Cisco Next Generation Routing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
INTRODUCTION Client
1 INTRODUCTION Client Server Network Fig. 1-1. A network with two clients and one server. Client machine Server machine Request Network Reply Client process Server process Fig. 1-2. The client-server model involves requests and replies. Fig. 1-3. In a peer-to-peer system there are no fixed clients and servers. 2222222222222222222222222222222222222222222222222222222222222222222222222222222 21 222222222222222222222222222222222222222222222222222222222222222222222222222222Tag1 Full name1 Example 1 1 1 1 1 12222222222222222222222222222222222222222222222222222222222222222222222222222222B2C1 Business-to-consumer1 Ordering books on-line 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222B2B1 Business-to-business1 Car manufacturer ordering tires from supplier 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222G2C1 Government-to-consumer1 Government distributing tax forms electronically 1 1 1 1 1 12222222222222222222222222222222222222222222222222222222222222222222222222222222C2C1 Consumer-to-consumer1 Auctioning second-hand products on line 1 21 222222222222222222222222222222222222222222222222222222222222222222222222222222P2P1 Peer-to-peer1 File sharing 1 Fig. 1-4. Some forms of e-commerce. 22222222222222222222222222222222222222222222222222222222222222 222222222222222222222222222222222222222222222222222222222222221 Wireless1 Mobile1 Applications 1 1 1 1 1 122222222222222222222222222222222222222222222222222222222222222No1 No1 Desktop computers in offices 1 222222222222222222222222222222222222222222222222222222222222221 -
Network Reliability and Fault Tolerance
Network Reliability and Fault Tolerance Muriel Medard´ [email protected] Laboratory for Information and Decision Systems Room 35-212 Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139 Steven S. Lumetta [email protected] Coordinated Science Laboratory University of Illinois Urbana-Champaign 1308 W. Main Street, Urbana, IL 61801 1 Introduction The majority of communications applications, from cellular telephone conversations to credit card transactions, assume the availability of a reliable network. At this level, data are expected to tra- verse the network and to arrive intact at their destination. The physical systems that compose a network, on the other hand, are subjected to a wide range of problems, ranging from signal distor- tion to component failures. Similarly, the software that supports the high-level semantic interface 1 often contains unknown bugs and other latent reliability problems. Redundancy underlies all ap- proaches to fault tolerance. Definitive definitions for all concepts and terms related to reliability, and, more broadly, dependability, can be found in [AAC+92]. Designing any system to tolerate faults first requires the selection of a fault model, a set of possible failure scenarios along with an understanding of the frequency, duration, and impact of each scenario. A simple fault model merely lists the set of faults to be considered; inclusion in the set is decided based on a combination of expected frequency, impact on the system, and feasibility or cost of providing protection. Most reliable network designs address the failure of any single component, and some designs tolerate multiple failures. In contrast, few attempt to handle the adversarial conditions that might occur in a terrorist attack, and cataclysmic events are almost never addressed at any scale larger than a city. -
Router Configuration Guide R15.0.R1
ROUTER CONFIGURATION GUIDE RELEASE 15.0.R1 7450 ETHERNET SERVICE SWITCH 7750 SERVICE ROUTER 7950 EXTENSIBLE ROUTING SYSTEM ROUTER CONFIGURATION GUIDE RELEASE 15.0.R1 3HE 11976 AAAA TQZZA 01 Issue: 01 March 2017 Nokia — Proprietary and confidential. Use pursuant to applicable agreements. ROUTER CONFIGURATION GUIDE RELEASE 15.0.R1 Nokia is a registered trademark of Nokia Corporation. Other products and company names mentioned herein may be trademarks or tradenames of their respective owners. The information presented is subject to change without notice. No responsibility is assumed for inaccuracies contained herein. © 2017 Nokia. Contains proprietary/trade secret information which is the property of Nokia and must not be made available to, or copied or used by anyone outside Nokia without its written authorization. Not to be used or disclosed except in accordance with applicable agreements. 2 3HE 11976 AAAA TQZZA 01 Issue: 01 ROUTER CONFIGURATION GUIDE RELEASE 15.0.R1 Table of Contents 1 Getting Started..............................................................................11 1.1 About This Guide.......................................................................................11 1.2 In This Chapter..........................................................................................12 1.3 Router Configuration Process ...................................................................12 2 IP Router Configuration ..............................................................13 2.1 In This Chapter..........................................................................................13 -
