Securely Scale and Allocate Optimum Bandwidth for Your Multi-Tenant Cloud Network with Lenovo and Emulex

Total Page:16

File Type:pdf, Size:1020Kb

Securely Scale and Allocate Optimum Bandwidth for Your Multi-Tenant Cloud Network with Lenovo and Emulex SOLUTIONS BRIEF Securely scale and allocate optimum bandwidth for your multi-tenant cloud network with Lenovo and Emulex Private VLAN Technology The Business Challenge – Scaling multi-tenant deployments n Defined by IETF RFC 5517 with Layer 2 isolation n Supported by Lenovo switches Managed Service Providers (MSP), Cloud Service Providers (CSP) and n Conforms to the 802.1Q standard larger enterprises deploying a multi-tenant cloud infrastructure require Private VLAN Solution Benefits virtual LAN (VLAN) provisioning at scale. This ensures network privacy and security for virtual machines (VMs) of individual tenants or business units. n Scalable multi-tenant isolation and security by breaking the 4,094 VLAN ID barrier However, the limit of 4,094 available VLAN IDs restricts scalability, especially since an individual tenant may require multiple VLAN IDs. n Minimizes potential waste of IP addresses n Enables secure public, hybrid or private clouds Additionally, to enable IP routing, each VLAN is assigned a subnet address space or a block of addresses, potentially resulting in inefficient IP Lenovo & Emulex Advantages addressing. Assigning a block of addresses to a customer VLAN can result n Maximum flexibility from Lenovo switches’ ability to enable the in unused IP addresses. As the number of devices in a VLAN increases, the isolation and sharing of PVLAN traffic across multiple switches quantity of assigned address might be inadequate. Standard Private VLAN n Optimum 10GbE bandwidth allocation between VM, storage or (PVLAN) and Unified Fabric Port (UFP) technologies offer capabilities that backup and virtualization services (vMotion/management) from aid with security and network scaling. Lenovo 10GbE VFA adapter provided by Emulex with Unified Fabric Overview of Private VLAN and Universal Fabric Port (UFP) Technology Port (UFP) technology Private VLAN partitions a single (primary) VLAN broadcast domain into n Superior workload performance with dynamic allocation of unused or underutilized allocated bandwidth with UFP technology multiple (secondary) VLAN sub-domains while keeping existing IP subnet and Layer 3 configurations. There are three different types of standard Lenovo & Emulex Supported Products networking port designations associated with a PVLAN implementation. n Lenovo Flex System Fabric switches (EN4093R, CN4093) When used in a cloud deployment, these port designations regulate how n Lenovo Flex System compute nodes (x240, x240 M5, x280/480/880 the VMs and end devices communicate on their secondary isolated or X6) community VLANs. n Lenovo 10GbE Virtual Fabric Adapter (VFA) provided by Emulex n Promiscuous ports belong to the primary VLAN and can communicate (CN4058S, CN4054R, CN4052) with any isolated or community port n Community ports belong to a community VLAN and can communicate with any other community port in that particular community VLAN or Promiscuous with a promiscuous port Ports n Isolated ports belong to an isolated VLAN and cannot communicate with either other isolated ports or community ports. It only communicates with a promiscuous port Host Host Host Host X E F A B X Isolated VLAN 101 Community VLAN 103 X X Host Host C D Community VLAN 102 Core Router Promiscuous Port = Primary VLAN1 vMotion P – Promiscuous Port Backup Layer 2/3 Switch Mgmt. VM I/O Lenovo EN4093R/CN4093 vPort1.1 vPort1.4 vPort2.1 vPort2.4 Emulex VFA5 10GbE Adapter PVLAN1 Trunk Community UFP1 UFP2 UFP3 UFP4 VLANc UFP1 UFP2 UFP3 UFP4 i c – Community VLAN i i – Isolated VLAN i c Distributed vSwitch c i Lenovo Flex Lenovo Flex The Lenovo UFP technology is a cost effective way to allocate, share Using this approach provides complete traffic isolation all the way and dynamically control network throughput. UFP creates a virtual down to the VM. This is a very