughout the entire network. Registered Shipments: Reliable Transport Many have sent or received registered mail. At transfer points, the mail (or contents of a shipment) is accounted for prior to being forwarded. This additional effort of accounting for shipment integrity often results in

4 DATA COMMUNICATIONS MANAGEMENT slower and more costly delivery. If one generally finds that normal shipments reach their destination, one will rely on the final recipient to verify shipment integrity, thus reducing the cost of shipment. In TCP/IP networks, registered shipments are analogous to reliable transport and normal shipments are comparable to unreliable transport. 5 Network links have become more reliable and transmission error rates have declined significantly. Although it was more efficient, if not necessary, for SNA to verify message integrity at each transfer node in the 1960s, it is now possible to avoid the cost of additional processing overhead. Enterprise Extender uses unreliable UDP transport for forwarding SNA application data across a TCP/IP network. Message integrity is guaranteed by the session endpoints instead of each intermediate router within the network. Packaging: Encapsulation In networking parlance, placing a letter in an envelope is encapsulation. The envelope has an external address that is used by a carrier to route the letter to its destination. Once received, the envelope is discarded and the contents distributed as appropriate. DLSw is the encapsulation of SNA protocols within a TCP/IP package. The package is a usable TCP/IP address that has been discovered by the DLSw-capable routers. Likewise, Enterprise Extender is the transport of SNA protocols within a lighter UDP package. WHAT IS ENTERPRISE EXTENDER? Enterprise Extender is an extension to HPR technology that provides efficient encapsulation of SNA application traffic within UDP frames by HPR-capable devices at the edges of an IP network. To the IP network, the SNA traffic is UDP datagrams that get routed without hardware or software changes to the IP backbone. The Enterprise Extender session is normal SNA with predictable performance and high availability. Unlike gateways, there is no protocol transformation and, unlike most common tunneling mechanisms, the encapsulation is performed at the routing layers without the overhead of additional transport functions. Enterprise Extender enables efficient use of the IP infrastructure for support of IP-based clients accessing SNAbased data. Enterprise Extender is currently supported on all IBM Communication Servers and routers, on IBM Personal Communications products (TN3270e client), on Cisco routers (as SNASw), and within the operating system of System/390 servers. 6 Enterprise Extender can be implemented in traffic consolidating communications servers or remote routers or within a single end user s Personal Communications product. Terminat-

5 ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS ing this traffic within a System/390 enables pure IP transport by existing routers and eliminates many shortcomings of DLSw TCP encapsulation. Larger Number of SNA Users At both the sending and receiving locations, DLSw-capable routers terminate the SNA connection and locally acknowledge transmissions. Connection setup and maintenance is process intensive, involving link-level acknowledgment, TCP retransmit, congestion control, protocol translation, and data store-and-forward. This is a significant router burden even to the more powerful routers. Very often, the expensive data center DLSw router is incapable of supporting more than a few hundred SNA users. Enterprise Extender eliminates the termination and acknowledgment workload, thereby enabling the routers to handle a much larger number of users. Because Enterprise Extender uses end-system to end-system congestion control and connectionless UDP, there are no TCP retransmit buffers, no timers, and no congestion control logic in the router. Because of these savings, the edge routers can concentrate on the job they do best forwarding packets rather than providing protocol translation and maintaining many TCP connections. Enterprise Extender allows the existing data center routing platforms to handle larger networks and larger volumes of network traffic. In similar network configurations, the same router has been measured to be up to ten times faster when using Enterprise Extender rather than DLSw. No Single Point of Failure Enterprise Extender leverages the inherent availability features of IP to provide failure-resistant SNA application access. With DLSw, the data center router, where termination and acknowledgment occurs, is a single point of failure. Should this router fail, although an alternate path may exist, all SNA connections would be disrupted and would have to be reestablished. Because Enterprise Extender does not terminate the session flow, it can support the IP reroute capability, maintain the connection, and switch to an alternate path without session disruption. When Enterprise Extender is operating within S/390 Parallel Enterprise Servers (Parallel Sysplex), 7 the UDP/IP flow extends into the sysplex. The HPR-controlled session over an IP network is from the end user all the way to the application on the server. This provides applications full parallel sysplex support in the event the original application processor fails, it can move to another processor without terminating the original session. This results in five nines availability of the legacy SNA application ( percent availability) running on OS/390 with no changes to the SNA applications.

