SlideShare a Scribd company logo
MSR (Multiple Super Ring)
Make A More Reliable LAN by
Korenix MSR
Industrial Data Communication by Korenix – A Beijer Group Company
Link loss RM failure
Backup RM
Backup RM
Backup RM
Backup RM
How It Works
There are 4 running stages:
Configure & Install: Switches are linked into a ring. One of them
is automatically elected as RM (Ring Manager), while the others
become backup RM. RM blocks one of its ring ports as a backup
path and starts to monitor the ring status.
Failure Recovery: Following a link or device failure, RM activates
its backup path. Topology changes and traffic resumes. RM will
jump to the failure position and prepares for later Seamless
Restoration (patented). In case of RM failure, the one next to it
becomes RM. The ring is always under control. (patented)
Trouble Shooting: The ring is broken and has to be fixed asap.
MSR warns and provides information about the failure position
to help fast trouble shooting.
Restoration: Putting a new link to fix the failure. The ring forms
again. MSR achieves 0ms Seamless Restoration by using the
restored link as the backup path. Traffic flows as it was without
being disturbed. There is no topology change, packet loss, or
broadcast storm. It’s the most stable ring technology. (patented)
Korenix’s patented redundant ring technology delivers more benefits than fast recovery. It’s fast, stable, and
easy to use. Its unique design eliminates the risks of single point of failure or broadcast storm. It turns out a
comprehensive superiority over other ring technologies through all running stages.
Configuration made easy
Superior In All Running Stages
It’s designed to be used without the need of IT knowledge. RM and backup path are elected automatically.
Step 1
Create a new ring with an ID
Step 2
Choose ring ports
Step 3
Enable (Done!)
MSR Other proprietary rings *
CONFIGURE
& INSTALL
• Simple
• Assign ring ports and enable
• RM and backup path auto selected
• Mistake indication
• Manually
• Not support
FAILURE
RECOVERY
• Fast
• 5ms recovery minimizes packet loss
• RM Redundancy – no critical point
• Network resumes immediately
• 20ms or more
• Single point of failure
• Wait until RESTORATION
TROUBLE
SHOOTING
• Clear
• LED failure positioning
• Warning notification
• Live topology map
• No LED positioning
RESTORATION • Seamless
• 0ms Seamless Restoration
• No topology change – stable
• No packet loss – no error
• No broadcast storm – risk free
• 20ms or more
• Topology change
• Packet loss or risk of
broadcast storm
Healthy Link Loss Configure Error
?
* In most cases
Ring Status LED indicator helps field engineers to identify failure cause and position.
Industrial Data Communication by Korenix – A Beijer Group Company
More Than One Ring
MultiRing connects multiple rings in the simplest
way. Each ring operates independently.
TrunkRing multiples the bandwidth and the
redundancy by aggregating multiple ring links.
Rapid Dual Homing connects to a 3rd party network
by multiple nodes or redundant links.
Super Chain extends a ring network by a chain.
The chain has its own redundant protection.
• How many nodes can be in a ring? Up to 250 switches in a ring without compromise in recovery time.
• What speed and media? It doesn’t matter. A ring can be composed by 100Mbps or gigabit, by
copper or fiber mixed.
• Why can’t I find RM indicator? The RM of most ring technologies is fixed and is a critical point. It’s
very important to know RM position for the reason of single point of
failure. Thanks to the patent of RM Redundancy, MSR solves this
issue and uses RS (Ring Status) indicator instead for more benefits.
• How to monitor the ring status? You can monitor ring status by LED indicator, web, CLI, SNMP,
Korenix network management software, Modbus TCP, and can be
informed by email, SNMP trap, relay alarm for warning events.
• Why broadcast storm occurs to a
ring and how to solve it?
A ring without a blocking path is a loop, which let go broadcast
packet runs in the circle endlessly and overwhelms the network in a
blink. It is highly risky during restoration, reboot from blackout, or
RM failure. MSR’s Seamless Restoration prevents loop, RM
Redundancy recovers RM failure, which in turn eliminates the
possibility of broadcast storm.
FAQ
Industrial Data Communication by Korenix – A Beijer Group Company

More Related Content

Similar to A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018

Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Jiunn-Jer Sun
 
What is LoRaNET?
What is LoRaNET?What is LoRaNET?
What is LoRaNET?
Antenna Manufacturer Coco
 
alm.pdf
alm.pdfalm.pdf
alm.pdf
elitvin01
 
alm.pdf
alm.pdfalm.pdf
alm.pdf
elitvin01
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Jiunn-Jer Sun
 
