LOAD BALANCING FOR RELIABLE MULTICAST
- 格式:pdf
- 大小:78.94 KB
- 文档页数:6
The Dell EMC S5048-ON switch is an innovative, future-ready T op-of-Rack (T oR) open networking switch providing excellent capabilities and cost-effectiveness for the enterprise, mid-market, Tier2 cloud and NFV service providers with demanding compute and storage traffic environments.The S5048F-ON 25GbE switch is Dell’s latest disaggregated hardware and software data center networking solution that provides backward compatible 25GbE server port connections, 100GbE uplinks, storage optimized architecture, and a broad range of functionality to meet the growing demands of today’s data center environment now and in the future.The compact S5048F-ON model design provides industry-leading density with up to 72 ports of 25GbE or up to 48 ports of 25GbE and 6 ports of 100GbE in a 1RU form factor.Using industry-leading hardware and a choice of Dell’s OS9 or select 3rd party network operating systems and tools, the S5048F-ON delivers non-blocking performance* for workloads sensitive to packet loss. The compact S5048F-ON model provides multi rate speed enabling denser footprints and simplifying migration to 25GbE server connections and 100GbE fabrics. Priority-based flow control (PFC), data center bridge exchange (DCBX) and enhanced transmission selection (ETS) make the S5048F-ON an excellent choice for DCB environments.Maximum performance and functionalityThe Dell EMC Networking S-Series S5048F-ON is a high-performance, multi-function, 10/25/40/50/100 GbE T oR switch purpose-built for applications in high-performance data center, cloud and computing environments.In addition, the S5048F-ON incorporates multiple architectural features that optimize data center network flexibility, efficiency, and availability, including IO panel to PSU airflow or PSU to IO panel airflow for hot/cold aisle environments, and redundant, hot-swappable power supplies and fans. Key applications• Organizations looking to enter the software-defined data center era with a choice of networking technologies designed to deliver theflexibility they need• Native high-density 25 GbE T oR server access in high-performance data center environments• 25 GbE backward compatible to 10G and 1G for future proofing and data center server migration to faster uplink speeds.• Capability to support mixed 25G and 10G servers on front panel ports • iSCSI storage deployment including DCB converged lossless transactions • Suitable as a T oR or Leaf switch in 100G Active Fabric implementations • As a high speed VXLAN L2 gateway that connects the hypervisor-based overlay networks with non-virtualized infrastructure• Emerging applications requiring hardware support for new protocols Key features• 1RU high-density 25/10/1 GbE T oR switch with up to forty eight ports of native 25 GbE (SFP28) ports supporting 25 GbE without breakout cables• Multi-rate 100GbE ports support 10/25/40/50/100 GbE• 3.6 Tbps (full-duplex) non-blocking, store and forward switching fabric delivers line-rate performance under full load*• Scalable L2 and L3 Ethernet switching with QoS and a full comple-ment of standards-based IPv4 and IPv6 features, including OSPF and BGP routing support• L2 multipath support via Virtual Link Trunking (VLT) and multiple VLT (mVLT) multi-chassis link aggregation technology• VRF-lite enables sharing of networking infrastructure and provides L3 traffic isolation across tenants• Open Automation Framework adding automated configuration and provisioning capabilities to simplify the management of networkenvironments• Jumbo frame support for large data transfers• 128 link aggregation groups with up to eight members per group, using enhanced hashing• Redundant, hot-swappable power supplies and fans• I/O panel to power supply airflow or power supply to I/O panel airflow • T ool-less enterprise ReadyRails™ mounting kits reducing time and resources for switch rack installation• Power-efficient operation up to 45°C helping reduce cooling costs in temperature-constrained deployments (Dell EMC Fresh Air 2.0compliant)• Converged network support for DCB and ECN capability• Supports the open source Open Network Install Environment (ONIE) for zero touch installation of alternate network operating systems• Fibre Channel, FCoE, FCoE transit (FIP Snooping) and NPIV ProxyDELL EMC NETWORKING S5048F-ONHigh-performance open networking top-of-rack switch with native 25G server ports and 100G network fabric connectivity**future deliverable48 line-rate 25 Gigabit Ethernet SFP28 ports6 line-rate 100 Gigabit Ethernet QSFP28 ports1 RJ45 console/management port with RS232signaling1 Micro-USB type B optional console port1 10/100/1000 Base-T Ethernet port used asmanagement port1 USB type A port for the external mass storage Size: 1 RU, 1.72 h x 17.1 w x 18” d(4.4 h x 43.4 w x 45.7 cm d)Weight: 22lbs (9.98kg)ISO 7779 A-weighted sound pressure level: 59.6 dBA at 73.4°F (23°C)Power supply: 100–240 VAC 50/60 HzMax. thermal output: 1956 BTU/hMax. current draw per system:5.73A/4.8A at 100/120V AC2.87A/2.4A at 200/240V ACMax. power consumption: 573 Watts (AC)T yp. power consumption: 288 Watts (AC) with all optics loadedMax. operating specifications:Operating temperature: 32° to 113°F (0° to 45°C) Operating humidity: 10 to 90% (RH), non-condensingFresh Air Compliant to 45°CMax. non-operating specifications:Storage temperature: –40° to 158°F (–40° to70°C)Storage humidity: 5 to 95% (RH), non-condensing RedundancyT wo hot swappable redundant power suppliesHot swappable redundant fansPerformanceSwitch fabric capacity: 3.6TbpsForwarding capacity: Up to 2,678 MppsPacket buffer memory: 22MB (16MB supported in initial release)CPU memory: 8GBMAC addresses: 132K (in scaled-l2-switch mode) ARP table: 82K (in scaled-l3-hosts mode)IPv4 routes: Up to 128KIPv6 routes: Up to 64K (20k currently supported) Multicast hosts: Up to 8KLink aggregation: 128 groups, 32 members per LAG groupLayer 2 VLANs: 4KMSTP: 64 instancesLAG Load Balancing: Based on layer 2, IPv4 or IPv6 header, or tunnel inner header contentsQoS data queues: 8QoS control queues: 12QoS: 1024 entries per TileIngress ACL: 1024 entries per TileEgress ACL: 1k entries per TilePre-Ingress ACL: 1k entries per TileIEEE Compliance802.1AB LLDP802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN T agging, Double VLAN T agging,GVRP802.1Qbb PFC802.1Qaz ETS802.1s MSTP802.1w RSTP802.1X Network Access Control802.3ab Gigabit Ethernet (1000BASE-T) orbreakout802.3ac Frame Extensions for VLAN T agging 802.3ad Link Aggregation with LACP 802.3ba 40 Gigabit Ethernet (40GBase-SR4,40GBase-CR4, 40GBase-LR4, 100GBase-SR10, 100GBase-LR4, 100GBase-ER4) onoptical ports802.3bj 100 Gigabit Ethernet802.3u Fast Ethernet (100Base-TX) on mgmtports802.3x Flow Control802.3z Gigabit Ethernet (1000Base-X) with QSAANSI/TIA-1057 LLDP-MEDForce10 PVST+Jumbo MTU support 9,416 bytesLayer2 Protocols4301 Security Architecture for IPSec*4302 IPSec Authentication Header*4303 ESP Protocol*802.1D Compatible802.1p L2 Prioritization802.1Q VLAN T agging802.1s MSTP802.1w RSTP802.1t RPVST+802.3ad Link Aggregation with LACPVL T Virtual Link T runkingRFC Compliance768 UDP793 TCP854 T elnet959 FTP1321 MD51350 TFTP2474 Differentiated Services2698 T wo Rate Three Color Marker3164 Syslog4254 S SHv2General IPv4 Protocols791 I Pv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1191 Path MTU Discovery1305 NTPv41519 CIDR1542 BOOTP (relay)1858 IP Fragment Filtering2131 DHCP (server and relay)5798 V RRP3021 31-bit Prefixes3046 D HCP Option 82 (Relay)1812 Requirements for IPv4 Routers1918 Address Allocation for Private Internets2474 Diffserv Field in IPv4 and Ipv6 Headers2596 A ssured Forwarding PHB Group3195 Reliable Delivery for Syslog3246 E xpedited Assured Forwarding4364 V RF-lite (IPv4 VRF with OSPF and BGP)*General IPv6 Protocols1981 Path MTU Discovery*2460 I Pv62461 Neighbor Discovery*2462 S tateless Address AutoConfig2463 I CMPv62675 Jumbo grams3587 Global Unicast Address Format4291 IPv6 Addressing2464 T ransmission of IPv6 Packets over EthernetNetworks2711 IPv6 Router Alert Option4007 I Pv6 Scoped Address Architectureand Routers4291 IPv6 Addressing Architecture4861 Neighbor Discovery for IPv64862 I Pv6 Stateless Address Autoconfiguration5095 Deprecation of T ype 0 Routing Headers in IPv6IPv6 Management support (telnet, FTP, TACACS,RADI US, SSH, NTP)RIP1058 RIPv12453 R I Pv2OSPF (v2/v3)1587 NSSA (not supported in OSPFv3)1745 OSPF/BGP interaction1765 OSPF Database overflow2154 MD52328 OSPFv22370 Opaque LSA3101 OSPF NSSA3623 O SPF Graceful Restart (Helper mode)*BGP1997 Communities2385 M D52439 R oute Flap Damping2545 B GP-4 Multiprotocol Extensions for IPv6I nter-Domain Routing2796 Route Reflection2842 C apabilities2858 M ultiprotocol Extensions2918 Route Refresh3065 C onfederations4271 BGP-44360 E xtended Communities4893 4-byte ASN5396 4-byte ASN Representation5492 C apabilities AdvertisementMulticast1112 IGMPv12236 I GMPv23376 IGMPv3MSDPPIM-SMPIM-SSMNetwork Management1155 SMIv11157 SNMPv11212 Concise MIB Definitions1215 SNMP Traps1493 Bridges MIB1850 OSPFv2 MIB1901 Community-Based SNMPv22011 IP MIB2096 I P Forwarding T able MIB2578 SMI v22579 T extual Conventions for SMIv22580 C onformance Statements for SMIv22618 RADIUS Authentication MIB2665 E thernet-Like Interfaces MIB2674 Extended Bridge MIB2787 VRRP MIB2819 RMON MIB (groups 1, 2, 3, 9)2863 I nterfaces MIB3273 RMON High Capacity MIB3410 SNMPv33411 SNMPv3 Management Framework3412 Message Processing and Dispatching for theSimple Network Management Protocol (SNMP)3413 SNMP Applications3414 User-based Security Model (USM) forSNMPv33415 VACM for SNMP3416 SNMPv23417 Transport mappings for SNMP3418 SNMP MIB3434 R MON High Capacity Alarm MIB3584 C oexistance between SNMP v1, v2 and v3 4022 I P MIB4087 IP Tunnel MIB4113 UDP MIB4133 Entity MIB4292 M IB for IP4293 M IB for IPv6 T extual Conventions4502 R MONv2 (groups 1,2,3,9)5060 PIM MIBANSI/TIA-1057 LLDP-MED MIBDell_ITA.Rev_1_1 MIBdraft-ietf-idr-bgp4-mib-06 BGP MIBv1IEEE 802.1AB LLDP MIBIEEE 802.1AB LLDP DOT1 MIBIEEE 802.1AB LLDP DOT3 MIB sFlowv5 sFlowv5 MIB (version 1.3)DELL-NETWORKING-BGP4-V2-MIB(draft-ietf-idr-bgp4-mibv2-05)DELL-NETWORKING-IF-EXTENSION-MIBDELL-NETWORKING-LINK-AGGREGATION-MIB DELL-NETWORKING-COPY-CONFIG-MIBDELL-NETWORKING-PRODUCTS-MIBDELL-NETWORKING-CHASSIS-MIBDELL-NETWORKING-SMIDELL-NETWORKING-TCDELL-NETWORKING-TRAP-EVENT-MIBDELL-NETWORKING-SYSTEM-COMPONENT-MIB DELL-NETWORKING-FIB-MIBDELL-NETWORKING-FPSTATS-MIBDELL-NETWORKING-ISIS-MIBDELL-NETWORKING-FIPSNOOPING-MIBDELL-NETWORKING-VIRTUAL-LINK-TRUNK-MIB DELL-NETWORKING-DCB-MIBDELL-NETWORKING-OPENFLOW-MIBDELL-NETWORKING-BMP-MIBDELL-NETWORKING-BPSTATS-MIBSecuritydraft-grant-tacacs-02 TACACS+2404 The Use of HMACSHA-1-96 within ESP and AH 2865 R ADI US3162 Radius and IPv63579 RADIUS support for EAP3580 802.1X with RADIUS3768 EAP3826 A ES Cipher Algorithm in the SNMP User Base Security Model4250, 4251, 4252, 4253, 4254 SSHv24301 Security Architecture for IPSec4302 I PSec Authentication Header4807 IPsecv Security Policy DB MIBData center bridging802.1Qbb Priority-Based Flow Control802.1Qaz Enhanced Transmission Selection (ETS)* Data Center Bridging eXchange (DCBx)DCBx Application TLV (iSCSI, FCoE*) Regulatory complianceSafetyUL/CSA 60950-1, Second EditionEN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group DifferencesEN 60825-1 Safety of Laser Products Part 1: Equipment Classification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication SystemsIEC 62368-1FDA Regulation 21 CFR 1040.10 and 1040.11 Emissions & ImmunityFCC Part 15 (CFR 47) (USA) Class AICES-003 (Canada) Class AEN55032: 2015 (Europe) Class ACISPR32 (International) Class AAS/NZS CISPR32 (Australia and New Zealand) Class AVCCI (Japan) Class AKN32 (Korea) Class ACNS13438 (T aiwan) Class ACISPR22EN55022EN61000-3-2EN61000-3-3EN61000-6-1EN300 386EN 61000-4-2 ESDEN 61000-4-3 Radiated ImmunityEN 61000-4-4 EFTEN 61000-4-5 SurgeEN 61000-4-6 Low Frequency Conducted Immunity NEBSGR-63-CoreGR-1089-CoreATT-TP-76200VZ.TPR.9305RoHSRoHS 6 and China RoHS compliantCertificationsJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2009, Class A Warranty1 Year Return to DepotLearn more at /NetworkingIT Lifecycle Servicesfor NetworkingExperts, insights and easeOur highly trained experts, withinnovative tools and proven processes,help you transform your IT investments into strategic advantages.Plan & DesignLet us analyze yourmultivendor environmentand deliver a comprehensivereport and action plan to buildupon the existing network andimprove performance.Deploy & IntegrateGet new wired or wirelessnetwork technology installedand configured with ProDeploy.Reduce costs, save time, andget up and running fast.EducateEnsure your staff builds theright skills for long-termsuccess. Get certified on DellEMC Networking technologyand learn how to increaseperformance and optimizeinfrastructure.Manage & SupportGain access to technical expertsand quickly resolve multivendornetworking challenges withProSupport. Spend less timeresolving network issues andmore time innovating.OptimizeMaximize performance fordynamic IT environments withDell EMC Optimize. Benefitfrom in-depth predictiveanalysis, remote monitoringand a dedicated systemsanalyst for your network.RetireWe can help you resell or retireexcess hardware while meetinglocal regulatory guidelines andacting in an environmentallyresponsible way.Learn more at/lifecycleservices*Future release**Packet sizes over 147 Bytes。
The N3200 switch series offers power-efficient and resilient 1GbE and 1/2.5/5/10GbE Multigigabit range of switching solution for advanced Layer 3 distribution for offices and campus networks. The series has high-performance capabilities and wire-speed performance utilizing a non-blocking architecture to easily handle unexpected traffic loads. Use dual internal hot-swappable 80PLUS Platinum certified power supplies for high availability and power efficiency. The switches offer simple management and scalability via an 400Gbps (full duplex) high-availability stacking architecture that allows management of up to 12 switches from a single IP address.Modernize campus network architectures Modernize campus network architectures with a power-efficient and resilient 1/2.5/5/10GbE switching solution with dense options of 802.3at (30W) or 802.3bt (60W/90W) PoE solutions to deliver clean power to wide range network devices such as wireless access points (APs), Voice-over-IP (VoIP) handsets, video conferencing systems, security cameras, LED luminaires and many more.Achieve high availability and full bandwidth utilizationwith Multichassis Link Aggregation (MLAG). N3200 series switches support MLAG to create active/active loop-free redundancy without spanning tree. Server roomscan deliver reliable server and storage connectivity with features to help save time and avoid configuration errors. N3200 supports VRF-lite, allowing it to be partitioned into multiple virtual routers with isolated control and data planes on the same physical switch. For greater interoperabilityin multivendor networks, N3200 switches offer the latest open-standard protocols.Leverage familiar tools and practicesAll N-Series switches include Dell EMC Networking OS6, designed for easier deployment, greater interoperability and a lower learning curve for network administrators.OS6 common command line interface (CLI) and graphic user interface (GUI) are intuitive, so skilled network administrators can get productive quickly. N3200 switches also support the Open Network Install Environment (ONIE), enabling installation of alternate network operating systems.Deploy with confidence at any scaleN3200 series switches help create performance assurance with a data rate up to 1560Gbps (full duplex) and a forwarding rate up to 2167Mpps. Scale easily with built-in rear stacking ports. Switch stacks of up to 6241/2.5/5/10GbE/25GbE ports can be managed from a single screen using the highly available stacking architecturefor high-density aggregation with seamless redundant availability. The N-series switches’ lifetime warranty covers software upgrades, hardware repair or replacement, and optics and cables purchased with the switch.¹Dell EMC PowerSwitchN3200-ON Series SwitchesHigh performance Open networking 1GbE and 10GbE Multigigabit switchesfor modern campus networks1 Select Networking products carry a Lifetime Limited Warranty with Basic Hardware Service (repair or replacement) for life. Repair or replacement does not include troubleshooting, configuration, or other advanced service provided by Dell EMC ProSupport. See details at https:///en-us/work/shop/networkingwarranty/cp/networkingwarrantyHardware, performance and efficiency• 1GbE Switches: 1RU switches with up to 48 line-rate 1GbE ports of copper or fiber, and four integrated10GbE SFP+ ports. PoE variants with up to 48 ports of 802.3at (30W) PoE.• Multigig Switches: 1RU switches with up to 48 line-rate 1G/2.5G/ 5G/10GbE copper ports with four integrated 25GbE SFP28 ports. PoE variants with up to 48 portsof 802.3bt (90W) PoE.• 400Gbps stacking bandwidth using two 100GbE QSFP28integrated rear stacking ports.• Available with dual 80PLUS Platinum certified hot swappableinternal power supplies. Optional external power supply to extend PoE budgets on specific models.• Variable speed fan operation helps decrease cooling and power costs.• Energy-Efficient Ethernet and lower power PHYs reduce power to inactive ports and idle links, providing energy savings from the power cord to the port.• Dell EMC Fresh Air compliance for operation in environments up to 113°F (45°C) reduces coolingcosts.Deploying, configuring and managing• USB auto-configuration rapidly deploys the switch without complex TFTP configurations or sendingtechnical staff to remote offices.• Management via an intuitive and familiar CLI, embedded web server (GUI), SNMP-basedmanagement console application (including Dell EMC OpenManage Network Manager), Telnet or serialconnection.• Private VLAN extensions and Private VLAN Edge support.• AAA authorization, TACACS+ accounting and RADIUS support for comprehensive secure access support.• Authentication tiering allows network administrators to tier port authentication methods such as 802.1x, MAC Authentication Bypass and Captive Portal in priorityorder so that a single port can provide flexible access and security.• Achieve high availability and full bandwidth utilization with MLAG and support firmware upgrades withouttaking the network offline.• Layer 3 Advanced IPv4 and IPv6 functionality including BGP, VRF, BFD, PIM-SM/DM/SSM, IGMP/MLD, RIPv1/ v2, OSPFv2/v3• VXLAN support in hardware only ²• MACsec support in N3248PXE-ON hardware only ²2 Can be used if enabled by ON partner network operating system.3 Planned in Roadmap4 Auto-negotiation not supported, using 1G optics require manual configuration and all 4x10G SFP+ or 4x25G SFP28 ports to be set to same speed. 100M speed not supported.5 Auto-negotiation not supported, using 10G cables or optics require manual configuration and all 4x25G SFP28 ports to be set to same speed. 