6 DATA COMMUNICATIONS MANAGEMENT Enterprise Extender eliminates a TCP/IP network connection into the server with a stub SNA session between the gateway routing device and the server. Extending the UDP/IP flow into the S/390 server also eliminates the complexity of multiple gateways each supporting several hundred TN3270 sessions. 8 The data center router or switch can be ES- CON channel attached or use the recently available gigabit Ethernet adapter for high-speed IP attachment 9 to the S/390 server. And, recent S/390 operating system enhancements have eliminated the single access and further improved TCP/IP stack availability. Traffic Priority Most routers provide some form of prioritized queuing; however, the difficulty has been to properly identify the priority at which an SNA packet should be sent. With DLSw, for example, where traffic prioritization is handled on a link basis, multiple links must be defined to the same SNA device. Other traffic prioritization techniques either have no capability to provide SNA priority, require guesswork, or adherence to addressing conventions. Enterprise Extender ends this guesswork and configuration overhead and provides real priority by mapping the priority of SNA packets to UDP port numbers that routers within the IP network can easily use to properly handle the traffic. 10 Efficient Message Sequencing DLSw uses TCP/IP reliable transport to avoid messages arriving at their destination scrambled or out of sequence. This is because although higher layers of SNA could correct scrambled messages, correction can require significant retransmission that would severely impact response times. Enterprise Extender employs congestion avoidance (Adaptive Rate-Based) and selective retransmission of lost packets. When only an occasionally missing message part has to be selectively retransmitted, instead of the missing segment and all segments following it, the HPR-capable endpoints manage the retransmission with little effect on response times. Choosing Between Enterprise Extender or DLSw Today there are no ubiquitous network solutions. Thousands of native SNA transport networks have provided unsurpassed reliability and predictability. Emerging E-business opportunities rely on the Internet, intranets, and internal TCP/IP networks. Companies deciding how to merge these SNA and TCP/IP networks should consider both Data Link Switching and Enterprise Extender. Consider the total cost of ownership. Are the routers currently in the network capable of supporting DLSw? Do existing routers have the capacity to handle the increased DLSw workload? Are the current network

7 ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS devices capable of providing HPR support to Enterprise Extender? What is the skill set of the people within the organization? Will education offset any savings in initial purchase prices? How much will it cost to maintain the solution? Consider implementation implications. Are skills currently available or will they have to be recruited? How long will it take to redesign and upgrade the current network? Does one want to maintain the current IP network without change? Does one want gigabit Ethernet attachment into the S/390 server? Does one want to use TN3270 servers to transform from IP-based to SNA-based data flows? Where will one locate and how will one maintain any TN3270e servers? How will current decisions affect future network plans? How one consolidates the networking will affect future growth and acquisition plans. External E-business customers, business partners, as well as internal executives may see one s network performance. Therefore, choose wisely network consolidation decisions will impact business. Notes 1. Enterprise Extender also supports communication between a DLUR and S/390, between APPC applications or between S/390 servers. 2. Although DLSw is nonproprietary (RFC 1795), implementations (such as Cisco Systems Inc. DLSw+) are proprietary. The additional features provided by proprietary extensions are only useable in a single vendor implementation. Multi-vendor DLSw implementations will revert to a restricted base-set of functions. 3. September 7, 1999, News Release: Cisco Introduces an Easier, More Scalable SNA Solution for IP Infrastructures. 4. Technically, the connection-oriented and connection-less definitions depend on the presence of session set-up/tear-down protocol and control blocks within the routing device. The less common descriptor pinned-route may be a more acceptable answer. 5. This is TCP/IP network nomenclature only and hopefully the U.S. Post Office will not take offense with the analogy. 6. Enterprise Extender is available on Communications Server for OS/390 V2R6 (or later) as a base component of OS/ IBM, Parallel Sysplex, and S/390 are trademarks of the IBM Corporation. 8. Communications Server for OS/390 has tested support of 64,000 TN3270 sessions. Continuing the DLSw flow to the S/390 also eliminates the complexity of multiple TN3270-capable routers. 9. The gigabit Ethernet adapter on S/390 servers only supports IP flows. Enterprise Extender is the recommended method of high-speed access to SNA applications. 10. The routers must support TOS or port prioritization. Because segmented packets lose port number prioritization, TOS is preferred. Richard J. Tobacco has more than 15 years of experience in sales support and marketing of networking products. He currently works for the Network Computing Software Division of IBM as the Brand Manager for Communications Server for OS/390.

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,

More information

AN ENGINEER S GUIDE TO TMoIP

AN ENGINEER S GUIDE TO TMoIP AN ENGINEER S GUIDE TO TMoIP Richard W. Hoffman III GDP Space Systems ABSTRACT As telemetry transport systems move inexorably closer to a unified telemetry-over-ip approach, the operators and engineers

More information

Securing Enterprise Extender

Securing Enterprise Extender Securing Enterprise Extender Sam Reynolds IBM z/os Communications Server Design samr@us.ibm.com Ray Romney Cisco Systems romney@cisco.com Tony Amies William Data Systems Product Architect tony.amies@willdata.com

More information

TN3270 AND TN5250 INTERNET STANDARDS

TN3270 AND TN5250 INTERNET STANDARDS 51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet

More information

FIBRE CHANNEL OVER ETHERNET

FIBRE CHANNEL OVER ETHERNET FIBRE CHANNEL OVER ETHERNET A Review of FCoE Today Abstract Fibre Channel over Ethernet (FcoE) is a storage networking option, based on industry standards. This white paper provides an overview of FCoE,

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

IP Network Emulation

IP Network Emulation Developing and Testing IP Products Under www.packetstorm.com 2017 PacketStorm Communications, Inc. PacketStorm is a trademark of PacketStorm Communications. Other brand and product names mentioned in this

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Simplify IP Telephony with System i. IBM System i IP Telephony

Simplify IP Telephony with System i. IBM System i IP Telephony Simplify IP Telephony with System i IBM System i IP Telephony Highlights Deploy a complete IP telephony suite on one easy-to-manage system, or even part of a system, shared with other applications Integrate

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Chapter 5 OSI Network Layer

Chapter 5 OSI Network Layer Chapter 5 OSI Network Layer The protocols of the OSI model Network layer specify addressing and processes that enable Transport layer data to be packaged and transported. The Network layer encapsulation

More information

UDP Traffic Management

UDP Traffic Management Packeteer Technical White Paper Series UDP Traffic Management May 2002 Packeteer, Inc. 10495 N. De Anza Blvd. Cupertino, CA 95014 408.873.4400 info@packeteer.com www.packeteer.com Company and product names

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

TCP/IP protocol suite

TCP/IP protocol suite TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP

More information

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers.

Networking 101. Introduction to Ethernet networking basics; Network types, components, configurations. Routers. Switches. Servers. Switches Routers PCs Networking 101 Introduction to Ethernet networking basics; Network types, components, configurations Servers Hubs Protocols Cat-5 UTP NICs Page 1 July 28, 2000 Network Types LAN Local

More information

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

Data Transport over IP Networks

Data Transport over IP Networks Data Transport over IP Networks Derek Konigsberg octo@logicprobe.org AITP University of Central Florida Data Transport over IP Networks p.1/24 Introduction The TCP/IP protocol suite was created by DARPA

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing 1 Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this

More information

Designing APPN Internetworks

Designing APPN Internetworks CHAPTER 6 Designing APPN Internetworks Advanced Peer-to-Peer Networking (APPN) is a second generation of the Systems Network Architecture (SNA) from IBM. It moves SNA from a hierarchical, mainframe-centric

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

Chapter -4 OSI Reference Model

Chapter -4 OSI Reference Model Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

NT1210 Introduction to Networking. Unit 10

NT1210 Introduction to Networking. Unit 10 NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Chapter 2 Network Architectures A global view

Chapter 2 Network Architectures A global view Chapter 2 Architectures A global view Professor Dongning uo Architecture Architecture, n. 2a: formation or construction as or as if as the result of conscious act, 2b: a unifying or coherent form or structure.

More information

Switched Network Latency Problems Solved

Switched Network Latency Problems Solved 1 Switched Network Latency Problems Solved A Lightfleet Whitepaper by the Lightfleet Technical Staff Overview The biggest limiter to network performance is the control plane the array of processors and

More information

Optimize and Accelerate Your Mission- Critical Applications across the WAN

Optimize and Accelerate Your Mission- Critical Applications across the WAN BIG IP WAN Optimization Module DATASHEET What s Inside: 1 Key Benefits 2 BIG-IP WAN Optimization Infrastructure 3 Data Optimization Across the WAN 4 TCP Optimization 4 Application Protocol Optimization

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 2: More layering and the end-to-end principle. Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 Today in

More information

Solutions in an SNA/IP (EE) Network

Solutions in an SNA/IP (EE) Network High Performance Switching and Routing Solutions in an SNA/IP (EE) Network Howard Johnson, Brocade Communications Dr. Steve Guendert, Brocade Communications 3 August 2010 (4:30pm 5:30pm) Room 102 1 Legal

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

Lecture (02) The TCP/IP Networking Model

Lecture (02) The TCP/IP Networking Model Agenda ١ Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP

More information

Network Management & Monitoring Network Delay

Network Management & Monitoring Network Delay Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Higher Performance Delivered at a Lower Cost A New Approach to WAN Optimization

Higher Performance Delivered at a Lower Cost A New Approach to WAN Optimization Higher Performance Delivered at a Lower Cost A New Approach to WAN Optimization Employing intelligent WAN optimization technology over virtually any broadband access technology, HughesNet offers the distributed

More information

The Corporate Intranet Gilbert Held

The Corporate Intranet Gilbert Held 51-10-52 The Corporate Intranet Gilbert Held Payoff The growth in the popularity of the Internet has significantly influenced software product development users today can access search tools and browsers