Maipu 3 g access solution for enterprises
Maipu 3 g access solution for enterprisesMaipu 3 g access solution for enterprises
Maipu 3 g access solution for enterprises
Uttamkumar Ress
 
PLNOG 13: Marek Janik: Rings in Ethernet Networks
PLNOG 13: Marek Janik: Rings in Ethernet NetworksPLNOG 13: Marek Janik: Rings in Ethernet Networks
PLNOG 13: Marek Janik: Rings in Ethernet Networks
PROIDEA
 
ADVA Advanced Link Monitor (ALM)
ADVA Advanced Link Monitor (ALM)ADVA Advanced Link Monitor (ALM)
ADVA Advanced Link Monitor (ALM)
Vincent Sleiffer
 
8 wcdma rf optimization&case study-60
8 wcdma rf optimization&case study-608 wcdma rf optimization&case study-60
8 wcdma rf optimization&case study-60
Ba Quynh Nguyen
 
High Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 Enclosure
High Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 EnclosureHigh Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 Enclosure
High Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 Enclosure
Barry Zoon
 
08. DRIVE TEST Analysis
08. DRIVE TEST Analysis08. DRIVE TEST Analysis
08. DRIVE TEST Analysis
Amit vishwakarma
 
2G Network Optimization
2G Network Optimization2G Network Optimization
2G Network Optimization
MrrRith2
 
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassisLE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
Ronald Bartels
 
PROJECT 2016-2017
PROJECT 2016-2017PROJECT 2016-2017
PROJECT 2016-2017
K Mathew Shilling Jose
 
High Speed Long Range SCADA Radio Modem TMR1 - OEM
High Speed Long Range SCADA Radio Modem TMR1 - OEMHigh Speed Long Range SCADA Radio Modem TMR1 - OEM
High Speed Long Range SCADA Radio Modem TMR1 - OEM
Barry Zoon
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Jiunn-Jer Sun
 
MSIP report
MSIP reportMSIP report
MSIP report
MD SAFWAN BIN ALAM
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
ShantanuDharekar
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
ShantanuDharekar
 
6500-M User Manual
6500-M User Manual6500-M User Manual
6500-M User Manual
Dave Horn
 

Similar to A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018 (20)

Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
What is LoRaNET?
What is LoRaNET?What is LoRaNET?
What is LoRaNET?
 
alm.pdf
alm.pdfalm.pdf
alm.pdf
 
alm.pdf
alm.pdfalm.pdf
alm.pdf
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
 
Maipu 3 g access solution for enterprises
Maipu 3 g access solution for enterprisesMaipu 3 g access solution for enterprises
Maipu 3 g access solution for enterprises
 
PLNOG 13: Marek Janik: Rings in Ethernet Networks
PLNOG 13: Marek Janik: Rings in Ethernet NetworksPLNOG 13: Marek Janik: Rings in Ethernet Networks
PLNOG 13: Marek Janik: Rings in Ethernet Networks
 
ADVA Advanced Link Monitor (ALM)
ADVA Advanced Link Monitor (ALM)ADVA Advanced Link Monitor (ALM)
ADVA Advanced Link Monitor (ALM)
 
8 wcdma rf optimization&case study-60
8 wcdma rf optimization&case study-608 wcdma rf optimization&case study-60
8 wcdma rf optimization&case study-60
 
High Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 Enclosure
High Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 EnclosureHigh Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 Enclosure
High Speed Long Range Wireless SCADA Radio Modem TMR1 - IP67 Enclosure
 
08. DRIVE TEST Analysis
08. DRIVE TEST Analysis08. DRIVE TEST Analysis
08. DRIVE TEST Analysis
 
2G Network Optimization
2G Network Optimization2G Network Optimization
2G Network Optimization
 
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassisLE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
 
PROJECT 2016-2017
PROJECT 2016-2017PROJECT 2016-2017
PROJECT 2016-2017
 
High Speed Long Range SCADA Radio Modem TMR1 - OEM
High Speed Long Range SCADA Radio Modem TMR1 - OEMHigh Speed Long Range SCADA Radio Modem TMR1 - OEM
High Speed Long Range SCADA Radio Modem TMR1 - OEM
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
 
MSIP report
MSIP reportMSIP report
MSIP report
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
6500-M User Manual
6500-M User Manual6500-M User Manual
6500-M User Manual
 

