Ethernet technology has emerged as a cost-effective, mature, robust, high-speed, and versatile choice for MAN/WAN networking of critical defense establishments and military installations – for e.g., army, navy, and air force bases, mission commands, remote war centers, the Pentagon, and other security agencies. Intelligent Ethernet helps to achieve IP-centric service requirements, while enabling wireless and fixed-line networks to evolve to a fast, economical, packet-switched infrastructure. The last few years have seen tremendous advancements in Ethernet architecture, its features, switch/router system design, and its integration with optical technologies. This tutorial provides a clear conceptual overview of optical Ethernet technology advances, network architectures, and benefits for military and defense network planners, network architects, and system engineers.
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...Vishal Sharma, Ph.D.
Ethernet technology has emerged as a cost-effective, mature, robust, high-speed, & versatile choice for MAN/WAN networking of critical defense establishments and military installations – for e.g., army, navy, & air force bases, mission commands, remote war centers, the Pentagon, and other security agencies. Intelligent Ethernet helps to achieve IP-centric service requirements, while...
The goal of the carrier today is to offer manageable end-user data services with a measurable QoS (Quality-of-Service) at the minimum cost per bit, using the smallest footprint systems, with the simplest implementation that allows for service-level agreements, operational efficiency, and traffic scalability. This has lead to the emergence of two design principles: the lower the layer at which...
Carrier Ethernet addresses limitations of legacy telecommunications technologies by providing flexible bandwidth scalability through Ethernet. It allows bandwidth to be added remotely up to the port speed without technology changes. This enables services tailored to subscriber needs rather than fixed increments. Carrier Ethernet also reduces costs by using the same Ethernet technology across networks and simplifying operations. It can be delivered over various transport network technologies to provide services like E-Line, E-LAN, and E-Tree connectivity.
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Vishal Sharma, Ph.D.
This workshop is one of the first that we're aware of to give a detailed taxonomy & analysis of deployment options for Carrier Ethernet-based metro/access networks, in one place. We elaborate each option addressing questions like: network architectures possible? Is other supporting technology needed? Or, is it standalone for the applications/services a provider might run, and so on.
The document discusses Carrier Ethernet and provides definitions and background. It defines Ethernet and discusses its history and standards development. It then defines Carrier Ethernet, explaining that it provides standardized, carrier-class Ethernet services on a large scale with attributes like scalability, reliability, service management and quality of service. The document outlines requirements for Carrier Ethernet networks including availability, stability, performance, multicast and TDM support, and security.
Carrier Ethernet provides standardized, carrier-class Ethernet services on a global scale. It builds upon Metro Ethernet by expanding the services to cover worldwide networks traversing multiple countries and access networks. Carrier Ethernet is defined by five key attributes that distinguish it from traditional LAN-based Ethernet: it provides standardized services across multiple networks; can scale to support millions of nodes and high bandwidths; offers reliable service with fast protection from link failures; ensures quality of service through service level agreements; and manages services through centralized operations support systems.
This document discusses how carrier-grade Ethernet can ensure reliable communications for utility networks transitioning to support smart grid applications. It covers Ethernet mechanisms that provide carrier-grade performance such as quality of service, resiliency, monitoring and timing synchronization. Choosing between IP, MPLS and Ethernet options is discussed. The document also addresses network security considerations and introduces RAD's carrier-grade Ethernet product portfolio for power utilities.
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...Vishal Sharma, Ph.D.
Ethernet technology has emerged as a cost-effective, mature, robust, high-speed, & versatile choice for MAN/WAN networking of critical defense establishments and military installations – for e.g., army, navy, & air force bases, mission commands, remote war centers, the Pentagon, and other security agencies. Intelligent Ethernet helps to achieve IP-centric service requirements, while...
The goal of the carrier today is to offer manageable end-user data services with a measurable QoS (Quality-of-Service) at the minimum cost per bit, using the smallest footprint systems, with the simplest implementation that allows for service-level agreements, operational efficiency, and traffic scalability. This has lead to the emergence of two design principles: the lower the layer at which...
Carrier Ethernet addresses limitations of legacy telecommunications technologies by providing flexible bandwidth scalability through Ethernet. It allows bandwidth to be added remotely up to the port speed without technology changes. This enables services tailored to subscriber needs rather than fixed increments. Carrier Ethernet also reduces costs by using the same Ethernet technology across networks and simplifying operations. It can be delivered over various transport network technologies to provide services like E-Line, E-LAN, and E-Tree connectivity.
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Vishal Sharma, Ph.D.
This workshop is one of the first that we're aware of to give a detailed taxonomy & analysis of deployment options for Carrier Ethernet-based metro/access networks, in one place. We elaborate each option addressing questions like: network architectures possible? Is other supporting technology needed? Or, is it standalone for the applications/services a provider might run, and so on.
The document discusses Carrier Ethernet and provides definitions and background. It defines Ethernet and discusses its history and standards development. It then defines Carrier Ethernet, explaining that it provides standardized, carrier-class Ethernet services on a large scale with attributes like scalability, reliability, service management and quality of service. The document outlines requirements for Carrier Ethernet networks including availability, stability, performance, multicast and TDM support, and security.
Carrier Ethernet provides standardized, carrier-class Ethernet services on a global scale. It builds upon Metro Ethernet by expanding the services to cover worldwide networks traversing multiple countries and access networks. Carrier Ethernet is defined by five key attributes that distinguish it from traditional LAN-based Ethernet: it provides standardized services across multiple networks; can scale to support millions of nodes and high bandwidths; offers reliable service with fast protection from link failures; ensures quality of service through service level agreements; and manages services through centralized operations support systems.
This document discusses how carrier-grade Ethernet can ensure reliable communications for utility networks transitioning to support smart grid applications. It covers Ethernet mechanisms that provide carrier-grade performance such as quality of service, resiliency, monitoring and timing synchronization. Choosing between IP, MPLS and Ethernet options is discussed. The document also addresses network security considerations and introduces RAD's carrier-grade Ethernet product portfolio for power utilities.
Enabling 5G X-Haul with Deterministic Ethernet - A TransPacket whitepaperIvar Søvold
Transpacket (www.transpacket.com) explores the concept of Ethernet X-Haul in a newly released whitepaper. Discussed extensively in the mobile industry in connection with 5G, the idea is to have an Ethernet based converged transport network serving multiple purposes including fronthaul and backhaul. The whitepaper presents the RAN architectures under consideration for 5G, and their consequences in terms of requirements for the transport network. It further describes how an innovative Ethernet scheduling mechanism is required to support deterministic Ethernet, and to fully achieve an 5G Ethernet X-Haul. It also introduces two use cases, namely Ethernet Crosshaul, and Indoor Coverage, which demonstrate the added value of deterministic Ethernet for mobile transport applications.
The document discusses the transition to carrier Ethernet networks and the opportunities it provides. Key points include:
- Carrier Ethernet can help meet massive data growth and 4G/LTE applications by leveraging existing wireline infrastructure.
- It provides new revenue opportunities for service providers through mobile backhaul and wholesale services.
- Transitioning to Ethernet reduces operational costs compared to legacy TDM networks and allows incremental bandwidth increases at lower cost.
This document provides information about network topologies and media access methods. It begins by defining a network topology as the physical layout of computers on a network. The four primary network topologies are then described as star, bus, ring, and mesh. Communication methods for bus, ring, and star topologies are explained. Hybrid topologies that combine elements of different primary topologies are also introduced. The document concludes by discussing two common media access methods: CSMA/CD and CSMA/CA.
Networks and telecommunication technologies basicsDavid Kibuki
The document provides an overview of network and telecommunication technologies. It discusses how networks have evolved from single-user PCs to complex multi-user systems connecting organizations. The main types of networks covered include local area networks (LANs), wide area networks (WANs), wireless networks, metropolitan area networks (MANs), and personal area networks (PANs). The document also describes common network structures like server-based, client/server, and peer-to-peer networks. Finally, it discusses popular network topologies such as bus, star, tree and mesh configurations.
This document discusses optical Ethernet networks and related technologies. It defines optical Ethernet networks as networks spanning MANs/WANs that offer carrier-grade Ethernet services over connection-oriented Ethernet transport infrastructures using optical PHYs. Carrier Ethernet provides the service component, while packet-optical transport systems provide the transport and PHY layers in line with various networking standards. Applications include triple-play services, mobile backhaul, and utility infrastructure networks.
This document summarizes a case study on using wireless networking for small businesses. It discusses how wireless networks provide flexibility and mobility compared to wired networks. The document then describes the two main types of wireless networks - ad-hoc peer-to-peer networks and infrastructure networks with access points. It also outlines several key benefits of wireless technology for small businesses, including increased productivity, universal access to corporate data, enhanced IT support, improved data availability, and improved data access for customers.
MPLS-based Metro Ethernet Networks Tutorial by KhatriFebrian
This document provides an overview of traditional metro Ethernet networks and carrier Ethernet services. It discusses:
1. How services were traditionally identified using VLAN IDs and Q-in-Q tagging which allowed for more services by preserving customer VLAN tags.
2. Forwarding was done through dynamic MAC learning in switch databases, which posed scaling issues as databases in all switches had to contain all MAC addresses.
3. Resiliency was provided by variants of spanning tree protocol, but these resulted in unused bandwidth during topology changes.
The document discusses Ethernet technologies and concepts. It covers the basic Ethernet frame format, which includes fields for preamble, start-of-frame delimiter, destination address, source address, length/type, data, and frame check sequence. It also describes half-duplex frame transmission using CSMA/CD (carrier sense multiple access with collision detection) and the process stations follow to transmit frames and handle collisions. Additionally, it provides background on the development of Ethernet standards and the logical relationship between Ethernet and the OSI reference model.
The IEEE 802.3ah standard defines Ethernet connectivity over the "first mile" or last mile to homes and businesses. It specifies Ethernet delivery over copper or fiber networks and defines management capabilities for carriers. 802.3ah eliminates the need for protocol conversions and takes advantage of Ethernet's low costs while providing needed network monitoring. Media converter manufacturers are offering 802.3ah compliant equipment to connect to existing copper networks and provide management of the entire Ethernet link from central office to customer premises.
