Link Aggregation Reference Model. By Paul A. Bottorff For March 1998 IEEE Meeting
|
|
- Isaac McKinney
- 5 years ago
- Views:
Transcription
1 Link Aggregation Reference Model By Paul A. Bottorff For March 1998 IEEE Meeting
2 Definition for Link Group The aggregation of a group of links is a trunk Each Link Aggregation Multiplexer instance along with all link segments and associated entities who s s are bound to the Link Aggregation Multiplexer instance are part of the same Link Segment Group. Link Segment Group or Link Group for short Once called a trunk group
3 Link Groups Group 1 Group 2 Group 3 MUXs B D E s Group 1: Active Link Group Group 2: Inactive Link Group Group 3: Active Link Group with Null Mux
4 4 Components of Link Aggregation Link Aggregation Collector (AC) Link Aggregation Distributor (AD) Link Aggregation Load Balancer (AB) Link Aggregation Controller (ACTRL) The combination of the Collector, Distributor, and Load Balancer is a Link Aggregation Multiplexer or MUX Link Aggregation Reference Model 2 September 17, 1997
5 Link Aggregation Reference Model OSI REFERENCE MODEL LAYERS APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL CTRL Recconcil. PCS PMA PMD LLC - LOGICAL LINK CONTROL AC - COLLECTOR LAN CSMA/CD LAYERS HIGHER LAYERS CTRL Recconcil. PCS PMA PMD AD - DISTRIBUTOR ACTRL - LINK AGGREGATION CONTROLLER CTRL Recconcil. PCS PMA PMD AB - LOAD BALANCER STANDARDIZED LINK AGGREGATION COMPONENTS
6 Collector Functions Provides a client interface for end-station, bridge, or router entities conforming to or 802.1d interface Binds with all s of the Link Group Merges frame from all s of the Link Group into a single receive stream Registers Multicast Addresses with the Controller Link Aggregation Reference Model 6 September 17, 1997
7 Distributor Functions Provides a client interface for end-station, bridge, or router entities conforming to or 802.1d interface Binds with all s of the Link Group Distribute frames from the client to the s Link Aggregation Reference Model 7 September 17, 1997
8 Controller Functions Initializes each Mux Initializes each Determines which s are active Assigns s to Link Groups Informs s what unicast address to use Informs each Mux of the s in its Link Group Link Aggregation Reference Model 8 September 17, 1997
9 Controller Functions Adds and removes s from Link Groups Responds to manual Link Groups controls Performs automatic Link Group protocols Provides status for the Link Group Maintains the list of multicast addresses for each Link Group Updates the multicast addresses for each of each Link Group Link Aggregation Reference Model 9 September 17, 1997
10 A Switch Design Example CLIENT CLIENT Controller Cm-a Collector Mux (AC) Distributor Mux (AD) Collector Mux (AC) Distributor Mux (AD) Cm-b LA Mgmt Interface ACTRL Link Aggregation D Layer C Cl-1 Cl-2 Cl-3 CTRL CTRL CTRL Recconcil. PCS PMA PMD Recconcil. PCS PMA PMD Recconcil. PCS PMA PMD Link Aggregation Reference Model 3 September 17, 1997
11 Simplified Reference Model LAN CSMA/CD LAYERS HIGHER LAYERS AC LLC ACTRL AD AC - Link Aggregation Collector AD - Link Aggregation Distributor ACTRL - Link Aggregation Controller - Media Access Control LLC - Logical Link Control
12 Switch Reference Model LLC HIGHER LAYER ENTITIES (Bridge Protocol Entity, Bridge Management, etc.) LLC AC AD AC AD Relay AC AD AC AD ACTRL ACTRL ACTRL End-Station Switch End-Station
13 The Standard Needs To Cover 4 Interfaces Aggregation Layer to Client Interface Identical to and interface or to Aggregation Layer Interface Already specified by and interface Aggregation Layer Management Interface MIB and service primitives need specification Aggregation Layer Peer Dialog Interface Frame based protocols for auto-configuration and error detection
14 Interfaces For Standardization 802.1d or CLIENT CLIENT Aggregation Layer Mgmt Interface Aggregation to Client AC ACTRL AD Peer Dialog Aggregation to Client AC ACTRL AD Mgmt Interface Aggregation to Aggregation to NODE 1 NODE 2
15 Recommedations Adopt the term Link Group to replace trunk group Adopt the Link Aggregation Reference Model Standardize Link Aggregation behavior at the 4 interfaces: Link Aggregation to Client to Link Aggregation Link Aggregation Layer Management Interface Link Aggregation Peer Dialog Interface
16 Addressing for Link Aggregation By Paul A. Bottorff For March 1998 IEEE Meeting
17 So What Are the Issues? End-Station and Router Aggregates must use a single logical address so higher layer protocols view the Aggregate as a single. Single address for IP ARP Single address for IPX network layers Single address for management and policy systems Bridges don t require a address for data transfer
18 End-Stations Use Single Address Link Group Logical Address MUX B No Address s All SA addresses use the Link Group address
19 Bridges Use An Address Per No Address Link Group Physical Address 1 MUX B Physical Address 2 Physical Address 3 s Bridge Uses Physical Addresses to source BPDUs etc.
