SlideShare a Scribd company logo
1 of 11
Whitepaper www.korenix.com
Disaster to Industrial Ethernet Networking
Root Causes and Solutions
Broadcast Storm
Whitepaper www.korenix.com
With Ethernet growing popular as an
Industrial application protocol, more and
more users suffer from broadcast storm
especially when a redundant ring technology
is used in their networks. Broadcast storm,
which overwhelms the network and damages
the whole system, is considered as one of the
most serious problems in Ethernet
networking.
This whitepaper reveals the root cause of
broadcast storm, and presents how to get
free from broadcast storm by korenix’s
comprehensive solution: Prevention,
Resilience, and Protection.
Preface
2
Index
1. The Root Cause
4. When Broadcast Storm Happens to
Redundant Ring
5. Mitigating Broadcast Storm
6. Korenix Comprehensive Solution
a) Prevention within a Ring
b) Resilience to RM failure
c) Protection beyond a Ring
7. Summary
2. The Result: Worse Than You Think
3. Is Your Redundant Ring Safe?
Whitepaper www.korenix.com
Eve
Ann Bob
Cat Dan
• Ethernet switch learns how to forward Unicast (1-to-1)
packet according to the destination address of the packet.
• Managed switch learns how to forward Multicast (1-to-
many) packets on demand by the management features.
• Broadcast (1-to-all) packets are flooded everywhere.
BBBBBMMDCBA
• Broadcast packets are transmitted everywhere. If a
network has a loop topology, a broadcast packet goes
through the loop again and again.
• Endless looping broadcast packets consume all the
bandwidth, overwhelming the network in an instance.
B
Ethernet Switching Principle
Looping Broadcast Causes Storm
Root Cause: Loop Topology
3
Whitepaper www.korenix.com
Three rings in a LAN share the same broadcast domain
L2
Result: Worse Than You Think
• Unknown Unicast and Unknown Multicast are packets
that switches have not learned how to forward them yet.
These packets are handled as in the same way as
broadcast which may result in storm as well.
Not only Broadcast Packets Cause Storm
• Broadcast packets are flooded everywhere,
thus a storm will radiate from the origin to
the whole network.
• Broadcast is received by all network devices.
Endless broadcast traffic created by a storm
overwhelms every node in the system.
Crash The Whole System
Eve
Ann Bob
Cat Dan
?????
Multicast is commonly used in Industrial protocols such as Ethernet/IP, ProfitNet RT,
IEEE 1588, IEC6850-3 GOOSE, video streaming, and so on.
Industrial Ethernet packet sizes are typically small. A 100Mbps fast Ethernet device might possibly
receive more than 100,000 packets within one second when broadcast storm occurs.
4
Broadcast
Storm
Whitepaper www.korenix.com
Is Your Redundant Ring Safe?
Redundant ring technologies are widely used in today’s
industrial Ethernet networks. However, they are essentially
exposed to the risk of broadcast storm because of their
loop topology by nature.
• The technology relies on one and only one switch
assigned as Ring Manager (RM) to monitor the
completeness of the ring
• If the ring is complete, RM blocks one of its path
• The blocked path works for redundancy. It also cuts off
the loop to prevent broadcast storm
Improper design, configuration or operation may result in
broadcast storm.
Redundant Ring in Danger
BR
5
Whitepaper www.korenix.com
• Link Restoration fixes a
Broken ring (Loop!)
• At the moment any
broadcast leads to a storm
• RM cannot detect the loop
and cannot block its path
because of the storm
R
Broken
R R
1. Link Restoration
When Broadcast Storm Happens To Redundant Ring
2. Network Restart 3. RM Malfunction
• Devices’ boot time varies
• Before RM starts to function,
topology loop and broadcast
storm will occur
• RM cannot detect the loop
and cannot block its path
because of the storm
• RM is the only manager of
the ring
• An occasional malfunction,
system halt or unexpected
problem may lead to a loop
and broadcast storm
6
Whitepaper www.korenix.com
Rate limiting constrains broadcast traffic at a
specified level and drops broadcast packets
(either good or bad) once the level is
exceeded, thus preventing further network
outages.
One LAN refers to one single broadcast domain.
Dividing a single network into smaller LANs by
layer 3 switches protects one another from
storm attacks. This, however, is a costly
solution to the problem.
1. Rate Limit 2. Dividing the Broadcast Domain
7
LAN2 LAN3LAN1
L3
Others: Mitigating Broadcast Storm
Mitigating is not the solution to root cause. It reduces the problem, but it does not stop the
storm. Duplicated broadcast packets still disturb the system’s normal operation.
100%
10%
Whitepaper www.korenix.com
1. Prevention within a Ring
Korenix’s Comprehensive Solution
8
Compared to other redundant ring technologies, korenix patented Seamless Restoration solves
the two root causes, link restoration and network restart, by preventing the network from
having loop topology at the first moment when a link is restored to a ring.
• Packet loss
• Topology change
during link restoration or
network restart
• Broadcast storm
due to loop topology when
a link restoration occurs or
a network is restarted
Seamless Restoration
• No broadcast storm
• No packet loss
• No topology change
Whitepaper www.korenix.com
Korenix’s Comprehensive Solution
2. Resilience to RM Failure
9
Korenix patented RM Redundancy technology is designed
to solve the single critical point problem of RM.
• When the RM fails or stops sending control packets, a
backup RM is activated, which operates automatically
without any manual configuration.
• It is not primary/secondary but fully redundant. Any
number of RM failures/malfunctions can be recovered
instantly.
The ring is always under control to prevent broadcast storm.
R
R
R
R
R
R
R
R
Whitepaper www.korenix.com
3. Protection beyond the Ring
Korenix’s Comprehensive Solution
10
With korenix patented Loop Protection (pending) enabled, a switch becomes a Protector and
starts to detect if there is any loop in the network. The connection between the protector and
the loop will be disabled if a loop is found. It can:
a) provide a double insurance on a ring in addition to RM redundancy
b) protect different parts of a LAN from each other by a korenix layer 2 switch instead of a
costly layer 3 switch
c) add korenix ring to pre-existing third party network and protect the ring from broadcast
storm
Rings in a LAN share the same broadcast domain
L2
KBroadcast
Storm
P
P
P
Broadcast
Storm
Whitepaper www.korenix.com
Email sales@korenix.com
Web www.korenix.com
Phone +886-2-8911-1000
Fax +886-2-2912-3328
Address F2, No. 188, Pao-Chiao
Rd. Shing-Tien City,
Taipei 23145, Taiwan
A broadcast storm occurs to industrial Ethernet
networks, and more typically in those, which
offer a ring for network redundancy. A ring is
exposed to the risk because of its loop
topology which is the root cause of broadcast
storm. Traditional treatment can only mitigate
the problem by rate limit or dividing broadcast
domain through layer 3 switches. However,
either ways does not aim at the root causes
and cannot stop the system being affected.
By offering comprehensive solutions that
include prevention, resilience and protection,
Korenix makes a contribution to the industrial
Ethernet world by enabling users to have a
reliable network free from broadcast storm.
Summary
11