Ethernet is a widely used wired networking technology that has evolved over generations to support higher data rates. It uses CSMA/CD for media access and defines physical layer standards for copper and fiber optic cabling. Key Ethernet standards include 10BaseT, 100BaseTX, 1000BaseT, and 10 Gigabit Ethernet, with higher speeds enabled by new cabling types and increased maximum segment lengths.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
This document provides an overview of local area networks (LANs), including their components, topologies, and standards. It discusses the IEEE 802 project and standards for Ethernet (IEEE 802.3), Token Bus (IEEE 802.4), and Token Ring (IEEE 802.5). The key topics covered include the characteristics of LANs, common network topologies like star, bus, ring and their advantages/disadvantages, and the access methods used in Ethernet and Token Ring specifications.
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
This document analyzes and compares the performance of MPLS-enabled networks and traditional IP networks. It discusses how MPLS protocol performs with OSPF protocol. Nine Cisco routers running IOS version 12.4 were used to test network performance with MPLS and traditional IP routing. The results show how service providers can benefit from MPLS services by increasing network latency and additional benefits obtained from MPLS. Key areas analyzed include latency, utilization in the network. MPLS networks offer benefits like traffic engineering, scalability, VPN services, and ability to carry layer 2 protocols over the MPLS core.
Ethernet satellite dishinternational plastics, inc. coreo10
The document describes the network infrastructure for International Plastics Inc., which has four locations connected by a WAN. It provides details on the setup at each location, including servers, computers, printers, and networking equipment. The network administrators have identified areas for improvement, such as supporting mobile devices and making changes more easily. They plan to upgrade applications and security, as well as migrate some systems to improve costs, communications, and data management to facilitate the company's continued growth.
The document discusses the technical elements of the public switched telephone network (PSTN). It describes how the PSTN is composed of customer premises equipment, local loops connecting to end office switches, a transport core of trunk lines connecting switches, and a signaling system. It explains how circuit switching is used to establish connections for voice calls and its inefficiency for data. The document also covers cellular network technologies like GSM and how channels are reused across different cells to support more customers.
Network devices such as repeaters, bridges, switches and routers are used to connect and expand networks. Repeaters regenerate signals to expand small networks, while bridges and switches can understand node addresses to segment networks. Routers interconnect different networks and determine optimal routes using network layer addresses and routing protocols. Remote access devices like modems and ADSL modems allow computers to connect to networks over telephone lines by modulating digital signals into analog for transmission.
This document discusses different types of transmission media used in computer networks, including guided and unguided media. It focuses on the three primary types of cables used to build local area networks (LANs): coaxial cable, twisted-pair cable, and fiber optic cable. For each cable type, the document describes the cable construction, common varieties used in networking, maximum data transmission speeds, and typical applications. Twisted-pair cable is highlighted as the most common medium in modern LANs.
WANs use carrier services to connect organizational locations and provide access to external services and remote users. WANs carry various traffic types like voice, data, and video, with telephone and data services being most common. Physical equipment includes customer premises equipment (CPE) connected to the service provider's central office via local loops.
This document provides an introduction to networking and data communication. It discusses key topics such as:
- Data communication is the transmission of data over a communications channel between devices. A network connects computing devices to communicate and share resources either physically or wirelessly.
- Data must be converted into signals to be transmitted over physical or wireless media. Signals can be analog or digital.
- Common network topologies include mesh, bus, ring and star configurations. Hybrid topologies combine elements of different topologies.
- Transmission media can be guided (using cables) or unguided (wireless) and include technologies like twisted pair, coaxial, fiber optic, radio waves, microwaves and infrared.
Optical Ethernet extends Ethernet beyond local area networks into metropolitan and wide area networks. It combines the flexibility, simplicity and cost-effectiveness of Ethernet with the reliability, speed and reach of optical networking. Key components are the ability to segregate different user traffic and deliver customized service levels. Optical Ethernet technologies provide the longest spans and greatest speeds for local area networks today and will continue to advance Ethernet transport capabilities.
Ethernet was first created by Robert Metcalfe and standardized by IEEE as 802.3. Fast Ethernet (802.3u) transmitted data 10 times faster than standard Ethernet at 100 Mbps while still being backward compatible. Gigabit Ethernet (802.3z) further increased speed to 1000 Mbps and supported full duplex between computers and switches or half duplex between computers and hubs using CSMA/CD. Switched Ethernet uses switches containing plug-in cards to reduce collisions by separating collision domains and allowing parallel transmission between cards.
Enabling 5G X-Haul with Deterministic Ethernet - A TransPacket whitepaperIvar Søvold
Transpacket (www.transpacket.com) explores the concept of Ethernet X-Haul in a newly released whitepaper. Discussed extensively in the mobile industry in connection with 5G, the idea is to have an Ethernet based converged transport network serving multiple purposes including fronthaul and backhaul. The whitepaper presents the RAN architectures under consideration for 5G, and their consequences in terms of requirements for the transport network. It further describes how an innovative Ethernet scheduling mechanism is required to support deterministic Ethernet, and to fully achieve an 5G Ethernet X-Haul. It also introduces two use cases, namely Ethernet Crosshaul, and Indoor Coverage, which demonstrate the added value of deterministic Ethernet for mobile transport applications.
The document discusses the transition to carrier Ethernet networks and the opportunities it provides. Key points include:
- Carrier Ethernet can help meet massive data growth and 4G/LTE applications by leveraging existing wireline infrastructure.
- It provides new revenue opportunities for service providers through mobile backhaul and wholesale services.
- Transitioning to Ethernet reduces operational costs compared to legacy TDM networks and allows incremental bandwidth increases at lower cost.
This document provides information about network topologies and media access methods. It begins by defining a network topology as the physical layout of computers on a network. The four primary network topologies are then described as star, bus, ring, and mesh. Communication methods for bus, ring, and star topologies are explained. Hybrid topologies that combine elements of different primary topologies are also introduced. The document concludes by discussing two common media access methods: CSMA/CD and CSMA/CA.
Networks and telecommunication technologies basicsDavid Kibuki
The document provides an overview of network and telecommunication technologies. It discusses how networks have evolved from single-user PCs to complex multi-user systems connecting organizations. The main types of networks covered include local area networks (LANs), wide area networks (WANs), wireless networks, metropolitan area networks (MANs), and personal area networks (PANs). The document also describes common network structures like server-based, client/server, and peer-to-peer networks. Finally, it discusses popular network topologies such as bus, star, tree and mesh configurations.
This document discusses optical Ethernet networks and related technologies. It defines optical Ethernet networks as networks spanning MANs/WANs that offer carrier-grade Ethernet services over connection-oriented Ethernet transport infrastructures using optical PHYs. Carrier Ethernet provides the service component, while packet-optical transport systems provide the transport and PHY layers in line with various networking standards. Applications include triple-play services, mobile backhaul, and utility infrastructure networks.
This document summarizes a case study on using wireless networking for small businesses. It discusses how wireless networks provide flexibility and mobility compared to wired networks. The document then describes the two main types of wireless networks - ad-hoc peer-to-peer networks and infrastructure networks with access points. It also outlines several key benefits of wireless technology for small businesses, including increased productivity, universal access to corporate data, enhanced IT support, improved data availability, and improved data access for customers.
MPLS-based Metro Ethernet Networks Tutorial by KhatriFebrian
This document provides an overview of traditional metro Ethernet networks and carrier Ethernet services. It discusses:
1. How services were traditionally identified using VLAN IDs and Q-in-Q tagging which allowed for more services by preserving customer VLAN tags.
2. Forwarding was done through dynamic MAC learning in switch databases, which posed scaling issues as databases in all switches had to contain all MAC addresses.
3. Resiliency was provided by variants of spanning tree protocol, but these resulted in unused bandwidth during topology changes.
The document discusses Ethernet technologies and concepts. It covers the basic Ethernet frame format, which includes fields for preamble, start-of-frame delimiter, destination address, source address, length/type, data, and frame check sequence. It also describes half-duplex frame transmission using CSMA/CD (carrier sense multiple access with collision detection) and the process stations follow to transmit frames and handle collisions. Additionally, it provides background on the development of Ethernet standards and the logical relationship between Ethernet and the OSI reference model.
The IEEE 802.3ah standard defines Ethernet connectivity over the "first mile" or last mile to homes and businesses. It specifies Ethernet delivery over copper or fiber networks and defines management capabilities for carriers. 802.3ah eliminates the need for protocol conversions and takes advantage of Ethernet's low costs while providing needed network monitoring. Media converter manufacturers are offering 802.3ah compliant equipment to connect to existing copper networks and provide management of the entire Ethernet link from central office to customer premises.
Ethernet is a widely used wired networking technology that has evolved over generations to support higher data rates. It uses CSMA/CD for media access and defines physical layer standards for copper and fiber optic cabling. Key Ethernet standards include 10BaseT, 100BaseTX, 1000BaseT, and 10 Gigabit Ethernet, with higher speeds enabled by new cabling types and increased maximum segment lengths.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
This document provides an overview of local area networks (LANs), including their components, topologies, and standards. It discusses the IEEE 802 project and standards for Ethernet (IEEE 802.3), Token Bus (IEEE 802.4), and Token Ring (IEEE 802.5). The key topics covered include the characteristics of LANs, common network topologies like star, bus, ring and their advantages/disadvantages, and the access methods used in Ethernet and Token Ring specifications.
IRJET- Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET Journal
This document analyzes and compares the performance of MPLS-enabled networks and traditional IP networks. It discusses how MPLS protocol performs with OSPF protocol. Nine Cisco routers running IOS version 12.4 were used to test network performance with MPLS and traditional IP routing. The results show how service providers can benefit from MPLS services by increasing network latency and additional benefits obtained from MPLS. Key areas analyzed include latency, utilization in the network. MPLS networks offer benefits like traffic engineering, scalability, VPN services, and ability to carry layer 2 protocols over the MPLS core.
Ethernet satellite dishinternational plastics, inc. coreo10
The document describes the network infrastructure for International Plastics Inc., which has four locations connected by a WAN. It provides details on the setup at each location, including servers, computers, printers, and networking equipment. The network administrators have identified areas for improvement, such as supporting mobile devices and making changes more easily. They plan to upgrade applications and security, as well as migrate some systems to improve costs, communications, and data management to facilitate the company's continued growth.