20 General Case: Bridge/Router/Server Logical Address Link Group Physical Address 1 MUX B Physical Address 2 Physical Address 3 s s either pass SA from MUX or generate SA with Physical Address
21 Distinct Logical and Physical Addresses If MUX B is using Physical Address 3, then what happens when 3 is dropped from B and added to E Dual Homed End-Stations Also Have Problem MUX B E s
22 Unique Logical And Physical Addresses For End-Stations and Routers Each Mux must have a unique address Physical Addresses Do Not Need to Be Unique Physical Addresses Must Be Distinct From All Logical Addresses
23 A Solution Not Requiring a Physical Address A single unique IEEE address is associated with each LA Group 802 s which are not yet assigned to a LA Group all use the same well known address called the initialization address 802 s in initialization state should only transmit frames with DAs holding the 802.1d reserved addresses All frames received from a in initialization mode will be directed to the LA Control module
24 Recommendations Allow single address end-stations Allow bridges without logical addresses Allow all physical and logical addresses to be unique Allow combinations where all logical addresses are unique but physical addresses are not unique
25 Link Aggregation Protocols By Paul A. Bottorff For Future IEEE Meeting
26 Initialization Procedure Each MUX powers up in a reset state and with an assigned IEEE address Each powers up reset and with the init address Each Controller gets the IEEE address associated with each MUX Control determines the Link Group for each The Controller programs each with the Link Group unicast address The Controller informs MUXs to bind with s
27 Initialization Procedure Each MUX may receive frames in either promiscuous or specifically addressed mode Each MUX may transmit frames in either passthrough or normal mode The MUX may register or deregister multicast addresses for the Link Group
Networks: Access Management
Networks: Access Management Class Notes # 3 Protocols and Layers (part 1) September 19, 2003 Functions A small set of functions form the basis of all protocols. Not all protocols have all functions; this
More informationLecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.
Lecture 7: Ethernet Hardware Addressing and Frame Format Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks MAC Addresses The shared medium in a LAN
More informationIEEE Bridge Model
IEEE 802.1 Bridge Model Glenn Parsons John Messenger Presentation supporting TD6/WP3 Figures based on L2CP layering - MEF42033 by Steve Haddock WD07r1 Q13/15 Paris January 2013 1 802 Reference Model ISO/IEC
More informationVLAN - SP6510P8 2013/4. Copyright 2011 Micronet Communications, INC
VLAN - SP6510P8 2013/4 www.micronet.info Copyright 2011 Micronet Communications, INC Agenda VLAN Protocol VLAN Voice VLAN www.micronet.info 2 Micronet Communications Inc. Benefit Bandwidth Preservation
More informationComputer Networks Principles LAN - Ethernet
Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2
More informationก ก Information Technology II
ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access
More informationInternetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1
Internetworking Concepts Overview 2000, Cisco Systems, Inc. 2-1 2000, Cisco Systems, Inc. www.cisco.com ICND v1.0a 2-2 Objectives On completion of this chapter, you will be able to perform the following
More informationTransparent Bridging and VLAN
Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.
More informationAccess Rules. Controlling Network Access
This chapter describes how to control network access through or to the ASA using access rules. You use access rules to control network access in both routed and transparent firewall modes. In transparent
More informationRaj Jain. The Ohio State University Columbus, OH
Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting
More informationSecondary Address Support
Secondary Address Support Peter Jones July 21, 2003 7/21/2003 3:19 PM pj_sec_addr_02.ppt 1 Secondary Addresses Allows for more efficient support of protocols like RFC 2338 Virtual Router Redundancy Protocol.