100M/1G speed not supported.Hardware specificationsPhysical2 integrated rear 100GbE QSFP28 stacking ports (except N3208PX-ON)Out-of-band management port(10/100/1000BASE-T)USB (Type A) port for configuration via USB flash driveMicroUSB (Type B) console port (MicroUSB to USB connector cable included)RJ45 console port with RS232 signaling(RJ-45 to female DB-9 connector cable included)Auto-negotiation for speed and flow control Auto-MDI/MDIX, port mirroringFlow-based port mirroring Broadcast storm controlEnergy-Efficient Ethernet per port settings Redundant variable speed fansAir flow: I/O to power supplyPower supply:Integrated 320W (N3208PX-ON),550W (N3224T-ON, N3224F-ON,N3248TE-ON, N3248X-ON),1050W (N3224P-ON, N3248P-ON),1600W (N3224PX-ON, N3248PXE-ON)Dual firmware images on-boardSwitching engine model: Store and forwardChassisSize (1RU, H x W x D):N3208PX-ON: 1.71 in x 11 in x 12.28 in;All other models: 1.71 in x 17.09 in x 15.75 in (power supply/fan tray handle adds add’l 1.18 in)Approximate weight (Switch with 1 PSU installed):8.44lbs/3.83kg (N3208PX-ON),13.75lbs/6.24kg (N3224T-ON),14.25lbs/6.46kg (N3224F-ON),15.6lbs/7.08kg(N3224P-ON),16lbs/7.26kg (N3224PX-ON,15.4lbs/6.99kg (N3248TE-ON),16.7lbs/7.57kg (N3248P-ON),16.1lbs/7.3kg (N3248X-ON),17.6lbs/7.98kg (N3248PXE-ON)2-post rack mounting kitEnvironmentalPower supply efficiency: 87% or better in all operating modesMax. thermal output (BTU/hr):2821 (N3208PX-ON), 686 (N3224T-ON), 764 (N3224F-ON), 3220 (N3224P-ON), 9344 (N3224PX-ON), 723 (N3248TE-ON), 5719 (N3248P-ON), 1637 (N3248X-ON), 18224 (N3248PXE-ON)Power consumption max (watts):900 (N3208PX-ON), 201 (N3224T-ON),224 (N3224F-ON), 944 (N3224P-ON),2740 (N3224PX-ON), 212 (N3248TE-ON), 1677 (N3248P-ON), 480 (N3248X-ON), 5344 (N3248PXE-ON)Operating temperature: 32° to 113°F (0° to 45°C)Operating relative humidity: 95%Storage temperature: –40° to 158°F(–40° to 70°C)Storage relative humidity: 95%PerformanceCPU memory: 4GBSSD: 8GB (32GB for N3248TE-ON)Packet buffer memory:8MB (4MB for N3208PX-ON and 32MB forN3248X-ON and N3248PXE-ON)Switch fabric capacity (full-duplex):88Gbps (N3208PX-ON),528Gbps (N3224T-ON, N3224F-ON,N3224P-ON),576Gbps (N3248TE-ON, N3248P-ON),1080Gbps (N3224PX-ON),1560Gbps (N3248X-ON, N3248PXE-ON)Forwarding rate:122Mpps (N3208PX-ON),733Mpps (N3224T-ON, N3224F-ON,N3224P-ON),800Mpps (N3248TE-ON, N3248P-ON),1500Mpps (N3224PX-ON),2167Mpps (N3248X-ON, N3248PXE-ON)Line-rate Layer 2 switching: All (non-blocking)Line-rate Layer 3 routing: All (non-blocking)Network Operating System specificationsSoftware specifications listed below areapplicable for OS6. For detailed specificationsof NOS, please contact your Dell Technologiesrepresentative.Scaling performanceMAC addresses: 32KLink aggregation:128 LAG groups, 144 dynamic ports perstack, 8 member ports per LAGPriority queues per port: 8Static routes: 1,024 (IPv4)/1,024 (IPv6)Dynamic routes: 8,158 (IPv4)/4,096 (IPv6)OSPF routing interfaces: 8,158RIP routing interfaces: 512ECMP next hops per route: 16ECMP groups: 1024VLAN routing interfaces: 128VLANs supported: 4,094Protocol-based VLANs: SupportedMulticast forwarding entries:1,536 (IPv4), 512 (IPv6)ARP entries: 6,144NDP entries: 2,560Access control lists (ACL): SupportedMAC and IP-based ACLs: SupportedTime-controlled ACLs: SupportedMax number of ACLs: 100Max ACL rules system-wide: 3,914Max rules per ACL: 1,023Max ACL rules per interface (IPv4):1,023 (ingress), 511 (egress)Max ACL rules per interface (IPv6):1,021 (ingress), 509 (egress)Max VLAN interfaces with ACLs applied: 24IEEE compliance802.1AB LLDPDell Voice VLANDell ISDP802.1D Bridging, Spanning Tree802.1p Ethernet Priority (User Provisioningand Mapping)Dell Adjustable WRR and Strict QueueScheduling802.1Q VLAN Tagging, Double VLANTagging, GVRP802.1S Multiple Spanning Tree (MSTP)802.1v Protocol-based VLANs802.1W Rapid Spanning Tree (RSTP)Dell RSTP-Per VLANDell Spanning tree optional features: STProot guard, BPDU guard, BPDUfiltering802.1X Network Access Control, Auto VLAN802.2 Logical Link Control802.3 10BASE-T802.3ab Gigabit Ethernet (1000BASE-T)802.3ac Frame Extensions for VLANTagging802.3ad Link Aggregation with LACP802.3at PoE (N3224P-ON, N3248P-ON,N3208PX-ON, N3224PX-ON,N3248PXE-ON)802.3bt PoE (N3208PX-ON, N3224PX-ON,N3248PXE-ON)802.3AX LAG Load BalancingDell Multi-Chassis LAG (MLAG)Dell Policy Based Forwarding802.3az Energy Efficient Ethernet (EEE)802.3u Fast Ethernet (100BASE-TX) onmanagement ports802.3x Flow Control802.3z Gigabit Ethernet (1000BASE-X)802.3bz 1G/2.5G/5G/10GANSI LLDP-MED (TIA-1057)Dell EqualLogic iSCSI Auto-configurationMTU 9,216 bytesGeneral Internet protocolsGeneral Internet protocols are supported.For a detailed list, please contact your DellTechnologies representative.General IPv4 protocolsGeneral IPv4 protocols are supported. Fora detailed list, please contact your DellTechnologies representative.General IPv6 protocolsGeneral IPv6 protocols are supported. Fora detailed list, please contact your DellTechnologies representative.Layer 3 functionality1058 RIPv11724 RIPv2 MIB Extension1765 OSPF DB overflow1850 OSPF MIB2082 RIP-2 MD5 Auth2328 OSPFv22338 VRRP2370 OpaqueDell Policy Based Routing2453 RIPv22740 OSPFv32787 VRRP MIB3101 NSSA3137 OSPF Stub Router Advert3623 Graceful Restart3768 VRRP4271 BGP5187 OSPFv3 Graceful Routing RestartMulticast1112 IGMPv12236 IGMPv22365 Admin scoped IP2710 MLDv12932 IPv4 MIB2933 IGMP MIB3810 MLDv23973 PIM-DM4541 IGMP v1/v2/v3 Snooping and Querier5060 PIM MIB5061 PIM MIB3376 IGMPv3Dell Static IP MulticastDraft-ietf-pim-sm-bsr-05Draft-ietf-idmr-dvmrp-v3-10 DVMRPDraft-ietf-magma-igmp-proxy-06.txtIGMP/MLD ProxyingDraft-ietf-magma-igmpv3-and-routing-05.txtdraft-ietf-idmr-dvmrp-mib-11draft-ietf-magma-mgmd-mib-05draft-ietf-pim-bsr-mib-06IEEE 802.1ag draft 8.1 – Connectivity FaultManagement (CFM)IEEE 802.1p GMRP Dynamic L2 MulticastRegistrationQuality of service2474 DiffServ Field2475 DiffServ Architecture2597 Assured Fwd PHBDell Port Based QoS Services (TCP/UDP) ModeDell Red/WREDDell Flow Based QoS ServicesDell Audio Video Bridging Mode (IPv4/IPv6)Dell UDLD2697 srTCM4115 trTCMNetwork Management and SecurityDell L4 Trusted Mode1155 SMIv11157 SNMPv11212 Concise MIB Definitions1213 MIB-II1215 SNMP Traps1286 Bridge MIB1442 SMIv21451 Manager-to-Manager MIB1492 TACACS+1493 Managed objects for Bridges MIB 1573 Evolution of Interfaces1612 DNS Resolver MIB Extensions1643 Ethernet-like MIB1757 RMON MIB1867 HTML/2.0 Forms with file uploadextensions1901 Community-based SNMPv21907 SNMPv2 MIB1908 Coexistence between SNMPv1/v2 2011 IP MIB2012 TCP MIB2013 UDP MIB2068 HTTP/1.12096 IP Forwarding Table MIB2233 Interfaces Group using SMIv22246 TLS v12271 SNMP Framework MIB 2295 Transport Content Negotiation2296 Remote Variant Selection2576 Coexistence between SNMPv1/v2/v32578 SMIv22579 Textual Conventions for SMIv22580 Conformance Statements for SMIv22613 RMON MIB2618 RADIUS Authentication MIB2620 RADIUS Accounting MIB2665 Ethernet-like Interfaces MIB2666 Identification of Ethernet chipsets2674 Extended Bridge MIB2737 ENTITY MIB2818 HTTP over TLS2819 RMON MIB (groups 1, 2, 3, 9)2856 Text Conv. For High Capacity DataTypes2863 Interfaces MIB2865 RADIUS2866 RADIUS Accounting2868 RADIUS Attributes for Tunnel Prot.2869 RADIUS Extensions3410 Internet Standard Mgmt. Framework3411 SNMP Management Framework3412 Message Processing and Dispatching3413 SNMP Applications3414 User-based security model3415 View-based control model3416 SNMPv23417 Transport Mappings3418 SNMP MIB3577 RMON MIB3580 802.1X with RADIUS3737 Registry of RMON MIB4086 Randomness Requirements4113 UDP MIB4251 SSHv2 Protocol4252 SSHv2 Authentication4253 SSHv2 Transport4254 SSHv2 Connection Protocol4419 SSHv2 Transport Layer Protocol4521 LDAP Extensions4716 SECSH Public Key File Format5246 TLS v1.26101 SSL6398 IP Router AlertDell Enterprise MIB supporting routingfeaturesdraft-ietfhubmib- etherifmib- v3-00.txt (ObsoletesRFC 2665)Other certificationsN-Series products have the necessary featuresto support a PCI compliant network topology.Regulatory, environment and othercomplianceSafety and emissionsAustralia/New Zealand: ACMA RCA Class ACanada: ICES Class A; cULChina: CCC Class A; NALEurope: CE Class AJapan: VCCI Class AUSA: FCC Class A; NRTL UL; FDA 21 CFR1040.10 and 1040.11Eurasia Customs Union: EAC Germany: GSmarkProduct meets EMC and safety standards inmany countries inclusive of USA, Canada,EU, Japan, China. For more country-specificregulatory information, and approvals, pleasesee your Dell Technologies representative.RoHSProduct meets RoHS compliance standards inmany countries inclusive of USA, EU, China,and India. For more country-specific RoHScompliance information, please see your DellTechnologies representative.EU WEEEEU Battery DirectiveREACHEnergyJapan: JEL© 2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. IT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, with innovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & DesignLet us analyze your multivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running fast.EducateEnsure your staff builds the right skills for long-term success. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic ITenvironments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remotemonitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at/ServicesContact a Dell Technologies ExpertView more resourcesJoin the conversationwith@DellNetworkingLearn more about Dell EMC Networking solutions。
The Dell EMC Networking S4048T-ON switch is the industry’s latest data center networking solution, empowering organizations to deploy modern workloads and applications designed for the open networking era. Businesses who have made the transition away from monolithic proprietary mainframe systems to industry standard server platforms can now enjoy even greater benefits from Dell EMC open networking platforms. By using industry-leading hardware and a choice of leading network operating systems to simplify data center fabric orchestration and automation, organizations can tailor their network to their unique requirements and accelerate innovation.These new offerings provide the needed flexibility to transform data centers. High-capacity network fabrics are cost-effective and easy to deploy, providing a clear path to the software-defined data center of the future with no vendor lock-in.The S4048T-ON supports the open source Open Network Install Environment (ONIE) for zero-touch installation of alternate network operating systems, including feature rich Dell Networking OS.High density 1/10G BASE-T switchThe Dell EMC Networking S-Series S4048T-ON is a high-density100M/1G/10G/40GbE top-of-rack (ToR) switch purpose-builtfor applications in high-performance data center and computing environments. Leveraging a non-blocking switching architecture, theS4048T-ON delivers line-rate L2 and L3 forwarding capacity within a conservative power budget. The compact S4048T-ON design provides industry-leading density of 48 dual-speed 1/10G BASE-T (RJ45) ports, as well as six 40GbE QSFP+ up-links to conserve valuable rack space and simplify the migration to 40Gbps in the data center core. Each40GbE QSFP+ up-link can also support four 10GbE (SFP+) ports with a breakout cable. In addition, the S4048T-ON incorporates multiple architectural features that optimize data center network flexibility, efficiency and availability, including I/O panel to PSU airflow or PSU to I/O panel airflow for hot/cold aisle environments, and redundant, hot-swappable power supplies and fans. S4048T-ON supports feature-rich Dell Networking OS, VLT, network virtualization features such as VRF-lite, VXLAN Gateway and support for Dell Embedded Open Automation Framework.• The S4048T-ON is the only switch in the industry that supports traditional network-centric virtualization (VRF) and hypervisorcentric virtualization (VXLAN). The switch fully supports L2 VX-• The S4048T-ON also supports Dell EMC Networking’s Embedded Open Automation Framework, which provides enhanced network automation and virtualization capabilities for virtual data centerenvironments.• The Open Automation Framework comprises a suite of interre-lated network management tools that can be used together orindependently to provide a network that is flexible, available andmanageable while helping to reduce operational expenses.Key applicationsDynamic data centers ready to make the transition to software-defined environments• High-density 10Gbase-T ToR server access in high-performance data center environments• Lossless iSCSI storage deployments that can benefit from innovative iSCSI & DCB optimizations that are unique only to Dell NetworkingswitchesWhen running the Dell Networking OS9, Active Fabric™ implementation for large deployments in conjunction with the Dell EMC Z-Series, creating a flat, two-tier, nonblocking 10/40GbE data center network design:• High-performance SDN/OpenFlow 1.3 enabled with ability to inter-operate with industry standard OpenFlow controllers• As a high speed VXLAN Layer 2 Gateway that connects thehypervisor based ovelray networks with nonvirtualized infrastructure Key features - general• 48 dual-speed 1/10GbE (SFP+) ports and six 40GbE (QSFP+)uplinks (totaling 72 10GbE ports with breakout cables) with OSsupport• 1.44Tbps (full-duplex) non-blocking switching fabric delivers line-rateperformance under full load with sub 600ns latency• I/O panel to PSU airflow or PSU to I/O panel airflow• Supports the open source ONIE for zero-touch• installation of alternate network operating systems• Redundant, hot-swappable power supplies and fansDELL EMC NETWORKING S4048T-ON SWITCHEnergy-efficient 10GBASE-T top-of-rack switch optimized for data center efficiencyKey features with Dell EMC Networking OS9Scalable L2 and L3 Ethernet switching with QoS and a full complement of standards-based IPv4 and IPv6 features, including OSPF, BGP and PBR (Policy Based Routing) support• Scalable L2 and L3 Ethernet switching with QoS and a full complement of standards-based IPv4 and IPv6 features, including OSPF, BGP andPBR (Policy Based Routing) support• VRF-lite enables sharing of networking infrastructure and provides L3traffic isolation across tenants• Increase VM Mobility region by stretching L2 VLAN within or across two DCs with unique VLT capabilities like Routed VL T, VLT Proxy Gateway • VXLAN gateway functionality support for bridging the nonvirtualizedand the virtualized overlay networks with line rate performance.• Embedded Open Automation Framework adding automatedconfiguration and provisioning capabilities to simplify the management of network environments. Supports Puppet agent for DevOps• Modular Dell Networking OS software delivers inherent stability as well as enhanced monitoring and serviceability functions.• Enhanced mirroring capabilities including 1:4 local mirroring,• Remote Port Mirroring (RPM), and Encapsulated Remote PortMirroring (ERPM). Rate shaping combined with flow based mirroringenables the user to analyze fine grained flows• Jumbo frame support for large data transfers• 128 link aggregation groups with up to 16 members per group, usingenhanced hashing• Converged network support for DCB, with priority flow control(802.1Qbb), ETS (802.1Qaz), DCBx and iSCSI TLV• S4048T-ON supports RoCE and Routable RoCE to enable convergence of compute and storage on Active FabricUser port stacking support for up to six units and unique mixed mode stacking that allows stacking of S4048-ON with S4048T-ON to providecombination of 10G SFP+ and RJ45 ports in a stack.Physical48 fixed 10GBase-T ports supporting 100M/1G/10G speeds6 fixed 40 Gigabit Ethernet QSFP+ ports1 RJ45 console/management port with RS232signaling1 USB 2.0 type A to support mass storage device1 Micro-USB 2.0 type B Serial Console Port1 8 GB SSD ModuleSize: 1RU, 1.71 x 17.09 x 18.11”(4.35 x 43.4 x 46 cm (H x W x D)Weight: 23 lbs (10.43kg)ISO 7779 A-weighted sound pressure level: 65 dB at 77°F (25°C)Power supply: 100–240V AC 50/60HzMax. thermal output: 1568 BTU/hMax. current draw per system:4.6 A at 460W/100VAC,2.3 A at 460W/200VACMax. power consumption: 460 WattsT ypical power consumption: 338 WattsMax. operating specifications:Operating temperature: 32°F to 113°F (0°C to45°C)Operating humidity: 5 to 90% (RH), non-condensing Max. non-operating specifications:Storage temperature: –40°F to 158°F (–40°C to70°C)Storage humidity: 5 to 95% (RH), non-condensingRedundancyHot swappable redundant powerHot swappable redundant fansPerformance GeneralSwitch fabric capacity:1.44Tbps (full-duplex)720Gbps (half-duplex)Forwarding Capacity: 1080 MppsLatency: 2.8 usPacket buffer memory: 16MBCPU memory: 4GBOS9 Performance:MAC addresses: 160KARP table 128KIPv4 routes: 128KIPv6 hosts: 64KIPv6 routes: 64KMulticast routes: 8KLink aggregation: 16 links per group, 128 groupsLayer 2 VLANs: 4KMSTP: 64 instancesVRF-Lite: 511 instancesLAG load balancing: Based on layer 2, IPv4 or IPv6headers Latency: Sub 3usQOS data queues: 8QOS control queues: 12Ingress ACL: 16KEgress ACL: 1KQoS: Default 3K entries scalable to 12KIEEE compliance with Dell Networking OS9802.1AB LLDP802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN T agging, Double VLAN T agging,GVRP802.1Qbb PFC802.1Qaz ETS802.1s MSTP802.1w RSTP802.1X Network Access Control802.3ab Gigabit Ethernet (1000BASE-T)802.3ac Frame Extensions for VLAN T agging802.3ad Link Aggregation with LACP802.3ae 10 Gigabit Ethernet (10GBase-X) withQSA802.3ba 40 Gigabit Ethernet (40GBase-SR4,40GBase-CR4, 40GBase-LR4) on opticalports802.3u Fast Ethernet (100Base-TX)802.3x Flow Control802.3z Gigabit Ethernet (1000Base-X) with QSA 802.3az Energy Efficient EthernetANSI/TIA-1057 LLDP-MEDForce10 PVST+Max MTU 9216 bytesRFC and I-D compliance with Dell Networking OS9General Internet protocols768 UDP793 TCP854 T elnet959 FTPGeneral IPv4 protocols791 IPv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1305 NTPv31519 CIDR1542 BOOTP (relay)1812 Requirements for IPv4 Routers1918 Address Allocation for Private Internets 2474 Diffserv Field in IPv4 and Ipv6 Headers 2596 Assured Forwarding PHB Group3164 BSD Syslog3195 Reliable Delivery for Syslog3246 Expedited Assured Forwarding4364 VRF-lite (IPv4 VRF with OSPF, BGP,IS-IS and V4 multicast)5798 VRRPGeneral IPv6 protocols1981 Path MTU Discovery Features2460 Internet Protocol, Version 6 (IPv6)Specification2464 Transmission of IPv6 Packets overEthernet Networks2711 IPv6 Router Alert Option4007 IPv6 Scoped Address Architecture4213 Basic Transition Mechanisms for IPv6Hosts and Routers4291 IPv6 Addressing Architecture4443 ICMP for IPv64861 Neighbor Discovery for IPv64862 IPv6 Stateless Address Autoconfiguration 5095 Deprecation of T ype 0 Routing Headers in IPv6IPv6 Management support (telnet, FTP, TACACS, RADIUS, SSH, NTP)VRF-Lite (IPv6 VRF with OSPFv3, BGPv6, IS-IS) RIP1058 RIPv1 2453 RIPv2OSPF (v2/v3)1587 NSSA 4552 Authentication/2154 OSPF Digital Signatures Confidentiality for 2328 OSPFv2 OSPFv32370 Opaque LSA 5340 OSPF for IPv6IS-IS1142 Base IS-IS Protocol1195 IPv4 Routing5301 Dynamic hostname exchangemechanism for IS-IS5302 Domain-wide prefix distribution withtwo-level IS-IS5303 3-way handshake for IS-IS pt-to-ptadjacencies5304 IS-IS MD5 Authentication5306 Restart signaling for IS-IS5308 IS-IS for IPv65309 IS-IS point to point operation over LANdraft-isis-igp-p2p-over-lan-06draft-kaplan-isis-ext-eth-02BGP1997 Communities2385 MD52545 BGP-4 Multiprotocol Extensions for IPv6Inter-Domain Routing2439 Route Flap Damping2796 Route Reflection2842 Capabilities2858 Multiprotocol Extensions2918 Route Refresh3065 Confederations4360 Extended Communities4893 4-byte ASN5396 4-byte ASN representationsdraft-ietf-idr-bgp4-20 BGPv4draft-michaelson-4byte-as-representation-054-byte ASN Representation (partial)draft-ietf-idr-add-paths-04.txt ADD PATHMulticast1112 IGMPv12236 IGMPv23376 IGMPv3MSDP, PIM-SM, PIM-SSMSecurity2404 The Use of HMACSHA- 1-96 within ESPand AH2865 RADIUS3162 Radius and IPv63579 Radius support for EAP3580 802.1X with RADIUS3768 EAP3826 AES Cipher Algorithm in the SNMP UserBase Security Model4250, 4251, 4252, 4253, 4254 SSHv24301 Security Architecture for IPSec4302 IPSec Authentication Header4303 ESP Protocol4807 IPsecv Security Policy DB MIBdraft-ietf-pim-sm-v2-new-05 PIM-SMwData center bridging802.1Qbb Priority-Based Flow Control802.1Qaz Enhanced Transmission Selection (ETS)Data Center Bridging eXchange (DCBx)DCBx Application TLV (iSCSI, FCoE)Network management1155 SMIv11157 SNMPv11212 Concise MIB Definitions1215 SNMP Traps1493 Bridges MIB1850 OSPFv2 MIB1901 Community-Based SNMPv22011 IP MIB2096 IP Forwarding T able MIB2578 SMIv22579 T extual Conventions for SMIv22580 Conformance Statements for SMIv22618 RADIUS Authentication MIB2665 Ethernet-Like Interfaces MIB2674 Extended Bridge MIB2787 VRRP MIB2819 RMON MIB (groups 1, 2, 3, 9)2863 Interfaces MIB3273 RMON High Capacity MIB3410 SNMPv33411 SNMPv3 Management Framework3412 Message Processing and Dispatching forthe Simple Network ManagementProtocol (SNMP)3413 SNMP Applications3414 User-based Security Model (USM) forSNMPv33415 VACM for SNMP3416 SNMPv23417 Transport mappings for SNMP3418 SNMP MIB3434 RMON High Capacity Alarm MIB3584 Coexistance between SNMP v1, v2 andv34022 IP MIB4087 IP Tunnel MIB4113 UDP MIB4133 Entity MIB4292 MIB for IP4293 MIB for IPv6 T extual Conventions4502 RMONv2 (groups 1,2,3,9)5060 PIM MIBANSI/TIA-1057 LLDP-MED MIBDell_ITA.Rev_1_1 MIBdraft-grant-tacacs-02 TACACS+draft-ietf-idr-bgp4-mib-06 BGP MIBv1IEEE 802.1AB LLDP MIBIEEE 802.1AB LLDP DOT1 MIBIEEE 802.1AB LLDP DOT3 MIB sFlowv5 sFlowv5 MIB (version 1.3)DELL-NETWORKING-SMIDELL-NETWORKING-TCDELL-NETWORKING-CHASSIS-MIBDELL-NETWORKING-PRODUCTS-MIBDELL-NETWORKING-SYSTEM-COMPONENT-MIBDELL-NETWORKING-TRAP-EVENT-MIBDELL-NETWORKING-COPY-CONFIG-MIBDELL-NETWORKING-IF-EXTENSION-MIBDELL-NETWORKING-FIB-MIBIT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, withinnovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & Design Let us analyze yourmultivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running cateEnsure your staff builds the right skills for long-termsuccess. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic IT environments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remote monitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at/lifecycleservicesLearn more at /NetworkingDELL-NETWORKING-FPSTATS-MIBDELL-NETWORKING-LINK-AGGREGATION-MIB DELL-NETWORKING-MSTP-MIB DELL-NETWORKING-BGP4-V2-MIB DELL-NETWORKING-ISIS-MIBDELL-NETWORKING-FIPSNOOPING-MIBDELL-NETWORKING-VIRTUAL-LINK-TRUNK-MIB DELL-NETWORKING-DCB-MIBDELL-NETWORKING-OPENFLOW-MIB DELL-NETWORKING-BMP-MIBDELL-NETWORKING-BPSTATS-MIBRegulatory compliance SafetyCUS UL 60950-1, Second Edition CSA 60950-1-03, Second Edition EN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group Differences EN 60825-1, 1st EditionEN 60825-1 Safety of Laser Products Part 1:Equipment Classification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication Systems FDA Regulation 21 CFR 1040.10 and 1040.11EmissionsInternational: CISPR 22, Class AAustralia/New Zealand: AS/NZS CISPR 22: 2009, Class ACanada: ICES-003:2016 Issue 6, Class AEurope: EN 55022: 2010+AC:2011 / CISPR 22: 2008, Class AJapan: VCCI V-3/2014.04, Class A & V4/2012.04USA: FCC CFR 47 Part 15, Subpart B:2009, Class A RoHSAll S-Series components are EU RoHS compliant.CertificationsJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2009, Class A Available with US Trade Agreements Act (TAA) complianceUSGv6 Host and Router Certified on Dell Networking OS 9.5 and greater IPv6 Ready for both Host and RouterUCR DoD APL (core and distribution ALSAN switch ImmunityEN 300 386 V1.6.1 (2012-09) EMC for Network Equipment\EN 55022, Class AEN 55024: 2010 / CISPR 24: 2010EN 61000-3-2: Harmonic Current Emissions EN 61000-3-3: Voltage Fluctuations and Flicker EN 61000-4-2: ESDEN 61000-4-3: Radiated Immunity EN 61000-4-4: EFT EN 61000-4-5: SurgeEN 61000-4-6: Low Frequency Conducted Immunity。
容错纠错存在的问题及对策简介:随着科技的不断发展,人们对于容错纠错技术的需求也越来越高。
然而,尽管容错纠错技术在很多领域都有广泛的应用,但仍然存在一些问题需要解决。
本文将讨论容错纠错存在的问题,并提出相应的对策。
一、容错纠错存在的问题1.1 难以100%保证数据完整性容错纠错技术可以通过增加冗余信息来确保数据在传输或存储过程中不丢失或损坏,但并不能完全保证数据的完整性。
无论是硬盘存储还是网络传输,都存在一定概率出现错误。
这就意味着在极小概率情况下,数据仍可能会丢失或损坏。
1.2 对系统资源消耗较大为了增加冗余信息和实现容错纠错功能,系统需要额外分配一部分资源用于相关计算和存储。
这样就会导致系统性能降低,并且资源消耗较大。
对于某些对实时性要求较高或资源受限的系统来说,这种消耗可能会成为瓶颈。
1.3 算法复杂度高容错纠错技术所使用的纠错算法往往非常复杂,需要消耗大量的计算资源和时间。
尤其是对于大规模数据传输或存储场景来说,这样的计算复杂度会成为一个挑战。
高复杂度不仅延长了处理时间,还增加了系统出错概率。
二、解决容错纠错存在问题的对策2.1 引入多种容错机制针对数据完整性无法100%保证的问题,可以引入多种容错机制来提高可靠性。
例如,除了使用冗余信息进行错误检测和纠正外,还可以采用备份策略,在不同位置保存数据副本,并定期进行校验。
当发现错误时,可以从备份中恢复数据。
2.2 优化资源分配为了减轻容错技术对系统资源的消耗,可以优化资源分配策略。
根据具体应用场景的需求和系统特点,合理安排计算和存储资源。
通过技术手段对冗余信息进行压缩或编码处理,减少所需的存储空间和计算能力。
2.3 算法优化与硬件协同设计针对算法复杂度高的问题,可以通过算法优化和硬件协同设计来提高运算效率。
在算法层面上,可以通过改进纠错算法的逻辑和流程,优化计算过程。
在硬件层面上,可以采用特定的处理器或硬件加速技术,提升容错纠错技术的执行效率。
双网卡冗余技术双网卡冗余服务器典型技术我个人认为使用NIC Express绑定多网卡,在当今这个数据时代具有一定的实际意义,无论是对于互联网服务器还是局域网服务器的用户都有启发,当我们为服务器绑定多网卡形成阵列之后,不仅可以扩大服务器的网络带宽,而且可以有效均衡负载和提高容错能力,避免服务器出现传输瓶颈或者因某块网卡故障而停止服务。
也许你会说,在当今千兆网卡早已普及的时代,还费劲绑定几块百兆网卡做什么?其实绑定多网卡的目的并不是仅仅为了提高带宽,这样做还有一个最大的优点就是多块网卡可以有效增强服务器的负载承受能力和冗余容错能力。
也许你也经历过,当使用单块10M/100M网卡在局域网里拷贝1G以上大文件的时候,经常会出现电脑停止响应,或者速度奇慢接近死机的情况,当多网卡绑定之后,这种情况会得到明显改善。
所谓双网卡,就是通过软件将双网卡绑定为一个IP地址,这个技术对于许多朋友来说并不陌生,许多高档服务器网卡(例如intel8255x系列、3COM服务器网卡等)都具有多网卡绑定功能,可以通过软硬件设置将两块或者多块网卡绑定在同一个IP地址上,使用起来就好象在使用一块网卡,多网卡绑定的优点不少,首先,可以增大带宽,假如一个网卡的带宽是100M,理论上两块网卡就是200M,三块就是300M,当然实际上的效果是不会是这样简单的增加的,不过经实际测试使用多个网卡对于增加带宽,保持带宽的稳定性肯定是有裨益的,如果交换机等相关条件不错的话,这个效果还是很能令人满意;其次,可以形成网卡冗余阵列、分担负载,双网卡被绑定成“一块网卡”之后,同步一起工作,对服务器的访问流量被均衡分担到两块网卡上,这样每块网卡的负载压力就小多了,抗并发访问的能力提高,保证了服务器访问的稳定和畅快,当其中一块发生故障的时候,另一块立刻接管全部负载,过程是无缝的,服务不会中断,直到维修人员到来。
先下载一个软件NICExpress下载完软件,先不忙安装,咱们还是先准备好硬件。
Sophos UTM Feature ListGeneral ManagementÌCustomizable dashboardÌRole-based administration: Auditor, read-only and manager for all functionsÌNo-charge, centralized management of multipleUTMs via Sophos UTM Manager (SUM)ÌConfigurable update serviceÌReusable system object definitions for networks, services, hosts, time periods, users and groups, clients and servers ÌPoint & Click IPS rule managementÌSelf-service user portal for one-click VPN setupÌConfiguration change trackingÌManual or fully automated backup and restore optionsÌEmail or SNMP trap notification optionsÌSNMP supportÌOne-time password (OTP) / Two-factor authentication(2FA) supports OATH protocol for WebAdmin, User Portal, SSL VPN, IPSec VPN, HTML5 Portal and SSH Login*ÌOne-click secure access for Sophos customer support** Network Routing and ServicesÌRouting: static, multicast (PIM-SM)and dynamic (BGP, OSPF)ÌNAT static, masquerade (dynamic)ÌP rotocol independent multicast routing with IGMP snooping ÌBridging with STP support and ARP broadcast forwarding ÌW AN link balancing: 32 Internet connections, auto-link health check, automatic failover, automatic andweighted balancing and granular multipath rulesÌZ ero-config active/passive high- availabilityÌA ctive/active clustering for up to 10 appliancesÌ802.3ad interface link aggregationÌQoS with full control over bandwidth pools anddownload throttling using Stochastic Fairness Queuingand Random Early Detection on inbound trafficÌF ull configuration of DNS, DHCP and NTPÌS erver load balancingÌI Pv6 supportÌR ED supportÌVLAN DHCP support and tagging**ÌMultiple bridge support**Network ProtectionÌStateful deep packet inspection firewallÌIntrusion protection: Deep packet inspectionengine, 18,000+ patternsÌSelective IPS patterns for maximumperformance and protectionÌIPS pattern aging algorithm for optimal performance*ÌFlood protection: DoS, DDoS and portscan blockingÌCountry blocking by region or individual country(over 360 countries) with separate inbound/outbound settings and exceptionsÌSite-to-site VPN: SSL, IPSec, 256- bit AES/3DES,PFS, RSA, X.509 certificates, pre-shared keyÌRemote access: SSL, IPsec, iPhone/iPad/Cisco VPN client supportÌVoIP handling for SIP and H.323 connectionsÌConnection tracking helpers: FTP, IRC, PPTP, TFTPÌIdentity-based rules and configuration withAuthentication Agent for usersAdvanced Threat Protection*ÌDetect and block network traffic attempting tocontact command and control servers usingDNS, AFC, HTTP Proxy and firewallÌIdentify infected hosts on the network Sandstorm Protection***ÌCloud-based sandbox to detect, block and gain visibility into evasive zero-day targeted attacks in active content such as executables, PDFs, Office Documents, and more ÌPreviously unseen suspicious files aredetonated in the cloud-sandbox and monitoredbefore being released to the end-userÌComplete reporting on all suspicious file activityincluding detailed sandbox analysis results AuthenticationÌTransparent, proxy authentication (NTLM/Kerberos) or client authenticationÌAuthentication via: Active Directory, eDirectory,RADIUS, LDAP and TACACS+ÌSingle sign-on: Active directory, eDirectoryÌSophos Transparent Authentication Suite (STAS)provides AD agent for transparent reliable SSOauthentication with Microsoft Active Directory***ÌSSL supportÌTools: server settings check, username/passwordtesting and authentication cache flushÌGraphical browser for users and groupsÌAutomatic user creationÌScheduled backend synchronization prefetchÌComplex password enforcementWeb ProtectionÌURL Filter database with 35 million+ sitesin 96 categories and 65+ languagesÌApplication Control: Accurate signatures andLayer 7 patterns for thousands of applicationsÌDynamic application control based onproductivity or risk thresholdÌView traffic in real-time, choose to block or shapeÌMalware scanning: HTTP/S, FTP and web-based email via dual independent antivirus engines (Sophos & Avira) block all forms of viruses, web malware, trojans and spywareÌFully transparent HTTPS filtering of URLs*ÌOption for selective HTTPS Scanning of untrusted sites**ÌAdvanced web malware protectionwith JavaScript emulation*ÌLive Protection real-time in-the-cloud lookupsfor the latest threat intelligenceÌPotentially unwanted application (PUA) download blocking*ÌMalicious URL reputation filtering backed by SophosLabs ÌReputation threshold: set the reputation threshold awebsite requires to be accessible from internal networkÌActive content filter: File extension, MIME type,JavaScript, ActiveX, Java and FlashÌTrue-File-Type detection/scan within archive files**ÌYouTube for Schools enforcementÌSafeSearch enforcementÌGoogle Apps enforcement*Web PolicyÌAuthentication: Active Directory, eDirectory,LDAP, RADIUS, TACACS+ and local databaseÌSingle sign-on: Active Directory,eDirectory, Apple Open DirectoryÌProxy Modes: Standard, (Fully) Transparent, Authenticated, Single sign-on and Transparent with AD SSO*ÌTransparent captive portal with authenticationÌSupport for separate filtering proxies in different modesÌTime, user and group-based access policiesÌBrowsing quota time policies and quota reset option**ÌAllow temporary URL filter overrides with authentication ÌClient Authentication Agent for dedicated per-user tracking ÌCloning of security profilesÌCustomizable user-messages for events in local languages ÌCustom HTTPS verification CA supportÌSetup wizard and context sensitive online helpÌCustomizable block pagesÌCustom categorization to override categoriesor create custom categories*ÌSite tagging for creating custom site categories**ÌAuthentication and filtering options by device typefor iOS, Android, Mac, Windows and others*ÌPolicy testing tool for URLs, times,users and other parameters*Email ProtectionÌReputation service with spam outbreak monitoring based on patented Recurrent-Pattern-Detection technologyÌAdvanced spam detection techniques: RBL, heuristics,SPF checking, BATV, URL scanning, grey listing, RDNS/HELO checks, expression filter and recipient verification ÌBlock spam and malware during the SMTP transaction ÌDetects phishing URLs within e-mailsÌGlobal & per-user domain and address black/white lists ÌRecipient Verification against Active Directory accountÌE-mail scanning with SMTP and POP3 supportÌDual antivirus engines (Sophos & Avira)ÌTrue-File-Type detection/scan within archive files**ÌScan embedded mail formats: Block maliciousand unwanted files with MIME type checkingÌQuarantine unscannable or over-sized messagesÌFilter mail for unlimited domains and mailboxesÌAutomatic signature and pattern updatesÌSophos Live Anti-Virus real-time cloud lookups** Email Encryption and DLPÌPatent-pending SPX encryption for one-way message encryption*ÌRecipient self-registration SPX password management**ÌAdd attachments to SPX secure replies**ÌTransparent en-/decryption and digitalsigning for SMTP e-mailsÌCompletely transparent, no additionalsoftware or client requiredÌSupports S/MIME, OpenPGP, and TLS standardsÌPGP key server supportÌAllows content/virus scanning even for encrypted e-mails ÌCentral management of all keys and certificates- no key or certificate distribution requiredÌDLP engine with automatic scanning of emailsand attachments for sensitive data*ÌPre-packaged sensitive data type contentcontrol lists (CCLs) for PII, PCI, HIPAA, andmore, maintained by SophosLabs*Email ManagementÌUser-quarantine reports mailed outdaily at customizable timesÌLog Management service supportÌCustomizable User Portal for end-usermail management, in 15 languagesÌAnonymization of reporting data to enforce privacy policy ÌOver 50 Integrated reportsÌPDF and CSV exporting of reportsÌCustomizable email footers and disclaimersÌSetup wizard and context sensitive online helpÌEmail header manipulation support**End-User PortalÌSMTP quarantine: view and releasemessages held in quarantineÌSender blacklist/whitelistÌHotspot access informationÌDownload the Sophos Authentication Agent (SAA)ÌDownload remote access clientsoftware and configuration filesÌHTML5 VPN portal for opening clientless VPN connections to predefined hosts using predefined servicesÌDownload HTTPS Proxy CA certificatesVPNÌPPTP, L2TP, SSL, IPsec, HTML5-based and Ciscoclient-based remote user VPNs, as well as IPsec, SSL,Amazon VPC-based site-to-site tunnels and SophosRemote Ethernet Device (RED) plug-and-play VPNÌIPv6 SSL VPN support***VPN IPsec ClientÌAuthentication: Pre-Shared Key (PSK), PKI(X.509), Smartcards, Token and XAUTHÌEncryption: AES (128/192/256), DES, 3DES(112/168), Blowfish, RSA (up to 2048 Bit), DHgroups 1/2/5/14, MD5 and SHA-256/384/512ÌIntelligent split-tunneling for optimum traffic routingÌNAT-traversal supportÌClient-monitor for graphical overview of connection status ÌMultilingual: German, English and FrenchÌIPsec Tunnel BindingVPN SSL ClientÌProven SSL-(TLS)-based securityÌMinimal system requirementsÌProfile support for varying levels of accessÌSupports MD5, SHA, DES, 3DES and AESÌWorks through all firewalls, regardless of proxies and NAT ÌSupport for iOS and AndroidClientless VPNÌTrue clientless HTML5 VPN portal for accessingapplications securely from a browser on any device VPN One-ClickÌEasy setup and installations of every client within minutes ÌDownload of client-software, individual configurationfiles, keys and certificates one click away fromthe Security Gateway end-user portalÌAutomatic installation and configuration of the clientÌNo configuration required by end userVPN REDÌCentral Management of all REDappliances from Sophos UTMÌNo configuration: Automatically connectsthrough a cloud-based provisioning serviceÌSecure encrypted tunnel using digital X.509certificates and AES256- encryptionÌRED sites are fully protected by the Network, Weband Mail security subscriptions of the Central UTM.ÌVirtual Ethernet for reliable transfer ofall traffic between locationsÌIP address management with centrally definedDHCP and DNS Server configurationÌRemotely de-authorize RED devicesafter a select period of inactivityÌCompression of tunnel traffic* (RED50, RED 10 revision 2, 3)ÌVLAN port configuration options* (RED 50)ÌSupport for RED 15w with integrated 802.11n WiFi AP*** Secure Wi-FiÌSimple plug-and-play deployment,automatically appearing in the UTMÌCentral monitor and manage all access points (APs) and wireless clients through the built-in wireless controller ÌIntegrated security: All Wi-Fi traffic isautomatically routed through the UTMÌWireless 802.11 b/g/n at 2.4 GHz and 5GHz (AP 50)ÌPower-over-Ethernet 802.3af (AP 30/50)ÌMultiple SSID support: Up to 8ÌStrong encryption supports state-of-the-artwireless authentication including WPA2-Enterpriseand IEEE 802.1X (RADIUS authentication)ÌWireless guest Internet access with customizablesplash pages on your captive portalÌVoucher-based guest access for daily or weekly access ÌTime-based wireless network accessÌWireless repeating and bridging meshednetwork mode with AP 50ÌHotspot backend authentication support*(RADIUS, TACACS, LDAP, AD)ÌAutomatic channel selection background optimization**ÌMulti-tenant hotspot administration**ÌSupport for HTTPS login support**Web Application Firewall ProtectionÌReverse proxyÌURL hardening engineÌForm hardening engineÌDeep-linking controlÌDirectory traversal preventionÌSQL injection protectionÌCross-site scripting protectionÌDual-antivirus engines (Sophos & Avira)ÌHTTPS (SSL) encryption offloadingÌCookie signing with digital signaturesÌPath-based routingÌOutlook anywhere protocol supportÌReverse authentication (offloading) for form-basedand basic authentication for server access*ÌPersistent session cookie support***Web Application Firewall ManagementÌAuto server discovery scans attachednetworks and identifies web serversÌIntegrated load balancer spreadsvisitors across multiple serversÌPredefined firewall profiles for MicrosoftOutlook Web Access (OWA)ÌQuick server switch allows easy maintenanceÌSkip individual checks in a granular fashion as required ÌMatch requests from source networksor specified target URLsÌSupport for logical and/or operatorsÌAssists compatibility with various configurationsand non-standard deploymentsÌOptions to change WAF performance parameters**ÌUpload custom WAF rules**ÌScan size limit option**ÌAllow/Block IP ranges**ÌWildcard support for server paths**ÌAutomatically append a prefix/suffix for authentication** UTM Endpoint ProtectionÌWindows endpoint protection with SophosAntivirus and device controlÌOn-access, on-demand or scheduled scanningfor malware, viruses, spyware and TrojansÌPUA scanningÌLive Protection Antivirus provides real-time, in-the-cloud lookups for the latest threat intelligenceÌHIPS with suspicious behavior detectionÌWeb protection with malicious site protectionÌDownload scanningÌDevice control including removable storage, optical media, modems, Bluetooth, wireless, infrared and more * New in UTM Accelerated (9.2)** New in UTM Advantage (9.3)*** New in UTM Elevated (9.4)ÌWeb in Endpoint enforcement of web policy and webmalware scanning on the endpoint with full policyand reporting synchronization with the UTMUTM Endpoint ManagementÌFully managed within the UTMÌEasy deployment from the UTM using using our installer ÌMonitor connected endpoints, threat statusand device utilization with full log accessÌAlerts for infected endpoints*SEC Endpoint Integration*ÌI ntegration with Sophos Enterprise ConsoleEndpoint Management provides UTM webpolicy and reporting for Web in EndpointLogging and ReportingÌLogging: Remote syslog, nightly rotation, email/ftp/SMB/SSH archiving and log management serviceÌOn-box reporting: Packet filter, intrusion protection,bandwidth and day/week/month/year scalesÌIdentity-based reportingÌPDF or CSV report exportingÌE xecutive report scheduling and archivingÌR eactive reporting engine crafts reports as you click on data ÌS ave, instantly email or subscribe recipients to any reports ÌP DF and CSV exporting of reportsÌN ightly compression and rotation of logsÌL og file archiving: On-box, FTP, SMB, SSH, Email and Syslog ÌH undreds of on-box reportsÌD aily activity reportingÌU RL filter override reportÌP er-user tracking and auditingÌA nonymization of reporting data to enforce privacy policy ÌF ull transaction log of all activity in human-readable formatUnited Kingdom and Worldwide Sales Tel: +44 (0)8447 671131Email:****************North American SalesToll Free: 1-866-866-2802Email:******************Australia and New Zealand SalesTel: +61 2 9409 9100Email:****************.auAsia SalesTel: +65 62244168Email:********************Oxford, UK | Boston, USA© Copyright 2016. Sophos Ltd. All rights reserved.Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners.1129-02.13DD.dsna.simple。
