DPRO Kimberly K. Hiller, Gerald Arcuri
|
|
- Baldwin Robertson
- 6 years ago
- Views:
Transcription
1 Kimberly K. Hiller, Gerald Arcuri Technology Overview 27 August 2003 Routers: Overview Summary Routers continue to evolve with better performance and a larger variety of WAN and LAN options, and security. Routers remain essential networking devices for small to large enterprise networks. Table of Contents Technology Basics Security Management Technology Analysis Business Use Standards Selection Guidelines Technology Leaders Insight List Of Tables Table 1: Common Routing Protocols Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 Technology Basics Routing is the function of transferring packets across a network from a source to a destination. The router is connected to at least two networks and determines the next point on the network to which a packet must progress to reach its ultimate destination. Typically a packet travels through a number of network points via routers before arriving at its destination. Routing Functions Routing performs primarily two basic activities: 1. Calculating the optimal paths through the network (path determination) and 2. Transporting the payload or packets along the route (packet switching). In order to accomplish these activities, the router creates and maintains a table of the available routes and their conditions, and uses this information in conjunction with other parameters (such as, distance, cost, latency and others) as part of a routing algorithm to determine the optimal path for a packet. Routing protocols (see the Common Routing Protocols table) are different than routed protocols. Routed protocols are routed over an internetwork and can include Internet Protocol (IP), DECnet, AppleTalk, Novell NetWare, Banyan Vines and Xerox Network System. Routing protocols implement the routing algorithms and are used by intermediate systems to create the routing tables to determine the path. Table 1: Common Routing Protocols Routing Protocols Interior Gateway Routing Protocol (IGRP) Enhanced Interior Gateway Routing Protocol (Enhanced IGRP) Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Exterior Gateway Protocol (EGP) Border Gateway Protocol (BGP) Intermediate System-to- Intermediate System (IS-IS) Description Cisco Systems proprietary routing algorithm. An Interior Gateway Protocol (IGP) that transfers packets from one network to another adjacent one. An internal router protocol used for informing network computers of changes in configuration. An IGP that transfers packets from one network to an adjacent one. The Transmission Control Protocol/Internet Protocol (TCP/IP) used by exterior routers to move data from one autonomous system to another. The interdomain routing protocol implemented in TCP/IP networks. A routing method among intermediate systems that requires the end systems, rather than the intermediate systems, to be responsible for providing error correction. It reduces complexity and overhead of routing protocols. 27 August
3 Table 1: Common Routing Protocols Routing Protocols Description Link State Protocol Any routing protocol derived from the Dijkstra algorithm, such as Shortest Path First (SPF), OSPF and IS-IS. Routers that use link state protocols update each other and learn network topology by periodically broadcasting link state data across the network. The data from each router includes only the cost and identification of those networks directly connected to that router. All routers on a network compile tables of routers and connections and can then calculate optimal paths from themselves to each link. Distance Vector Any routing protocol derived from the Bellman-Ford algorithm, such as DECnet or Protocol Routing Information Protocol (RIP). The routers using such protocols create a network map by communicating in a periodic and progressive sequence. Source: Gartner Glossary. Many routers offer application-based quality of service (QOS) and traffic-shaping controls without reducing performance, thus facilitating the evolution toward higher-bandwidth application demand. QOS technologies handle the timely delivery of specific applications data or resources to a particular destination. QOS guarantees bandwidth for key applications and users, and sometimes can have an added business benefit of putting off the need for faster network infrastructure. QOS polices can be broad enough to encompass all the applications in the network, or relate specifically to a single host-to-host application flow. Traffic shaping is a form of bandwidth management that incorporates QOS capabilities, such as buffering, congestion detection and avoidance, and rate limiting. Traffic shaping capabilities configured in a WAN edge enable enterprises to define a subset of the capacity of a network link or a private virtual circuit (PVC). This subset is the maximum amount of bandwidth that can be consumed by traffic of a certain type. Then, depending on the type of shaping being used, the enterprise network device either buffers or discards traffic that is exceeds the maximum allotted bandwidth. Security The explosion of the Internet and the dramatic growth in collaborative applications and e-based activities has forced enterprises to give security measures very serious attention. As a result, router vendors have responded and have incorporated a wide range of security functions into their routers, from small office/home office (SOHO) through high-end backbone routers. The integration of security measures is standard in nearly all router offerings today. In addition to the routing functions, the products can include integrated firewall, virtual private network (VPN) creation with encryption and even intrusion detection. All of this is offered in a centralized management environment. Many router-based firewalls are policy-managed and even include stateful inspection which provides one of the highest levels of security. Stateful inspection not only filters packets according to the data in the packet header, but also assesses the packet s payload and looks at the application protocol. After this evaluation it gives access decisions based on the source, destination and services requested by the packet. The term stateful inspection refers to the firewall s capability to remember the status of a connection and build a context for each data stream in its memory. Stateful inspection can detect more sophisticated hacker attacks, such as IP spoofing, in which the hacker attempts to send malicious packets through the router by making them appear to originate from within the local network. VPN capabilities include site-to-site and remote access VPNs, with the incorporation of tunneling protocols. Newer routers are capable of up to 5,000 and 10,000 VPN tunnels and high-speed throughput. 27 August
4 Some vendors have also introduced cards that accelerate VPN encryption for both Triple Data Encryption Standard (3DES) and advanced encryption standard (AES). Management As the number of networking devices and the variety of networking options continue to increase in the enterprise, network management becomes a more difficult and more critical component for network administrators. Some software vendors deliver an enterprise network management system that offers fault, configuration, accounting, security and performance management, while other vendors offer routerspecific management capabilities to improve the productivity and performance of network operations. Some router vendors have incorporated powerful management and configuration support tools in their products to ease the burden of providing secure, policy-managed solutions for the enterprise. Some fuller-featured network management tools can prioritize network traffic, optimize routing, and support voice and video application, among other functions. Some of these can support a variety of routed protocols, such as IP, Internetwork Packet Exchange (IPX), AppleTalk, DECnet, Systems Network Architecture (SNA) and other protocols, and can accommodate nearly any host or operating system environment. Technology Analysis Business Use Most of the business uses for routers evolve from technology enhancements, which ultimately result in increased benefits, cost reductions and efficiencies that derive from those enhancements. For example, router vendors are continually increasing performance, adding additional WAN and LAN options, and integrating security features. The purpose of these enhancements is to meet increasing business requirements, such as the evolution toward collaborative-based business processes and the use of applications requiring more bandwidth, such as video and voice traffic. Standards IPv6 Internet Protocol version 6 (IPv6) is the Internet Engineering Task Force s (IETF) next-generation Internet communications protocol, replacing IPv4. The IPv6 protocol fixes many IPv4-related problems, most notably the limited number of available IPv4 addresses. IPv6 will gradually replace IPv4, although the two will co-exist for several years during the transition. IPv6 has a 128-bit address space compared to IPv4 s 32-bit space, which will allow for a geometric increase in the number of possible addresses. This means a much higher number of users will be able to connect directly to the Internet and also that IP-based enterprise networks should scale more effectively. In addition to the dramatic increase in network addresses, IPv6 also adds enhancements in the areas of routing and network auto-configuration. IPv6 will enable host machines to automatically discover the information, such as the address of a local router, needed to connect to the Internet or a corporate IP backbone; this feature will reduce much of the manual configuration operations required for network administrators. Selection Guidelines Router Classification 27 August
5 Gartner classifies routers based on the size of the environment in which they operate SOHO, branch offices, midrange backbone routers and high-end enterprise backbone routers. Service provider routers are usually the largest routers, with high-capacity switching fabrics, a Network Equipment Building System (NEBS)-compliant chassis, granular QOS features, and multiservice options to support the largest number of customers, giving service providers greater revenue-generating capability. This report focuses exclusively on enterprise routers. SOHO SOHO routers provide small office environments or teleworkers with business class features for a variety of access solutions, WAN technologies, security and even management. SOHO routers support one of several access technologies, including ISDN (Integrated Services Digital Network), DSL (Digital Subscriber Loop) and Ethernet or Token Ring; some also accommodate xdsl over ISDN or over plain old telephone service (POTS). Higher-end SOHO routers can provide QOS features for data, voice and video applications. In addition, SOHO routers can also accommodate integrated analog phone ports, or serial ports for fractional T1 or frame relay connections. Today, more and more routers (even the smallest SOHO routers) offer security features with support for a stateful inspection firewall and IP Security (IPsec) and 3DES encryption for VPN applications. Branch Office Routers Branch office routers link remote LANs to corporate networks. They typically