The document discusses the technical elements of the public switched telephone network (PSTN). It describes how the PSTN is composed of customer premises equipment, local loops connecting to end office switches, a transport core of trunk lines connecting switches, and a signaling system. It explains how circuit switching is used to establish connections for voice calls and its inefficiency for data. The document also covers cellular network technologies like GSM and how channels are reused across different cells to support more customers.
Network devices such as repeaters, bridges, switches and routers are used to connect and expand networks. Repeaters regenerate signals to expand small networks, while bridges and switches can understand node addresses to segment networks. Routers interconnect different networks and determine optimal routes using network layer addresses and routing protocols. Remote access devices like modems and ADSL modems allow computers to connect to networks over telephone lines by modulating digital signals into analog for transmission.
This document discusses different types of transmission media used in computer networks, including guided and unguided media. It focuses on the three primary types of cables used to build local area networks (LANs): coaxial cable, twisted-pair cable, and fiber optic cable. For each cable type, the document describes the cable construction, common varieties used in networking, maximum data transmission speeds, and typical applications. Twisted-pair cable is highlighted as the most common medium in modern LANs.
WANs use carrier services to connect organizational locations and provide access to external services and remote users. WANs carry various traffic types like voice, data, and video, with telephone and data services being most common. Physical equipment includes customer premises equipment (CPE) connected to the service provider's central office via local loops.
This document provides an introduction to networking and data communication. It discusses key topics such as:
- Data communication is the transmission of data over a communications channel between devices. A network connects computing devices to communicate and share resources either physically or wirelessly.
- Data must be converted into signals to be transmitted over physical or wireless media. Signals can be analog or digital.
- Common network topologies include mesh, bus, ring and star configurations. Hybrid topologies combine elements of different topologies.
- Transmission media can be guided (using cables) or unguided (wireless) and include technologies like twisted pair, coaxial, fiber optic, radio waves, microwaves and infrared.
Optical Ethernet extends Ethernet beyond local area networks into metropolitan and wide area networks. It combines the flexibility, simplicity and cost-effectiveness of Ethernet with the reliability, speed and reach of optical networking. Key components are the ability to segregate different user traffic and deliver customized service levels. Optical Ethernet technologies provide the longest spans and greatest speeds for local area networks today and will continue to advance Ethernet transport capabilities.
Ethernet was first created by Robert Metcalfe and standardized by IEEE as 802.3. Fast Ethernet (802.3u) transmitted data 10 times faster than standard Ethernet at 100 Mbps while still being backward compatible. Gigabit Ethernet (802.3z) further increased speed to 1000 Mbps and supported full duplex between computers and switches or half duplex between computers and hubs using CSMA/CD. Switched Ethernet uses switches containing plug-in cards to reduce collisions by separating collision domains and allowing parallel transmission between cards.
OTN networks provide transparent transport of client signals while protecting client management information and enabling low latency transport through enhanced fault detection and correction capabilities. Ciena enhances OTN with support for low-rate client interfaces, sub-wavelength grooming to improve efficiency, and intelligent control plane automation. The Optical Transport Network defined in ITU G.709 standards allows convergence of networks through transport of legacy and future client protocols with flexibility.
Super capacitors, also known as ultracapacitors, are energy storage devices that can store and release energy faster than batteries. They store energy electrostatically through a process called electric double-layer capacitance. While super capacitors have lower energy density than batteries, they can provide burst of power and undergo hundreds of thousands of charge/discharge cycles. Applications of super capacitors include use in electric buses for rapid charging at stops, diesel engine startups, and as power sources for devices requiring brief high power.
The document discusses various Ethernet protocols and standards including:
- IEEE 802.3u and 802.3z which define Fast Ethernet and Gigabit Ethernet transmission rates.
- IEEE 802.1D, 802.1s, and 802.1w which relate to Spanning Tree Protocol (STP) and its variants for avoiding loops.
- IEEE 802.1Q for VLAN tagging to logically separate traffic on a physical LAN infrastructure.
- IEEE 802.3ad for Link Aggregation to combine multiple network links into a single logical trunk to increase bandwidth and redundancy.
This document provides an overview of advances in Ethernet technology. It discusses the evolution of Ethernet beyond its original use as a LAN technology. It describes different standards body views of Ethernet and key Ethernet concepts like frames, addressing, clients, and link layer control protocols. The document also outlines modern Ethernet features like VLANs, Ethernet services, QoS, link aggregation, and OAM functions.
How to create a logo using Microsoft Powerpoint?ANURAG BANSAL
Learn how you can easily create impressive logo using Microsoft PowerPoint yourself. Don't need to hire a designer to create a simple logo as long as you have a basic idea in mind.
This document provides an overview of Ethernet in a presentation for a computer networks class. It begins with an introduction to Ethernet and network topologies. The technology section discusses Ethernet standards, frame formats, and cable types. Devices covered include switches, routers, and the differences between them. Applications like firewalls and IP spoofing are also mentioned. The summary reiterates the key topics discussed, including the introduction of Ethernet, technologies and devices, and applications. It also outlines the future of Ethernet, such as vehicular uses and standardizing software-defined networking.
A supercapacitor or ultra capacitor is an electrochemical capacitor that has an unusually high energy density when compared to common capacitors. They are of particular interest in automotive applications for hybrid vehicles and as supplementary storage for battery electric vehicles.
An Ethernet frame contains 6 segments: the preamble, destination and source addresses, type/length field, data/payload, and frame check sequence. It can carry higher-level network protocols like IP packets. The frame always refers to the physical transmission medium, while a packet can be transmitted over different mediums. Jumbo frames are larger than the standard 1500 byte frame size and introduce VLAN tagging to identify specific VLANs and prioritize traffic between interconnected devices.
An Optical Transport Network (OTN) uses optical fiber links to connect network elements and provide transport, multiplexing, routing, management and protection of client signals. OTN applies these functions from SDH/SONET to DWDM networks, and offers stronger error correction, more monitoring levels and transparent transport of client signals compared to SDH/SONET. This document describes OTN architecture, interfaces and standards, the optical transport hierarchy of multiplexing ODUk, OPUk and OTUk signals, and the containment and frame rates of these signals.
1) Carrier Ethernet provides more flexible bandwidth scalability compared to legacy technologies like T1, E3, SONET, and ATM. Bandwidth can be remotely provisioned up to the Ethernet port speed without needing new equipment or sending a technician.
2) Carrier Ethernet differs from traditional Ethernet in that it connects entire organizations to an Ethernet port across wide areas between buildings rather than within a single building.
3) Carrier Ethernet can be implemented over various layer 1 transport technologies like fiber, SONET/SDH, MPLS, or microwave. It provides standardized Ethernet services like E-Line, E-LAN, and E-Tree.
Services and applications’ infrastructure for agile optical networksTal Lavian Ph.D.
Huge advancements in optical devices, components and networking.
The underline of the Internet is optical – How can we take advantage of this?
How can the applications take advantage of this?
Agile Optical Network is starting to appear. What services and interfaces we’ll need between the optical control and the applications?
What are the applications?
The Internet architecture was built on some 15-20 years old assumptions. Are some modifications needed?
Is packet switching good for all? In some cases, is circuit switching better? (move TeraBytes of SAN date, P2P, Streaming)
End-to-End Argument – Is is valid for all cases?
What cases not? What instead?
The current Internet architecture is based on L3. What is needed in order to offer services in L1-L2?
Computation vs. Bandwidth 10X in 5 years
The document discusses MPLS VPN and Reliance Communications' MPLS VPN solution. It provides an overview of MPLS VPN and its benefits, including flexibility, scalability, security, and quality of service. It then describes Reliance's MPLS network and data centers, and how their solution addresses challenges around performance, security and flexibility for corporate networks.
The 5-day course covers preparation for the MEF-CECP exam, focusing on carrier Ethernet concepts. Day 1 introduces carrier Ethernet and MEF services, including E-Line, E-LAN and E-Tree services. Participants learn about legacy Ethernet limitations addressed by carrier Ethernet, as well as the key attributes and components of carrier Ethernet networks.
This document provides an overview of wide area network (WAN) concepts and technologies. It discusses the purpose of WANs in connecting local area networks, common WAN topologies, and how WANs relate to the OSI model. The document also examines various WAN technologies including dedicated circuits, Frame Relay, ATM, Ethernet, MPLS, and broadband options. Key considerations for selecting a WAN technology include whether to use a private WAN infrastructure with a service provider or a public WAN over the internet using VPNs.
This document compares the next-generation mobile broadband technologies LTE and WiMAX. It describes their quality of service (QoS) structures and how they are designed to support current and future QoS needs to sustain various application requirements. The document provides details on LTE and WiMAX standards, architectures, and QoS support through different bearer types and service flows.
EtherNet/IP is an industrial Ethernet network solution that implements the Common Industrial Protocol (CIP) using Ethernet technology. It provides a unified communication architecture for manufacturing automation applications like control, safety, and information collection. EtherNet/IP leverages the widespread adoption of Ethernet and TCP/IP protocols to provide a cost-effective networking solution for industrial devices while enabling connectivity to enterprise networks. It supports real-time I/O messaging and explicit device messaging over Ethernet using CIP.
EtherNet/IP is an industrial Ethernet network solution that implements the Common Industrial Protocol (CIP) using Ethernet technology. It provides a unified communication architecture for manufacturing automation applications like control, safety, and information collection. EtherNet/IP leverages the widespread adoption of Ethernet and TCP/IP protocols to provide a cost-effective, scalable networking solution while enabling connectivity to enterprise systems. As a CIP network, it supports producer-consumer messaging and flexible device configurations.
This document discusses various local area network (LAN) technologies. It begins by defining LANs and explaining that they can connect devices within a single building or across multiple buildings. Common LAN technologies discussed include Ethernet, Token Ring, fiber, and wireless networks. Ethernet is currently the most widely used standard. Fast Ethernet and Gigabit Ethernet are also covered as higher-speed successors to standard Ethernet. The document also examines protocols, the OSI model, Ethernet coding standards, and different types of media like twisted pair and fiber optic cables.