important feature for MSPs and their interface called a vPort that appears as a physical interface to the tenants who are concerned with security. By supporting UFP with host and can intelligently adjust bandwidth allocations dynamically PVLAN trunk port technology, Lenovo and Emulex solve some of the key as traffic needs change. Instead of dropping packets when an security and bandwidth management issues associated with deploying allocated bandwidth limitation is reached, UFP reshapes the traffic large cloud networks. for lossless throughput. Use Cases This helps maximize the benefits of costly 10Gb per second (and higher) There are two different use cases that are ideal for deploying PVLAN trunk physical Ethernet network adapters by allowing multiple virtual ports and UFP technology in MSP or private and hybrid cloud deployments: connections to meet data center requirements. In this configuration, n High VM density – This use case is ideal for MSPs supporting tenants, UFP-compliant Emulex adapters and Lenovo Ethernet switches can who are hosting virtual desktop infrastructures where high volumes carve a single 10Gb Ethernet (10GbE) port into four vPorts for VM of VMs are deployed per host. In these types of deployments applications, where each vPort may be independently configured with thousands, or possibly, tens of thousands of VMs are deployed in a a different minimum and maximum bandwidth allocation. single data center. This solution is ideal because it affords the VLAN The Solution – Extend PVLANs into the hypervisor layer with UFP and IP address scaling required by these architectures. bandwidth control n Reserving host assets – This use case is ideal for large enterprise Lenovo and Emulex, an Avago Technologies Company, address the and even MSPs where a few tenants (e.g. e-mail, Web, FTP or VoIP challenge of scaling up large multi-tenant deployments by delivering application in a DMZ) are deployed across a single host based on an optimum solution, which combines UFP technologies and PVLAN an integer count of a specific host asset such as CPU core count, so trunk ports to the switches facing the host servers. PVLAN trunk the hypervisor may associate that entire asset with a specific VM. ports allow private VLANs to be extended all the way down to the For instance, a 2 socket host with the latest Intel Xeon E7-2800 distributed vSwitch. With this capability, an MSP can place a large v2 processor consisting of 15 cores per CPU might be limited to a number of VMs in secondary VLAN sub-domains (isolated & maximum of 30 VMs, where every VM is associated with a core. community), which may extend across multiple hosts but still consume only a few VLAN IDs. For example, all the VMs may be Conclusions placed into an isolated VLAN, consuming just a single VLAN ID. This Deploying large cloud architectures requires provisioning secure enables the solution to easily scale beyond 10,000 VMs without private VLANs at scales extending beyond the traditional 4,094 VLAN approaching the traditional limiting capacity of 4094 VLANs. limit. Lenovo and Emulex deliver a PVLAN solution that: In this configuration, all the traffic from the VMs on a host passes 1. Enables deployment of 10,000 or more VMs per tenants with layer 2 through a single vPort. This frees up the other three vPorts on a isolation 10GbE link, which can be allocated and bandwidth shaped for bi- 2. Provides the flexibility to span multiple host servers directional traffic flow to support hypervisor management, backup 3. Utilizes Lenovo-exclusive UFP technology to optimally allocate 10GbE and VM migration services. bandwidth with UFP-compliant VFA adapters provided by Emulex For product information, please visit our website at www.emulex.com/Lenovo Avago, Avago Technologies, Emulex, LightPulse and the Emulex logo are trademarks of Avago Technologies in the United States and other countries. All other brand and product names are the trademarks of their respective owners. Copyright ©2015 Avago Technologies. All rights reserved. ELX15-2584 · 5/15.