More Related Content

What's hot

Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Ali Habeeb
 
Idea Huawei DWDM-Training.pptx
Idea Huawei DWDM-Training.pptxIdea Huawei DWDM-Training.pptx
Idea Huawei DWDM-Training.pptxGaneshVats2
 
Lte power control
Lte power controlLte power control
Lte power controlPranay Akul
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2Hamdamboy (함담보이)
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comMapYourTech
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlowJoel W. King
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1Nitin George Thomas
 
LTE Schedulers – A Definitive Approach
LTE Schedulers – A Definitive Approach LTE Schedulers – A Definitive Approach
LTE Schedulers – A Definitive Approach Sukhvinder Singh Malik
 

What's hot (20)

Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Routing
RoutingRouting
Routing
 
Idea Huawei DWDM-Training.pptx
Idea Huawei DWDM-Training.pptxIdea Huawei DWDM-Training.pptx
Idea Huawei DWDM-Training.pptx
 
Lte power control
Lte power controlLte power control
Lte power control
 
Sync in 3 g
Sync in 3 gSync in 3 g
Sync in 3 g
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
 
gsm
 gsm gsm
gsm
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
 
Mac
MacMac
Mac
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1305090798 04-basic-parameter-planning-rules-v1-1
305090798 04-basic-parameter-planning-rules-v1-1
 