Quality of service refers to a network's ability to provide reliable communication through factors like error rates, bandwidth, throughput, transmission delay, availability, and jitter. These factors influence a network's capability to deliver secure and reliable service. Measuring these QoS factors allows efficient use of network resources and comparison of different networks' overall performance.
Stable Ethernet TCP/IP Real Time Communication In Industrial Embedded Applica...IJRES Journal
This paper discusses using Ethernet for real-time communication in industrial embedded applications. It first reviews using switched Ethernet to eliminate collisions and enable real-time data transmission. It then examines different industrial Ethernet technologies like EtherCAT and how priority scheduling and other techniques can enhance real-time performance. Various simulation results are presented showing the impact of parameters like packet processing rate and non-real-time traffic on latency. Finally, it concludes that industrial Ethernet networks using intelligent switching can offer advantages over traditional networks while enabling Internet connectivity if techniques like traffic shaping and multicasting are used.
With the rapid growth of IP networks in South-Asia in the past
few years, and the advent of new services and applications -- be they
wireless/wireline broadband Internet access, cable telephony, VoIP, remote
teleconferencing, e-governance, or mobile entertainment -- a key
issue before carriers is how to design and operate their networks as
methodically and as efficiently as possible to maximize both customer
retention and profits.
While several best practices typically emerge from each provider\'s
unique situation and cumulative experience (the "art" of network design), there
are certain operational precepts that systematize and streamline the
complex, multi-dimensional task of designing and managing modern, operational
IP networks (the "science" of network design).
In this talk, we first discuss the overall network design process and the
manner in which control over the network must be exercised at varying
timescales to achieve efficient operation. Next we discuss the
functions that the operational, engineering, and planning teams at a
carrier must typically execute, their inter-relationships, and
the importance/rationale for performing them to optimize network
performance.
We then outline some network design best practices that have evolved
over the past decade, drawing upon examples of carriers such as
Sprint, Global Crossing, AT&T, NTT, and Reliance. We conclude with
a look at some automated traffic engineering and planning tools,
and how they enable carriers to rapidly identify potential
performance problems, rigorously experiment with/evaluate design
options, perform thorough scenario and network analysis, and
develop robust designs.
Frame Relay is a packet-switched protocol that operates at the physical and data link layers of the OSI model. It was originally designed for ISDN interfaces but is now used over various network interfaces. Frame Relay is more efficient than X.25 and offers higher performance without retransmission capabilities. Frame Relay uses data terminal equipment (DTE) connected to data circuit-terminating equipment (DCE) via physical and link layer connections to transmit data packets over wide area networks.
The document discusses challenges and security issues related to the Internet of Things (IoT). It notes that while IoT provides many benefits across various industries like healthcare, transportation, and more, it also faces challenges. Key challenges include the large number of devices and sensors requiring unique identification, and the need for proper data storage, management, and processing. Regarding security issues, the document states that IoT devices are vulnerable to attacks due to limited computing resources. It proposes using cloud computing and other techniques to help build a more secure IoT infrastructure.
This document proposes evolving carrier Ethernet architecture by combining segment routing and SDN technologies. Segment routing uses IS-IS or OSPF extensions to distribute MPLS labels without LDP. This simplifies network infrastructure while providing rich converged services with high availability and agility. Unified MPLS currently addresses challenges but is complex; segment routing and SDN could accelerate service deployment and reduce complexity by reducing management protocols. The proposal uses segment routing for transport and SDN for centralized service layer control.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document presents a novel approach for minimizing delay and load in wireless networks (WiMAX) developed by Shilpa Mehta et al. It begins by introducing WiMAX and discussing challenges in providing quality of service. It then proposes a new scheduling algorithm called QOS Recovered that aims to minimize delay and load by fixing queue size and number of packets. The algorithm is compared to the existing weighted fair queuing algorithm through simulation. The document provides background on scheduling in WiMAX and discusses common scheduling strategies and algorithms. It also describes using the OPNET simulator to model the wireless network and evaluate the new algorithm's performance.
This document discusses introducing IP transport capabilities into the Cello Packet Platform (CPP) telecommunications technology. It notes that voice traffic is being replaced by data traffic, putting new demands on networks to handle both delay-sensitive and packet-oriented traffic. While ATM was considered the solution for quality of service, issues around scalability, administration and cost have emerged. The document outlines six basic principles for IP services in CPP, including embedding an IP router across the main processor cluster and device boards, and fully distributing IPv4/IPv6 forwarding in hardware or software. Introducing IP support in CPP provides benefits to network operators by offering a consistent solution for TDM, ATM and IP transport.
Ethernet and Fast Ethernet standards define the physical implementation of local area networks using twisted pair cable and fiber optics. Ethernet uses CSMA/CD access method over coaxial cable or twisted pair up to 100 meters, while Fast Ethernet operates at 100 Mbps over twisted pair or fiber. Repeaters can extend the length of an Ethernet segment by regenerating the signal past the maximum segment distance.
Similar to Milcom10 T10 Optical Ethernet Sharma Davari 2010 11 01 (20)
A presentation given at the IoT World, May 2016 discussing why IoT innovation has significant economic impact, the legal and commercial challenges to the IoT Ecosystem, and the impact of new IP regulations (AIA, Banks, open-source models). We also assess the IP landscape for IoT looking the a taxonomy of technologies involved, the key owners, and areas ripe for licensing, and conclude with a look to the future.
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...Vishal Sharma, Ph.D.
Network Infrastructure Security in Cellular Data Networks: An Initial Investigation - a presentation of the research by the Wireless Networks Research Group at IIT Bombay at SANOG (The South-Asian Network Operators Group) in January 2006.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.Vishal Sharma, Ph.D.
The document discusses how a company called Metanoia, Inc. can help partners in 7 key areas to accelerate profits. It outlines Metanoia's expertise in strategic consulting, systems design and technical guidance for telecommunications operators and vendors. The document promotes Metanoia's services and credentials, highlighting case studies where they helped clients solve problems, evaluate technologies and plan network migrations. It argues that partnering with Metanoia can boost partners' initiatives, revenues and productivity through collaborative problem solving.
A New Analysis for Wavelength Translation in Regular WDM NetworksVishal Sharma, Ph.D.
We present a new analysis of wavelength translation in
regular, all-optical WDM networks, that is simple, computationally
inexpensive, and accurate for both low and high
network loads. In a network with
k
wavelengths per link,
we model the output link by an auxiliary
M/M/k/k
queueing
system. We then obtain a closed-form expression for
the probability
P succ
that a session arriving at a node at a
random time successfully establishes a connection from its
source node to its destination node. Unlike previous analyses,
which use the link independence blocking assumption,
we account for the dependence between the acquisition of
wavelengths on successive links of the session’s path. Based
on the success probability, we show that the throughput per
wavelength increases superlinearly (as expected) as we increase
the number of wavelengths per link; however, the
extent of this superlinear increase in throughput saturates
rather quickly. This suggests some interesting possibilities
for network provisioning in an all-optical network. We verify the accuracy of our analysis via simulations for the torus
and hypercube networks.
A carrier-oriented panel conceived, co-ordinated, moderated/chaired by me (with great inputs from the NANOG Program Committee, and our PC Liason, Tony Tauber of Comcast), as part of our "Network Health Assessment to Lower TCO!" initiative, where our focus is to gather carrier eco-system thinking around contemporary carrier issues/challenges, to explore what we are doing well, what the needs of the...
Capacity Planning Panel - Operator and Eco-System Player DiscourseVishal Sharma, Ph.D.
This is a service-provider oriented panel hosted at NANOG52 in Denver, CO, that I coordinated (with Nina Bargisen of TDC with help from Phil Griston, Cariden, and Timothy Hu, WANDL) and moderated/Chaired. The panel involved excellent presentations by Tom Lundstrom (Qwest) and Duke Fisher (Verizon) on how they were using network planning and design tools to effectively handle large-scale design..
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...Vishal Sharma, Ph.D.
This document discusses internet routing protocols and provides an overview of distance vector and link state routing. It begins by outlining the talk and explaining the importance of routing in the internet. It then describes the routing process at a router and how routers build routing tables by exchanging information with routing protocols. The document proceeds to illustrate the operation of distance vector routing, including how routers calculate and update their routing tables. It notes some drawbacks of distance vector routing, such as slow convergence after topology changes and problems with unequal link costs. Finally, it provides examples of how these drawbacks, like counting to infinity and bouncing effects, can occur.
This classic talk from 2002-03, captures some of the key traffic engineering and core network design strategies deployed by carriers from the early 1990's to early 2000's, and (now, in 2011!) provides a great historical perspective on how network cores have evolved. It will prove valuable for those looking to understand network evolution, and the operational principles and considerations behind it...
This talk/tutorial was one that I delivered to multiple organizations -- ranging from semiconductor houses, to start-up system vendors, to research and academic institutions, back in the 2002 time frame. As the abstract below illustrates, it captures the key essence & principles behind the router designs of two of the most popular and landmark switch/routers in our industry -- the Cisco...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Vishal Sharma, Ph.D.
This is an early short tutorial from back in 2001 that focuses on the control of dynamic (or agile) optical networks. We begin by highlighting the motivation for such networks, their basic requirements, and the advantages of agility. We examine the functionality needed for routing and connection establishment in such dynamic networks, and compare possible candidates for the design of such a...
Design Considerations for Converged Optical Ethernet NetworksVishal Sharma, Ph.D.
Transport networks have evolved to support a variety of traffic types over greater distances due to technologies like WDM and DWDM. This has led to a transition from voice-dominated to multi-service networks. Advances in optical networking components like EDFAs, AWGs, and ROADMs along with multi-service platforms have enabled direct transport of Ethernet frames over optical wavelengths without intermediate protocols. Further standards development aims to provide carrier-class qualities to Ethernet while optical networking seeks greater flexibility through technologies like DOADMs. Future networks will require dynamic bandwidth allocation and lower-cost metro access solutions.
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks Vishal Sharma, Ph.D.
The main theme of this workshop is to elucidate medium access control (MAC) layer operation and cross-layer system and network design techniques for providing Quality-of-Service (QoS) in wireless broadband networks, and to put it in the context of military communications. We will use the IEEE 802.16 standard as an example for the rich feature set it presents, and the flexibility it provides for...