负载均衡load balance的英文缩写Title: Load Balance (LB): The Cornerstone of Efficient Resource ManagementIntroductionIn the realm ofputing and networking, one term that frequently crops up is "Load Balance" or LB for short. This concept plays a pivotal role in optimizing resource utilization, enhancing system performance, and ensuring fault tolerance. In this article, we will delve into the intricacies of load balancing, its significance, and how it contributes to efficient resource management.What is Load Balancing?Load balancing refers to the methodical distribution of network traffic across multiple servers to optimize resource utilization, enhance responsiveness, and avoid overloading any single server. It is an essentialponent of fault-tolerant systems as it ensures that no single point of failure exists.The Importance of Load BalancingThe importance of load balancing can be summed up in three main points:1. Improved Performance: By distributing the workload evenly across multiple servers, each server operates within its optimal capacity, leading to better overall system performance.2. Enhanced Availability: If one server fails or needs maintenance, the load balancer redirects traffic to other available servers, thereby ensuring continuous service availability.3. Scalability: As the demand for services increases, new servers can be added to the system without disrupting existing services. This allows for easy expansion and scalability of the system.How does Load Balancing Work?Load balancing typically involves the use of a software or hardware device called a load balancer. The load balancer acts as a traffic cop, directing client requests to the various backend servers based on certain predefined algorithms and policies. These algorithms may consider factors such as server availability, server load, geographic location, or specific application requirements.Types of Load Balancing AlgorithmsThere are several types of load balancing algorithms, including:1. Round Robin: Each iing request is assigned to the next available server in a rotation.2. Least Connections: New requests are sent to the server with the fewest active connections.3. IP Hash: A hash function is used to determine which server should handle a request based on the client's IP address.4. Weighted Algorithms: Servers are assigned weights based on their processing power or capacity, and requests are distributed accordingly.ConclusionLoad balancing (LB) is a crucial aspect of modernputing and networking infrastructure. Its ability to distribute workloads efficiently, ensure high availability, and facilitate scalability makes it an indispensable tool for managing resources effectively. Understanding the concepts and mechanisms behind load balancing can help organizations make informed decisions about their IT infrastructure and improve the overall user experience.。
reliablemulticast protocol协议(一)Reliable Multicast Protocol1. IntroductionThe Reliable Multicast Protocol (RMP) is designed to provide efficient and reliable multicast communication for various applications. It aims to deliver multicast data to a group of recipients while ensuring reliable and ordered delivery. This protocol is particularly useful in scenarios where multiple recipients need to receive the same data simultaneously without any loss or duplication.2. Protocol OverviewThe RMP operates on a client-server architecture. The server sends multicast data to a group of clients, and the clients receive and process the data. The protocol guarantees the reliable delivery of data through various mechanisms such as acknowledgment, retransmission, and ordering.3. Protocol ComponentsThe RMP consists of the following main components:3.1. SenderThe sender is responsible for transmitting multicast data to a group of clients. It breaks the data into smaller chunks, assigns sequence numbers to each chunk, and sends them to the multicast address. The sender also maintains a list of unacknowledged chunks for retransmission purposes.3.2. ReceiverThe receiver is responsible for receiving and processing multicast data from the sender. It acknowledges the received chunks and requests retransmission for any missing orcorrupted chunks. The receiver also ensures the correct ordering of chunks based on sequence numbers.3.3. Group ManagementThe group management component handles the registration and removal of clients from the multicast group. It maintains a list of active clients and updates it as clients join or leave the group. This component ensures that multicast datais only sent to active clients.4. Protocol WorkflowThe RMP follows the following workflow:1.Sender sends multicast data to the group address.2.Receiver(s) join the multicast group and start listeningfor data.3.Receiver acknowledges the received chunks by sendingacknowledgment messages to the sender.4.Sender receives acknowledgments and updates the list ofunacknowledged chunks.5.If any chunks are not acknowledged within a specifiedtimeout period, the sender retransmits them to the group.6.Receiver continues to receive data, acknowledge it, andrequest retransmission if necessary.7.When the receiver receives all the expected chunks, itsignals the completion of data delivery.5. Protocol FeaturesThe RMP offers the following features:•Reliability: The protocol ensures that multicast data is reliably delivered to all active clients without loss orduplication.•Ordered Delivery: The protocol maintains the correct ordering of mult icast data at the receiver’s end.•Efficiency: The RMP optimizes the use of network resources, minimizing unnecessary retransmissions andconserving bandwidth.•Scalability: The protocol can handle large multicast groups with a large number of clients efficiently. •Dynamic Group Management: The protocol supports the dynamic addition and removal of clients from themulticast group.6. ConclusionThe Reliable Multicast Protocol (RMP) provides a reliable and efficient solution for multicast communication. It ensures that multicast data is delivered without loss or duplication, while maintaining the correct ordering of data. The protocol’s features and components make it suitable for a wide range of applications requiring multicast communication.7. Protocol Implementation7.1. Sender ImplementationThe sender implementation of the RMP involves the following steps:1.Break the data into smaller chunks.2.Assign sequence numbers to each chunk.3.Send the chunks to the multicast group address.4.Maintain a list of unacknowledged chunks.5.Handle acknowledgments by updating the list ofunacknowledged chunks.6.Retransmit any unacknowledged chunks after a specifiedtimeout period.7.2. Receiver ImplementationThe receiver implementation of the RMP involves the following steps:1.Join the multicast group and start listening for data.2.Receive the multicast data chunks.3.Acknowledge the received chunks by sendingacknowledgment messages to the sender.4.Request retransmission for any missing or corruptedchunks.5.Ensure the correct ordering of received chunks based onsequence numbers.6.Signal the completion of data delivery when all expectedchunks are received.7.3. Group Management ImplementationThe group management implementation of the RMP involves the following steps:1.Register clients to the multicast group.2.Update the list of active clients as clients join orleave the group.3.Ensure that multicast data is only sent to activeclients.8. Security ConsiderationsWhen implementing the RMP, the following security considerations should be taken into account: •Authentication: Implement mechanisms to authenticate clients and protect against unauthorized access to themulticast group.•Data Privacy: Use encryption to ensure the privacy of multicast data and prevent unauthorized interception. •Data Integrity: Implement measures to detect and prevent tampering with the multicast data during transmission.•Access Control: Define access control policies to restrict multicast group membership to authorizedclients only.9. ConclusionThe Reliable Multicast Protocol (RMP) provides a comprehensive and efficient solution for reliable multicast communication. Its sender, receiver, and group management components ensure reliable and ordered delivery of multicast data to a group of r ecipients. By following the protocol’s workflow and considering security considerations,applications can benefit from the RMP’s features and enhance their multicast communication capabilities.。
D ATA S HE E TM 20 I n t e r n e t B a c k b o n e R o u t e rThe M20 router’s compact design offers tremendous performance and portdensity. The M20 router has a rich feature set that includes numerous advantages.sRoute lookup rates in excess of 40 Mpps for wire-rate forwarding performancesAggregate throughputcapacity exceeding 20 Gbps sPerformance-based packet filtering, rate limiting, and sampling with the Internet Processor II™ ASIC sRedundant System and Switch Board andredundant Routing Engine sMarket-leading port density and flexibility sProduction-proven routing software with Internet-scale implementations of BGP4, IS-IS, OSPF , MPLS traffic engineering, class of service, and multicasting applicationsThe M20™ Internet backbone router is a high-performance routing platform that is built for a variety of Internet applications, including high-speed access, public and private peering,hosting sites, and backbone core networks.The M20 router leverages proven M-series ASIC technology to deliver wire-rateperformance and rich packet processing,such as filtering, sampling, and rate limiting.It runs the same JUNOS™ Internet software and shares the same interfaces that are supported by the M40™ Internet backbone router, providing a seamless upgrade path that protects your investment. Moreover, its compact design (14 in / 35.56 cm high)delivers market-leading performance and port density, while consuming minimal rack space.The M20 router offers wire-rate performance,advanced features,internal redundancy,and scaleability in a space-efficient package.A d v a n t a g e sFeatur esBenefitsIt [JUNOS software]dramatically increases our confidence that we will have access to technology to keep scaling along with what the demands on the network are.We can keep running.—Michael O’Dell,Chief Scientist,UUNETTechnologies, Inc.“”A r c h i t e c t u r eThe two key components of the M20 architecture are the Packet Forwarding Engine (PFE) and the Routing Engine,which are connected via a 100-Mbps link. Control traffic passing through the 100-Mbps link is prioritized and rate limited to help protect against denial-of-service attacks.sThe PFE is responsible for packet forwarding performance.It consists of the Flexible PIC Concentrators (FPCs),physical interface cards (PICs), System and Switch Board (SSB), and state-of-the-art ASICs.sThe Routing Engine maintains the routing tables andcontrols the routing protocols. It consists of an Intel-based PCI platform running JUNOS software.The architecture ensures industry-leading service delivery by cleanly separating the forwarding performance from the routing performance. This separation ensures that stressexperienced by one component does not adversely affect the performance of the other since there is no overlap of required resources.Leading-edge ASICsThe feature-rich M20 ASICs deliver a comprehensive hardware-based system for packet processing, including route lookups, filtering, sampling, rate limiting, loadbalancing, buffer management, switching, encapsulation,and de-encapsulation functions. To ensure a non-blocking forwarding path, all channels between the ASICs are oversized, dedicated paths.Internet Processor and Internet Processor II ASICsThe Internet Processor™ ASIC, which was originally deployed with M20 routers, supports an aggregated lookup rate of over 40 Mpps.An enhanced version, the Internet Processor II ASIC,supports the same 40 Mpps lookup rate. With over one million gates, this ASIC delivers predictable, high-speed forwarding performance with service flexibility, including filtering and sampling. The Internet Processor II ASIC is the largest, fastest, and most advanced ASIC ever implemented on a router platform and deployed in the Internet.Distributed Buffer Manager ASICsThe Distributed Buffer Manager ASICs allocate incoming data packets throughout shared memory on the FPCs. This single-stage buffering improves performance by requiring only one write to and one read from shared memory. There are no extraneous steps of copying packets from input buffers to output buffers. The shared memory is completelynonblocking, which in turn, prevents head-of-line blocking.I/O Manager ASICsEach FPC is equipped with an I/O Manager ASIC that supports wire-rate packet parsing, packet prioritizing, and queuing.Each I/O Manager ASIC divides the packets, stores them in shared memory (managed by the Distributed Buffer Manager ASICs), and re-assembles the packets for transmission.Media-specific ASICsThe media-specific ASICs perform physical layer functions,such as framing. Each PIC is equipped with an ASIC or FPGA that performs control functions tailored to the PIC’s media type.Packet Forwarding EngineThe PFE provides Layer 2 and Layer 3 packet switching, route lookups, and packet forwarding. The Internet Processor II ASIC forwards an aggregate of up to 40 Mpps for all packet sizes. The aggregate throughput is 20.6 Gbps half-duplex.The PFE supports the same ASIC-based features supported by all other M-series routers. For example, class-of-service features include rate limiting, classification, priority queuing,Random Early Detection and Weighted Round Robin to increase bandwidth efficiency. Filtering and sampling areLogical View of M20 ArchitecturePacket Forwarding Enginealso available for restricting access, increasing security, and analyzing network traffic.Finally, the PFE delivers maximum stability duringexceptional conditions, while also providing a significantly lower part count. This stability reduces power consumption and increases mean time between failure.Flexible PIC ConcentratorsThe FPCs house PICs and connect them to the rest of the PFE. There is a dedicated, full-duplex, 3.2-Gbps channel between each FPC and the core of the PFE.You can insert up to four FPCs in an M20 chassis. Each FPC slot supports one FPC or one OC-48c/STM-16 PIC. Each FPC supports up to four of the other PICs in any combination,providing unparalleled interface density and configuration flexibility.Each FPC contains shared memory for storing data packets received; the Distributed Buffer Manager ASICs on the SSB manage this memory. In addition, the FPC houses the I/O Manager ASIC, which performs a variety of queue management and class-of-service functions.Physical Interface CardsPICs provide a complete range of fiber optic and electrical transmission interfaces to the network. The M20 router offers flexibility and conserves rack space by supporting a wide variety of PICs and port densities. All PICs occupy one of four PIC spaces per FPC except for the OC-48c/STM-16 PIC, which occupies an entire FPC slot.An additional Tunnel Services PIC enables the M20 router to function as the ingress or egress point of an IP-IP unicasttunnel, a Cisco generic routing encapsulation (GRE) tunnel, or a Protocol Independent Multicast - Sparse Mode (PIM-SM) tunnel.For a list of available PICs, see the M-series Internet Backbone Routers Physical Interface Cards datasheet.System and Switch BoardThe SSB performs route lookup, filtering, and sampling, as well as provides switching to the destination FPC. Hosting both the Internet Processor II ASIC and the Distributed Buffer Manager ASICs, the SSB makes forwarding decisions,distributes data cells throughout memory , processes exception and control packets, monitors system components, and controls FPC resets. You can have one or two SSBs, ensuring automatic failover to a redundant SSB in case of failure.Routing EngineThe Routing Engine maintains the routing tables and controls the routing protocols, as well as the JUNOS software processes that control the router’s interfaces, the chassis components, system management, and user access to the router. These routing and software processes run on top of a kernel that interacts with the PFE.sThe Routing Engine processes all routing protocol updates from the network, so PFE performance is not affected.sThe Routing Engine implements each routing protocol with a complete set of Internet features and provides full flexibility for advertising, filtering, and modifying routes.Routing policies are set according to route parameters,such as prefixes, prefix lengths, and BGP attributes.You can install a redundant Routing Engine to ensuremaximum system availability and to minimize MTTR in case of failure.JUNOS Internet SoftwareJUNOS software is optimized to scale to large numbers of network interfaces and routes. The software consists of a series of system processes running in protected memory on top of an independent operating system. The modular design improves reliability by protecting against system-wide failure since the failure of one software process does not affect other processes.SuppliesBack ViewM20 Router Front and Back ViewsFront View14 inS p e c i f i c a t i o n sSpecification DescriptionCopyright © 2000, Juniper Networks, Inc. All rights reserved. Juniper Networks is a registered trademark of Juniper Networks, Inc. Internet Processor,Internet Processor II, JUNOS, M5, M10, M20, M40, and M160 are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks may be the property of their respective owners. All specifications are subject to change without notice.Printed in USA.O r d e r i n g I n f o r m a t i o nModel NumberDescriptionPart Number 100009-003 09/00w w w.j u n i p e r.n e tC O R P O R AT EH E A D Q U A R T E RSJuniper Networks, Inc.1194 North Mathilda Avenue Sunnyvale, CA 94089 USAPhone 408 745 2000 or 888 JUNIPER Fax 408 745 2100Juniper Networks, Inc. has sales offices worldwide.For contact information, refer to /contactus.html .。