LTE Schedulers – A Definitive Approach
LTE Schedulers – A Definitive Approach LTE Schedulers – A Definitive Approach
LTE Schedulers – A Definitive Approach
 
X.25
X.25X.25
X.25
 

Similar to Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012

Nokia td lte-and_wimax_coexistence_and_migration
Nokia td lte-and_wimax_coexistence_and_migrationNokia td lte-and_wimax_coexistence_and_migration
Nokia td lte-and_wimax_coexistence_and_migrationmnajib171
 
How do achieve a good coexistence in the 2.4 GHz ISM band.pdf
How do achieve a good coexistence in the 2.4 GHz ISM band.pdfHow do achieve a good coexistence in the 2.4 GHz ISM band.pdf
How do achieve a good coexistence in the 2.4 GHz ISM band.pdfAntenna Manufacturer Coco
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernetSamit Singh
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To NetworkingPhil Ashman
 
Ready transmesia media
Ready transmesia mediaReady transmesia media
Ready transmesia mediaVarun Jain
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Jiunn-Jer Sun
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptxathars248
 
TRM MINI-LINK TN Presentation By Khalil Al-Alami
TRM MINI-LINK TN Presentation By Khalil Al-AlamiTRM MINI-LINK TN Presentation By Khalil Al-Alami
TRM MINI-LINK TN Presentation By Khalil Al-AlamiKhalil Al-Alami
 
A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...
A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...
A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...IRJET Journal
 
Commscope-Andrew TLCN4-W
Commscope-Andrew TLCN4-WCommscope-Andrew TLCN4-W
Commscope-Andrew TLCN4-Wsavomir
 
Introduction To Sonet
Introduction To SonetIntroduction To Sonet
Introduction To SonetMarkEspinosa
 
Gepon Presentation
Gepon PresentationGepon Presentation
Gepon PresentationScorpAL
 

Similar to Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012 (20)

EMC and HFPQ for industrial networks - Jos Knockaert, UGent and Peter Thomas...
EMC and HFPQ for industrial networks -  Jos Knockaert, UGent and Peter Thomas...EMC and HFPQ for industrial networks -  Jos Knockaert, UGent and Peter Thomas...
EMC and HFPQ for industrial networks - Jos Knockaert, UGent and Peter Thomas...
 
How to build resilient industrial networks
How to build resilient industrial networksHow to build resilient industrial networks
How to build resilient industrial networks
 
EMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGent
EMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGentEMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGent
EMC for Networks - Peter Thomas, Control Specialists and Jos Knockaert, UGent
 
Nokia td lte-and_wimax_coexistence_and_migration
Nokia td lte-and_wimax_coexistence_and_migrationNokia td lte-and_wimax_coexistence_and_migration
Nokia td lte-and_wimax_coexistence_and_migration
 
How do achieve a good coexistence in the 2.4 GHz ISM band.pdf
How do achieve a good coexistence in the 2.4 GHz ISM band.pdfHow do achieve a good coexistence in the 2.4 GHz ISM band.pdf
How do achieve a good coexistence in the 2.4 GHz ISM band.pdf
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Intro To Networking
Intro To NetworkingIntro To Networking
Intro To Networking
 
Ready transmesia media
Ready transmesia mediaReady transmesia media
Ready transmesia media
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
 
TRM MINI-LINK TN Presentation By Khalil Al-Alami
TRM MINI-LINK TN Presentation By Khalil Al-AlamiTRM MINI-LINK TN Presentation By Khalil Al-Alami
TRM MINI-LINK TN Presentation By Khalil Al-Alami
 
A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...
A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...
A Survey on Emerging WiMAX Antenna Technologies and Slotted Microstrip Patch ...
 