The Role of Emerging Broadband Technologies on the Converged
The Role of Emerging Broadband Technologies on the Converged Packet-Based Network Introduction The vision of network convergence toward a consolidated packet-based network has been discussed for years, though it is still not a reality. Currently, there are numerous overlay networks such as IP, ATM, FR, Ethernet, SONET, DWDM and wireless for different services. The evolution pace toward convergence has been slow due to economic, technical and regulatory issues. However, the fact is that data traffic volume is now surpassing voice traffic volume. Traditional TDM voice traffic is moving to IP packets and TDM private line is moving to Ethernet private line. The wave of broadband applications such as Internet access, VOD, and IPTV create high bandwidth requirements for the network. These applications are packet-based, but have a much lower margin of profit for the service providers when compared to traditional voice service. Today’s overlay and traditional circuit-based infrastructure will become less optimal for the new packet-based services as the profit margin decreases. Most of the wireless networks in North America today are still circuit-based because most of the current wireless service is still voice-based. However, with emerging wireless access technologies such as WiMAX and Wi-Fi, more broadband wireless data and video services can be deployed. As a result, the wireless core network evolves toward a packet-based network. Service offerings drive network evolution. As more packet-based broadband services are launched and bundled together in service offerings, service providers start to add more packet-aware features into their current network components. -
Congestion Control in Resilient Packet Ring Networks
New Jersey Institute of Technology Digital Commons @ NJIT Dissertations Electronic Theses and Dissertations Fall 1-31-2005 Congestion control in resilient packet ring networks Alharbi Fahd New Jersey Institute of Technology Follow this and additional works at: https://digitalcommons.njit.edu/dissertations Part of the Electrical and Electronics Commons Recommended Citation Fahd, Alharbi, "Congestion control in resilient packet ring networks" (2005). Dissertations. 670. https://digitalcommons.njit.edu/dissertations/670 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at Digital Commons @ NJIT. It has been accepted for inclusion in Dissertations by an authorized administrator of Digital Commons @ NJIT. For more information, please contact [email protected]. Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of “fair use” that user may be liable for copyright infringement, This institution reserves the right to refuse to accept a copying order if, in its judgment, fulfillment -
New York University— 3D Resilience
Customer Profile New York University— 3D Resilience New York University (NYU) deploys a network core based upon a radical “tetrahedron” design with seven levels of resilience. The core is built with Cisco Catalyst® 6500 Series switches, which meet all design requirements. Background currently a member of Internet 2. It has a Founded in 1831, NYU is the largest network built end-to-end with Cisco private nonprofit university in the United products and technologies, developed over States and occupies six major centers in time beginning with Cisco AGS routers in Manhattan. The university’s founding the early 1990s. The 120 networked fathers planned NYU as a center of higher buildings of NYU house approximately learning that would be open to all, 1100 network devices, an assortment of regardless of national origin, religious Cisco Catalyst switches and Cisco routers. beliefs, or social background. Current Upgrades are scheduled to accommodate enrollment exceeds 51,000 students growth, support new features, or increase attending 14 schools and colleges in 135 performance. The NYU network supports buildings at 6 locations in Manhattan and about 27,000 active network nodes running in more than 20 countries. The curriculum IP, IPX, and AppleTalk on a variety of encompasses every major discipline, and server and desktop platforms. NYU provides leadership education and The core network installed in 1995 research in medicine, dentistry, business, consisted of Cisco routers with 100-Mbps science, fine arts, law, social work, and Fiber Distributed Data Interface (FDDI) education, among others. The faculty, links. Since its installation, this network has which in 1831 consisted of 14 professors never failed, which can be attributed to the (among them artist and inventor Samuel F. -