More informationSummary of Proposed Responses to CSD
Summary of Proposed Responses to CSD IEEE 802.3 400 Gb/s Ethernet Study Group John D Ambrosia, Dell Indian Wells, CA, USA IEEE 802.3 Jan 2014 Interim Page 1 Introduction This presentation summarizes all
More informationInternetwork Basic. Possible causes of LAN traffic congestion are
Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible
More informationJuniper.Selftestengine.jn0-694.v by.KIM-HL.52q
Juniper.Selftestengine.jn0-694.v2013-10-24.by.KIM-HL.52q Number: jn0-694 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: JN0-694 Exam Name: Enterprise Routing
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get
More informationConfiguring your VLAN. Presented by Gregory Laffoon
Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is
More informationResilient Packet Ring 5 Criteria (2. Compatibility)
Resilient Packet Ring 5 Criteria (2. Compatibility) - 802. Overview and Architecture - 802.1D, 802.1Q, 802.1f - Systems management standards Byoung-Joon (BJ) Lee IEEE 802 RPRSG, July 10-14, 2000 2000,
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationConfiguring Private VLANs
Finding Feature Information, on page 1 Prerequisites for Private VLANs, on page 1 Restrictions for Private VLANs, on page 1 Information About Private VLANs, on page 2 How to Configure Private VLANs, on
More informationIntroduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...
Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More information802.1Q Forwarding PTP messages in an IEEE Transparent Clock Considerations in response to liaison from Q13/15
802.1Q Forwarding PTP messages in an IEEE Transparent Clock Considerations in response to liaison from Q13/15 John Messenger, Anthony Magee, Nir Laufer, November 2012 v03 Background ITU-T Q13/15 is developing
More informationLAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks
LAN Interconnection different interconnecting devices, many approaches 1 Need for ability to expand beyond single LAN; appears concept of Extended LAN, extending the number of attached stations and maximum
More informationProduct features. Applications
Applications Layer 2+ VLAN static routing application The managed switch features a built-in, robust IPv4/IPv6 Layer 3 traffic static routing protocol to ensure reliable routing between VLANs and network
More informationUser Guide TL-R470T+/TL-R480T REV9.0.2
User Guide TL-R470T+/TL-R480T+ 1910012468 REV9.0.2 September 2018 CONTENTS About This Guide Intended Readers... 1 Conventions... 1 More Information... 1 Accessing the Router Overview... 3 Web Interface
More informationConfiguring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts
Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling
More informationReview of the 5 Criteria
Review of the 5 Criteria Howard Frazier Broadcom Corporation September, 2006 IEEE 802.3 HSSG 1 Outline Audience Purpose 5 Criteria Guidelines for responses Summary Successful examples IEEE 802.3 HSSG 2
More informationET4254 Communications and Networking 1
Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of
More informationConfiguring Private VLANs
CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco
More informationConfiguring EIGRP. 2001, Cisco Systems, Inc.
Configuring EIGRP 4-1 EIGRP Overview 4-2 What Is EIGRP? IPX Routing Protocols IP Routing Protocols AppleTalk Routing Protocol Enhanced IGRP IP Routing Protocols AppleTalk Routing Protocol IPX Routing Protocols
More informationEncapsulation Bridging and
Encapsulation Bridging and 802.17 Robert Castellano, Jedai Broadband Networks 9/10/2001 rc_ebridge_02.pdf 802-17-02-00051 Outline 802.17 Bridging 802.17 Compatibility Requirements 802.1D Bridging Architecture
More informationNetwork Working Group Request for Comments: 1434 IBM March Data Link Switching: Switch-to-Switch Protocol
Network Working Group Request for Comments: 1434 R. Dixon D. Kushi IBM March 1993 Status of this Memo Data Link Switching: Switch-to-Switch Protocol This memo provides information for the Internet community.
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationLLC and Bridges. Raj Jain. Professor of CIS. The Ohio State University
LLC and Bridges Professor of CIS Columbus, OH 43210 Jain@ACM.Org This presentation is available on-line at: http://www.cis.ohio-state.edu/~jain/cis677-00/ 7-1 Overview Logical Link Control Bridges Path
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationLOCAL AREA NETWORKS Q&A Topic 4: VLAN
A. Indicate whether the sentence or statement is true or false: 1. VLANs are more flexible in handling moves and additions of ports than routers 2. VLANs logically segment the physical LAN infrastructure
More informationConnecting to the Network
Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.