Network in brief
Network in briefNetwork in brief
Network in brief
 
Commscope-Andrew TLCN4-W
Commscope-Andrew TLCN4-WCommscope-Andrew TLCN4-W
Commscope-Andrew TLCN4-W
 
3.pptx
3.pptx3.pptx
3.pptx
 
Br33421423
Br33421423Br33421423
Br33421423
 
Br33421423
Br33421423Br33421423
Br33421423
 
Introduction To Sonet
Introduction To SonetIntroduction To Sonet
Introduction To Sonet
 
Gepon Presentation
Gepon PresentationGepon Presentation
Gepon Presentation
 
SebKMT Cable Sheath testers & Fault Locators
SebKMT Cable Sheath testers & Fault LocatorsSebKMT Cable Sheath testers & Fault Locators
SebKMT Cable Sheath testers & Fault Locators
 

More from Jiunn-Jer Sun

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Jiunn-Jer Sun
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Jiunn-Jer Sun
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Jiunn-Jer Sun
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Jiunn-Jer Sun
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Jiunn-Jer Sun
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018Jiunn-Jer Sun
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...Jiunn-Jer Sun
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012Jiunn-Jer Sun
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Jiunn-Jer Sun
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Jiunn-Jer Sun
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Jiunn-Jer Sun
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Jiunn-Jer Sun
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Jiunn-Jer Sun
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Jiunn-Jer Sun
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Jiunn-Jer Sun
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Jiunn-Jer Sun
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Jiunn-Jer Sun
 

More from Jiunn-Jer Sun (20)

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
 
Power Distribution Feeder Automation - Application Story 2012
Power Distribution Feeder Automation -  Application Story 2012Power Distribution Feeder Automation -  Application Story 2012
Power Distribution Feeder Automation - Application Story 2012
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012