Getting Physical with Ethernet
ETHERNET GETTING PHYSICAL STANDARDS • The Importance of Standards • Standards are necessary in almost every business and public service entity. For example, before 1904, fire hose couplings in the United States were not standard, which meant a fire department in one community could not help in another community. The transmission of electric current was not standardized until the end of the nineteenth century, so customers had to choose between Thomas Edison’s direct current (DC) and George Westinghouse’s alternating current (AC). IEEE 802 STANDARD • IEEE 802 is a family of IEEE standards dealing with local area networks and metropolitan area networks. • More specifically, the IEEE 802 standards are restricted to networks carrying variable-size packets. By contrast, in cell relay networks data is transmitted in short, uniformly sized units called cells. Isochronous , where data is transmitted as a steady stream of octets, or groups of octets, at regular time intervals, are also out of the scope of this standard. The number 802 was simply the next free number IEEE could assign,[1] though “802” is sometimes associated with the date the first meeting was held — February 1980. • The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC). The most widely used standards are for the Ethernet family, Token Ring, Wireless LAN, Bridging and Virtual Bridged LANs. An individual working group provides the focus for each area. Name Description Note IEEE 802.1 Higher Layer LAN Protocols (Bridging) active IEEE 802.2 -
End to End IPTV Design and Implementation, How to Avoid Pitfalls Rajiv Chaudhuri Ericsson Consulting Agenda for the IP TV Design Tutorial
End to End IPTV Design and Implementation, How to avoid Pitfalls Rajiv Chaudhuri Ericsson Consulting Agenda for the IP TV Design Tutorial 1. IP TV Business Models and Challenges 2. Key IP TV Design Considerations 3. Delivering IP TV Services and Quality of Experience 4. Testing Considerations 5. Future Directions 6. Finally – Key Messages NETWORKS20008 2 1. IP TV Business Models and Business Case Challenges What is IP TV ? It is “TV anytime” with no strict dependency on the fixed program guide Can replace cable and satellite based video and TV broadcast services It is broadband TV, video on demand and interactive TV It offers triple play service bundling – voice, video and data on FTTP and ADSL 2+ and VDSL access Viewers would expect a predictable or better service quality, when comparing IP TV with Broadcast FTA, cable and Satellite TV services NETWORKS20008 4 Slide 4 What is TV? (Broadcast, Internet TV, IPTV) air DVB-S DVB-T DVB STB Broadcast TV HFC DVB-C DVB-H / HSPA Internet TV xDSL/FTTx Internet DVB-IP IPTV STB IPTV TV xDSL/FTTx IP Server NETWORKS20008 5 IPTV Scenarios Managed vs Unmanaged Live content Ingestion 1 Telcos (QoS) Telcos (QoS) 2 ManagedManaged NetworkNetwork 3 4 Internet Content InternetInternet UnmanagedUnmanaged NetworkNetwork 1. Professional content over managed network to PC client (Broadband TV) 2. Professional content over managed network to STB (IPTV) 3. Internet originating content to STB (Internet TV = Web TV) 4. Internet orientating content to PC (Internet TV = Web TV) NETWORKS20008 6 IP TV Scenario Analysis -
IEEE Plenary - Lajolla, CA RPRSG Meeting Minutes July 11-13 2000
IEEE Plenary - LaJolla, CA RPRSG Meeting Minutes July 11-13 2000 7/11/2000 8:43AM 30 attendees Presentations may be found at: http://www.ieee802.org/rprsg/public/july_plenary/index.html ACTION items in text Motion#1- The RPRSG voting rules amended to require: 1) 75% approval vote for technical issues 2) 50% +1 approval vote for procedural issues Motion: Harry Peng Second:Raj Sharma Yes:20 No:0 Minutes will be approved 8/12/2000 Presentation - Performance Metrics IEEE 802 RPRSG Khaled Amer Discussion - Ring Restoration performance metric will be added Ring performance stability with traffic flow changes Define Ingress/Egress access connection Bit Rate and Traffic characteristics Can Egress rate be below ring rate? Which mechanism? Simulation scenarios should be included ingress=egress traffic ports Change Bit rate to data rate in presentation Define L2/L1 mapping for consistency (mapping delay, etc.) Define L1 data rate - SONET vs. GigE Define L1 model ( packetization delay) metrics Sharing of model source code discussion Presentation - IPR(Intellectual Property Rights) issues Gary Robinson Presentation - Assessment of Scalable Coherent Interface Jason Fan Presentation - Resilient Packet Ring 5 Criteria (Compatibility) BJ Lee Discussion - Ethernet (SNAP encapsulation) and LLC over MAC sublayer correction Page 5- SRP TTL field 8 bits 802.1D compatibility (transparent bridging) and jumbo frame support Compatibility discussion tabled until PAR discussion Decision not to preclude 802.1D bridging Presentation - IEEE 802 Compatibility Considerations -