Data center optimized 1/10GbE switchThe Dell Networking S Series S55 1/10GbE top-of-rack (ToR) switch is optimized for lowering operational costs while increasing scalability and improving manageabilityat the network edge. Optimized for high-performance data center applications, the S55 leverages a non-blocking architecture that delivers low-latency L2 and L3 switching to eliminate network bottlenecks. The high-density S55 design provides 48 GbE access ports with up to four modular 10GbE uplinks in just 1RU to conserve valuable rack space. The S55 incorporates multiple architectural features that optimize data center network efficiency and reliability, including I/O-to-PSU panel airflow or PSU-to-I/O panel airflow for hot/cold aisle environments,and redundant, hot-swappable power supplies and fans. A “scale-as-you-grow” ToR solution that is simpleto deploy and manage, up to 12 S55 switches can be stacked to create a a single logical switch by utilizingDell Networking’s stacking technology and high-speed stacking modules.The S55 provides support for Dell Networking’s Open Automation Framework, which leverages capabilitiesof the modular Dell FTOS software to bring network automation into virtual data center environments, making them more responsive and able to adapt to changesin application requirements. The Open Automation Framework is comprised of a suite of inter-related network management tools that can be used together or independently to provide a network that is more flexible, available and manageable while reducing operational expenses.Applications• 1/10GbE server aggregation at the ToR in high- performance data center environments• With the S4810/S4820T/Z9000 virtualized switch/ router to create a flat, two-tier, non-blocking 1/10GbE data center network designKey features• The 1RU S55 switch delivers 48 GbE access interfaces:– 44 10/100/1000Base-T copper ports (fixed RJ45)– 4 GbE ports that can be configured for copper or fiber (SFP)• In addition, the S55 provides two optional high-speed slots that support the following uplink modules:– 2-port 10GbE SFP+ modules– 2-port 12Gbps stacking module• 176Gbps switching capacity delivers, non-blocking switching with less than 5 microseconds of latency • Scalable layer 2 and layer 3 switching with a full complement of standards-based features in FTOS • I/O-to-PSU panel airflow or PSU-to-I/O panel airflow • Redundant, hot-swappable power supplies (AC or DC) and fans• Stacking technology enables up to 12 S55 switches to be managed as a single unit• Open Automation Framework adds VM awareness as well as automated configuration and provisioningcapabilities to simplify the management of virtualnetwork environments• Modular Dell FTOS software delivers inherent stability as well as advanced monitoring andserviceability functions• Supports 9,252 byte jumbo frames• Low power consumption of 130W for a fully-configured unitWire-speed 1/10GbE,low-latency ToR switch delivers efficient data center performance.Dell Networking S SeriesS55 high-performance 1/10GbE top-of-rack switch48-port GbE switch with up to four modular 10GbE ports or stacking interfaces in just 1RU, non-blocking architecture supports low-latency switching and routing, integrated network automation and virtualization technology with Networking’s Open Automation Framework, reliable, data center optimizeddesign supports I/O-to-PSU and PSU-to-I/O airflows and redundant, hot-swappable power.Learn More at /Networking© 2013 Dell, Inc. All rights reserved. Dell, Inc and the DELL logo are trademarks of Dell, Inc. All other company names are trademarks of their respective holders. Information in this document is subject to change without notice. Dell, Inc. assumes no responsibility for any errors that may appear in this document.July 2013 | Version 2dell-networking-s series-s55-spec sheetSpecifications: S55 high-performance 1/10GbE ToR switchPhysical44 10/100/1000Base-T ports 4 GbE SFP ports1 RJ45 console management port with RS232 signaling 1 RJ45 Ethernet management port 1 USB-B management port2 USB 2.0 ports (1 USB A, 1 USB B)2 module baysSize: 1 RU, 1.75 x 17.42 x 18.75 (in), 4.44 x 44.25 x 47.62 (cm) Weight: 14.41 lbs (6.54 kg)ISO 7779 A-weighted sound pressure level:63.9 dBA at 73.4°F (23°C) Power supply: 100–240V AC 50/60 Hz, –44 to -60V DC Max. thermal output: 443 BTU/h Max. current draw per system:2A at 100/120V AC, 1A at 200/240V AC, 3.6A at -48V DC Max. power consumption: 130W Max. operating specifications:Operating temperature: 32°F to 122°F (0°C to 50°C)Operating humidity: 10 to 85% (RH), non-condensing Max. non-operating specifications:Storage temperature: –40°F to 158°F (–40°F to 70°C)Storage humidity: 5 to 95% (RH), non-condensing Reliability: MTBF 169,315 hoursRedundancyRing stacking topology with dynamic master election Dual modular slots with up to four 10GbE ports Link aggregation across stack members Hot swappable redundant AC or DC power Hot swappable redundant fanPerformanceMAC addresses: 32K IPv4 routes: 16K IPv6 routes:8KSwitching capacity 176Gbps Forwarding capacity:131MppsLink aggregation: 8 links per group, 128 groups per stackStacking capacity: 96Gbps per stack member Queues per port: 4 queues VLANs: 4096Layer 2 switching: All protocols, including IPv4 and IPv6Layer 3 routing: IPv4 and IPv6LAG load balancing: Based on layer 2, IPv4 or IPv6 headers Switching latency: <5 µs for 64 byte frames Packet buffer memory: 4MB CPU memory: 2GB SD card: 8GBIEEE compliance802.1AB LLDP802.1ag Connectivity fault Management 802.1D Bridging, STP 802.1p L2 Prioritization 802.1Q VLAN Tagging, Double VLAN Tagging, GVRP 802.1s MSTP 802.1w RSTP 802.1X Network Access Control 802.3ab Gigabit Ethernet (1000Base-T)802.3ac Frame Extensions for VLAN Tagging 802.3ad Link Aggregation with LACP 802.3ae 10 Gigabit Ethernet (10GBase-X)802.3ak 10 Gigabit Ethernet (10GBase-CX4)802.3i Ethernet (10Base-T)802.3u Fast Ethernet (100Base-TX)802.3x Flow Control 802.3z Gigabit Ethernet (1000Base-X)ANSI/TIA-1057 LLDP-MED Force10 FRRP (Force10 Redundant Ring Protocol)Force10 PVST+MTU 9,252 bytesRFC and I-D complianceGeneral Internet protocols768 UDP 1321 MD5793 TCP 1350 TFTP 854Telnet 2474 Differentiated Services 959FTP 3164 SyslogGeneral IPv4 protocols791 IPv4 1812 Routers 792 ICMP 1858 IP Fragment Filtering 826 ARP 2131 DHCP (server & relay)1027 Proxy ARP 2338 VRRP 1035 DNS (client) 3021 31-bit Prefixes 1042 Ethernet Transmission 3046 DHCP Option 821191 Path MTU Discovery 3069 Private VLAN 1305 NTPv3 3128 Tiny Fragment Attack 1519 CIDR Protection 1542 BOOTP (relay )General IPv6 protocols1981 Path MTU Discovery 2463 ICMPv6 (partial) 2464 Ethernet 2460 IPv6Transmission 2461 Neighbor Discovery 2675 Jumbograms (partial)3587 Global Unicast 2462 Stateless Address Address Format Autoconfiguration 4291 Addressing(partial)RIP1058 RIPv12453 RIPv2OSPF1587 NSSA 3623 Graceful Restart 2154 MD5 4222 Prioritization and 2328 OSPFv2Congestion voidance2370 Opaque LSABGP1997 Communities 3065 Confederations 2385 MD54360 Extended 2439 Route Flap Damping Communities 2796 Route Reflection 4893 4-byte ASN 2842 Capabilities 5396 4-byte ASN 2858 Multiprotocol representations Extensions 4271 BGPv42918 Route Refresh4724 Graceful Restart Multicast1112 IGMPv1 4541 IGMP v1/v2/v32236 IGMPv2 Snooping3376 IGMPv3 4601PIM-SM for IPv43569 SSM for IPv4Network management1155 SMIv11156 Internet MIB 1157 SNMPv11212 Concise MIB Definitions 1215 SNMP Traps 1493 Bridges MIB 1850 OSPFv2 MIB 1901 Community-based SNMPv21905 SNMPv21907 SNMP MIB 2011 IP MIB 2012 TCP MIB 2013 UDP MIB 2024 DLSw MIB 2096 IP Forwarding Table MIB 2233 Interfaces MIB 2570 SNMPv32571 Management Frameworks 2572 Message Processing and Dispatching 2574 SNMPv3 USM 2575 SNMPv3 VACM 2576 Coexistence Between SNMPv1/ v2/v32578 SMIv22579 Textual Conventions for SMIv22580 Conformance Statements for SMIv22618 RADIUS Authentication MIB 2665 Ethernet-like Interfaces MIB 2674 Extended Bridge MIB 2787 VRRP MIB 2819 RMON MIB (groups 1, 2, 3, 9)2863 Interfaces MIB 2865 RADIUS 3273 RMON High Capacity MIB 3416 SNMPv23418 SNMP MIB 3434 RMON High Capacity Alarm MIB 3580 802.1X with RADIUS 4273 BGP MIBv14293 IPv6 MIB 5060 PIM MIB ANSI/TIA-1057 LLDP-MED MIB draft-grant-tacacs-02 TACACS+IEEE 802.1AB LLDP MIB IEEE 802.1AB LLDP DOT1 MIB IEEE 802.1AB LLDP DOT3 MIB sFlow sFlow v5 MIB (version 1.3)MIBsF10-CHASSIS-MIBF10-IF-EXTENSION-MIBF10-LINK-AGGREGATION-MIB F10-PRODUCTS-MIBF10-S-SERIES-CHASSIS-MIBFORCE10-BGP4-V2-MIB draft-ietf-idr-bgp4-mibv2-05FORCE10-COPY-CONFIG-MIB FORCE10-MSTP-MIB ruzin-mstp-mib-02 (traps only)FORCE10-SYSTEM-COMPONENT-MIB FORCE10-TRAP-EVENT-MIBRegulatory ComplianceSafetyUL/CSA 60950-1, 2nd EditionEN 60950-1, 2nd EditionIEC 60950-1, 2nd Edition Including all National Deviations and Group DifferencesEN 60825-1 Safety of Laser Products Part 1: Equipment Classification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication SystemsFDA Regulation 21 CFR 1040.10 and 1040.11China CCCEmissionsAustralia/New Zealand: AS/NZS CISPR 22: Class A Canada: ICES-003, Issue-4, Class A Europe: EN 55022: (CISPR 22), Class A Japan: VCCI Class AUSA: FCC CFR 47 Part 15, Subpart B, Class A Brazil: AnatelImmunityEN 300 386 EMC for Network Equipment EN 55024EN 61000-3-2: Harmonic Current Emissions EN 61000-3-3: Voltage Fluctuations and Flicker EN 61000-4-2: ESDEN 61000-4-3: Radiated Immunity EN 61000-4-4: EFT EN 61000-4-5: SurgeS5544 x 10/100/1000Base-T, 4 x 1GbE SFP, 1 x AC PSU, 2 x FM, IO/ to PSU Panels (Normal)44 x 10/100/1000Base-T, 4 x 1GbE SFP, 1 x AC PSU, 2 x FM, PSU to I/O Panels (Reverse)44 x 10/100/1000Base-T, 4 x 1GbE SFP, 1 x DC PSU, 2 x FM, I/O to PSU Panels (Normal)44 x 10/100/1000Base-T, 4 x 1GbE SFP, 1 x DC PSU, 2 x FM,PSU to I/O Panels (Reverse)Redundant power supplies and Fan modules*AC Power Supply, I/O to PSU Panels (Normal)AC Power Supply, PSU to I/O Panels (Reverse)DC Power Supply, I/O to PSU Panels (Normal)DC Power Supply, PSU to I/O Panels (Reverse)Fan Module, 1 x Fan, I/O to PSU Panels (Normal)Fan Module, 1 x Fan, PSU to I/O Panels (Reverse)Modules*2-port 10GE SFP+ module2-port 12Gbps high-speed stacking module Optics*SFP+, 10GbE, SR, 850nm Wavelength, 300m reach SFP+, 10GbE, LR, 1310nm Wavelength, 10Km reach SFP+, 10GbE, ER, 1310nm Wavelength, 40Km reach SFP+, 10GbE, LRM, 1310nm Wavelength, 220m reach SFP, 1000Base-SX, 850nm Wavelength, 550m reach SFP, 1000Base-LX, 1310nm Wavelength, 10Km reach SFP, 1000Base-ZX, 1550nm Wavelength, 80Km reach SFP, 100Base-FX, 1310nm Wavelength, 2Km reach SFP, 1000Base-T Cables*SFP+, CU, 10GbE, Direct Attach Cable, 0.5m SFP+, CU, 10GbE, Direct Attach Cable, 1m SFP+, CU, 10GbE, Direct Attach Cable, 2m SFP+, CU, 10GbE, Direct Attach Cable, 5m SFP+, CU, 10GbE, Direct Attach Cable, 7m Stacking Cable, 0.6m, 12Gbps SoftwareFTOS – Networking Operating System Software, L3, S55Note: In-field change of airflow direction not supported.*Ordered separately。
RDP:A Result Delivery Protocol for Mobile ComputingMarkus Endler,Dilma M.Silva and Kunio OkudaDepartment of Computer ScienceUniversity of S˜a o Paulo,Brazilendler,dilma,kunio@p.brAbstractNowadays several information retrieval services are be-ing offered to mobile clients.Many of such services are im-plemented by groups of distributed servers and sometimesemploy time-consuming data location and retrieval proto-cols among the servers.Moreover,many network appli-cations have strong reliability requirements.This meansthat client-server communication in services for mobilecomputing must also be reliable despite the intrinsic non-predictability related to mobile computing.In this paper we present a client-server protocol whichimplements reliable delivery of messages to mobile hosts.Reliability here means that for every request from a mo-bile client to a network service,eventually it will receivethe result,despite its periods of inactivity and any numberof migrations.This protocol is suitable for network servicesbased on request-reply style of communication(e.g.RPC)and with long request processing times,i.e.where there ishigh probability that a client at a mobile host migrates toanother cell while waiting for the reply.The main advantage of our protocol is that the locationof the proxy used to forward messages to a mobile host isnot static(as in Mobile IP),by which it facilitates dynamicglobal load balancing within the set of Mobile Support Sta-tions.1.IntroductionWith the ongoing improvement and spread of cellulartelephony technology,more and more computer networkservices will be supporting wireless communication.Soon,it will be possible to access many sorts of information basesfrom lightweight,inexpensive and hand-held terminals orPDAs,regardless of their current location.Also,many ofthese information bases will be fed with data sent by thesemobile devices,which may range from frequent updatesinteractions and processing within the TIS network.In order to implement efficiently the operations offered by the system to mobile users(such as query,update,sub-scribe1,and multicast2)we are designing and implementing a suite of protocols[7]that handle different aspects of the operations,such as user mobility,data location,data repli-cation,TIS interaction,etc.We hope that the model and the protocols are generic enough to be easily adaptable to a variety of applications,ranging from support systems for strategical actions to electronic mail systems for portable computers.In this paper we focus our attention on a connectionless communication protocol for mobile clients named Result Delivery Protocol(RDP).In our project,this protocol is used for the query and subscription operations mentioned before.The remainder of this paper is organized as follows:In section2we define the system model and the underlying assumptions.In section3we describe the Result Deliv-ery Protocol,focusing on how location updates of migrat-ing clients and retransmissions are handled by the protocol. We then compare our protcol with related work in section 4.Finally,in section5we give informal arguments about its correctness and the incurred overhead and draw some conclusions.2.System Model and AssumptionsThe model of the system consists of two types of ma-chines,the static hosts and the mobile hosts().Static hosts are connected to each other through a static and reli-able network.Among the static hosts,some also serve as Mobile Sup-port Stations()for the mobile hosts and are assumed not to fail.Each defines a geographic region(cell) in which it is able to communicate with the set of mobile hosts currently located in the cell.The information about the s within a cell is maintained at each in a data structure local1The user specifies an entity and a threshold on any of its attribute val-ues,and the system will notify the user about related changes in the entity.2The user provides its identification,the identification of a group of users(previously configured)and a message to be sent to the group.sends a join message to the in charge for the cell it is currently in,which then becomes the currently responsible for the(respMss).A leaves the system by sending a leave message to its respMss.Mobile hosts are able to move from one cell to an-other.Whenever a enters a new cell it sends a greet(oldMss)message to the responsible for the target cell,where oldMss is the identity of the re-sponsible for the cell which the is leaving.With this information the of the new cell is able to initiate a Hand-off protocol with the previous(see Section3.2).This greet message is also sent by the when it becomes active again within the same cell where it has been before become inactive.In this particular case,however,the will not initiate a Hand-off protocol,since the previous mentioned in message greet is itself.Actually,in this model we abstract from the details of how a learns that it is entering or leaving a cell,assum-ing that this can be achieved in different ways according to the wireless technology in use.Figure1shows a system with three s andfive s (in the corresponding cells or migrating)and where mobile host is issuing a request to server from one cell,but may pick up the server’s reply while visiting another cell.The main assumptions of the model are the following: munication among the s is reliable and mes-sage delivery is in causal order;2.All are reliable and do not fail;3.At any time,each active is associated with exactlyone(respMss).4.If a is active it must send an Ack to all messagesreceived from its respMss,and while it is inactive itmust not reply to any message.When a migrates between cells it may be considered inactive by both the ()or the new Mss()during the period of time of the Hand-off.5.A is able to detect if a message from its respMssis a new one or if it is a retransmission.6.A only leaves the system if it has acknowledgedall messages received by its respMss.3.Result Delivery ProtocolIn the remainder of this paper we present and analyze a protocol which guarantees reliable delivery of reply mes-sages from a server in the network to a mobile client.This protocol,which we called Result Delivery Protocol,is suit-able for network services based on a request-reply style of interaction(e.g.RPC)and with long request processing time.For such services,it is likely that the client(on the mobile host)migrates to another cell while waiting for the result of the request.The protocol can be used with a wide range of existing network services since from the perspec-tive of the server,service access is identical to the one by a static client.Although the presentation of the protocol is focussed on a request-reply style of interaction,like operation query of the traffic information service(Section1),it can be used as well for asynchronous notifications of events to mobile clients.Thus,the RDP may as well be used for implement-ing the operation subscribe(Section1),by which a mobile client is informed of any major change in the traffic situa-tion.The RDP protocol is based on the indirect model for client-server interactions proposed by Badrinath et al.[2]. In this model the mobile support stations act as represen-tatives for all the mobile hosts within their cell,hold part of the’s state,and do the translation between the wired and the wireless communication.3.1.Outline of the ProtocolThe Result Delivery Protocol(RDP)is based on the no-tion of a proxy for requests(or simply proxy).A proxy is created on behalf of a that wishes to interact with servers within the wired network.It is created at the responsible for the’s current cell(respMss)whenever the initiates a new series of service requests.The main purpose of the proxy is to provide afixed location for the re-ception of server replies,to keep track of pending requests, store the request’s results,and to forward the results to the responsible for the cell in which the is currently located.The proxy object exists only until all result for-wards are acknowledged by the corresponding.Then,at a later moment,the same may cause the creation ofa new proxy at the same or a different,depending on whether it has or not migrated.However,at any time each is associated with at most one proxy.In order to decide to which to forward the result of a request,each proxy holds a variable called currentLoc,which is updated with the address of the current respMss of the corresponding whenever it migrates.A proxy alsoholds a requestList containing identifiers of all pend-ing requests issued by the.For being able to update currentLoc at every migra-tion,each has one proxy reference(or simply pRef) associated to it,which is hold by its respMss.As the namesuggests,a pRef contains a reference(the i.e.address ofthe and a proxyID)to the current proxy associated with the.However,when a does not have a proxy(i.e.when it has no pending requests)pRef holds a null ad-dress.A pRef also contains aflag called Ready to Kill pRef(RKpR),which signals whether the proxy has forwarded theresult of its last pending request(see section3.3for more details).Each time a receives a new request from one of its local s it checks the corresponding pRef.If it hasan null address,a new proxy is created locally on behalf of and updates pRef with its own address and the proxy’s objectID.Otherwise,Mss forwards the request tothe proxy whose address is mentioned in pRef.When a migrates from to pRef ishanded over through the Hand-off protocol(see Section3.2) to as part of’s state.After completion of the Hand-off for a,’s new location is updated at the proxy.This is done by having send a special mes-sage(update currentLoc)to the proxy.This message is also sent when a respMss receives a greet message from the announcing its switch from the inactive to the ac-tive state.At the proxy,the arrival of the update cur-rentLoc message causes the variable currentLoc to be updated and any non-acknowledged results from pend-ing requests to be re-sent to the new location.When the result of any of s pending requests(say,re-quest R)arrives at a proxy(located at)it is forwarded by to the address mentioned in currentLoc(i.e. respMss)and then delivered to through wireless com-munication.In normal conditions,i.e.when a is active and staysin its cell for a sufficient long period of time,the arrival ofR’s result is acknowledged by the through a Ack mes-sage,which is forwarded by to.Once it has arrived,the proxy marks that request R has been completed, removes it from the requestList,and possibly sends an acknowledgment to the server,depending on the particular application-level client-server protocol being used.If respMss is unable to reach,because it is migrat-ing or is in inactive state,or simply because wireless com-munication failed,the respMss does not attempt any new forwarding of the result.Instead,it is the proxy that will re-sent the result as soon as it receives the next update of ’s address.At each,higher priority is given to forwarding Ack messages(from s to)than to engaging in any new Hand-off