Recommended publications
  • Data Link Layer
    Data link layer Goals: ❒ Principles behind data link layer services ❍ Error detection, correction ❍ Sharing a broadcast channel: Multiple access ❍ Link layer addressing ❍ Reliable data transfer, flow control: Done! ❒ Example link layer technology: Ethernet Link layer services Framing and link access ❍ Encapsulate datagram: Frame adds header, trailer ❍ Channel access – if shared medium ❍ Frame headers use ‘physical addresses’ = “MAC” to identify source and destination • Different from IP address! Reliable delivery (between adjacent nodes) ❍ Seldom used on low bit error links (fiber optic, co-axial cable and some twisted pairs) ❍ Sometimes used on high error rate links (e.g., wireless links) Link layer services (2.) Flow Control ❍ Pacing between sending and receiving nodes Error Detection ❍ Errors are caused by signal attenuation and noise. ❍ Receiver detects presence of errors signals sender for retrans. or drops frame Error Correction ❍ Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex ❍ With half duplex, nodes at both ends of link can transmit, but not at same time Multiple access links / protocols Two types of “links”: ❒ Point-to-point ❍ PPP for dial-up access ❍ Point-to-point link between Ethernet switch and host ❒ Broadcast (shared wire or medium) ❍ Traditional Ethernet ❍ Upstream HFC ❍ 802.11 wireless LAN MAC protocols: Three broad classes ❒ Channel Partitioning ❍ Divide channel into smaller “pieces” (time slots, frequency) ❍ Allocate piece to node for exclusive use ❒ Random
    [Show full text]
  • Understanding Linux Internetworking
    White Paper by David Davis, ActualTech Media Understanding Linux Internetworking In this Paper Introduction Layer 2 vs. Layer 3 Internetworking................ 2 The Internet: the largest internetwork ever created. In fact, the Layer 2 Internetworking on term Internet (with a capital I) is just a shortened version of the Linux Systems ............................................... 3 term internetwork, which means multiple networks connected Bridging ......................................................... 3 together. Most companies create some form of internetwork when they connect their local-area network (LAN) to a wide area Spanning Tree ............................................... 4 network (WAN). For IP packets to be delivered from one Layer 3 Internetworking View on network to another network, IP routing is used — typically in Linux Systems ............................................... 5 conjunction with dynamic routing protocols such as OSPF or BGP. You c an e as i l y use Linux as an internetworking device and Neighbor Table .............................................. 5 connect hosts together on local networks and connect local IP Routing ..................................................... 6 networks together and to the Internet. Virtual LANs (VLANs) ..................................... 7 Here’s what you’ll learn in this paper: Overlay Networks with VXLAN ....................... 9 • The differences between layer 2 and layer 3 internetworking In Summary ................................................. 10 • How to configure IP routing and bridging in Linux Appendix A: The Basics of TCP/IP Addresses ....................................... 11 • How to configure advanced Linux internetworking, such as VLANs, VXLAN, and network packet filtering Appendix B: The OSI Model......................... 12 To create an internetwork, you need to understand layer 2 and layer 3 internetworking, MAC addresses, bridging, routing, ACLs, VLANs, and VXLAN. We’ve got a lot to cover, so let’s get started! Understanding Linux Internetworking 1 Layer 2 vs.
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Virtual Private Network: an Overview Type of Virtual Private Network
    Virtual Private Network : Layer 2 Solution Giorgio Sadolfo [email protected] What is virtual private network? • A virtual private network (VPN) allows the provisioning of private network services for an organization or organizations over a public or shared infrastructure such as the Internet or service provider backbone network (Cisco). Virtual Private Network: An Overview Type of virtual private network • SITE to SITE : Site-to-site VPNs provide an Internet-based WAN infrastructure to extend network resources to branch offices, home offices, and business partner sites. • Reliable and high-quality transport of complex, mission-critical traffic, such as voice and client server applications • Simplified provisioning and reduced operational tasks for network designs • Integrated advanced network intelligence and routing for a wide range of network designs Type of virtual private network • REMOTE ACCESS : Remote access VPNs extend almost any data, voice, or video application to the remote desktop, emulating the main office desktop. With this VPN, you can provide highly secure, customizable remote access to anyone, anytime, anywhere, with almost any device. • Create a remote user experience that emulates working on the main office desktop • Deliver VPN access safely and easily to a wide range of users and devices • Support a wide range of connectivity options, endpoints, and platforms to meet your dynamic remote access needs VPN Layer 2: Overview • Layer 2 site-to-site VPNs (L2VPN) can be provisioned between switches, hosts, and routers and allow data link layer connectivity between separate sites. • Communication between customer switches, hosts, and routers is based on Layer 2 addressing, and PE devices perform forwarding of customer data traffic based on incoming link and Layer 2 header information: • MAC address; • Frame Relay; • Data Link Connection Identifier [DLCI]; • and so on.