offer two or more WAN ports to support resilience, and provide WAN speeds over 1 Mbps. Although primarily fixed-function, they can have slots for WAN options. These WAN options can hold cards for 56 Kbps, T1 or xdsl; many also have 10/100-Mbps Ethernet ports with support for dial backup. Branch office routers also accommodate asynchronous transfer mode (ATM) protocols and functions for ATM service, multiple virtual channel connections and virtual channel multiplexing. Other branch routers incorporate a 10/100-Mbps switch to provide each connection with dedicated 10/100-Mbps bandwidth in order to increase throughput for bandwidth-sensitive applications; this contrasts with the incorporation of a hub where the bandwidth is shared by all stations. Branch office routers can also deliver a built-in PPP over Ethernet (PPPoE) feature, which reduces the support costs of installing PPPoE software to different computer platforms and enables the product to become plug-andplay. Midrange Backbone Routers Midrange Backbone Routers are modular routers that support flexible WAN combinations. Typically, midrange backbone routers offer a minimum of four WAN ports supporting speeds of 1 Mbps or greater, and at least one high-speed serial interface (HSSI) or OC-3/STM1 port. These devices also must provide at least one 100-Mbps or faster LAN port. However, many deliver more than this minimum with multiport 10/100 Ethernet network modules; LAN networking modules with support for Ethernet, Fast Ethernet or Gigabit Ethernet; serial connectivity, including support for HSSI, T1 and ISDN modules, or ATM network modules with speeds up to OC-3. Many midrange routers deliver high-performance processors to support performance and features that address the WAN, firewall and VPN needs of enterprise organizations, with capabilities to accommodate VPN connections to thousands of users; some also have an option for redundant power, giving them the capability to accommodate mission-critical applications. Routers with multiple network interface modules target regional offices having WAN aggregation requirements, with the capability of terminating multiple T3 or T1 connections. 27 August
6 High-End Routers Many high-end and midrange backbone routers integrate routing, VPN capabilities, firewalls and WAN ports in a single device. The high-end backbone routers are module and support a combination of flexible WAN ports; they typically offer a minimum of 32 ports with WAN speeds of 1 Mbps or greater and four or more OC-3/STM1 ports. Like the midrange backbone routers, these high-end routers must also offer multiple 100-Mbps or single/multiple 1000-Mbps LAN ports, plus fault-tolerant features, such as dual power supplies. Larger, high-end backbone routers support 10-Gigabit Ethernet and maintain wire-speed performance even with all services enabled. High-end routers target central-site VPN and WAN link aggregation, and support for QOS enables voice over IP (VoIP) and other priority-sensitive applications, such as video. Many of these routers use layer 2, 3 and 4 data to deliver application-based QOS functions and traffic-shaping controls, without loss of performance, because in most of these routers, application awareness is an inherent feature, as opposed to a software add-on. These routers can guarantee bandwidth on an application-by-application basis, and in order to support high-priority traffic, the QOS policies can be broad enough to encompass all the applications in the network, or relate specifically to a single host-to-host application flow. Technology Leaders Gartner Dataquest research shows the following companies as leaders in the enterprise router market: SOHO Routers: Cisco, D-Link, BinTec (Europe), ZyXEL, Yamaha. Vendors to watch in this space: Netgear. Branch Office Routers: Cisco, Fujitsu, Nortel, BinTec (Europe), Netopia. Vendors to watch in this space: Adtran, Allied, Enterasys, Huawei, NTT (Japan), Tasman. Midrange Routers: Cisco, Fujitsu, Nortel Networks, NEC, BinTec (Europe). Vendors to watch in this space: Enterasys. High-End Routers: Cisco, NEC, Nortel. Vendors to watch in this space: Enterasys. Insight Routers continue to evolve to keep pace with the increased business demand. The explosive growth of the Internet, the trend toward teleworking, the greater reliance on real-time collaborative applications, the increased use of voice/video over the Internet, and a growing mobile workforce have contributed to network congestion and a greater demand on routers to ease that congestion. As a result, router vendors have integrated a wealth of features to overcome the networking challenges and to improve performance. Enterprises should carefully evaluate their current and planned application requirements, and ensure that the chosen router product line can accommodate the potential increased demand that those applications will place on the network. 27 August
Chapter 7: Routing Dynamically. Routing & Switching
Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationExam: Title : Routing & Switching Exam (RSS) Ver :
Exam: 646-521 Title : Routing & Switching Exam (RSS) Ver : 01.02.04 Missing answer will be provided shortly. QUESTION 1 What does the Catalyst 6500 Network Analysis Module (NAM) do? (Choose two) A. Gives
More informationCHAPTER 4: ROUTING DYNAMIC. Routing & Switching
CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table
More informationTable of Contents. Cisco TCP/IP
Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing
More informationNortel Networks Optivity Policy Services
Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationCisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.
Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. 6 Networking Basics p. 14 Wireless LANs p. 22 Cisco Hardware
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationIT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview
IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate
More informationIP Routing. Bharat S. Chaudhari International Institute of Information Technology Pune, India
IP Routing Bharat S. Chaudhari International Institute of Information Technology Pune, India June 21, 2005 Network Devices: Ø The networking and internetworking devices are divided in the following categories:
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building
More informationOpen Shortest Path First (OSPF)
CHAPTER 42 Open Shortest Path First (OSPF) Background Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior gateway protocol (IGP) working
More informationWindows NT Server Operating System. Server. Unicast Routing Principles. White Paper. Abstract
Windows NT Server Operating System Server Unicast Routing Principles White Paper Abstract With Windows NT Server 4.0, the implementation and configuration of routing has become much easier. Windows NT
More informationCourse Routing Classification Properties Routing Protocols 1/39
Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More informationWAN Technologies CCNA 4
WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe
More informationGlobal IP Network System Large-Scale, Guaranteed, Carrier-Grade
Global Network System Large-Scale, Guaranteed, Carrier-Grade 192 Global Network System Large-Scale, Guaranteed, Carrier-Grade Takanori Miyamoto Shiro Tanabe Osamu Takada Shinobu Gohara OVERVIEW: traffic
More informationBTEC Level 3 Extended Diploma
BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward
More informationIP Protocols. ALTTC/Oct
IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationSOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary
SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been
More informationICS 351: Today's plan. OSPF BGP Routing in general
ICS 351: Today's plan OSPF BGP Routing in general link-state routing in distance-vector (Bellman-Ford, Ford-Fulkerson, RIP-style) routing, each router distributes its routing table to its neighbors an
More informationDeployment Scenarios
This chapter describes and shows some typical deployment scenarios for the Cisco 860, Cisco 880, and Cisco 890 series Intergrated Services Routers (ISRs): About the, page 1 Enterprise Small Branch, page
More informationSpending on Service Provider Routers Begins to Grow in EMEA
Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a
More informationHUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date
HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or
More informationCisco Group Encrypted Transport VPN
Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that
More informationMPLS VPN Carrier Supporting Carrier Using LDP and an IGP
MPLS VPN Carrier Supporting Carrier Using LDP and an IGP Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Carrier Supporting Carrier (CSC) enables one MPLS VPN-based service provider
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationCCNA Exploration Network Fundamentals
CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing
More informationMultiprotocol Label Switching (MPLS) on Cisco Routers
Multiprotocol Label Switching (MPLS) on Cisco Routers This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This
More informationMPLS VPN Carrier Supporting Carrier Using LDP and an IGP
MPLS VPN Carrier Supporting Carrier Using LDP and an IGP Last Updated: December 14, 2011 Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Carrier Supporting Carrier (CSC) enables one
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms
More informationMultiprotocol Label Switching (MPLS) on Cisco Routers
Multiprotocol Label Switching (MPLS) on Cisco Routers This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This
More informationRequest for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview
Network Working Group Request for Comments: 2340 Category: Informational B. Jamoussi D. Jamieson D. Williston S. Gabe Nortel (Northern Telecom) Ltd. May 1998 Status of this Memo Nortel s Virtual Network
More informationNETWORK ARCHITECTURE
GLOBAL MPLS NETWORK ARCHITECTURE The IP backbone is designed to service connectivity for IP and IP VPN services. The backbone network provides IP connectivity between Points of Presence (POPs). The design
More informationCisco 6 Routers. Andrew Hamilton John Mistichelli with Bryant G. Tow. San Francisco Paris Düsseldorf Soest London SYBEX
Cisco 6 Routers. Andrew Hamilton John Mistichelli with Bryant G. Tow O SYBEX San Francisco Paris Düsseldorf Soest London Introduction xviii Part 1 Up and Running 1 Chapter 1 A Brief Review of the OSI Model
More informationJuniper Networks M Series and J Series Routers
PRODUCT CATEGORY BROCHURE Juniper Networks M Series and J Series Routers Juniper Networks Enterprise Routers New Levels of Security, Availability, Predictable Performance, and Operations Agility for Today