transactions.This avoids that results already ac-knowledged by a are re-sent to the new cell.However, as soon as respMss receives a request(from another) to transfer’s state,as part of the Hand-off protocol,it will ignore all future Ack messages from this.From the viewpoint of the proxy,until it does not receive an Ack message informing that R’s result has been indeed received by the,it keeps re-sending the result to every from which its gets a update currentLoc mes-sage.Notice that this guarantees that every result from a request will eventually reach its destination(the),pro-vided that the does not leave the system with a pending request.The price to pay for this reliability is that eventu-ally a result will be sent more than once to a.3.2.Hand-off ProtocolThe Hand-off protocol is executed between a and whenever a switches cells,and aims at transfer-ring all of’s relevant state to.It works as follows:A entering a new cell registers itself with the cor-responding Mobile Service Station(i.e.)by sending it a greet message containing the identification of its pre-vious respMss.After having announced itself to,a must not reply to any message from any other than.When receiving the greet message,sendsa dereg message,asking it to de-register and send back’s proxy reference(pRef).When re-ceives dereg Mh,it replies to with a deregAck message containing’s pRef,and then removes from its localMhs list and updates’s new location with its proxy,by send-ing the update currLoc message to the proxy,whose address is contained in pRef.The greet message is also sent by a when it be-comes active again within the same cell where it has been before become inactive.In this case,however,message greet carries the identification of s current respMss, and hence no Hand-off is initiated.3.3.The Proxy Life-cycleAlthough every always has at most one proxy that forwards results to it,the location of the proxies in the static network may change over time,by which the protocol facili-tates dynamic global load balancing within the set of s.As mentioned earlier,a proxy is created whenever a issues a new request and no proxy is yet available,i.e.when address in’s pRef is empty.After creation,a proxy is capable of handling several concurrent requests from its .When a proxy(hosted at)forwards the result of the last pending request(say,)to a respMss,flag del-pRef is set to and is piggy-backed on this result mes-sage sent to a’s respMss.It means that if this message is received by the,then the proxy can be deleted.When the respMss receives a result message with del-pRef,it setsflag RKpR true at’s pRef,mean-ing that respMss will confirm the removal of the proxy(and erase proxy’s address in pRef’s)as soon as it receives an Ack from that is not preceded by any new request.If this is the case,respMss sends message Ack withflag del-proxy piggy-backed on it to,by which this one knows that the proxy can in fact be deleted.How-ever,if in the meantime,a new request from arrives at respMss,flag RKpR is re-set to and Ack message is sent with del-proxy,meaning that the old proxy will also be used for this new request.Figure2shows the proxy and pRef objects,and theflags used to control the existence of the proxy.Thus,the removal of the proxy is confirmed by respMss only if the following condition holds:RKpR and for all of’s requests the corresponding Ack has been received.Notice that since will always use respMss as the gateway for new requests,it will never happen that a new request is sent to a which is not hosting a’s proxy.3.4.ExamplesIn this section we present two examples to illustrate how RDP works.Figure3shows a scenario where a mobile host Mh issues a single request to a server at,then migrates toand later to.Assuming that this is’sfirst request,its pRef will contain no address.Hence a new proxy is created at with its variable currentLoc (abbreviated by currL)set to and also the address in pRef is set to.Now each time the migrates(and after the Hand-off protocol is completed)the new sends an update currL message to the proxy in order to update its variable currL.MhrespMssMss pupdate currLupdate currLforward result forward resultserverMss Mss p oproxy MhrequestcurrL:=ppRef:=(Mssp)pRefcurrL:=oresultcurrL:=n?Mss nAckAck Hand-offHand-off+greetgreet++dereg+pRefdel-pRefdel-pRefdel-proxyderegAckWhen the response of the request (result )arrives atthe proxy,forwards it to the Mss metioned in currL ,even if in the meantime has migrated,as suggested by the question mark in the figure.Piggy-backed on the re-sult message goes del-pRef,because proxy’s requestList has a single entry.Because Mh has mean-while migrated to another cell,the proxy does not receivean Ack from,hence will repeat the forwarding every time its variable currL is updated,until it finally receives an Ack from the Mh .When receives the result with del-pRef ,it sets the flag RKpR at ’s pRef ,forwardsresult to Mh and waits for an Ack from.As soon as this message arrives,and since still RKpR ,erases the address at ’s pRef and also sends message Ack piggy-backed with flag del-proxy to .Finally,when this message arrives at the proxy is deleted.Figure 4depicts a scenario where a Mh issues several requests through its proxy,showing when the proxy is actu-ally deleted.In this scenario,the mobile host Mh first issues requestA at (creating a new proxy),and then mi-grates to Mss .Thus,initially the proxy’s requestListcontains only requestA and when resultA arrives fromthe server,forwards resultA with del-pRef to .When this message arrives,sets flag RKpR =true at ’s pRef ,and forwards resultA to Mh .However,since Mh issues a new requestB before send-ing an Ack for resultA (AckA )flag RKpR is set to false.Since now Mss receives AckA when RKpR,it leaves pRef ’s address unchanged.After receiving requestB followed by AckA ,the proxy’s requestList ends up holding only requestB ,and resultB is forwarded to .Assume that meanwhile a new requestC arrives at the proxy,causing its requestList to hold both requestB and requestC .When AckB is received by the proxy,and resultC is received and forwarded,requestB can be removed from requestList ,leaving only the single pending requestC .In this particular case,the proxy does not forward again resultB (which has already been sent),but sends a spe-cial message containing only del-pRef to ,where it causes flag RKpR at ’s pRef to be set to .Finally,when AckC arrives from ,pRef ’s address isset to null,and message AckC with del-proxyisAresultCAck BAck AresultAresultBresultBresultCrequestC resultA+requestBresultA Ack BAckCrequestBrequestCAck +AckC resultBresultCrequestBrequestCupdate currLMssrequestAMhrequestAproxy serverMsspHand-offdel-pRefdel-pRefdel-proxysent to proxy,which causes its deletion.This means that at the next time issues a new request,a new proxy will be created at its current respMss .However,suppose that the last del-pRef message hadarrived at Mss after AckC .Since RKpR,pRef would be left unchanged and AckC would be sent to with del-proxy ,avoiding the removal of the proxy.4.Related WorkIn our work,we adopt the indirect model for client-server interactions originally proposed by Badrinath et al.[2]and now adopted also in many other works [14,3,8].In this model mobility is made explicit to all protocol layers (up to the application layer)and the s serve as static interme-diates for any communication between the mobile clients and the servers executing on the pared to other approaches that make mobility explicit only to the protocol layers up to the network layer (e.g.Mobile IP and its optimizations [10]),the indirect model has as its main advantage the possibility to build mobility-aware higher-level protocols which use locality information to dynami-cally adapt themselves to variant transmission and/or net-work access conditions,such as communication bandwidth of wireless media,closest server,etc.Moreover,this model has the advantage of allowing the s to perform trans-lations between the wired and wireless medium,and also to store application-specific data related to the state of the‘local’s.Based on the indirect model,Bakre [3]proposes an in-direct TCP protocol (I-TCP)and protocols at higher layers,all of which take mobility into account.In his approachthe fixed host only ‘sees’an image of its peer,which is actually stored at its respMss and is transferred to otherwhen a moves between cells.However,since during a Hand-Off the wireless component of I-TCP sim-ply resets congestion-related parameters,I-TCP cannot rely on transport-layer acknowledgments and defers this respon-sibility to higher protocol layers.Moreover,the fixed host(the server)must be informed that a new is now hold-ing ’s image.Although our protocol is not aimed for connection-oriented services,and hence does not require maintaining the status of a connection,it proposes a solu-tion to minimize the disruption caused by the Hand-off.Although RDP is not a generic network protocol (since it is suited only for connectionless request-reply communica-tion,rather than for generic datagram delivery),it is useful to compare it with Mobile IP due to some common char-acteristics.In both protocols messages (or datagrams)are delivered to mobile hosts via intermediate elements.In Mo-bile IP they are called home and foreign agent and in RDP these are the proxy and the respMss .In both protocols,thecurrentlocation (in Mobile IP terminology,care-of ad-dress )is stored at the proxy and updated whenever the registers at a new .The main differences between the protocols are as fol-lows:In Mobile IP the home agent is fixed rather than dy-namic,making dynamic load balancing impossible.In RDP the proxy remains at a same location only while there are some pending requests,and as soon as all results of pend-ing requests have been delivered successfully to the corre-sponding ,the proxy removes itself.Thus,in RDP the proxy must keep track of the pending requests,meaning thatall new requests must be forwarded to thehosting the proxy ,which is not the case in Mobile IP.Another conse-quence of the proxy ’s dynamic address is that the proxy ref-erence (pRef)has to be handed over betweens at every migration.Since in Mobile IP the address of home agent isstatic,it can be included byinto each request.However,Mobile IP does not guarantee reliable data de-livery to the s.For example,IP datagrams may be lost while a new care-of address change is on its way to the home agent,or during the periods of inactivity of the mo-bile host.In fact,Mobile IP delegates the task of detect-ing and re-transmitting lost datagrams to upper network lay-ers,such as TCP.However,it has been shown that conven-tional transport-level protocols without mobility-awareness present bad performance when used in a wireless environ-ment[4].In RDP,on the other hand,Hand-Off is tightly integrated with the message delivery,ensuring that no mes-sages(i.e.request results)are lost despite migration or inactivity.Many other works have investigated the issue of dis-connected data access.In Project Dataman,from Rutgers, Imielinski and Badrinath[9]proposed several query and up-date strategies for distributed information services that store frequently modified data,such as the geographic location of individual mobile hosts.Project Rover[11],from M.I.T.,is a well-known dis-tributed object development environment for disconnected operation.It provides mobile computing support based on two concepts:Queued Remote Procedure Calls(QRPC) and Relocable Dynamic Objects(RDOs).In QRPC(asyn-chronous RPC)the actual sending of the RPC request is de-coupled from the QRPC invocation and is performed as soon as the has established a good communication link with a base station.A RDO is an object encapsulating both code and data that can execute either at the client or the server.In some sense,QRPC and RDP perform comple-mentary tasks.While thefirst guarantees reliable sending of requests,RDP guarantees reliable result delivery.Pitoura et al.[12]describe a general architecture of an information system for mobile environment,and in[13] propose support for transactions management for wireless environments.Although recently much attention has been given to the problems of database transaction management [6]with disconnection requirements,this issue is not ad-dressed by our work.In Project Wireless-View[15](U.Illinois-Chicago)sev-eral data allocation schemes are studied and specific cost models for access to continuously changing databases from clients at mobile hosts were proposed.Bayou[5](Xerox)is a weakly consistent storage system designed for a mobile computing environment that supports the development of a variety of collaborative applications, such as shared calendars,mail,databases,etc.Unlike our system model,Bayou treats mobile units as peers in a peer-to-peer model,where a mobile host may be both a Bayou client and server.In Bayou,collections of data items are fully replicated at a group of Bayou servers, and clients can read or write any copy residing on any server with which they are able to communicate.The main contri-butions of this system are its mechanisms for dependency checks and merge procedures,necessary for maintaining high availability of Bayou system with weak replica con-sistency.5.Protocol Analysis and ConclusionThe protocol presented in this paper guarantees delivery (of the result)with at least-one semantics,since the proxy keeps re-transmitting the result until an Ack message ar-rives,signaling that the has indeed received the re-sponse.However,a that becomes inactive right after reception of the result message(but does not send an Ack message)will receive this message again when it be-comes active again,either in the previous or in a new cell.If the already sent an Ack to its respMss and if wired communication guarantees delivery of messages in causal order,then the protocol ensures delivery of messages with exactly once semantics.This is because eachis supposed to handle Ack forwards with highest priority, and therefore the following sequence of causal dependen-cies among events(where denotes the sending of message from server)always holds:send(Ack)@Mss send(Ack+del-proxy)@Mss send(update currL)@Mss.Hence,the proxy will re-ceive the Ack message(forwarded by)before the message update currL,from,and will thus re-move the proxy instead of re-transmitting result.In any case,delivery of redundant messages is not a ma-jor problem,since it can be assumed that the is able to identify duplicated messages.If the wireless communication is reliable,re-transmissions of the result with the Result Delivery Protocol(RDP)occur only if the mean time period a spends in a cell is less than,where and are the average transmission times for the wired and wireless communication,respectively. This is unlikely to be the case for current mobile support systems where the diameter of the cells is of reasonable size,e.g.some kilometers.The major advantage is that,except for the proxy ref-erence,neither result forwarding pointers nor other residue (e.g.copies of the result message)need to be kept at the,i.e.the can discard the result message after a single attempt to forward it to the local3.The overhead of this protocol is limited to the follow-ing extra messages:(1)one update currL whenever the mobile host migrates or becomes active again;and(2)one extra Ack message sent from respMss to the proxy when-ever acknowledges the receipt of result.Besides,every request from the mobile host to an application server has to pass through the proxy,so that the proxy can hold it as pending.Our work extends the indirect model of Badrinath et al.[2]in the sense that the proxy represents yet another communication mediator between the mobile client and the server.The main advantage of using a proxy is that from the server’s point of view,the service is being requested from a fixed client(i.e.the proxy),which transparently handles all the mobility of the client it pared with sim-ilar approaches[3,1]our protocol aims at minimizing the transfer of a’s state between the old and new dur-ing Hand-off,because most of the data related to the request (e.g.the result)is kept at the proxy.The Result Delivery Protocol is being implemented as a prototype system in the scope of the SIDAM Project.In this prototype,we are simulating host mobility through ran-dom communication between distributed processes(repre-senting s,and servers)within a Linux network. Using this prototype,we will test this protocol concerning its efficiency with respect to several patterns of mobility, queries and subscriptions.At a future step,we intend to re-implement it in a network with real wireless communication support.The main advantage of the RDP protocol is that although at each moment only a single is responsible for re-transmitting the request results for a given,the proto-col facilitates dynamic global load balancing within the set of s.Moreover,the protocol guarantees that eventually every result will be delivered to the requesting despite any number of migrations and periods of inactivity. AcknowledgmentsWe gratefully acknowledge Ricardo da Rocha and our colleagues from project SIDAM for their valuable com-ments and suggestions.Project SIDAM is being supported by FAPESP(Grant no.98/06138-2).References[1]Arup Acharya and B.R.Badrinath.Delivering multi-cast messages in networks with mobile hosts.In13th International Conference on Distributed Computing Systems,pages292–299,Pittsburgh,US,May1993.[2]B.R.Badrinath, A.Bakre,T.Imielinski,andR.Marantz.Handling Mobile Clients:A Case for In-direct Interaction.In Proc.4th Workstation Operating Systems,October1993.[3]A.Bakre.Design and Implementation of Indirect Pro-tocols for Mobile Wireless Environments.PhD thesis, Rutgers University,October1996.[4]S.Biaz and N.H.Vaidya.Tolerating visitor locationregister failures in mobile environments.In Seven-teenth IEEE Symposium on Reliable Distributed Sys-tems(SRDS’98),pages109–117,Washington-Brus-sels-Tokyo,October1998.IEEE.[5]A.Demers,K.Petersen,M.Spreitzer, D.Terry,M.Theimer,and B.Welch.The Bayou Architecture: Support for Data Sharing Among Mobile Users.In Workshop on Mobile Computing Systems and Appli-cations,Santa Cruz,CA,U.S.,94.[6]M.H.Dunham and V.Kumar.Impact of Mobil-ity on Transaction Management.In Proc.of Mo-biDE/Mobicom99Workshop,Seattle,WA,pages14–21.ACM,August1999.[7]M.Endler.A protocol for atomic multicast amongmobile hosts.In Dial M Workshop/Mobicom’99,Sea-tle(USA),pages56–63.ACM,August1999.[8]M.Haar,R.Cunningham,and V.Cahill.Supportingcorba applications in a mobile environment.In Proc.of MobiCom99,Settle,WA,pages36–47.ACM,Au-gust1999.[9]T.Imielinski and B.R.Badrinath.Querying in highlymobile distributed environments.In Proc.of the18th VLDB Conference,1992.[10]David B.Johnson and David A.Maltz.Protocols foradaptive wireless and mobile networking.IEEE Per-sonal Comunications,3(1),February1996.[11]A.D.Joseph,J.A.Tauber,and M.F.Kaashoek.MobileComputing with the Rover Toolkit.IEEE Transactions on Computers,February1997.[12]E.Pintoura and B.Bhargava.Building informationsystems for mobile environments.In Proc.3rd Inter-national Conference on Information and Knowledge Management,pages371–378,1994.[13]E.Pintoura and B.Bhargava.Revising transactionconcepts for mobile computing.In Proc.IEEE Work-shop on Mobile Computing Systems and Applications, pages164–168,1994.[14]E.A.Brewer R.H.Katz.The Case for Wireless Over-lay Networks.In Proc.of the SPIE Conference on Multimedia and Networking,(MMCM’96),San Jose, CA,January1996.[15]O.Wolfson Y.Huang.Allocation in DistributedDatabases and Mobile Computers.IEEE Transactions on Parallel and Distributed Systems,9(4),April1998.。