More informationSupported Standards. Class of Service Tagging for Ethernet frames. Multiple Spanning Tree Protocol. Rapid Spanning Tree Protocol
, page 1 This table lists the IEEE compliance standards. Table 1: IEEE Compliance s 802.1D MAC Bridges 802.1p Class of Service Tagging for Ethernet frames 802.1Q VLAN Tagging 802.1s Multiple Spanning Tree
More informationIEEE 802.1Q YANG Bridge Port Interface Model in Support of 802.1AX, 802.1X, etc. Marc Holness Version Sept 2016
IEEE 802.1Q YANG Port Interface Model in Support of 802.1AX, 802.1X, etc. Marc Holness Version 0.1 12 Sept 2016 IEEE 802.1Q Port Each Port is associated with one Interface, and in most situations, each
More informationCAN in Automation (CiA) International Users and Manufacturers Group e.v.
CAN in Automation (CiA) International Users and Manufacturers Group e.v. CAN Application Layer for Industrial Applications CiA/DS201 February 1996 February 1996 1. SCOPE This document contains a description
More informationRouting Between VLANs Overview
Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.
More informationGuideTorrent. The best excellent exam certification guide torrent and dumps torrent provider
GuideTorrent http://www.guidetorrent.com The best excellent exam certification guide torrent and dumps torrent provider Exam : JN0-343 Title : Juniper Networks Certified Internet Specialist (JNCIS-ENT)
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information
More informationCisco CISCO Data Center Networking Infrastructure Design Specialist. Practice Test. Version
Cisco 642-971 CISCO 642-971 Data Center Networking Infrastructure Design Specialist Practice Test Version 1.1 QUESTION NO: 1 Cisco 642-971: Practice Exam Which service module configuration is recommended
More informationMonitoring Ethernet Operations, Administration, and Maintenance Tool Properties
CHAPTER 16 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Ethernet
More informationFor information about configuring these settings from Cluster Management Suite (CMS), refer to the online help.
Configuring VLANs This chapter provides information about configuring virtual LANs (VLANs). It includes command-line interface (CLI) procedures for using commands that have been specifically created or
More informationIndustrial 48G+4x10G SFP+ Ports Gigabit Layer 3 Routing Server
INDUSTRIAL ETHERNET RACKMOUNT SWITCH Industrial 48G+4x10G SFP+ Ports Gigabit Layer 3 Routing Server JetNet 7852G-4XG The JetNet 7852G-4XG is a 19-inch Gigabit Layer 3 Routing Server, equipped with 48 10/100/1000
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN
More informationSYSTEMS ADMINISTRATION USING CISCO (315)
Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure
More informationQuickSpecs. HP enterprise access point WL520. Overview
Overview 1. Power Out 8. Ethernet LAN Activity LED 2. Power Supply 9. Power LED 3. Power Input 10. Wireless Interface Cardbus Slot B 4. Processor Module 11. Wireless Interface Cardbus Slot A 5. Cover 12.
More informationIndex. Numerics. Index 1
Index Numerics 802.1p priority (QoS) definition 8-6 802.1q VLAN in mesh 7-23 802.1Q VLAN standard 6-6 802.1w as a region 6-54 802.1x, mesh, not supported 7-5 A ABC enabled on edge switch 7-26 in mesh domain
More informationDGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window
9. Security DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Port Security 802.1X AAA RADIUS TACACS IMPB DHCP Server Screening ARP Spoofing Prevention MAC Authentication Web-based
More informationRouting Between VLANs Overview
Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.