    [Show full text]
  • Collision & Broadcast Domain a Collision Domain Is a Section of A
    Computer Networking & Communication 4th Class Arranged By: Dr.Ahmed Chalak Shakir Collision & Broadcast Domain A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters, particularly when using early versions of Ethernet. A network collision occurs when more than one device attempts to send a packet on a network segment at the same time. A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. LAYER 1 - PHYSICAL LAYER Devices - Hubs, Repeaters Collision Domain: As you might have studied both these devices just forward the data as it is to all the devices that are connected to them after attenuating it (making it stronger so that it travels more distance). All the devices fall in the SAME COLLISION DOMAIN because two or more devices might send the data at the same time even when we have CSMA/CD working. So, the data can collide and nullify each other that way no one gets nothing. Broadcast Domain: These devices don't use any type of addressing schemes to help them forward the data like MAC or IP addresses. So, if a PC A sends something for PC B and there are also C,D and E PC's connected to the hub then all the devices i.e. B,C,D and E would receive the data ( Only PC B accepts it while others drop it ). This is what is being in a single BROADCAST DOMAIN.
    [Show full text]
  • Linux Networking 101
    The Gorilla ® Guide to… Linux Networking 101 Inside this Guide: • Discover how Linux continues its march toward world domination • Learn basic Linux administration tips • See how easy it can be to build your entire network on a Linux foundation • Find out how Cumulus Linux is your ticket to networking freedom David M. Davis ActualTech Media Helping You Navigate The Technology Jungle! In Partnership With www.actualtechmedia.com The Gorilla Guide To… Linux Networking 101 Author David M. Davis, ActualTech Media Editors Hilary Kirchner, Dream Write Creative, LLC Christina Guthrie, Guthrie Writing & Editorial, LLC Madison Emery, Cumulus Networks Layout and Design Scott D. Lowe, ActualTech Media Copyright © 2017 by ActualTech Media. All rights reserved. No portion of this book may be reproduced or used in any manner without the express written permission of the publisher except for the use of brief quotations. The information provided within this eBook is for general informational purposes only. While we try to keep the information up- to-date and correct, there are no representations or warranties, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the information, products, services, or related graphics contained in this book for any purpose. Any use of this information is at your own risk. ActualTech Media Okatie Village Ste 103-157 Bluffton, SC 29909 www.actualtechmedia.com Entering the Jungle Introduction: Six Reasons You Need to Learn Linux ....................................................... 7 1. Linux is the future ........................................................................ 9 2. Linux is on everything .................................................................. 9 3. Linux is adaptable ....................................................................... 10 4. Linux has a strong community and ecosystem ........................... 10 5.
    [Show full text]
  • Ethernet Basics Ethernet Basics
    2016-09-24 Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Ethernet Basics • History • Ethernet Frames • CSMA/CD • Obsolete versions • 10Mbps versions • Segments • Spanning Tree Protocol 1 2016-09-24 Ethernet – Early History • 1970: ALOHAnet, first wireless packet-switched network - Norman Abramson, Univ. of Hawaii - Basis for Ethernet’s CSMA/CD protocol - 1972: first external network connected to ARPANET • 1973: Ethernet prototype developed at Xerox PARC - (Palo Alto Research Center) - 2.94 Mbps initially • 1976: "Ethernet: Distributed Packet Switching for Local Computer Networks" published in Communications of the ACM. - Bob Metcalfe and David Boggs - sometimes considered “the beginning of Ethernet” Ethernet goes Mainstream • 1979: DEC, Intel, Xerox collaborate on a commercial Ethernet specification - Ethernet II, a.k.a. “DIX” Ethernet - (Digital Equipment Corporation) • 1983: IEEE 802.3 specification formally approved - Differs from Ethernet II in the interpretation of the third header field • 1987: alternatives to coaxial cables - IEEE 802.3d: FOIRL, Fiber Optic Inter-Repeater Link - IEEE 802.3e: 1 Mbps over Twisted Pair wires (whoopee!) • 1990: Twisted-Pair wiring takes over - IEEE 802.3i: 10 Mbps over Twisted-Pair – 10Base-TX, 10Base-T4 2 2016-09-24 the Future is Now (next chapter) (and Now is so Yesteryear…) 1995 – Now: speed and cabling improvements • 1995: 100Mbps varieties • 1999: 1Gbps on twisted-pair • 2003-2006: 10Gbps on optical fiber and UTP • 2010: 40Gbps, 100Gbps (802.3ba) - optical fiber or twinaxial cable - point-to-point physical topology; for backbones • 2016, September: 2.5GBase-T, 5GBase-T ? - who knows? What Is Ethernet? • Protocols, standards for Local Area Networks » Ethernet II, IEEE 802.3 • Specifies Physical-layer components - Cabling, signaling properties, etc.