Metanoia is a technology consultancy that provides expertise in telecommunications networks. The document outlines Metanoia's background and expertise. It then summarizes a workshop on Metro Ethernet technologies that Metanoia will present. The workshop will cover legacy networks, Metro Ethernet Forum standards, Ethernet over legacy networks, native Ethernet services, and technologies like MPLS, VPNs, and resilience.
Since the photonic layer is the cheapest on a per-bit, per-function basis, and since
the key imperative before operator's today is to bridge the yawning gap between
exponentially increasing data traffic on the one-hand, and flat-to-declining revenues
on the other, a tighter coupling between the packet and optical layers to derive
operational, management, and deployment efficiencies, has...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...Vishal Sharma, Ph.D.
The operator's paradox, for the past several years now, has been that while there is an explosion in data traffic volumes to the tune of 45-65% yearly, the corresponding revenue growth is in the single digits at best. To bridge this gap between rising operating costs (spurred by increased network capacity demands) and relatively flat revenues, providers must assess how to better architect their...
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) ToolsVishal Sharma, Ph.D.
Designing & managing operational IP networks is a complex, multi-dimensional
task. A fundamental problem before carriers today
is to optimize network performance by better resource allocation to traffic demands.
This requires a systematic evaluation of options, a thorough scenario analysis,
and foolproof verification of network designs, all of which are increasingly
possible only with help from automated TE and planning tools.
In the past few years, significant advances have been made in enhancing existing
tools and developing new ones that help providers rapidly identify potential
performance problems, experiment with solutions, and develop robust designs.
Several techniques from optimization theory, linear programming, and
models of effective bandwidth calculation have been incorporated in such
tools, as have detailed models of several vendor systems.
We present a comparative analysis and an overview of key features of some key
commercially available network planning/TE tools, and outline how
they could be leveraged by carrier network engineering/planning
organizations to perform detailed network analysis, proactive/reactive
TE, and network design.
We first give an overview of the architecture, design philosophy, and canonical
features of modern design tools, and then focus on new enhancements to some
popular tools
as well as key distinguishing features of some newly developed ones.
In particular, we focus on decision support tools for IP network planning
and network analysis, including the latest versions from
WANDL, OPNET, Cariden..
We also present a perspective on current outstanding carrier requirements
for TE/planning tools that was synthesized by our conversations with
several leading Tier 1 and Tier 2 carriers.
A fundamental problem before carriers today is to optimize network cost
and performance by better resource allocation to traffic demands. This is especially
important with the packet infrastructure becoming a critical business resource.
The key to achieving this is traffic engineering (TE), the process of
systematically putting traffic where there is capacity, and backbone
capacity management, the process of ensuring that there is enough network
capacity to meet demand, even at peak times and under failure conditions,
without significant queue buildups.
In this talk, we first focus on the TE techniques and approaches used
in the networks of two large carriers: Global Crossing and
Sprint, which represent the two ends of the traffic engineering spectrum.
We do so by presenting a snapshot of their TE philosophy, deployment strategy,
and network design principles and operation.
We then present the results of an empirical study of backbone traffic
characteristics that suggests that Internet traffic is not self-similar at
timescales relevant to QoS. Our non-parametric approach requires minimal
assumptions (unlike much of the previous work), and allows
us to formulate a practical process for ensuring QoS using backbone
capacity management.
(This latter work is joint with Thomas Telkamp, Global Crossing Ltd. and Arman
Maghbouleh, Cariden Technologies, Inc.)
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
Furnish executives, senior engineering mgt., and technology experts at vendors & service providers (carriers, operators, MSOs, ISPs, ILECs, IXCs) with a bird’s eye view of how Metanoia, Inc. can be of service to them.
Set context for an interactive presentation/meeting to follow, where we can:
Present details of our service provider and/or vendor activities;
Discuss key points of problems solved/projects done;
Respond to queries in real-time
Review 8 key operator areas of interest (based on our analysis/interactions) as operators evolve their networks/services in an increasingly competitive world.
Highlight the top 4-6 issues within each area that, based on our assessment, operators are concerned about in the medium term, and furnish executives, senior engineering mgt., and technology experts at service providers (carriers, operators, MSOs, ISPs, ILECs, IXCs) with a bird’s eye view of how Metanoia, Inc. can be of service to them.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
43. Evolved Backhaul Network Common transmission infrastructure for different technologies (TDM and packets)
44.
45.
46. MEF Services for Mobile Backhaul Services muxed at RNC UNI Needed when inter-BS communication is permitted like in LTE/802.16m (WiMAX) EVPL Service for Backhaul using Metro Ethernet Networks EVP-LAN Service for Backhaul using Metro Ethernet Networks
47. MEF Services for Mobile Backhaul EVP-Tree Service for Backhaul using Metro Ethernet Networks
48. Key Developments Valuable for Military Adoption of Optical Ethernet Metanoia, Inc. Critical Systems Thinking™
49.
50. Recent Advances in Optical Ethernet Standards: Snapshot IEEE Fast last mile access (EPON, 802.11n), HS i/fs (40G,100G) Higher-Speeds MEF E-Tree (p2mp communication for multicast) New Services IETF, MEF FCoE, Ethernet PWs, Circuit Emulation over Ethernet (MEF 8) Interworking IEEE Hierarchy via Shortest Path Bridging (PLSB) Provider Back-bone Bridging (802.1ah) Scalability IEEE LinkSec, MACSec, Authentication Security IEEE, ITU-T SG 15 Connectivity Fault Mgt. (802.1ag), Perf. Mgt. (Y. 1731) OAM IEEE, MEF, IETF SyncE (link-layer clock distribution) 1588v3 (network level time & clock distribution) Demarcation devices (MEF NID) Automatic SLA negotiation (MEF E-LMI) Ethernet as transport (PBB-TE) MPLS-TP (Transport Profile): applicable for COE New Capabilities ITU-T SG15 Linear (G.8031) & ring (G.8032) protection Reliability/ Protection Stds. Organization(s) Standard and/or Activity Area
51.
52. MAC Sec Packet Format TCI = Tag Control Info. AN=Association No. SL = Short Length (i.e. no SCI inserted) PN = Packet No. SCI= Secure Channel ID (optional)
53.
54. Ethernet OAM & Maintenance Domains Independent OAM can be run in each OAM domain for the same VLAN IEEE provides for 8 levels of Maintenance Domains – allows a level to be assigned to each entity – customer, provider, operator Access Core Access Customer Customer Service Provider Customer OAM Domain Provider OAM Domain Operator OAM Domain Operator OAM Domain Operator OAM Domain
55. Ethernet OAM: Loopback (LB) Example for Provider & Operator Domains Access Core Access Customer Customer Service Provider Customer OAM Domain Provider OAM Domain Operator OAM Domain Operator OAM Domain Operator OAM Domain Independent OAM can be run in each OAM domain for the same VLAN We show operator, provider, and customer loopback examples above E2e Ethernet path Provider LB Operator LBs Customer LB
56.
57. IEEE 1588 Synchronization Operation & Clock Offset Computation Clock Offset Computation MS delay = t2 – t1 SM delay = t4 – t3 offset = {MS_delay –SM_delay}/2 1588 Operation
58. How Optical Ethernet Meets Key Technology Requirements of Military Networks Metanoia, Inc. Critical Systems Thinking™
67. Glossary (1) Equal Cost Multi-Path ECMP End to End e2e Dense Wavelength Division Multiplexing DWDM Deep Packet Inspection DPI Department of Defence DoD Data Communication Network DCN Destination Address DA Common Off-The-Shelf COTS Communities of Interest COI Customer Edge CE Connection Admission Control CAC Backbone Virtual ID B-VID Base Transceiver Station BTS Base Station Controller BSC Backbone MAC B-MAC Backbone Edge Bridge BEB Backbone Core Bridge BCB Access Control List ACL Multi-Protocol Label Switching - Transport Profile MPLS-TP Multi Protocol Label Switching MPLS Multi-point to Multi-point mp2mp Metro Ethernet Network MEN Metro Etherent Forum MEF Label Distribution Protocol LDP Line Card LC Link Aggregation Group LAG Individual Service ID I-SID Internet Group Management Protocol IGMP Internet Engineering Task Force IETF Institution of Electrical and Electronic Engineers IEEE Hierarchical QoS H-QoS Gigabit-capable PON GPON Ethernet Virtual Circuit EVC Ethernet Passive Optical Network EPON Ethernet Local Management Interface ELMI
68. Glossary (2) Provide Link State Bridging PLSB Physical Layer PHY Provider Edge PE Provider Backbone Bridging - Traffic Engineering PBB-TE Provider Backbone Bridging PBB Provider Bridging PB Point to Multi-point p2mp Optical Transport Network OTN Out of Band OOB Optical Data Unit ODU Operations, Administration, and Maintenance OAM Non-Stop Routing NSR Non-Stop Forwarding NSF Network-facing-Provider Edge device N-PE Network Management System NMS Next-Generation Network NGN Multiple Spanning Tree Protocol MSTP Transparent Interconnection of Lots of Links https://datatracker.ietf.org/wg/trill/charter/ TRILL Time Division Multiplexing TDM Spanning Tree Protocol STP Shortest Path Tree SPT Synchronous Optical Network SONET Synchronous Digital Hierarchy SDH Source Address SA Resource Reservation Protocol - Traffic Engineering (RSVP protocol with MPLS traffic engineering extensions) RSVP-TE Rapid Spanning Tree Protocol RSTP Radio Network Controller RNC Quality of Service QoS Pseudowire PW Packet Switched Network PSN Plain Old Telephone Service POTs Passive Optical Network PON
69. Glossary (3) Virtual Private Network VPN Virtual LAN VLAN User-facing-Provider Edge device U-PE User Network Interface UNI
70. Appendix: Word on Provider Bridging (PB) and Provider Backbone Bridging (PBB) Metanoia, Inc. Critical Systems Thinking™
71.
72. Provider Bridge (IEEE 802.1ad) Architecture CE: Customer Equipment UNI: User-to-Network Interface CES: Core Ethernet Switch/Bridge P-VLAN: Provider VLAN UNI-B CES CES CE-A UNI-A UNI-C CE-C Spanning tree CE-B CES Customer Network Customer Network Customer Network
73.