More from Jiunn-Jer Sun

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
Jiunn-Jer Sun
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Jiunn-Jer Sun
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
Jiunn-Jer Sun
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Jiunn-Jer Sun
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
Jiunn-Jer Sun
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Jiunn-Jer Sun
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
Jiunn-Jer Sun
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
Jiunn-Jer Sun
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
Jiunn-Jer Sun
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Jiunn-Jer Sun
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Jiunn-Jer Sun
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Jiunn-Jer Sun
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Jiunn-Jer Sun
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
Jiunn-Jer Sun
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Jiunn-Jer Sun
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
Jiunn-Jer Sun
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Jiunn-Jer Sun
 
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Jiunn-Jer Sun
 
Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013
Jiunn-Jer Sun
 

More from Jiunn-Jer Sun (20)

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
 
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
 
Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018

  • 1. MSR (Multiple Super Ring) Make A More Reliable LAN by Korenix MSR Industrial Data Communication by Korenix – A Beijer Group Company Link loss RM failure Backup RM Backup RM Backup RM Backup RM How It Works There are 4 running stages: Configure & Install: Switches are linked into a ring. One of them is automatically elected as RM (Ring Manager), while the others become backup RM. RM blocks one of its ring ports as a backup path and starts to monitor the ring status. Failure Recovery: Following a link or device failure, RM activates its backup path. Topology changes and traffic resumes. RM will jump to the failure position and prepares for later Seamless Restoration (patented). In case of RM failure, the one next to it becomes RM. The ring is always under control. (patented) Trouble Shooting: The ring is broken and has to be fixed asap. MSR warns and provides information about the failure position to help fast trouble shooting. Restoration: Putting a new link to fix the failure. The ring forms again. MSR achieves 0ms Seamless Restoration by using the restored link as the backup path. Traffic flows as it was without being disturbed. There is no topology change, packet loss, or broadcast storm. It’s the most stable ring technology. (patented) Korenix’s patented redundant ring technology delivers more benefits than fast recovery. It’s fast, stable, and easy to use. Its unique design eliminates the risks of single point of failure or broadcast storm. It turns out a comprehensive superiority over other ring technologies through all running stages.
  • 2. Configuration made easy Superior In All Running Stages It’s designed to be used without the need of IT knowledge. RM and backup path are elected automatically. Step 1 Create a new ring with an ID Step 2 Choose ring ports Step 3 Enable (Done!) MSR Other proprietary rings * CONFIGURE & INSTALL • Simple • Assign ring ports and enable • RM and backup path auto selected • Mistake indication • Manually • Not support FAILURE RECOVERY • Fast • 5ms recovery minimizes packet loss • RM Redundancy – no critical point • Network resumes immediately • 20ms or more • Single point of failure • Wait until RESTORATION TROUBLE SHOOTING • Clear • LED failure positioning • Warning notification • Live topology map • No LED positioning RESTORATION • Seamless • 0ms Seamless Restoration • No topology change – stable • No packet loss – no error • No broadcast storm – risk free • 20ms or more • Topology change • Packet loss or risk of broadcast storm Healthy Link Loss Configure Error ? * In most cases Ring Status LED indicator helps field engineers to identify failure cause and position. Industrial Data Communication by Korenix – A Beijer Group Company
  • 3. More Than One Ring MultiRing connects multiple rings in the simplest way. Each ring operates independently. TrunkRing multiples the bandwidth and the redundancy by aggregating multiple ring links. Rapid Dual Homing connects to a 3rd party network by multiple nodes or redundant links. Super Chain extends a ring network by a chain. The chain has its own redundant protection. • How many nodes can be in a ring? Up to 250 switches in a ring without compromise in recovery time. • What speed and media? It doesn’t matter. A ring can be composed by 100Mbps or gigabit, by copper or fiber mixed. • Why can’t I find RM indicator? The RM of most ring technologies is fixed and is a critical point. It’s very important to know RM position for the reason of single point of failure. Thanks to the patent of RM Redundancy, MSR solves this issue and uses RS (Ring Status) indicator instead for more benefits. • How to monitor the ring status? You can monitor ring status by LED indicator, web, CLI, SNMP, Korenix network management software, Modbus TCP, and can be informed by email, SNMP trap, relay alarm for warning events. • Why broadcast storm occurs to a ring and how to solve it? A ring without a blocking path is a loop, which let go broadcast packet runs in the circle endlessly and overwhelms the network in a blink. It is highly risky during restoration, reboot from blackout, or RM failure. MSR’s Seamless Restoration prevents loop, RM Redundancy recovers RM failure, which in turn eliminates the possibility of broadcast storm. FAQ Industrial Data Communication by Korenix – A Beijer Group Company