More informationVLAN Configuration. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership
More information24-Port 10/100 L3 Switch Model: Web Configuration Guide
24-Port 10/100 L3 Switch Model: 065-7434 Web Configuration Guide Table of Contents PREPARATIONS... 6 OVERVIEW... 6 Login... 6 PRODUCT INFORMATION... 9 OVERVIEW... 9 FEATURES... 9 SYSTEM VERSION INFORMATION...10
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address
ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted
More informationOmniRAN Network Reference Model with Backhaul
OmniRAN Network Reference Model with Backhaul Date: 2014-07-15 Author: Name Affiliation Phone Email Roger Marks EthAirNet Associates; ETRI +1 802 capable roger@ethair.net Notice: This document does not
More informationConfiguring VLAN CHAPTER
CHAPTER 10 LMS collects data about devices so that you can configure and manage Virtual Local Area Network (VLAN) in your network. You must set up your LMS server properly to ensure that Data Collection
More informationJetNet 5428Gv2. Features. Industrial 24FE+4G Gigabit Managed Ethernet Switch INDUSTRIAL ETHERNET RACKMOUNT SWITCH
INDUSTRIAL ETHERNET RACKMOUNT SWITCH Industrial 24FE+4G Gigabit Managed Ethernet Switch JetNet 5428Gv2 The JetNet 5428G is a 19-inch Gigabit Layer 2+ Industrial switch, equipped with 24 100 Base-TX ports
More informationH
H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the
More informationNetwork Configuration Example
Network Configuration Example Configuring Multichassis Link Aggregation on a QFX Series Switch Release NCE 64 Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089
More informationJetNet 6528Gf. Features. Industrial 28G Full Gigabit Managed Ethernet Switch INDUSTRIAL ETHERNET RACKMOUNT SWITCH
INDUSTRIAL ETHERNET RACKMOUNT SWITCH Industrial 28G Full Gigabit Managed Ethernet Switch JetNet 6528Gf The JetNet 6528Gf series is a 19-inch Full Gigabit Layer 2+ Industrial switch and is specially designed
More informationCCNA Practice test. 2. Which protocol can cause high CPU usage? A. NTP B. WCCP C. Telnet D. SNMP Answer: D
1. Which network would support at least 30 hosts? A. 10.0.0.0 255.255.255.252 B. 10.0.0.0 255.255.255.240 C. 10.0.0.0 255.255.255.224 D. 10.0.0.0 255.255.255.248 2. Which protocol can cause high CPU usage?
More informationLAN Emulation, IP Over ATM and MPOA
LAN Emulation, IP Over ATM and MPOA Professor of Computer and Information Sciences Columbus, OH 43210 These slides are available at http://www.cis.ohio-state.edu/~jain/cis777-00/ 1 Overview LAN Emulation
More informationImproving Bandwidth Efficiency When Bridging on RPR. November 2001
Improving Bandwidth Efficiency When Bridging on RPR November 2001, Nortel Networks Anoop Ghanwani, Lantern Communications Raj Sharma, Luminous Robin Olsson, Vitesse CP Fu, NEC 11/1/01 Page 1 Components
More informationEdge Control Transport for LRP
Edge Control Transport for LRP September 2017 Paul Bottorff, Network System Architect, Aruba CTO s Office Paul.Bottorff@hpe.com Link-local Registration Protocol Choices Draft 1.0 is based on an IS-IS-like
More informationJetNet 6528Gf. Features. Industrial 28G Full Gigabit Managed Ethernet Switch INDUSTRIAL ETHERNET RACKMOUNT SWITCH
INDUSTRIAL ETHERNET RACKMOUNT SWITCH Industrial 28G Full Gigabit Managed Ethernet Switch JetNet 6528Gf The JetNet 6528Gf series is a 19-inch Full Gigabit Layer 2+ Industrial switch and is specially designed
More informationBridging and Switching. Karst Koymans. Monday, February 17, 2014
.. Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 3.7, 2014/02/19 19:50:51) Monday, February 17, 2014 Karst Koymans (UvA) Layer 2 Monday, February 17,
More informationArchitectures of Communication Subsystems
Architectures of Communication Subsystems Open System Interconnection Reference Model Computer Networks Lecture 2 http://goo.gl/pze5o8 Connection-Oriented versus Connectionless Communication 2 Connection-Oriented
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationDistributed Real-Time Control Systems. Module 26 Sockets
Distributed Real-Time Control Systems Module 26 Sockets 1 Network Programming with Sockets Sockets are probably the most widely used objects in programming networked communications. What is a socket? To
More informationFeatures. Industrial 28G L3 Full Gigabit Managed Ethernet Switch JetNet 6828Gf INDUSTRIAL ETHERNET RACKMOUNT SWITCH
INDUSTRIAL ETHERNET RACKMOUNT SWITCH Industrial 28G L3 Full Gigabit Managed Ethernet Switch JetNet 6828Gf The JetNet 6828Gf series is a 19-inch Full Gigabit Layer 3 Industrial switch and is specially designed
More informationComputer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand
Jan May 2018 Computer Networks รศ.ดร.อน นต ผลเพ ม Assoc. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 2 Wenbing Zhao wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Misc. Interested in research? Secure