74. Provider Backbone Bridging (PBB) Architecture CPE B CPE A CPE C Provider backbone network (802.1ah) CPE B CPE A 802.1ad CPE B CPE B 802.1q CPE C Provider backbone network (802.1ad) CPE D CPE D CPE C CPE A Provider backbone network (802.1ad) Provider backbone network (802.1ad) Provider backbone network (802.1ad)
Editor's Notes
Over the last few years, Ethernet technology has seen tremendous advancements in features, network architecture, switch/router system design, and integration with optical technologies. Our goal in today’s tutorial is to provide a clear, conceptual overview of optical Ethernet technology advances, network architectures, systems evolution, and benefits for military and defense network planners, network architects, and system engineers. [Do a poll to ask: 1. How many people are familiar with Ethernet technology? 2. How many are familiar with optical Ethernet technology? 3. How do they define “optical Ethernet”? (Write it down, for later reference) 4. How many are involved in Ethernet-based systems or network design? This is to get a feel for the background and knowledge-level of the audience, so we can structure our discussion accordingly.]
Today’s tutorial has 4 main parts. 1) We will first discuss the key attributes of DoD’s net-centric data strategy, and the desirable features of military-grade networks, and show what this means for the packet-switched and transport technologies themselves, the network architecture and the systems deployed in them. Our goal will be to show that optical Ethernet technology meets many of these requirements, making it a viable candidate for use in military environments and networks. 2) To do so, we will first discuss the benefits of Ethernet technology for the military & military networks, and outlineA several applications of Ethernet in the military context. Next our discussion will focus on the basics of Optical Ethernet – starting with the 3 roles of Ethernet in the network, to the relationship between “Carrier Ethernet” and “optical Ethernet.” 3) Having done this, we will examine several macro architectural models for building MAN/WAN networks using optical Ethernet, and some of the key network design principles involved in each model. 4) And, finally, we will focus on the major recent developments in optical Ethernet technology that facilitate it’s adoption by the military/defense. Towards the end, we will bring this all together, by demonstrating how optical Ethernet technology meets the requirements and possesses the attributes outlined at the beginning of the tutorial.
Yammer is military equivalent of Twitter. The DoD’s net-centric data strategy was originally formulated in the 2003-2004 time frame, initially in the form of high-level direction to various departments, and, over the years, become increasingly specific about implementation and policy. The past several years have been spent in both refining and propagating this strategy through the military establishment. Here are it’s key attributes: Visible: implies it is available to a large audience of both known and un-anticipated users. Rapid Discovery: implies that data should be quickly found. This happens by categorizing and tagging data assets with structured metadata. Understandability: facilitated by rich, descriptive meta-data Shared spaces: data should be accessible by ultra-large user groups (multiple departments or agencies in parallel), and so should be posted in spaces where quick and efficient access is possible. Post-and-Process: this was a reversal of the military’s long-standing paradigm of task-process-exploit-disseminate and it’s one-to-one, need-basis communication. Indeed, the net-centric strategy encourages the task-post-process-use paradigm, by encouraging the posting of raw/unprocessed data (with the right metadata), so it is available to many users in parallel. E.g. data from the Afghan war front collected by the military, may now be available to the FBI, CIA, and numerous regional terror fighting agencies. E.g. Insurgents attack a unit using specific methods – this info. is usable by Pentagon to create strategy, PR dept. to see casualties, FBI to capture criminals, CIA to see flow of smuggled goods – opium. 6) Repurposing of data: With the data sharing paradigm, comes the need to keep the data distinct from the applications (and agencies) that may use it. This allows users to choose multiple applications to analyze, dissect, exploit the same data. By increasing the # of users and the # of ways in which the data is utilized, the DoD’s increases its ROI on data gathering. It also reduces the cost and effort entailed in duplicating efforts on data gathering by different agencies. 7) Handle Info. Only Once: As soon as data and applications are separated, it is natural to reduce duplicative data production/handling. By validating a user’s identity, different users may be given varying levels of access to the same data, thus requiring it to be processed, tagged, and handled only once (or minimally). 8) An important precept of the strategy was to actively collect user feedback on the process, and continually refine/improve it over time.
The specific strategic goals that emerge from the key attributes laid down by the DoD were to make data: visible, accessible, understandable, trusted, interoperable, and responsive, and available to various communities of interest, and to make the strategy institutionalized in various defense establishments. So, what do these goals mean? Visible: implies that the data is easily discoverable by potential users, who can manipulate the data, analyze it, and make decisions based on it. Accessible: implies a large # of users should be able to consume it, and the data location should be easily reachable Understandable: implies use descriptive metadata to clarify the meaning and purpose of the data. Trusted: implies that the integrity and quality of the data must be vouched for by a reliable organization that gathered it/made it available. Interoperable: implies data should be usable by many, while keeping its accuracy & integrity intact. Communities of Interest: implies that data management is decentralized to dynamic groups of interest, and used/analyzed by them based on immediate operational needs. Plus, the underlying infrastructure (networks, systems) must support the ability to dynamically convene and synchronize the COI. Finally, two user-oriented goals are: Responsive: implies be attentive to user needs, especially those wrt content coverage, quality, and performance of data access. Institutionalized: implies allow for procedures/policies to be established in each dept. for efficient data sharing.
We now look at the requirements of military-grade networks to understand what additional features are needed in networks that are designed for military/defense use.
Reliable built in redundancy. Here is a chart summarizing the 9 key requirements/attributes of military-grade networks, from our perspective. I’m going to take a little time to explore each of these in detail, since they will impact the choice of technology, and the design of networks and systems deployed for the military. i Rugged: Military networks and network gear must operate in harsh environments – extreme weather (heat, cold, moisture) or demanding conditions (confined spaces, vibration, shock, corrosion, gases) and EMI/EFI (Electro-Frequency Interference). As a result, the gear must be able to withstand these extremes. ii Secure: The military needs high-integrity data that is un-tampered, and uncorrupted, since critical mission or tactical decisions depend on it or sensitive info. (radar data, video image, communications) is being conveyed on it. iii) Reliable: critical and time-sensitive info. implies networks should be highly reliable, and have the ability to recover quickly from network failures. iv) Hard QoS: Warfighters increasingly use rich video/sensor data, and military commun. is moving to multi-media – this increases b/w requirements and needs data movement with the right fidelity. Applications like cluster computing, grid computing, and virtualization, all rely on moving data with the right quality through the network. Since timing/sync. info. is also transmitted over the network, it needs tight tolerances on delay, jitter, and loss. v) Fast connection setup: An important capability needed is the ability to do dynamic and quick call setup. This is needed to build COI’s over he underlying infrastructure. (One needs signaling and ELMI extensions, for example, to implement this.)
Manageable: With mixed communications, multiple media, large user bases, and dynamic content, having the ability to manage networks, diagnose problems, and control resources is key. Highly Available: Critical defense communications need 6 nine’s reliability or a near-zero downtime, because loss of real-time info. from the battlefield, command centers or between warfighters can mean the difference between victory and defeat! Diverse Access: Defense networks (Army, Navy, Air Force, Marines) utilize a very wide variety of technologies, from wireline to wireless ranging from 64Kbps dial-up links, to VSAT and satellite links, to optical fiber, microwave, Wi-Fi etc. This is because this mix of last-mile technologies allows the network to extend to the individual serviceman, vehicle, airborne end-node, or an aircraft, ship or armoured truck. Plus, defense establishments are spread over widely varying geographic regions, with much different access technologies – copper, fiber, coax, wireless. So, clearly a wide variation in access types must be accommodated Support of legacy and advanced services/applications: Again, defense networks utilize technologies ranging from the legacy to the ultra-modern, from T1 lines to mult-gigabit links, and from simple devices to complex Ethernet/IP routers. Thus, any technology adopted for military networks, must support both legacy and advanced services, and be able to transition the legacy services to more advanced services over a period of time.
Having outlined the goals of the DoD’s net-centric strategy, as well as the key attributes of military-grade networks, we now map these attributes to the features/requirements imposed on the underlying technology, the system and network architecture. We look at this in two parts – focusing first on the implications of the net-centric strategy, and then on the implications of military-grade requirements.
Scalability - the need for many locations, many end-nodes, and ultra-large user populations implies scalability is a must. Technology: For the underlying technology this means haivng a large address space, the ability to create/manage hierarchy, and the presence (preferably) of an automated control plane that facilitates discovery, topology learning & control. Systems: must have large memory and processing for their address/routing tables on line cards and control cards, and the capacity to support a large number of tunnels to create paths between many locations/nodes. Architecture: Network architecture should support many end-nodes, be designed to easily support hierarchy and traffic engineering (for tunnels). Additionally, architecture must be conducive to a wide geographic reach from access, metro to core. Security —the need for data integrity/trust implies support of security mechanisms/techniques. Technology: must preferably support link, segment and e2e security, the ability to isolate groups/classes of users, and the ability to detect breaches of configured policies designed to enforce security. Systems: must support encryption, authentication, and access control lists, operations like DPI on the line cards, user isolation via queueing mechanisms, and intelligent memory management to both isolate and prevent contamination if one user misbehaves, finally the ability to guard against attacks on security, e.g. DoS. Manageability -with a large user population accessing remote data, both the network and data need to be manageable. Technology: must provide robust OAM tools and management interfaces/protocols System: must support OAM tools/mechanisms, must be designed so that invoking OAM mechanisms does not tax forwarding performance, and allow for remote access/management in a flexible way Architecture: must provide for an OOB control, such as that over an independent, robust DCN
4. Dynamic Setup & Control – the need for having multiple COIs dynamically access data, the use of multiple applications to process common data requires the ability to dynamically setup communities and paths between end-nodes. Technology: should have a signaling mechanism to enable automated path setup, and/or an ability to do so efficiently in the management plane via the NMS. System: should support discovery – to facilitate creation of the topology, and signaling protocol stack in its control plane, support for dynamically joining/leaving multicast groups is valuable for COIs. Architecture: allow for an OOB signaling network, and the setup of diverse virtual topologies over the same infrastructure (implies a rich connectivity, many alternate paths, ability to provide sufficient physical redundancy, and quick recovery from failures/errors)
Let us now look at what implications military-grade network requirements have on the trio of technology, system design, and network architecture. Rugged – the technology should be operable over multiple media, in different environments. Where possible it should be deliverable over robust media – e.g. fiber, but should also work over wireless or copper. Technology should be robust to harsh environments – so it should either not be affected by extreme conditions, or have means to recover from their impact – heat, temperature, moisture (that is, the media used for the technology should be robust to this). System: designed to work with conduction cooling, have a means of off-loading complex processing to a centralized engine (to reduce load on main line cards, thus making them compact, simpler, low power, and hence easy to cool). Architecture: should be able to integrate diverse media, and where possible use the most robust media for the need – e.g. fiber, where feasible, wireless where needed, etc. 2. Secure Technology: must have widely available standards for encryption, tunnels for traffic/user isolation, and ability to raise alarms when tampering occurs System: build data plane and control plane robust to DDoS and security attacks, incorporate hardware-based, fast encryption, have memory partitioning and queue management to isolate users, and segregate the impact of one non-performing, compromised or rogue user on others. Architecture: The network architecture and the DCN must both be robust to hacking/tampering. Be able to detect breaches, and rapidly propagate alarms. 3. Reliable Technology: Must have signaling to enable restoration, allow for setup/control of multiple/alternative paths, and have OAM capabilities for loopback, connectivity check, and path tracing. System: must have hardware/software redundancy and support NSF, NSR, and hitless software upgrades, and also quick failure/defect detection and propagation.