    [Show full text]
  • Communication & Network Security
    6/13/19 Communication & Network Security MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ OSI vs. TCP/IP Model • Transport also called Host-to-Host in TCP/IP model. Encapsulation • System 1 is a “subject” (client) • System 2 has the “object” (server) 1 6/13/19 OSI Reference Notice: • Segments • Packets (Datagrams) • Frames • Bits Well known ports Protocol TCP/UDP Port Number File Transfer Protocol (FTP) (RFC 959) TCP 20/21 Secure Shell (SSH) (RFC 4250-4256) TCP 22 Telnet (RFC TCP 23 854) Simple Mail Transfer Protocol (SMTP) (RFC 5321) TCP 25 Domain Name System (DNS) (RFC 1034-1035) TCP/UDP 53 Dynamic Host Configuration Protocol (DHCP) (RFC 2131) UDP 67/68 Trivial File Transfer Protocol (TFTP) (RFC 1350) UDP 69 Hypertext Transfer Protocol (HTTP) (RFC 2616) TCP 80 Post Office Protocol (POP) version 3 (RFC 1939) TCP 110 Network Time Protocol (NTP) (RFC 5905) UDP 123 NetBIOS (RFC TCP/UDP 1001-1002) 137/138/139 Internet Message Access Protocol (IMAP) (RFC 3501) TCP 143 Well known ports (continued) Protocol TCP/UDP Port Number Simple Network Management Protocol (SNMP) UDP (RFC 1901-1908, 3411-3418) 161/162 Border Gateway Protocol (BGP) (RFC 4271) TCP 179 Lightweight Directory Access Protocol (LDAP) (RFC 4510) TCP/UDP 389 Hypertext Transfer Protocol over SSL/TLS (HTTPS) (RFC 2818) TCP 443 Line Print Daemon (LPD) TCP 515 Lightweight Directory Access Protocol over TLS/SSL (LDAPS) (RFC 4513) TCP/UDP 636 FTP over TLS/SSL (RFC 4217) TCP 989/990 Microsoft SQL Server TCP 1433 Oracle Server TCP 1521 Microsoft Remote Desktop Protocol (RDP) TCP 3389 • http://www.iana.org/assignments/service-names-port- numbers/service-names-port-numbers.xml.
    [Show full text]
  • Broadcast Domain
    Broadcast Domain A broadcast domain is a logical part of a network (a network segment) in which any network equipment can transmit data directly to other equipment or device without going through arouting device (assuming the devices share the same subnet and use the same gateway; also, they must be in the same VLAN). A more specific broadcast domain definition is the area of the computer network that consists of every single computer or network equipment that can be reached directly by sending a simple frame to the data link layer’s broadcast address. Details on Broadcast Domains While any layer 2 device is able to divide the collision domains, broadcast domains are only divided by layer 3 network devices such as routers or layer 3 switches. Frames are normally addressed to a specific destination device on the network. While all devices detect the frame transmission on the network, only the device to which the frame is addressed actually receives it. A special broadcast address consisting of all is used to send frames to all devices on the network. The VLAN (Virtual Local Area Network) technology can also create a so-called “virtual” broadcast domain. A network built with switching devices can see each network device as an independent system. These groups of independent systems can be joined into one broadcast domain, even if the computers are not physically connected to each other. This is very useful when administrating large networks where there is the need for better network management and control. How to Restrict the Broadcast Domain Since a broadcast domain is the area where broadcasts can be received, routers restrict broadcasts.
    [Show full text]
  • The Internet of Things Meets Big Data – Is Your Network Prepared?