More informationSecurity Management System Central Monitoring Station with Push Mode Connectivity
Security Management System Central Monitoring Station with Push Mode Connectivity Introduction Security Management System supports distributed deployment architecture, which involves (a) Central Monitoring
More informationConfiguring MPLS L2VPN
Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 About MPLS L2VPN 1 Comparison with traditional VPN 2 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration
More informationRequest for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview
Network Working Group Request for Comments: 2340 Category: Informational B. Jamoussi D. Jamieson D. Williston S. Gabe Nortel (Northern Telecom) Ltd. May 1998 Status of this Memo Nortel s Virtual Network
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationConfiguring MPLS L2VPN
Contents Configuring MPLS L2VPN 1 Overview 1 Comparison with traditional VPN 1 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration task list 4 Configuring
More information7010INT Data Communications Lecture 7 The Network Layer
Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical
More informationEncapsulated Bridging Support of November 2001
Encapsulated Bridging Support of 802.17 November 2001, Nortel Networks Anoop Ghanwani, Lantern Communications Raj Sharma, Luminous Robin Olsson, Vitesse CP Fu, NEC 11/2/01 Page 1 Components of a Complete
More informationTable of Contents. Layer 2. Refinement. Layer 3 view. Refinement. Devices and sublayers. Bridging and Switching
Table of Contents Layer 2 ridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 43, 2015/02/14 12:39:33) Monday, February 16, 2015 Refinement Devices and sublayers
More informationNetwork Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals
More informationPath MTU Discovery in Bridged Network
www.huawei.com Path MTU Discovery in Bridged Network Authors: Hesham ElBakoury Version: 1.0 HUAWEI TECHNOLOGIES CO., LTD. GOAL Discuss different ideas to discover the Path MTU in Bridged Ethernet Network
More informationConfiguring Virtual Private LAN Services
Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS
More informationLayer 2. Bridging and Switching. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.4, 2017/02/15 12:07:08)
Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 16.4, 2017/02/15 12:07:08) Friday, February 17, 2017 Karst Koymans (UvA) Layer 2 Friday, February 17,
More informationChapter 5 Reading Organizer After completion of this chapter, you should be able to:
Chapter 5 Reading Organizer After completion of this chapter, you should be able to: Describe the operation of the Ethernet sublayers. Identify the major fields of the Ethernet frame. Describe the purpose
More informationData and Computer Communications. Protocols and Architecture
Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or
More informationOperation Manual MPLS VLL. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 MPLS VLL Overview... 1-2 1.1.1 Concepts in MPLS VLL... 1-2 1.1.2 Introduction to MPLS VLL... 1-2 1.1.3 Packet Forwarding... 1-3 1.1.4 Implementation... 1-4
More informationOSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK
OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards
More informationSYSTEMS ADMINISTRATION USING CISCO (315)
Page 1 of 10 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1.
More informationTable of Contents. Layer 2. Refinement. Layer 3 view. Refinement. Devices and sublayers. Bridging and Switching
Table of Contents Layer 2 Bridging and Switching Karst Koymans Informatics Institute University of Amsterdam (version 17.6, 2017/11/16 09:52:16) Friday, ovember 10, 2017 Refinement Devices and sublayers
More informationCisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide
Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide Introduction This is the first of a series of documents on the design and implementation of a wireless
More informationSwitched Multimegabit Data Service (SMDS)
CHAPTER 14 Switched Multimegabit Data Service (SMDS) Background Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication
More informationIEEE P802.1AX-REV /D4.54. Link Aggregation Sponsor. Draft Standard for Local and Metropolitan Area Networks IEEE P802.1AX-REV /D4.54.
0 0 0 0 IEEE P0.AX-REV /D. Draft Standard for Local and Metropolitan Area Networks Link Aggregation Sponsor LAN MAN Standards Committee of the IEEE Computer Society Prepared by the Interworking Task Group
More informationConfiguration Guide TL-ER5120/TL-ER6020/TL-ER REV3.0.0
Configuration Guide TL-ER5120/TL-ER6020/TL-ER6120 1910012186 REV3.0.0 June 2017 CONTENTS About This Guide Intended Readers... 1 Conventions... 1 More Information... 1 Viewing Status Information... 2 System
More informationPacket Switching on L2 (LAN Level)
Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol
More information