4. Hard QoS Technology: Support virtualization of network – tunnels, VLANs, provide for packet headers that can mark priority to segregate traffic and support performance measurement OAM to track perf. metrics. Support tunnels, VLANs, having ability (in the technology -- packet hearders, OAM etc.) to mark, seggregate traffic, prioritize traffic, group/aggregate traffic (via technology-specific mechanisms). System: Isolate traffic via queues/scheduling, have separate tables for different priorities, classses, applications. Ability to signal, control and manage tunnels. Must allow for traffic isolation via queues, scheduling, separate tables/memory to keep traffic of different priorities, applications, classes seggregated. Have ability to signal tunnels, and control and manage tunnels via the system -- allowing for virtual networks to run on the same infra. (e.g. voice, BE, video) Support advanced traffic management -- queueing, marking, dropping, policing, shaping, hierarchical scheduling Architecture: Support provisioning and dimensioning, CAC to regulate traffic input, and TE to support smart traffic placement.
7. Diverse Last Mile Access Technology: Should be cheap, easily upgradable, support capability to aggregate, and yet keep segregated, different traffic types, using techniques such as PWs, VLANs, aggregation. System: The systems should be muli-service, able to support a variety of interfaces -- TDM, ATM, FR, IP, and other protocols, at a number of different data rates, and be able to aggregate this traffic appropriately. This requires not only corresponding processing h/w and software, but also the ability to process/examine this data and queue/route it appropriately. Architecture: Arch. should provide for aggregation points or on-ramps, where diverse traffic can be terminated and eventually transferred to a common IP/MPLS or Ethernet core, thus simplifying the management and operation of the core networks.
At this point, we have discussed the requirements for military-grade networks and what that means for the technology, the system design and the network architecture. Now we will focus on Ethernet, and first give you the characteristics of Ethernet and optical Ethernet, how it is used in different parts of the network, and at the end we will focus on how optical Ethernet meets the requirements outlined earlier. Before we delve in to the details of optical Ethernet, it is useful to look at Ethernet itself, examining why it is a beneficial technology to use, and its various applications in the military environment today.
These are pretty self-explanatory and we walk through them.
Switched Ethernet has 3 roles – inside systems/devices, as a networking infrastructure in the network, and as a fabric/interconnect within military systems, warfare systems E.g. 1-10 Gb/s is used between subsystems. Ethernet transport is used to evolve wireless backhaul, support IP-centric networks Lately it is also used to transport sensor/radar and video data, and for distribution of timing and synchronization info. Real-time video can be transmitted over Ethernet by tagging packets, classifying traffic, and managing queueing. Examples of Ethernet used in Military: Marines/Air-Force Ethernet switches used in the Apache helicopter – provides LAN connectivity to on-board IP-enabled computing devices Navy - used aboard aircraft carriers- Ronald Reagan – provides sophisticated remote monitoring capabilities and an IP-based networking platform for the SDSS system Ratheon’s Ship Self-Defence System (SDSS) Army: Future Combat Systems Integrated Computer Systems program uses: Used Switched Ethernet to control the NLOS-LS platform (Non Line-of-Sight Launch System) using Gigabit Ethernet switches. WIN-T – Warfighter Information Network – Tactical – uses ruggedized off-the-shelf Ethernet switches and IP routers from Cisco, NET, etc.
Thus, we have so far looked at the key requirements of military network and DoD’s net-centric strategy and what that means for the underlying technology, its corresponding systems, and network architecture, and we looked at Ethernet in a general way. We will now move to discussing the characteristics of optical Ethernet and how it is used in different parts of the network (network architecture), and then we will wrap-up by demonstrating how it meets the requirements outlined earlier.
Before defining the term “optical Ethernet,” it is useful to point out that the term “Ethernet” itself can apply to any one of the three roles of Ethernet technology: as a service , as a transport technology , and as a PHY layer . One is at the PHY level, physical layer, one is at the transport layer, and one is at the service layer. At the PHY layer we have the 1/10/100 G interfaces, wireless interfaces, and optical interfaces. These are standardized in the IEEE and ITU. Ethernet PHY refers to the framing and timing of the actual bits of the Ethernet frame, and their transmission over a physical medium – copper wire, coaxial cable, or optical fiber – to connect switches at the physical layer. Some common Ethernet PHYs are the 1 GE (IEEE 802.3z), 10 GE (IEEE 802.1ae), and 100 GE (IEEE 802.3ba) Ethernet PHYs. Note that Ethernet frames can also be embedded in other PHY framing standards, such as those in the ITU-T’s G.709 OTN (Optical Transport Network) standard.
Ethernet transport makes it possible to realize connection-oriented Ethernet (COE) . COE, in essence, refers to the collection of control-plane protocols and data-plane settings that create a connection-oriented capability for transferring the frames of an Ethernet service. We mention that Ethernet transport could be provided either by enhancing Ethernet technology (e.g. as is done in Provider Backbone Bridging with Traffic Engineering, PBB-TE, in the IEEE 802.1Qay standard) or by a different technology (e.g. using MPLS-TP technology being developed jointly by the IETF & the ITU-T). Both of these forms of transport involve switching/routing data frames, and are, therefore, referred to as Layer 2 (or L2) transport. It is also possible to embed Ethernet frames in a different transport networking layer, such as the one provided by the ITU-T’s G.709 OTN (Optical Transport Network) standard. This form of transport involves switching/routing traffic at the optical channel data unit (ODU) level and is therefore referred to as Layer 1 (or L1) transport. Ethernet PHY refers to the framing and timing of the actual bits of the Ethernet frame, and their transmission over a physical medium – copper wire, coaxial cable, or optical fiber – to connect switches at the physical layer. Some common Ethernet PHYs are the 1 GE (IEEE 802.3z), 10 GE (IEEE 802.1ae), and 100 GE (IEEE 802.3ba) Ethernet PHYs. Note that Ethernet frames can also be embedded in other PHY framing standards, such as those in the ITU-T’s G.709 OTN (Optical Transport Network) standard.
Optical Ethernet Network as a network spanning a MAN/WAN that offers a carrier-grade Ethernet service, running over a connection-oriented Ethernet (COE) transport infrastructure over an optical PHY (cf. Figure 2). The optical PHY could be provided either by the OTN’s optical channel (OCh), or by an Ethernet PHY running over optics, and may be multiplexed onto a given fiber using CWDM/DWDM technology. (L1 can have Ethernet MAC media dependent layer as well. That is the media access control of the Ethernet MAC is really part of L1.) This shows how we take Ethernet and enhance it to make it behave as a transport technology. E.g. PBB-TE is an enhancement to Ethernet to make it transport oriented. Or, we can use other technologies to make it connection oriented, e.g. MPLS-TP. We can have Ethernet ride directly over dark fiber (Ethernet PHY) or we can put it on widely available technologies such as OTN ODU, so that WDM can be used. (Thus, we can have Ethernet ride over transport and PHY, or we can have Ethernet go over L2 transport, which then rides one L1 transport and PHY.)
Carrier Ethernet was formalized by the work of the MEF in 2004-05, and is, in fact, the service component of Optical Ethernet. MEF defines it with 5 characteristics.
Standardized services refers to having a uniformly accepted definition of core services that serve as the building block for applications running atop them (more on these below). Scalability refers to a service that scales to millions of UNIs (end-points) and MAC addresses, spanning access, local, national, and global networks, with the ability to support a wide bandwidth granularity and versatile QoS options. Reliability refers to the ability to detect and recover from errors/faults without impacting customers, typically with rapid recovery times, as low as 50ms. Hard QoS implies providing end-to-end performance based on rates, frame loss, delay, and delay variation, and the ability to deliver SLAs that guarantee performance that matches the requirements of voice, video, and data traffic over heterogeneous converged networks. Service management implies having carrier-class OAM, and standards-based, vendor-independent implementations to monitor, diagnose, and manage networks offering Carrier Ethernet service.
The services defined by the MEF are in terms of an Ethernet Virtual Connection (EVC), which is defined as an association of two or more User Network Interfaces (UNIs) at the edge of a metro Ethernet network (MEN [1] ) cloud (i.e. subscriber sites), where the exchange of Ethernet service frames is limited to the UNI’s in the EVC. The MEF defines 3 standardized services: E-Line (a point-to-point EVC), E-LAN (a multipoint-to-multipoint EVC), and E-Tree (a point-to-multipoint “rooted” EVC, where the root(s) can communicate with any of the leaves, but the leaves must communicate with each other only via the root). Thus, an Ethernet Private Line service is built using a point-to-point EVCs, while an Ethernet Private LAN service is built using mp2mp EVCs. [1] Even though the MEF specifications refer to MENs (metro Ethernet networks) this is now a generic term that refers to the Carrier-Ethernet service enabled network, which can span a variety of access, metro, and long-haul networks.
Here we illustrate the 3 services defined by the MEF, explained earlier.