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationICS 351: Today's plan. OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics
ICS 351: Today's plan OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics OSPF OSPF generally used within a single Autonomous System (AS), i.e. within an organization
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationMultiprotocol Label Switching Overview
This chapter describes the Multiprotocol Label Switching (MPLS) distribution protocol. MPLS is a high-performance packet forwarding technology that integrates the performance and traffic management capabilities
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More informationIntroduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony
Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationUnit 6 Routing and Layers 3 and 4 Protocols. Chapter 6: Layers 3 and 4 Protocols
Unit 6 Routing and Layers 3 and 4 Protocols Chapter 6 from each textbook Chapter 6: Layers 3 and 4 Protocols 2008 ITT Educational Services Inc. IT-320 Wan Technologies : Unit 6: Slide 1 Objectives 6: Describe
More informationvoice-enabling.book Page 72 Friday, August 23, :19 AM
voice-enabling.book Page 72 Friday, August 23, 2002 11:19 AM voice-enabling.book Page 73 Friday, August 23, 2002 11:19 AM C H A P T E R 4 Offering Bundled and Data Services Chapter 2, VoIP Network Architectures:
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationIntranets and Virtual Private Networks (VPNs)
Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationInternetworking. different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork
UNIT - II Internetworking An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. different kinds of network technologies
More informationIntroduction to Routing
1 Introduction to Routing Session 2 Presentation_ID.scr 1 Agenda Addressing Concepts Routing Protocols Statics and Defaults 3 ISO OSI Reference Model Routing Information Protocol (RIP and RIPv2) L7 L6
More informationJuniper Networks M-series and J-series Routers. M10i. Solution Brochure J4350. Internet. Regional Office/ Medium Central Site. Branch Office J2320
Branch Office Solution Brochure Juniper Networks Enterprise Routers New Levels of Security, Availability, Predictable Performance, and Operations Agility for Today s High-Performance Businesses Juniper
More informationScalability Considerations
CHAPTER 3 This chapter presents the steps to selecting products for a VPN solution, starting with sizing the headend, and then choosing products that can be deployed for headend devices. This chapter concludes
More informationCCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Access Control ALOHA FDMA, TDMA, CDMA OSI Model Internetworking
More informationRSVP Scalability Enhancements
This document describes the Cisco Resource Reservation Protocol (RSVP) scalability enhancements. It identifies the supported platforms, provides configuration examples, and lists related IOS command line
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationIP & DCN Planning for Microwave Networks
IP & DCN Planning for Microwave Networks 2016 IP & DCN Planning for Microwave Networks To equip trainees with in-depth understandings and practical knowledge of IP / MPLS & DCN Planning and its Implementation
More informationCisco 5921 Embedded Services Router
Data Sheet Cisco 5921 Embedded Services Router The Cisco 5921 Embedded Services Router (ESR) is a Cisco IOS software router. It is designed to operate on small, low-power, Linux-based platforms to extend
More informationOptimize Your Broadband WAN
Technology, G. Johnson Research Note 15 September 2003 Optimize Your Broadband WAN When migrating from narrowband to broadband WANs, be aware that TCP's limitations can severely affect network performance,
More informationChapter 7 Routing Protocols
Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals
More informationCOMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a
COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)
More informationChapter 10: Planning and Cabling Networks
Chapter 10: Planning and Cabling Networks Before using an IP phone, accessing instant messaging, or conducting any number of other interactions over a data network, we must connect end devices and intermediary
More informationCOM I. Keene, B. Hafner
I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationInformation About Routing
19 CHAPTER This chapter describes underlying concepts of how routing behaves within the adaptive security appliance, and the routing protocols that are supported. The chapter includes the following sections:,
More informationMultiprotocol Label Switching (MPLS) on Cisco Routers
Multiprotocol Label Switching (MPLS) on Cisco Routers Feature History Release 11.1CT 12.1(3)T 12.1(5)T 12.0(14)ST 12.0(21)ST 12.0(22)S Modification The document introduced MPLS and was titled Tag Switching
More informationWritten and provided by. Expert Reference Series of White Papers. TCP/IP Overview COURSES.