Dell PowerSwitch S3100 Series © 2022 Dell Inc. or its subsidiaries.The S3100 switch series offers a power-efficient and resilient Gigabit Ethernet (GbE) switching solution with integrated 10GbE uplinks for advanced Layer 3 distribution for offices and campus networks. The S3100 switch series has high-performance capabilities and wire-speed performance utilizing a non-blocking architecture to easily handle unexpected traffic loads. Use dual internal hot-swappable 80PLUS-certified power supplies for high availability and power efficiency. The switches offer simple management and scalability via an 84Gbps (full-duplex) highavailability stacking architecture that allows management of up to 12 switches from a single IP address.Modernize campus network architecturesModernize campus network architectures with apower-efficient and resilient 1/10GbE switching solution with dense Power over Ethernet Plus (PoE+). SelectS3100 models offer 24 or 48 ports of PoE+ to deliver clean power to network devices such as wireless access points (APs), Voice-over-IP (VoIP) handsets, video conferencing systems and security cameras. For greater interoperability in multivendor networks, S3100 series switches offer the latest open-standard protocols and include technology to interface with Cisco protocol PVST+. The S3100 series supports Dell OS9, VLT and network virtualization features such as VRF-lite and support for Dell Embedded Open Automation Framework.Leverage familiar tools and practicesAll S3100 switches include Dell OS9 for easier deployment and greater interoperability. One common command line interface (CLI) using a well-known command language means a faster learning curve for network administrators.Deploy with confidence at any scaleS3100 series switches help create performanceassurance with a data rate up to 260Gbps (full duplex) and a forwarding rate up to 193Mpps. Scale easily with built-in rear stacking ports. Switch stacks of up to 624 ports can be managed from a single screen using the highly-available stacking architecture for high-density aggregation with seamless redundant availability.Hardware, performance and efficiency•Up to 48 line-rate GbE ports of copper or 24 line-rate ports of fiber, two combo ports for fiber/copper flexibili -ty, and two integrated 10GbE SFP+ ports• Up to 48 ports of PoE+ in 1RU without an external power supply• Hot swappable expansion module supporting dual-port SFP+ or dual-port 10GBaseT• Integrated stacking ports with support up to 84Gbps •Up to 624 ports in a 12-unit stack for high-density, high-availability aggregation and distribution in wiring closets/MDFs. Non-stop forwarding and fast failover in stack configurations•Available with dual 80PLUS-certified hot swappable power supplies. Variable speed fan operation helps decrease cooling and power costs•Energy-Efficient Ethernet and lower-power PHYsreduce power to inactive ports and idle links, providing energy savings from the power cord to the port •Dell Fresh Air compliance for operation in environ-ments up to 113°F (45°C) helps reduce cooling costsin temperature constrained deploymentsDELL POWERSWITCH S3100 SERIESHigh-performance managed Ethernet switches designed for non-blocking access2Dell PowerSwitch S3100 Series© 2022 Dell Inc. or its subsidiaries.**Requires C15 plugDeploying, configuring and managing• Tool-less ReadyRails™ significantly reduces rack installation time•Management via an intuitive and familiar CLI, SN -MP-based manage- ment console application (includingDell OpenManage Network Manager), Telnet or serialconnection • Private VLAN support• AAA authorization, TACACS+ accounting and RADIUS support for comprehensive secure access•Authentication tiering allows network administrators to tier port authentication methods such as 802.1x, MAC Authentication Bypass in priority order so that a single port can provide flexible access and security•Achieve high availability and full bandwidth utilization with VLT and support firmware upgrades without taking the network offline•Interfaces with PVST+ protocol for greater flexibility and interoperability in Cisco networks • Advanced Layer 3 IPv4 and IPv6 functionality • Flexible routing options with policy-based routing to route packets based on assigned criteria beyond destination address• Routed Port Monitoring (RPM) covers a Layer 3 domain without costly dedicated network taps•OpenFlow 1.3 provides the ability to separate thecontrol plane from the forwarding plane for deployment in SDN environments*Contact your Dell Technologies representative for a full list of validated storage arrays.3Dell PowerSwitch S3100 Series © 2022 Dell Inc. or its subsidiaries.Physical2 rear stacking ports (21Gbps) supporting up to 84Gbps (full-duplex)2 integrated front 10GbE SFP+ dedicated ports Out-of-band management port (10/100/1000BASE-T)USB (Type A) port for configuration via USB flash driveAuto-negotiation for speed and flow control Auto-MDI/MDIX, port mirroringEnergy-Efficient Ethernet per port settings Redundant variable speed fans Air flow: I/O to power supplyRJ45 console/management port with RS232 signaling (RJ-45 to female DB-9 connector cable included)Dual firmware images on-boardSwitching engine model: Store and forward ChasisSize (1RU): 1.7126in x 17.0866in x 16.0236in (43.5mm x 434.0mm x 407.0mm) (H x W x D)Approximate weight: 13.2277lbs/6kg (S3124 and S3124F), 14.5505lbs/6.6kg (S3124P), 15.2119lbs/6.9kg (S3148P)ReadyRails rack mounting system, no tools requiredEnvironmentalPower supply: 200W (S3124, S3124F and S3148), 715W or 1,100W (S3124P), 1,100W (S3148P)Power supply efficiency: 80% or better in all operating modesMax. thermal output (BTU/hr): 182.55 (S3124), 228.96 (S3124F), 4391.42 (S3124P), 221.11 (S3148), 7319.04 (S3148P)Power consumption max (watts): 52.8 (S3124), 67.1 (S3124F), 1,287 (S3124P), 74.8 (S3148), 2,145 (S3148P)Operating temperature: 32° to 113°F (0° to 45°C)Operating relative humidity: 95%Storage temperature: –40° to 149°F (–40° to 65°C)Storage relative humidity: 85%PerformanceMAC addresses: 56K (80K in L2 scaled mode)Static routes: 16K (IPv4)/8K (IPv6)Dynamic routes: 16K (IPv4)/8K (IPv6) Switch fabric capacity: 212Gbps (S3124, S3124F and S3124P) (full duplex) 260Gbps (S3148 and S3148P)Forwarding rate: 158Mpps (S3124, S3124F and S3124P) 193Mpps (S3148 and S3148P)Link aggregation: 16 links per group, 128 groups Priority queues per port: 8Line-rate Layer 2 switching: All (non-blocking)Line-rate Layer 3 routing: All (non-blocking)Flash memory: 1GPacket buffer memory: 4MB CPU memory: 2GB DDR3Layer 2 VLANs: 4K MSTP: 64 instances VRF-lite: 511 instancesLine-rate Layer 2 switching: All protocols, including IPv4 and IPv6Line-rate Layer 3 routing: IPv4 and IPv6IPv4 host table size: 22K (42K in L3 scaled hosts mode)IPv6 host table size: 16K (both global + Link Local)(32K in L3 scaled hosts mode)IPv4 Multicast table size: 8KLAG load balancing: Based on Layer 2, IPv4 or IPv6 headersIEEE compliance 802.1AB LLDP802.1D Bridging, STP 802.1p L2 Prioritization 802.1Q VLAN T agging 802.1Qbb PFC 802.1Qaz ETS 802.1s MSTP 802.1w RSTP802.1x Network Access Control 802.1x-2010 Port Based Network Access Control802.3ab Gigabit Ethernet (1000BASE-T)802.3ac Frame Extensions for VLAN T agging802.3ad Link Aggregation with LACP 802.1ax Link Aggregation Revision - 2008 and 2011802.3ae 10 Gigabit Ethernet (10GBase-X)802.3af PoE (for S3124P and S3148P)802.3at PoE+ (for S3124P and S3148P)802.3az Energy Efficient Ethernet (EEE)802.3u Fast Ethernet (100Base-TX) on mgmt ports 802.3x Flow Control 802.3z Gigabit Ethernet (1000Base-X) ANSI/TIA-1057 LLDP-MED Force10 PVST+MTU 12,000 bytes RFC and I-D compliance General Internet protocols 768 UDP 793 TCP 854 Telnet 959 FTPGeneral IPv4 protocols 791 IPv4792 ICMP 826 ARP 1027 Proxy ARP 1035 DNS (client)1042 Ethernet Transmission 1305 NTPv31519 CIDR 1542 BOOTP (relay)1812 Requirements for IPv4 Routers 1918 Address Allocation for Private Internets 2474 Diffserv Field in IPv4 and Ipv6 Headers 2596 Assured Forwarding PHB Group 3164 BSD Syslog 3195 Reliable Delivery for Syslog3246Expedited Assured Forwarding4364 VRF-lite (IPv4 VRF with OSPF and BGP)5798VRRPGeneral IPv6 protocols 1981 Path MTU Discovery Features 2460 Internet Protocol, Version 6 (IPv6) Specification 2464 Transmission of IPv6 Packets over Ethernet Networks 2711 IPv6 Router Alert Option 4007 IPv6 Scoped Address Architecture 4213 Basic Transition Mechanisms for IPv6 Hosts and Routers 4291 IPv6 Addressing Architecture 4443 ICMP for IPv64861 Neighbor Discovery for IPv64862 IPv6 Stateless Address Autoconfiguration 5095 Deprecation of Type 0 Routing Headers in IPv6IPv6 Management support (telnet, FTP , TACACS, RADIUS, SSH, NTP)RIP 1058RIPv1 2453 RIPv2OSPF (v2/v3) 1587 NSSA 4552 Authentication/ 2154 OSPF Digital Signatures 2328 OSPFv2 OSPFv3 2370 Opaque LSA 5340 OSPF for IPv6IS-IS 5301 Dynamic hostname exchange mechanism for IS-IS 5302 Domain-wide prefix distribution with two- level IS-IS5303 Three way handshake for IS-IS point- to-point adjacencies 5308 IS-IS for IPv6BGP 1997 Communities 2385 MD5 2545 BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing 2439 Route Flap Damping 2796 Route Reflection 2842 Capabilities 2858 Multiprotocol Extensions 2918 Route Refresh 3065 Confederations 4360 Extended Communities 4893 4-byte ASN 5396 4-byte ASN representations draft-ietf-idr-bgp4-20 BGPv4draft-michaelson-4byte-as-representation-05 4-byte ASN Representation (partial) draft-ietf-idr-add-paths-04.txt ADD PATH Multicast 1112 IGMPv1 2236 IGMPv2 3376 IGMPv3 MSDPdraft-ietf-pim-sm-v2-new-05PIM-SMw4Dell PowerSwitch S3100 Series © 2022 Dell Inc. or its subsidiaries.Network management 1155 SMIv11157 SNMPv11212 Concise MIB Definitions 1215 SNMP Traps 1493 Bridges MIB 1850 OSPFv2 MIB 1901 Community-Based SNMPv22011 IP MIB 2096 IP Forwarding Table MIB 2578 SMIv22579 Textual Conventions for SMIv22580 Conformance Statements for SMIv22618 RADIUS Authentication MIB 2665 Ethernet-Like Interfaces MIB 2674 Extended Bridge MIB 2787 VRRP MIB 2819 RMON MIB (groups 1, 2, 3, 9)2863 Interfaces MIB 3273 RMON High Capacity MIB 3410 SNMPv33411 SNMPv3 Management Framework 3412 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)3413 SNMP Applications 3414 User-based Security Model (USM) for NMPv33415 VACM for SNMP 3416 SNMPv23417 Transport mappings for SNMP 3418 SNMP MIB 3434 RMON High Capacity Alarm MIB 3584 Coexistence between SNMP v1, v2 and v34022 IP MIB 4087 IP Tunnel MIB 4113 UDP MIB 4133 Entity MIB 4292 MIB for IP 4293 MIB for IPv6 Textual Conventions 4502 RMONv2 (groups 1,2,3,9)5060 PIM MIBANSI/TIA-1057 LLDP-MED MIB Dell_ITA.Rev_1_1 MIBdraft-grant-tacacs-02 TACACS+draft-ietf-idr-bgp4-mib-06 BGP MIBv1IEEE 802.1AB LLDP MIBIEEE 802.1AB LLDP DOT1 MIB IEEE 802.1AB LLDP DOT3 MIB sFlowv5 sFlowv5 MIB (version 1.3)FORCE10-BGP4-V2-MIB Force10 BGP MIB (draft-ietf-idr-bgp4-mibv2-05)FORCE10-IF-EXTENSION-MIB FORCE10-LINKAGG-MIBFORCE10-COPY-CONFIG-MIB FORCE10-PRODUCTS-MIB FORCE10-SS-CHASSIS-MIB FORCE10-SMI FORCE10-TC-MIBFORCE10-TRAP-ALARM-MIBFORCE10-FORWARDINGPLANE-STATS-MIBRegulatory compliance SafetyUL/CSA 60950-1, Second Edition EN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group Differences EN 60825-1 Safety of Laser Products Part 1: Equipment Classification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication Systems FDA Regulation 21 CFR 1040.10 and 1040.11EmissionsUSA: FCC CFR 47 Part 15, Subpart B:2011, Class AImmunityEN 300 386 V1.4.1:2008 EMC for Network EquipmentEN 55024: 1998 + A1: 2001 + A2: 2003EN 61000-3-2: Harmonic Current Emissions EN 61000-3-3: Voltage Fluctuations and Flicker EN 61000-4-2: ESDEN 61000-4-3: Radiated Immunity EN 61000-4-4: EFT EN 61000-4-5: SurgeEN 61000-4-6: Low Frequency Conducted ImmunityRoHSAll S Series components are EU RoHS compliant.CertificationsAvailable with US Trade Agreements Act (TAA) complianceUSGv6 Host and Router Certified on Dell NetworkingOS 9.7 and greaterIPv6 Ready for both Host and Router DoD UC-APL approved switchFIPS 140-2 Approved Cryptography WarrantyLifetime Limited Hardware Warranty© 2022 Dell Inc. or its subsidiaries. All Rights Reserved. Dell and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. February 2022 | V1.9Dell PowerSwitch S3100 Series Spec SheetContact a Dell Technologies ExpertView more resourcesLearn more about Dell Networking solutions Join the conversation with@DellNetworkingIT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, with innovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & DesignLet us analyze your multivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running fast.EducateEnsure your staff builds the right skills for long-term success. Get certified on Dell Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic ITenvironments with Dell Optimize. Benefit from in-depth predictive analysis, remote monitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at /Services。
网络组播技术(Network Multicast Technologies)组播指的是单个发送者对应多个接收者的一种网络通信。
组播技术中,通过向多个接收方传送单信息流方式,可以减少具有多个接收方同时收听或查看相同资源情况下的网络通信流量。
对于 n 方视频会议,可以减少使用 a(n-1)倍的带宽长度。
“组播”中较为典型的是采用组播地址的 IP 组播。
IPv6 支持单播(Unicast)、组播(Multicast)以及任意播(Anycast)三种类型,IPv6 中没有关于广播(Broadcast)的具体划分,而是作为组播的一个典型类型。
此外组播定义还包括一些其它协议,如使用“点对多点”或“多点对多点”连接的异步传输协议(ATM)。
组播技术基于“组”这样一个概念,属于接收方专有组,主要接收相同数据流。
该接收方组可以分配在英特网的任意地方。
TCP/IP 中的主要组播技术和协议如下所述:Internet 组管理协议(IGMP 和 IGMPv3)― 主要应用于主机及其最接近路由器之间,主机通过该协议通知路由器它需要收听哪个组播组。
组播知道 IGMP 流量中的交换机 Snoop,从而避免了组播扩散现象。
协议无关组播(PIM)― 主要用于组织分配组播流量,避免逐步路由选择回路现象。
PIM 包括两种类型:协议无关组播-密集模式(PIM-DM)和协议无关组播-稀疏模式(PIM-SM)。
其中后者较为常用。
组播开放最短路径优先(MOSPF)― OSPF 的扩展协议,主要负责处理组播路由选择过程。
到目前为止尚未广泛应用。
多协议边缘网关协议(MBGP)― BGP 的扩展协议,主要负责处理逐步路由选择过程。
MBGP 支持不同余单播和组播拓朴技术,某些交换点利用到该技术。
组播信源发现协议(MSDP)― 主要用于将 Internet 中所有组播源分配到所有RP。
如果组播源数目增长几倍时,一般不采纳该协议。
源特定组播(SSM)― 确保组播传送的可靠性,利于使用广播。
The PowerSwitch S5200-ON 25/100GbE fixed switches comprise Dell EMC’s latest disaggregated hardware and software data center networking solutions, providing state-of-the-art, high-density 25/100GbE ports and abroad range of functionality to meet the growing demands of today’s data center environment. These innovative, next-generation open networking switches offer optimum flexibility and cost-effectiveness for web 2.0, enterprise, mid- market and cloud service provider with demanding compute and storage traffic environments.The S5200-ON is a complete family of switches: 12-port, 24-port, and 48-port 25GbE/100GbE ToR switches, 96-port 25GbE/100GbE Middle of Row (MoR)/End of Row (EoR) switch, and a 32-port 100GbE Multi-Rate Spine/Leaf switch. From the compact half-rack width S5212F-ON providing an ideal form factor for hyper-convergeddeployments, to the high density S5296F-ON for Middle of Row deployments, the S5200-ON series offersperformance and flexibility for a variety of network designs.In addition to 100GbE Spine/Leaf deployments, theS5232F-ON can also be used in high density deployments using breakout cables to achieve up to 128 10GbE or 128 25GbE ports.Using industry-leading hardware and a choice of Dell EMC’s OS10 or select 3rd party network operatingsystems and tools, the S5200-ON switches incorporate multiple architectural features that optimize data center network flexibility, efficiency and availability, including IO panel to PSU or PSU to IO panel airflow for hot/cold aisle environments, redundant, hot-swappable power supplies and fans and deliver non-blocking performance for workloads sensitive to packet loss.Priority-based flow control (PFC), data center bridge exchange (DCBX) and enhanced transmission selection(ETS) make the S5200-ON family ideally suited for DCB environments.Dell EMC PowerSwitch S5200-ON switches support the open source Open Network Install Environment (ONIE) for zero touch installation of Dell EMC’s OS10 networking operating system, as well as alternative network operating systems.Key applications• Organizations looking to enter the software-defined data center era with a choice of networking technologies designed to maximize flexibility • High-density 10/25GbE ToR server aggregation in high-performance data center environments at the desired fabric speed with the S5248F-ON or S5296F-ON• Low-density 10/25GbE server and storage aggregation with the S5212F-ON and S5224F-ON• Small-scale Fabric implementation via the S5232F-ON switch in leaf and spine along with S5248F-ON 1/10/25GbE ToR switches enabling cost-effective aggregation of 10/25/40/50/100 uplinks• Multi-functional 10/25/40/50/100GbE switching in High Performance Computing Clusters or other business-sensitive deployments requiring the highest bandwidth.• iSCSI deployments, including DCB converged lossless transactions• Single-pass VXLAN routing (future software release)Dell EMC PowerSwitch S5200-ON Series SwitchesHigh-performance, open networking 25GbE top-of-rack and 100GbEspine/leaf switchesKey features• 1 or 2RU high-density ToR switches with up to 48 or 96 ports of 25GbE or 32 ports of 100GbE• Multi-rate 100GbE ports support 10/25/40/50/100GbE • Scalable L2 and L3 Ethernet switching with QoS anda full complement of standards-based IPv4 and IPv6features, including OSPF and BGP routing support • Line-rate performance via non-blocking switchfabrics: 3.2Tbps (6.4Tbps full-duplex) on S5296F-ONand S5232F-ON, 2.0Tbps (4.0Tbps full-duplex) onS5248F-ON, and 1.08Tbps (2.16Tbps full-duplex) onS5224F-ON and S5212F-ON• L2 multipath support via Virtual Link Trunking (VLT)and Routed VLT support• VXLAN gateway functionality support for bridging and routing the non-virtualized and the virtualized overlaynetworks with line rate performance (hardware only)• Support for OS10 Enterprise Edition• Converged network support for DCB, with priority flow control (802.1Qbb), ETS (802.1Qaz), DCBx and iSCSI TLV support• Routable RoCE to enable convergence of computeand storage on Leaf/Spine Fabric• IO panel to PSU airflow or PSU to IO panel airflowRedundant, hot-swappable power supplies and fans on most models• Supports the open source Open Network InstallEnvironment (ONIE) for zero touch installation ofalternate network operating systems• L2 VXLAN (Static VXLAN with VLT, BGP EVPN)• Tool-less enterprise ReadyRails™ mounting kits formost models reducing time and resources for switchrack installation (S5212F-ON will utilize a tandem tray for mounting)• Power-efficient operation and Dell Fresh Air 2.0compliant up to 45ºC helps reduce cooling costs intemperature constrained deploymentsKey features with Dell EMC Networking OS10• Consistent DevOps framework across compute,storage and networking elements• Standard networking features, interfaces and scripting functions for legacy network operations integration • Standards-based switching hardware abstraction viaSwitch Abstraction Interface (SAI)• Pervasive, unrestricted developer environment viaControl Plane Services (CPS)• OS10 Enterprise Edition software enables Dell EMClayer 2 and 3 switching and routing protocols withintegrated IP services, quality of service, manageability and automation features• Leverage common open source tools and bestpractices (data models, commit rollbacks*)• Increase VM Mobility region by stretching L2 VLANwithin or across two DCs with unique VLT capabilities • Scalable L2 and L3 Ethernet Switching with QoS, ACL and a full complement of standards based IPv4 andIPv6 features including OSPF, BGP and PBR• Enhanced mirroring capabilities including localmirroring, Remote Port Mirroring (RPM), andEncapsulated Remote Port Mirroring (ERPM)• Converged network support for Data Center Bridging, with priority flow control (802.1Qbb), ETS (802.1Qaz), DCBx and iSCSI TLV*Roadmap1 RJ45 console/management port with RS232 signalingS5212F-ON: 12x25GbE SFP28 + 3x 100GbE QSFP28S5224F-ON: 24x25GbE SFP28 + 4x 100GbE QSFP28S5248F-ON: 48x25GbE SFP28 + 4x 100GbE QSFP28 + 2x 2x100GbE QSFP28-DDS5296F-ON: 96x25GbE SFP28 + 8x 100GbE QSFP28S5232F-ON: 32x100GbE QSFP28 ports +2xSFP+ 10GbEEnvironmentalPower supply: 100–240 VAC 50/60 HzMax Operating specifications:AC Max. Operating specifications: Operating temperature: 32° to 113°F(0° to 45°C)Operating humidity: 5 to 90% (RH),non-condensingMax. Non-operating