More information

Deploying Gigabit Ethernet to the Desktop: Drivers and Applications

Deploying Gigabit Ethernet to the Desktop: Drivers and Applications Deploying Gigabit Ethernet to the Desktop: Drivers and Applications The Federal Reserve estimates that the greater use of information technology accounts for 60 percent of the gains in the non-farm business

More information

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER

Enhanced IGRP. Chapter Goals. Enhanced IGRP Capabilities and Attributes CHAPTER 40 CHAPTER Chapter Goals Identify the four key technologies employed by (EIGRP). Understand the Diffusing Update Algorithm (DUAL), and describe how it improves the operational efficiency of EIGRP. Learn

More information

Technology Insight Series

Technology Insight Series Data-Center iscsi Building next generation storage networks Russ Fellows March 8, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved Data Center iscsi

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer CCNA Routing and Switching Introduction to Networks v6.0 Chapter 6 - Sections & Objectives 6.1 Network Layer Protocols Explain how network layer protocols and services support

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation

Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation . White Paper Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation Introduction As organizations increasingly rely on IT to help enable, and even change, their business

More information

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms

Internetworking Terms. Internet Structure. Internet Structure. Chapter 15&16 Internetworking. Internetwork Structure & Terms Chapter 15&16 Internetworking Internetwork Structure & Terms Internetworking Architecture Features Connection/Connectionless Architecture Fragmentation & Reassembly Internet Protocol & Services Addressing

More information

Lecture (02) The TCP/IP Networking Model

Lecture (02) The TCP/IP Networking Model Lecture (02) The TCP/IP Networking Model Dr. Ahmed M. ElShafee ١ Agenda Introduction to networking architecture Historical background The TCP/IP Protocol Architecture The TCP/IP Application Layer The TCP/IP

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

Federal Agencies and the Transition to IPv6

Federal Agencies and the Transition to IPv6 Federal Agencies and the Transition to IPv6 Introduction Because of the federal mandate to transition from IPv4 to IPv6, IT departments must include IPv6 as a core element of their current and future IT

More information

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI)

Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) Lecture (02, 03) Networking Model (TCP/IP) Networking Standard (OSI) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2014, Computer Networks II Agenda Introduction to networking architecture Historical

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

Mission Critical MPLS in Utilities

Mission Critical MPLS in Utilities Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This

More information

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far the most common of them. TCP/IP can be compared to the

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324

Data Encapsulation & OSI & TCP/IP Models Week 2. Lecturer: Lucy White Office : 324 Data Encapsulation & OSI & TCP/IP Models Week 2 Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Network Protocols A protocol is a formal description of a set of rules and conventions that govern a particular

More information

Chapter 1. Computer Networks and the Internet

Chapter 1. Computer Networks and the Internet Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Data Communications, Data Networks, and the Internet

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Optimizing and Managing File Storage in Windows Environments

Optimizing and Managing File Storage in Windows Environments Optimizing and Managing File Storage in Windows Environments A Powerful Solution Based on Microsoft DFS and Virtual File Manager September 2006 TR-3511 Abstract The Microsoft Distributed File System (DFS)

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

BROCADE 8000 SWITCH FREQUENTLY ASKED QUESTIONS

BROCADE 8000 SWITCH FREQUENTLY ASKED QUESTIONS FAQ BROCADE 8000 SWITCH FREQUENTLY ASKED QUESTIONS Overview Brocade provides the industry s leading family of Storage Area Network (SAN) and IP/Ethernet switches. These high-performance, highly reliable

More information

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008 Communicating Over the Network Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Drippy Sweet Pancakes

More information

ECE 4400:427/527 - Computer Networks Spring 2017

ECE 4400:427/527 - Computer Networks Spring 2017 ECE 4400:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

INTRODUCTORY COMPUTER

INTRODUCTORY COMPUTER INTRODUCTORY COMPUTER NETWORKS LAYERING Faramarz Hendessi Introductory Computer Networks Lecture 3 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi 2 Layering What is it? Building complex

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers Feature History Release 11.1CT 12.1(3)T 12.1(5)T 12.0(14)ST 12.0(21)ST 12.0(22)S Modification The document introduced MPLS and was titled Tag Switching

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

UNIT IV TRANSPORT LAYER

UNIT IV TRANSPORT LAYER Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Document ID: 18664 Contents Introduction Prerequisites Requirements Components Used Conventions

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Module 7: Configuring and Supporting TCP/IP

Module 7: Configuring and Supporting TCP/IP Module 7: Configuring and Supporting TCP/IP Contents Overview 1 Introduction to TCP/IP 2 Examining Classful IP Addressing 10 Defining Subnets 17 Using Classless Inter-Domain Routing 29 Configuring IP Addresses

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

HyperIP : SRDF Application Note

HyperIP : SRDF Application Note HyperIP : SRDF Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably enhances large data movement over big bandwidth and long-haul IP networks. HyperIP

More information