Nokia Digital Automation Cloud Broadband Everywhere July 2020
Nokia Digital Automation Cloud Broadband Everywhere July 2020 Frank Shelton 1 © 201 9 Nokia Nokia internal use The technology to keep everyone, everywhere connected has never been more important 2 © 2020 Nokia Public Nokia internal use Disciplined execution for successful integration and transformation Acquired Sold Acquired Acquired Motorola Solutions Devices Acquired Deepfield Unium & Services wireless networks Alcatel-Lucent Acquired Acquired Launched Networks Created Sold Acquired Comptel SpaceTime transformation plan Nokia HERE Gainspeed Created Insight Technologies Nokia Shanghai Acquired Bell Elenion Pulp, Paper, Rubber, Early Bell System products, Mobile phones 2012 2014 2016 2018 2020 3 © 2020 Nokia Public Nokia internal use Creating the technology to connect the world in a sustainable way Improving lives with our technology Integrity Climate Culture Excellent housekeeping practices Operational environmental management & circularity, responsible sourcing, health & safety, preventing the misuse of technology and labor practices in our operations 4 © 2020 Nokia Public Nokia internal use Integrity is the foundation of our business Nokia is a trusted and valued partner to many of the largest companies worldwide. We work tirelessly to earn and keep trust by adhering to the highest standards of ethics, integrity and compliance. *Recognized as one of 2020’s “World’s Most Ethical Companies” by Ethisphere, a global leader in defining and advancing the standards of ethical and responsible business practices. * ”World’s Most Ethical Companies” -
CPE 426 Computer Networks: Term 1-56 Homework 1 Wk 3 Solutions
ภาคเรียนที่ 1/2556 วิชา CPE426 Computer Networks: HW Wk3; Review 3+TCP/IP Concept 1 ชื่อ______________________________________รหัส_____________________Section________ CPE 426 Computer Networks: Term 1-56 Homework 1 Wk 3 Solutions Review III: LAN Technologies and Chapter 20: TCP/IP Concept ใหนกศั ึกษาแสดงคําตอบโดยเขียนลงในชองว างที่ใหไว สงตนชั่วโมงสัปดาหถัดไป 1. ใหนักศึกษาเขา Web Site ของ IEEE หรือ Search จาก IEEE802 Standard จากนั้นใหหาวามาตรฐาน IEEE802 ตอไปนี้เปน มาตรฐานของอะไร ตอไปนี้เปนขอมูลจาก http://en.wikipedia.org/wiki/IEEE_802 IEEE 802 Working Groups Name Description Note IEEE 802.1 Bridging (networking) and Network Management IEEE 802.2 LLC inactive IEEE 802.3 Ethernet IEEE 802.4 Token bus disbanded IEEE 802.5 Defines the MAC layer for a Token Ring inactive IEEE 802.6 MANs (DQDB) disbanded IEEE 802.7 Broadband LAN using Coaxial Cable disbanded IEEE 802.8 Fiber Optic TAG disbanded IEEE 802.9 Integrated Services LAN (ISLAN or isoEthernet) disbanded IEEE 802.10 Interoperable LAN Security disbanded IEEE 802.11 a/b/g/n Wireless LAN (WLAN) & Mesh (Wi-Fi certification) IEEE 802.12 100BaseVG disbanded IEEE 802.13 Unused[2] IEEE 802.14 Cable modems disbanded IEEE 802.15 Wireless PAN IEEE 802.15.1 Bluetooth certification IEEE 802.15.2 IEEE 802.15 and IEEE 802.11 coexistence IEEE 802.15.3 High-Rate wireless PAN Low-Rate wireless PAN (e.g., ZigBee, WirelessHART, IEEE 802.15.4 MiWi, etc.) IEEE 802.15.5 Mesh networking for WPAN IEEE 802.15.6 Body area network ภาควิชาวิศวกรรมคอมพิวเตอร วิทยาลัยวิศวกรรมศาสตร มหาวิทยาลัยรังสิต ภาคเรียนที่ 1/2556 -
Pocket Guideguide Industrial ETHERNET
Hirschmann Automation and Control GmbH PocketPocket GuideGuide Industrial ETHERNET Hirschmann Competence Center Edition 2006 Copyright © 2006 Hirschmann Automation and Control GmbH All Rights Reserved Permission is not given for the circulation or reproduction of this document, its use or the passing on of its contents unless granted expressly. Contravention renders the perpetrator liable for compensation for damages. All rights reserved, in particular in the case of patent grant or registration of a utility or design. The information/details in this publication merely contain general descriptions or performance factors which, when applied in an actual situation, do not always correspond with the described form, and may be amended by way of the further development of products. The desired performance factors shall only be deemed binding if these are expressly agreed on conclusion of the contract. In 1984 Hirschmann created the first fiber optic ETHERNET network at the University of Stuttgart. In 1990 Hirschmann also invented the ”Redundant ETHERNET Ring“ and finally in 1998 we brought out the HIPER-Ring (Hirsch- mann Performance Redundancy Ring) in switched ETHERNET. Hirschmann is the only manufacturer worldwide offer a universal product range for setting up high-performance, high-availablity industrial networks. From the networking of production lines via the control room using SCADA applications to the enterprise environment - vertical integration - everything from a single source. 1 Contents Contents Page 1 Know-How for the World of