Written and provided by Expert Reference Series of White Papers TCP/IP Overview 1-800-COURSES www.globalknowledge.com Table of Contents TCP/IP Overview...1 Document ID: 13769...1 Introduction...1 TCP/IP
More informationROUTING PROTOCOLS. Mario Baldi Routing - 1. see page 2
ROUTING PROTOCOLS Mario Baldi www.baldi.info Routing - 1 Copyright Notice This set of transparencies, hereinafter referred to as slides, is protected by copyright laws and provisions of International Treaties.
More informationIT220 Network Standards & Protocols. Unit 9: Chapter 9 The Internet
IT220 Network Standards & Protocols Unit 9: Chapter 9 The Internet 3 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of
More informationNetworks Hardware Components
Lec. 5 Networks Hardware Components Dr. Eng. Samy Elmokadem Chapter 8 10/12/2017 1 internetworking devices used in backbone networks After studying this Chapter you should: Know which internetworking devices
More informationRouting Overview. Information About Routing CHAPTER
21 CHAPTER This chapter describes underlying concepts of how routing behaves within the ASA, and the routing protocols that are supported. This chapter includes the following sections: Information About
More informationON-LINE EXPERT SUPPORT THROUGH VPN ACCESS
ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of
More informationIP Routing & Bridging
CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If
More informationHow Did LANs Evolve to Multilayer Switching?
How Did LANs Evolve to Multilayer Switching? How Did LANs Evolve to Multilayer Switching? Summary In the past, internetworking devices could easily be categorized as either bridges, routers, switches,
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationFundamental Networking Topics
Fundamental Networking Topics www.globalipv6.com Overview Knowing the basics about networking can make learning more advanced topics easier. This white paper is written to aid in explaining the fundamental
More informationEnterasys K-Series. Benefits. Product Overview. There is nothing more important than our customers. DATASHEET. Operational Efficiency.
DATASHEET Enterasys K-Series Product Overview The Enterasys K-Series is the most cost-effective, flow-based switching solution in the industry. Providing exceptional levels of automation, visibility and
More informationCisco IOS Software p. 1 Benefits p. 2 Packaging p. 6 Features Supported p. 7 Cisco Router Hardware p. 23 Cisco Router Network Hierarchy p.
Foreword p. xxix Cisco IOS Software p. 1 Benefits p. 2 Packaging p. 6 Features Supported p. 7 Cisco Router Hardware p. 23 Cisco Router Network Hierarchy p. 24 Online Insertion and Removal (OIR) p. 28 Cisco
More informationCisco How Virtual Private Networks Work
Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More informationArchitecting the High Performance Storage Network
Architecting the High Performance Storage Network Jim Metzler Ashton, Metzler & Associates Table of Contents 1.0 Executive Summary...3 3.0 SAN Architectural Principals...5 4.0 The Current Best Practices
More informationPassReview. PassReview - IT Certification Exams Pass Review
PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationWhy dynamic route? (1)
Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update
More informationMPLS in the DCN. Introduction CHAPTER
CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information
More informationNetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationIntroduction to Quality of Service
Introduction to Quality of Service The use of IP as a foundation for converged networks has raised several issues for both enterprise IT departments and ISPs. IP and Ethernet are connectionless technologies
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO DATA COMMUNICATION NETWORKS Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.
More informationDESIGNING RELIABLE, HETEROGENEOUS WANS
5-04-47 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES DESIGNING RELIABLE, HETEROGENEOUS WANS Duane E. Sharp INTRODUCTION Over the past few years, several significant technological developments
More informationTable of Contents. Cisco Quality of Service Options on GRE Tunnel Interfaces
Table of Contents Quality of Service Options on GRE Tunnel Interfaces...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Overview of GRE...1 Cisco QoS for GRE
More informationImplementing Hub and Spoke topologies in Virtual Private Network using Enhanced Interior Gateway Routing Protocol
Implementing Hub and Spoke topologies in Virtual Private Network using Enhanced Interior Gateway Routing Protocol Sree Vidya T R 1, Vasanthadev Suryakala S 2, Swarnalatha M 3 ECE Department, Valliammai
More informationCisco Networking Academy Curriculum - Semester Three Scope and Sequence
Cisco Networking Academy Curriculum - Semester Three Scope and Sequence Course Description: This is the third course in four courses designed to introduce new content and extend previously learned networking
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More informationIntroductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36
Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network
More informationMission Critical MPLS in Utilities
Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This
More information