Here we are illustrating the service, transport and PHY components of an optical Ethernet
We just described the characteristics of optical Ethernet, which can be used in different parts to provide e2e connectivity. Now these optical Ethernet technology can be used in different parts of the network, access, aggregation and core to provide e2e connectivity.
There are many permutations and many types of networks one can build with optical Ethernet. In this section, we will focus on some key examples of building networks using optical Ethernet, starting with use cases where only some part of the network is Ethernet, and going to cases where all parts of the network are built using Ethernet. We will also go along giving an assessment of where Ethernet best fits, and where it makes sense.
Here is a high-level look at the applicability of optical Ethernet to the access, metro/aggregation and core network segments. We look at which optical Ethernet means for each, how it applies, and how it relates. Note: Explain here briefly for the audience what LAG really is. A way to increase link capacity and/or guard against link failure. [ELMI has 3 versions. V1 is fully configured, where you just tell the PE node what you need. V2 is an option where you learn the preconfigured options from the PE and you, as the CE, just pick one of the preconfigured profiles. V3 is fully negotiable (or has the max. options), and was defined with OIF assistance.
IEEE 802.1 is doing a LAG across multiple systems – or multi-chassis LAG.
Here we show examples of how Ethernet is used. Assume that initially only the access is Ethernet. The metro/core are IP/MPLS. We can do it today, via MPLS LSPs, using labels. So, e2e it looks like Ethernet Q-in-Q service, with IP/MPLS transport.
This can be done today, with existing gear, but this is not scalable and we don’t take advantage of Ethernet aggregation here. You need IP/MPLS LSPs e2e, between each customer end-point, leading to potentially millions of PWs/tunnels, which becomes a configuration and management issue.
Here we are pushing Ethernet into the aggregation/metro. What we are doing here is adding another provider header to the Ethernet header, thus hiding the customer MAC address completely from the provider network. So, we have a PBB service end-to-end. This is attractive, because customer traffic is aggregated in the metro/core (yellow part), thus hiding the customer addresses. So, all the core sees are only the u-PE addresses (not all customer addresses), which are potentially an order of magnitude or more less than customer addresses. Meanwhile, IP/MPLS is confined to the core (blue). Due to the u-PE boxes being less than CE boxes, the number of LSPs and PWs needed in the core is also substantially reduced. Thus, this is showing how Ethernet moves into the metro.
Access+Metro solves the manageability and scalability problem, by using PBB to aggregate the customer MACs into the provider MACs, and restricts PW to only the core. It also restricts the core to only see the provider MACs (which is not the case with H-VPLS, which also solves the # PW explosion problem, but not the MAC explosion problem).
Here is the example where it is all Ethernet – from access, metro, to the core. The all Ethernet core here is a traffic engineered core, using PBB-TE, where the paths are pinned using configuration, and no MAC learning or STP is needed in the core. This allows OAM to run e2e, in segments, and have uniform technology throughout.
We also discuss Ethernet use in mobile technology.
Today mobile backhaul uses these mix of technologies, as shown, where most of them are based on TDM or ATM technologies, but gradually evolving to IP/Ethernet.
Before we look at the architectures, here are some definitions of backhaul components. The key observation is that as wireless services themselves move to packet-based data, it automatically creates a push to have the transport technology be packet-based as opposed to TDM, since that is a better match for the packet-based data that mobile networks are now carrying.
This shows the traditional backhaul. Where the access is TDM/ATM, which are transported from the cell site on a TDM link over a SONET/SDH network, and split at the back end into voice and data (ATM) traffic, and directed to the BSC and/or the RNC respectively. The key is that the backhaul network is all TDM, and there are separate transmission facilities for packet/data and voice/TDM at the back end.
The new evolved network will look like the following: where the access links can be TDM/ATM or, for 4G networks, can themselves use Ethernet connections, as shown. This traffic is all aggregated at the cellsite gateway, which is a CE router/switch now. The transmission to the backhaul network is now Ethernet, and the traffic is carried via PWs or via circuit emulation. The network itself becomes a Carrier Ethernet network, and the xconnects are replaced by switches and routers. At the backend, the packet and TDM data is sent to the BSC, and from there to the wireless core network. Thus, all traditional legacy and new packet traffic can be transported over a common packet Ethernet network, which is scalable, configurable, flexible, and uses standard technology.
The steps required for signaling of a PW in VPLS are the following: Bind AC to forwarder, and configure VPN ID to be globally unique. Disovery of remote PE’s in the same VPLS, either via BGP or via configuration or via a discovery server using RADIUS. Establish targeted LDP sessions to peers. Issue label mapping, perform checks at reception, and record label.
Here is the detail of how the TDM or packet data is actually transported over the Ethernet packet network. Here is a case where we have TDM access, and TDM data is carried over a PW over the Carrier Ethernet network. The PW can be used in the mobile backhaul scenario as a “wire” to carry all different types of data – TDM (chopped into packets via SATOP or CESoPSN), ATM, Ethernet, IP, ... The advantage now is the we can use the same packet network to perform synchronization, via IEEE 1588, which allows the distribution of clock all the way to the cell site/remote site. Note that this architecture and example, while cast in the mobile context, can in fact be any backhaul. The cell site could be a remote radar array location or a missile location, and the backhaul could be radar data or commands to operate the missile. So this architecture is for any data backhaul at all actually!
Here we are putting the MEF services in the mobile context.
New advancements which make Optical Ethernet more attractive for military applications, as there have been developments in all these key areas over the last few years.
Here we simply walk them through the table, giving them an overview of what is happening in each area, which standards are being developed in each area, and which industry body is leading those developments. Now that we’ve summarized the key developments, we will talk about a few key ones that we think are extremely relevant for military needs – e.g. security, timing & synchronization, and OAM.
Ethernet standards provide for e2e security via LinkSec, which comprises of MACSec and KeySec. KeySec is the key distribution/exchange protocol. MACSec defines the communication protocol between the 2 end nodes, and allows for 3 properties – authentication, data integrity, and confidentiality between the trusted end nodes. The security association is done via KeySec, and is used by MACSec.
The MACSec format is illustrated here. You have the LinkSec header just before the VLAN. It has its own Ethertype (akin to protocol ID) to announce that LinkSec is in use. All of the fields after the LinkSec header are encrypted, and thus unreadable by intermediate nodes. At the end of the frame, is the Integrity Check Value (ICV) like a CRC checksum, and creates tamper-proof transmission. Discovers change of bit in transmission. ICV ensures that no false packets can be inserted on the wire, and defuses wire-tapping, since you would know if your communication was corrupted by the insertion of bits.
Ethernet today is a technology with some of the most comprehensive OAM capabilities, in our view. It has tools for a number of different critical areas, such as continuity check, link trace, loop back etc. Might be good to explain Link Trace on the whiteboard, if time permits . Might be good to contrast it with IP ping/MPLS ping. That in Ethernet it does it with one packet with a multicast MAC address, and then how you construct the path. You need to know a priori the spanning tree and the MAC addresses of the nodes along the path. So LT is used to verify the path. You know how to stop by the TTL, and by the Target MAC address, put inside the LT (this is why you need a priori information about the target). In addition, it has performance measurement to ensure that SLAs can be met.
The speciality is the Ethernet OAM allows independent OAM to be run on different domains, even for the same flow (or VLAN). So you can do e2e between customer boxes, at the operator level or at the service provider level. Thus, each entity (operator, customer, provider) can run their own OAM, which is very valuable. The 8 domain levels can be assigned to each entity. Eg. Level 7-8 – customer, 5-6 to provider, and 3,2,1 to the operator, as specified in 802.1ag.
Provider : gives services to the end-customer Operator: provides the physical infrastructure for the provider, in a given segment – can run its own OAM. Here is an example of a loopback running on multiple levels on the same service.
Boundary is like a regenerator – once you’ve done many hops, at the boundary node, you generate a new clock using a PLL. Before that, you are using transparent clocking. Boundary clock becomes a “master” for the downstream segment of the network. For Ethernet, we can now use packet-based sync., and we don’t need to run a wire everywhere. The same packet network can enable synchronization of both clock and time-of-day. How it works is that we have a GM clock, the provides synchronization messages, which are received by the slave or boundary clock, running their own PLL loops. These clocks use the sync. messages and other messages (detailed later) to compensate for the jitter in the systems and within the network. Thus, they all have their clocks in sync. with the master. Master/Grandmaster is the one that gets the GPS. Note the delay request and delay response can actually go through different paths, which is why you take their average when computing offset adjustment.
How this works is that the master sends a Sync. message at time t1 and encodes that time into the packet and/or in a subsequent follow-up message (this is used in 2-step operation, when the MAC in the master does not have the ability to timestamp the Sync. message exactly at the instant that it leaves the Master). The slave receives it at time t2 and records this time. It then sends and Delay Req. message records time t3 of departure, and the time t4 of the response to the request. At this point, we know the MS and SM delays, and take their average to compute the offset or correction. This explanation has glossed over some details, such as how to account for the jitter accumulated within each node, but the standard has a provision to account for that, and to allow the slave to subtract this total jitter from its calculations, thus allows for upto nanosecond accuracy between the two clocks. We must be able to tell them how accurate IEEE 1588 synchronization is – I believe it’s accurate to sub-nanosecond levels, precisely because of the correction factors built into the protocol.
In this concluding part, we will now bring all of what we’ve previously discussed together, and demonstrate how optical Ethernet is able to meet a majority of the military network requirements we started with.
This is just walking them through the table, and pointing out the capabilities that support each requirement.
MEF8 puts the circuit traffic directly into Ethernet packets (after chopping it up, and adding a specific Ethertype)
Ethernet has a lot of capabilities and many other capabilities are being added to it to make it a very versatile technology usable in many applications from access to aggregation to core, and in data center applications as well. It could be used for mobile backhaul applications. Further you can mix-and-match it with other technologies, due to its interoperability. It is a very well established and well-known technology, has a lot of capabilities – has been here for many years, and is cheaper compared to other technologies. Therefore, it is very suitable for net-centric military applications. We are not saying that it must be used everywhere, but where it makes sense, and where its characteristics fit the application or network segment, it is certainly a strong candidate, it has the ability to be used. It, therefore, adds value in many applications.