    Moxa’s Webinar The Internet of Things Meets Big Data – Is Your Network Prepared? Nick Sandoval Field Application Engineer Agenda Converged Networks • Internet of Things • Big Data Trends in Industrial Networks Best Practices • Edge to Core • Quality of Service • Predictive • Class Based • Multicast • Network Segmentation with Layer 3 Converged Networks What is a converged network? Network convergence is the efficient coexistence of multiple data types on a single network Offers convenience and flexibility not possible with separate infrastructures Helps leverage economies of scale Nick’s House Hot Topic: Industrial Internet of Things (IIoT) 7 Confidential Confidential Confidential Confidential Big Data Poll Question Do you currently build your network to account for Internet of Things and/or Big Data? a) Not yet, but considering b) Only looked at Internet of Things c) Only looked at Big Data d) Absolutely e) No Trend Trends in the Industrial Space Quad-Play Network Industrial Networking Paradigm Shift Legacy Pervasive Converged Device Networking Industrial Ethernet Automation Network • 1-to-N • N-to-N • N-to-N • S-to-E Gateway • Fieldbus-to-Ethernet • Native Eth. IP • Data, Command • Standalone Networks • OneNET for for Data, Control, Data, Control, Video, Voice Video, Voice SCADA center Surveillance center Network management Control Center/ Information Layer Ground Turbo Ring Turbo Chain Underground Control Saved Layer Saved Explosion- Saved proof cabinet Control & Monitoring Personnel Positioning Wireless Comm. CCTV Systems Systems
    [Show full text]
  • Chapter 5 Link Layer
    Chapter 5 Link Layer Computer Networking: A Top Down Approach th 6 edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Link Layer 5-1 Chapter 5: Link layer our goals: v understand principles behind link layer services: § error detection, correction § sharing a broadcast channel: multiple access § link layer addressing § local area networks: Ethernet, VLANs v instantiation, implementation of various link layer technologies Link Layer 5-2 Link layer, LANs: outline 5.1 introduction, services 5.5 link virtualization: 5.2 error detection, MPLS correction 5.6 data center 5.3 multiple access networking protocols 5.7 a day in the life of a 5.4 LANs web request § addressing, ARP § Ethernet § switches § VLANS Link Layer 5-3 Link layer: introduction terminology: v hosts and routers: nodes global ISP v communication channels that connect adjacent nodes along communication path: links § wired links § wireless links § LANs v layer-2 packet: frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link Link Layer 5-4 Link layer: context v datagram transferred by transportation analogy: different link protocols over v trip from Princeton to Lausanne different links: § limo: Princeton to JFK § e.g., Ethernet on first link, § plane: JFK to Geneva frame relay on § train: Geneva to Lausanne intermediate links, 802.11 v tourist = datagram on last link v transport segment = v each link protocol
    [Show full text]
  • Single VLAN Architecture for WLAN.Pdf
    Single VLAN Architecture for Wireless LAN Author: Contributors: Alap Modi Colin Joseph Michael Wong Partha Narasimhan Peter Thornycroft Shiv Mehra Copyright Information © Copyright 2016 Hewlett Packard Enterprise Development LP Open Source Code This product includes code licensed under the GNU General Public License, the GNU Lesser General Public License, and/or certain other open source licenses. A complete machine-readable copy of the source code corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett-Packard Company. To obtain such source code, send a check or money order in the amount of US $10.00 to: Hewlett-Packard Company Attn: General Counsel 3000 Hanover Street Palo Alto, CA 94304 USA Please specify the product and version for which you are requesting source code. You may also request a copy of this source code free of charge at [email protected]. January 2016 2 Contents Contents 3 Figures 6 Symbols 7 About this Guide 9 Acronyms 9 Scope 10 Reference Material 11 Introduction to Single VLAN Design 12 VLAN Pooling for WLAN 13 Use of VLANs 13 VLAN Pooling on Enterprise WLAN 13 Key Considerations with VLAN Pooling 14 802.11 Frames do not Identify VLAN Tags 14 IPv6 SLAAC Breaks 15 Roaming Complexity 16 Inconsistent Utilization of VLANs from VLAN Pool 17 Single VLAN Design for WLAN 18 Single VLAN Design 18 Advantages of Single VLAN Design 19 Simple Design
    [Show full text]