  • 1. Whitepaper www.korenix.com Disaster to Industrial Ethernet Networking Root Causes and Solutions Broadcast Storm
  • 2. Whitepaper www.korenix.com With Ethernet growing popular as an Industrial application protocol, more and more users suffer from broadcast storm especially when a redundant ring technology is used in their networks. Broadcast storm, which overwhelms the network and damages the whole system, is considered as one of the most serious problems in Ethernet networking. This whitepaper reveals the root cause of broadcast storm, and presents how to get free from broadcast storm by korenix’s comprehensive solution: Prevention, Resilience, and Protection. Preface 2 Index 1. The Root Cause 4. When Broadcast Storm Happens to Redundant Ring 5. Mitigating Broadcast Storm 6. Korenix Comprehensive Solution a) Prevention within a Ring b) Resilience to RM failure c) Protection beyond a Ring 7. Summary 2. The Result: Worse Than You Think 3. Is Your Redundant Ring Safe?
  • 3. Whitepaper www.korenix.com Eve Ann Bob Cat Dan • Ethernet switch learns how to forward Unicast (1-to-1) packet according to the destination address of the packet. • Managed switch learns how to forward Multicast (1-to- many) packets on demand by the management features. • Broadcast (1-to-all) packets are flooded everywhere. BBBBBMMDCBA • Broadcast packets are transmitted everywhere. If a network has a loop topology, a broadcast packet goes through the loop again and again. • Endless looping broadcast packets consume all the bandwidth, overwhelming the network in an instance. B Ethernet Switching Principle Looping Broadcast Causes Storm Root Cause: Loop Topology 3
  • 4. Whitepaper www.korenix.com Three rings in a LAN share the same broadcast domain L2 Result: Worse Than You Think • Unknown Unicast and Unknown Multicast are packets that switches have not learned how to forward them yet. These packets are handled as in the same way as broadcast which may result in storm as well. Not only Broadcast Packets Cause Storm • Broadcast packets are flooded everywhere, thus a storm will radiate from the origin to the whole network. • Broadcast is received by all network devices. Endless broadcast traffic created by a storm overwhelms every node in the system. Crash The Whole System Eve Ann Bob Cat Dan ????? Multicast is commonly used in Industrial protocols such as Ethernet/IP, ProfitNet RT, IEEE 1588, IEC6850-3 GOOSE, video streaming, and so on. Industrial Ethernet packet sizes are typically small. A 100Mbps fast Ethernet device might possibly receive more than 100,000 packets within one second when broadcast storm occurs. 4 Broadcast Storm
  • 5. Whitepaper www.korenix.com Is Your Redundant Ring Safe? Redundant ring technologies are widely used in today’s industrial Ethernet networks. However, they are essentially exposed to the risk of broadcast storm because of their loop topology by nature. • The technology relies on one and only one switch assigned as Ring Manager (RM) to monitor the completeness of the ring • If the ring is complete, RM blocks one of its path • The blocked path works for redundancy. It also cuts off the loop to prevent broadcast storm Improper design, configuration or operation may result in broadcast storm. Redundant Ring in Danger BR 5
  • 6. Whitepaper www.korenix.com • Link Restoration fixes a Broken ring (Loop!) • At the moment any broadcast leads to a storm • RM cannot detect the loop and cannot block its path because of the storm R Broken R R 1. Link Restoration When Broadcast Storm Happens To Redundant Ring 2. Network Restart 3. RM Malfunction • Devices’ boot time varies • Before RM starts to function, topology loop and broadcast storm will occur • RM cannot detect the loop and cannot block its path because of the storm • RM is the only manager of the ring • An occasional malfunction, system halt or unexpected problem may lead to a loop and broadcast storm 6
  • 7. Whitepaper www.korenix.com Rate limiting constrains broadcast traffic at a specified level and drops broadcast packets (either good or bad) once the level is exceeded, thus preventing further network outages. One LAN refers to one single broadcast domain. Dividing a single network into smaller LANs by layer 3 switches protects one another from storm attacks. This, however, is a costly solution to the problem. 1. Rate Limit 2. Dividing the Broadcast Domain 7 LAN2 LAN3LAN1 L3 Others: Mitigating Broadcast Storm Mitigating is not the solution to root cause. It reduces the problem, but it does not stop the storm. Duplicated broadcast packets still disturb the system’s normal operation. 100% 10%
  • 8. Whitepaper www.korenix.com 1. Prevention within a Ring Korenix’s Comprehensive Solution 8 Compared to other redundant ring technologies, korenix patented Seamless Restoration solves the two root causes, link restoration and network restart, by preventing the network from having loop topology at the first moment when a link is restored to a ring. • Packet loss • Topology change during link restoration or network restart • Broadcast storm due to loop topology when a link restoration occurs or a network is restarted Seamless Restoration • No broadcast storm • No packet loss • No topology change
  • 9. Whitepaper www.korenix.com Korenix’s Comprehensive Solution 2. Resilience to RM Failure 9 Korenix patented RM Redundancy technology is designed to solve the single critical point problem of RM. • When the RM fails or stops sending control packets, a backup RM is activated, which operates automatically without any manual configuration. • It is not primary/secondary but fully redundant. Any number of RM failures/malfunctions can be recovered instantly. The ring is always under control to prevent broadcast storm. R R R R R R R R
  • 10. Whitepaper www.korenix.com 3. Protection beyond the Ring Korenix’s Comprehensive Solution 10 With korenix patented Loop Protection (pending) enabled, a switch becomes a Protector and starts to detect if there is any loop in the network. The connection between the protector and the loop will be disabled if a loop is found. It can: a) provide a double insurance on a ring in addition to RM redundancy b) protect different parts of a LAN from each other by a korenix layer 2 switch instead of a costly layer 3 switch c) add korenix ring to pre-existing third party network and protect the ring from broadcast storm Rings in a LAN share the same broadcast domain L2 KBroadcast Storm P P P Broadcast Storm
  • 11. Whitepaper www.korenix.com Email sales@korenix.com Web www.korenix.com Phone +886-2-8911-1000 Fax +886-2-2912-3328 Address F2, No. 188, Pao-Chiao Rd. Shing-Tien City, Taipei 23145, Taiwan A broadcast storm occurs to industrial Ethernet networks, and more typically in those, which offer a ring for network redundancy. A ring is exposed to the risk because of its loop topology which is the root cause of broadcast storm. Traditional treatment can only mitigate the problem by rate limit or dividing broadcast domain through layer 3 switches. However, either ways does not aim at the root causes and cannot stop the system being affected. By offering comprehensive solutions that include prevention, resilience and protection, Korenix makes a contribution to the industrial Ethernet world by enabling users to have a reliable network free from broadcast storm. Summary 11