specifications:Storage temperature: –40° to 158°F(–40° to 70°C)Storage humidity: 5 to 90% (RH), non- condensingFresh air Compliant to 45°CRedundancyHot swappable redundant powerHot swappable redundant fans (fixed power supply and fans on S5212F-ON)PerformancePacket buffer memory: 32MBCPU memory: 16GBMAC addresses: 160KARP table: 128KIPv4 routes: 128KIPv6 routes: 64KMulticast hosts: 32KLink aggregation: 16 links per group, 128 groups Layer 2 VLANs: 4KMSTP: 64 instancesLAG load balancing: Based on layer 2, IPv4 or IPv6 headersIEEE Compliance802.1AB LLDPTIA-1057 LLDP-MED802.3ad Link Aggregation802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN Tagging802.1Qbb PFC 802.1X Network Access Control802.3ac Frame Extensions for VLANTagging802.3x Flow ControlLayer2 Protocols802.1D Compatible802.1p L2 Prioritization802.1Q VLAN Tagging802.1s MSTP802.1w RSTP802.1t RPVST+VLT (Virtual Link Trunking)VRRP Active/ActiveRSTP & RPVST+Port Mirroring on VLT portsDCB, iSCSI, FSB on VLTRPM/ERPM over VLTVLT Minloss upgradeRFC Compliance768 UDP793 TCP854 Telnet959 FTP1321 MD51350 TFTP2474 Differentiated Services2698 Two Rate Three Color Marker3164 Syslog4254 SSHv2General IPv4 Protocols791 IPv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1191 Path MTU Discovery1305 NTPv41519 CIDR1812 Routers, Static Routes1858 IP Fragment Filtering2131 DHCPv4 (server and relay)5798 VRRPv33021 31-bit Prefixes1812 Requirements for IPv4 Routers1918 Address Allocation for PrivateInternets2474 Diffserv Field in IPv4 and Ipv6Headers2597 Assured Forwarding PHB Group3195 Reliable Delivery for Syslog3246 Expedited Forwarding PHB GroupVRF (BGPv4/v6)1981 Path MTU for IPv62372 IPv6 Addressing2460 IPv6 Protocol Specification2461 Neighbor Discovery2462 Stateless Address AutoConfig2711 IPv6 Router alert2463 ICMPv62464 Ethernet Transmission2675 IPv6 Jumbograms3484 Default Address Selection3493 Basic Socket Interface4291 Addressing Architecture3542 Advanced Sockets API3587 Global Unicast Address Format4291 IPv6 Addressing2464 Transmission of IPv6 Packets overEthernet Networks2711 IPv6 Router Alert Option4007 IPv6 Scoped Address Architecture4213 Transition Mechanisms for IPv6 Hostsand Routers3315 DHCPv6 Server & RelayIPv6 Static RoutesOSPF1745 OSPF/BGP interaction1765 OSPF Database overflow2154 OSPF with DigitalSignatures2328 OSPFv25340 OSPF for IPv6 (OSPFv3)2370 Opaque LSA3101 OSPF NSSA4552 OSPFv3 AuthenticationMulticast4541 IGMPv1/v2/v3 and MLDv1/v2SnoopingSecurity2865 RADIUS3162 Radius and IPv63579 Radius support for EAP3580 802.1X with RADIUS3826 AES Cipher in SNMP1492 TACACS (Authentication, Accounting)Control Plane, VTY & SNMP ACLsIP Access Control ListsBGP1997 Communities2385 MD52439 Route Flap Damping2796 Route Reflection2918 Route Refresh3065 Confederations4271 BGP-42545 BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing2858 Multiprotocol Extensions4360 Extended Communities4893 4-byte ASN5396 4-byte ASN Representation5492 Capabilities Advertisementdraft-ietf-idr-add-paths-04.txt ADD PATHLinux DistributionDebian Linux version 9Linux Kernel 4.9Network Management and Monitoring SNMPv1/2cIPv4/IPv6 Management support (Telnet, FTP, TACACS, RADIUS, SSH, NTP)SyslogPort MirroringRPM/ERPM3176 SFlowSupport Assist (Phone Home)RestConf APIs (Layer 2 features)XML SchemaCLI Commit (Scratchpad)Uplink Failure DetectionObject TrackingBidirectional Forwarding Detection (BFD) AutomationControl Plane Services APIsLinux Utilities and Scripting ToolsCLI Automation (Multiline Alias)Zero Touch Deployment (ZTD)Ansible, Puppet, Chef, SaltStack8040 RESTCONF APIs (L3)Quality of ServicePrefix ListRoute-MapRate Shaping (Egress)Rate Policing (Ingress)Scheduling AlgorithmsRound RobinWeighted Round RobinDeficit Round RobinStrict PriorityWeighted Random Early DetectData center bridging802.1Qbb Priority-Based Flow Control802.1Qaz Enhanced TransmissionSelection (ETS)Explicit Congestion NotificationData Center Bridging eXchange (DCBx)DCBx Application TLV (iSCSI, FCoE)RoCEv2Software Defined NetworkingOpenFlow 1.3 (Native)MIBSIP MIBIP Forward MIBHost Resources MIBIF MIBLLDP EXT1/3 MIBEntity MIBLAG MIBDell-Vendor MIBTCP MIBUDP MIBSNMPv2 MIBETHERLIKE-MIBSFLOW-MIBPFC-MIBRegulatory complianceSafetyUL/CSA 60950-1, Second EditionEN 60950-1, Second EditionIEC 60950-1, Second Edition Including AllNational Deviations and Group DifferencesEN 60825-1 Safety of Laser Products Part 1:Equipment Classification Requirements andUser’s GuideEN 60825-2 Safety of Laser Products Part 2:Safety of Optical Fibre CommunicationSystemsFDA Regulation 21 CFR 1040.10 and 1040.11EmissionsAustralia/New Zealand: AS/NZS CISPR 22:2006, Class ACanada: ICES-003, Issue-4, Class AEurope: EN 55022: 2006+A1:2007(CISPR 22: 2006), Class AJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2011,Class AImmunityEN 300 386 V1.4.1:2008 EMC for NetworkEquipmentEN 55024: 1998 + A1: 2001 + A2: 2003EN 61000-3-2: Harmonic CurrentEmissionsEN 61000-3-3: Voltage Fluctuations andFlickerEN 61000-4-2: ESDEN 61000-4-3: Radiated ImmunityEN 61000-4-4: EFTEN 61000-4-5: SurgeEN 61000-4-6: Low Frequency ConductedImmunityRoHSAll S Series components are EU RoHScompliant.CertificationsAvailable with US Trade Agreements Act(TAA) complianceUSGv6 Host and Router Certified on DellNetworking OS 9.5 and greaterIPv6 Ready for both Host and RouterUCR DoD APL (core and distributionALSAN switchWarranty1 year return to depot© 2018 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.Learn more at /NetworkingLearn more at /ServicesIT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, with innovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & DesignLet us analyze your multivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running fast.EducateEnsure your staff builds the right skills for long-term success. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic ITenvironments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remotemonitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentallyresponsible way.。
F5 301B 复习总结1.stream profile:1)在所有事件中执行搜索替换字符串的工作2)可以应用在任何standard virtual server,和http profile兼容。
3)当不配置http profile的时候,整个搜索替换过程会在所有的TCP分段上面执行,配置之后只会在HTTP实体进行此过程4)当steam profile和HTTP profile都关联到一个VS的时候,在HTTP response事件中不需要配置response chunking.BIG-IP会自动分片。
when HTTP_REQUEST {# Disable the stream filter for client requestsSTREAM::disable}when HTTP_RESPONSE {# Disable the stream filter for server responsesSTREAM::disable# Enable the stream filter for text responses onlyif {[HTTP::header value Content-Type] contains "text"}{# Replace 'old_text' with 'new_text'STREAM::expression {@old_text@new_text@}# Enable the stream filter for this response onlySTREAM::enable}}5)替换工作是单向进行的,只进行一次替换。
6)当HTTP压缩功能开启的时候将会阻止替换工作的进行,所以要替换字符,必须首先一处Accept-Encoding头部。
2.tcp-cell-optimized 对移动用户进行应用优化(从移动蜂窝网络过来的用户相对较慢),可以增加大量的缓存。
Huawei S5700-EI Series SwitchesProduct BrochureThe S5700-EI series gigabit enterprise switches (S5700-EI) are next-generation energy-saving switchesdeveloped by Huawei to meet the demand for high-bandwidth access and Ethernet multi-servicemaintain, reducing workloads for network planning, construction, and maintenance. The S5700-EI usesS5700-EI Series Gigabit Enterprise Switches Product OverviewProduct Appearance•Switching capacity: 416Gbps2-2Huawei Enterprise Sx700 Series Switch Product•Switching capacity: 416GbpsProduct Features and highlightsPowerful support for services•The S5700-EI supports IGMP v1/v2/v3 snooping, IGMP filter, IGMP fast leave, and IGMP proxy. It supportsline-speed replication of multicast packets between VLANs, multicast load balancing among member interfaces of a trunk, and controllable multicast, meeting requirements for IPTV services and othermulticast services.•The S5700-EI provides the Multi-VPN-Instance CE (MCE) function to isolate users in different VPNs on a device, ensuring data security and reducing costs.•The S5710-EI supports multiple MPLS & VPN features, including Label Distribution Protocol (LDP) or Resource Reservation Protocol for Traffic Engineering (RSVP-TE), MPLS TE, VLL, VPLS, and MPLS L3VPN. Comprehensive reliability mechanisms•Besides STP, RSTP, and MSTP, the S5700-EI supports enhanced Ethernet reliability technologies such asSmart Link and RRPP (Rapid Ring Protection Protocol), which implement millisecond-level protection switchover and ensure network reliability. It also provides Smart Link multi-instance and RRPP multi-instance to implement load balancing among links, optimizing bandwidth usage.Huawei Enterprise Sx700 Series Switch Product2-3•The S5700-EI supports enhanced trunk (E-Trunk) that enables a CE to be dual-homed to two PEs (S5700s).E-Trunk greatly enhances link reliability between devices and implements link aggregation betweendevices. This improves reliability of access devices.•The S5700-EI supports the Smart Ethernet Protection (SEP) protocol, a ring network protocol applied tothe link layer on an Ethernet network. SEP can be used on open ring networks and can be deployed onupper-layer aggregation devices to provide fast switchover, ensuring non-stop transmission of services.SEP features simplicity, high reliability, fast switchover, easy maintenance, and flexible topology, facilitatingnetwork planning and management.•The S5700-EI supports Ethernet Ring Protection Switching (ERPS), also referred to as G.8032. As the latestring network protocol, ERPS was developed based on traditional Ethernet MAC and bridging functionsand uses mature Ethernet OAM function and a Ring Automatic Protection Switching (R-APS) mechanismto implement millisecond-level protection switching. ERPS supports various services and allows flexiblenetworking, helping customers build a network with lower OPEX and CAPEX.•The S5700-EI supports redundant power supplies, and can use an AC power supply and a DC powersimultaneously. Users can choose a single power supply or use two power supplies to ensure devicereliability.•The S5700-EI supports VRRP, and can set up VRRP groups with other Layer 3 switches. VRRP providesredundant routes to ensure stable and reliable communication. Multiple equal-cost routes to an uplinkdevice can be configured on the S5700-EI to provide route redundancy. When an active route isunreachable, traffic is switched to a backup route.•The S5700-EI supports Bidirectional Forwarding Detection (BFD) and provides millisecond-level detectionfor protocols such as OSPF, IS-IS, VRRP, and PIM to improve network reliability. The S5700-EI complies withIEEE 802.3ah and 802.1ag. IEEE 802.3ah defines the mechanism for detecting faults on direct links overthe Ethernet in the first mile, and 802.1ag defines the mechanism for end-to-end service fault detection.The S5700-EI supports Y.1731. Besides fast end-to-end service fault detection, the S5700-EI can use theperformance measurement tools defined in Y.1731 to monitor network performance, providing accuratedata about network quality.Well-designed QoS policies and security mechanisms•The S5700-EI implements complex traffic classification based on packet information such as the 5-tuple,IP precedence, ToS, DSCP, IP protocol type, ICMP type, TCP/UDP port number, VLAN ID, Ethernet protocoltype. ACLs can be applied to inbound or outbound direction on an interface. The S5700-EI supportsa flow-based two-rate three-color CAR. Each port supports eight priority queues and multiple queuescheduling algorithms such as WRR, DRR, SP, WRR+SP, and DRR+SP. All of these ensure the quality ofvoice, video, and data services.Huawei Enterprise Sx700 Series Switch Product•The S5700-EI provides multiple security measures to defend against Denial of Service (DoS) attacks,and attacks against networks or users. DoS attack types include SYN Flood attacks, Land attacks, Smurf attacks, and ICMP Flood attacks. Attacks to networks refer to STP BPDU/root attacks. Attacks to users include bogus DHCP server attacks, man-in-the-middle attacks, IP/MAC spoofing attacks, DHCP requestflood attacks. DoS attacks that change the CHADDR field in DHCP packets are also attacks against users.•The S5700-EI supports DHCP snooping, which discards invalid packets that do not match any binding entries, such as ARP spoofing packets and IP spoofing packets. This prevents man-in-the-middle attacksto campus networks that hackers initiate by using ARP packets. The interface connected to a DHCP server can be configured as a trusted interface to protect the system against bogus DHCP server attacks.•The S5700-EI supports strict ARP learning, which prevents ARP spoofing attacks that will exhaust ARP entries. It also provides IP source check to prevent DoS attacks caused by MAC address spoofing, IP address spoofing, and MAC/IP spoofing.•The S5700-EI supports 802.1x authentication, MAC address authentication, and combined authentication on a per port basis, as well as Portal authentication on a per VLANIF interface basis. The S5700-EI also supports NAC. The S5700-EI authenticates users based on statically or dynamically bound user information such as the user name, IP address, MAC address, VLAN ID, access interface, and flag indicating whether antivirus software is installed. VLANs, QoS policies, and ACLs can be applied to users dynamically.•The S5700-EI can limit the number of MAC addresses learned on an interface to prevent attackers from exhausting MAC address entries by using bogus source MAC addresses. This function minimizes packetflooding that occurs when MAC addresses of users cannot be found in the MAC address table.Fine-grained traffic management•The S5710-EI supports NetStream. The NetStream module supports V5, V8, and V9 packet formats and provides various traffic analysis functions, such as real-time traffic sampling, dynamic report generation, traffic attribute analysis, and traffic exception report. The Netstream module enables administrators to monitor network status in real time and provides applications and analysis functions including potential fault detection, effective fault rectification, fast problem handling, and security monitoring, to help customers optimize network structure and adjust resource deployment.•The S5700-EI supports the Sampled Flow (sFlow) function, which uses a sampling mechanism to obtain statistics about traffic forwarded on a network and sends the statistics to the Collector in real time. The Collector analyzes traffic statistics to help customers manage network traffic efficiently. The S5700-EI integrates the sFlow Agent module and uses hardware for traffic monitoring. Unlike traffic monitoring through port mirroring, sFlow does not degrade network performance during traffic monitoring.Easy deployment and maintenance free•The S5700-EI supports automatic configuration, plug-and-play, and batch remote upgrade. These capabilities simplify device management and maintenance and reduce maintenance costs. The S5700-EI supports SNMP v1/v2c/v3 and provides flexible methods for managing devices. Users can manageHuawei Enterprise Sx700 Series Switch Productthe S5700-EI using the CLI and Web NMS. The NQA function helps users with network planning andupgrading. In addition, the S5700-EI supports NTP, SSH v2, HWTACACS+, RMON, log hosts, and port-based traffic statistics.•EasyDeploy: The Commander collects information about the topology of the client connecting to theCommander and saves client startup information based on the topology. The client can be replacedwithout configuration. Configuration and scripts can be delivered to the client in batches. In addition, theconfiguration delivery result can be queried. The Commander can collect and display power consumptionon the entire network.•The S5700-EI supports the GARP VLAN Registration Protocol (GVRP), which dynamically distributes,registers, and propagates VLAN attributes to reduce manual configuration workloads of networkadministrators and to ensure correct VLAN configuration. In a complex network topology, GVRP simplifiesVLAN configuration and reduces network communication faults caused by incorrect VLAN configuration.•The S5700-EI supports MUX VLAN. MUX VLAN isolates Layer 2 traffic between interfaces in a VLAN.Interfaces in a subordinate separate VLAN can communicate with ports in the principal VLAN but cannotcommunicate with each other. MUX VLAN is usually used on an enterprise intranet to isolate userinterfaces from each other but allow them to communicate with server interfaces. This function preventscommunication between network devices connected to certain interfaces or interface groups but allowsthe devices to communicate with the default gateway.PoE function•The S5700-EI PWR can use PoE power supplies with different power levels to provide -48V DC power forPowered Devices (PDs) such as IP phones, WLAN APs, and Bluetooth APs. In its role as Power SourcingEquipment (PSE), the S5700-EI PWR complies with IEEE 802.3af and 802.3at (PoE+) and can work with PDsthat are incompatible with 802.3af or 802.3at. Each port provides a maximum of 30 W power, complyingwith IEEE 802.3at. The PoE+ function increases the maximum power of each port and implements intelligentpower management for high-power consumption applications. This facilitates the use of PDs. PoE portscan work in power-saving mode. The S5700-EI PWR provides improved PoE solutions. Users can configurewhether and when a PoE port supplies power.High scalability•The S5700-EI supports intelligent stacking (iStack). Multiple S5700-EI switches can be connected withstack cables to set up a stack, which functions as a virtual switch. A stack consists of a master switch,a backup switch, and several slave switches. The backup switch takes over services when the masterswitch fails, reducing service interruption time. Stacks support intelligent upgrade so that users do notneed to change the software version of a switch when adding it to a stack. The iStack function allowsusers to connect multiple switches with stack cables to expand system capacity. These switches can bemanaged using a single IP address, which greatly reduces the costs of system expansion, operation, andmaintenance. Compared with traditional networking technologies, iStack has advantages in scalability,reliability, and system architecture.Huawei Enterprise Sx700 Series Switch ProductVarious IPv6 features•The S5700-EI supports IPv4/IPv6 dual stack and can migrate from an IPv4 network to an IPv6 network.S5700-EI hardware supports IPv4/IPv6 dual stack, IPv6 over IPv4 tunnels (including manual tunnels, 6to4tunnels, and ISATAP tunnels), and Layer 3 line-speed forwarding. The S5700-EI can be deployed on IPv4networks, IPv6 networks, or networks that run both IPv4 and IPv6. This makes networking flexible andenables easy migration from IPv4 to IPv6.Product Specifications2-7Huawei Enterprise Sx700 Series Switch ProductHuawei Enterprise Sx700 Series Switch Product*:The S5700 switches of the EI series are collectively called S5700-EI. S5710-EI is a sub-series switches of S5700-EI .2-9Huawei Enterprise Sx700 Series Switch ProductOn Large-sized Enterprise NetworksThe S5700-EI can function as an access device on a large-sized enterprise network or an aggregation device on a small-sized or medium-sized campus network. It supports link aggregation and dual-homing to improve network reliability.In Data CentersThe S5700-EI can be used in a data center. It connects to gigabit servers and aggregates traffic from the servers to uplink devices through trunk links. If multiple servers are available, an S5700-EI stack can be used to facilitate network maintenance and improve network reliability.InternetWANApplicationsHuawei Enterprise Sx700 Series Switch ProductFor more information, visit or contact your local Huawei sales office.S5710-28C-EI(24xEthernet 10/100/1000 ports,4 of which are dual-purpose 10/100/1000 or SFP ,4x10 GigSFP+, without power module)S5710-28C-PWR-EI-AC(24xEthernet 10/100/1000 PoE+ ports,4 of which are dual-purpose 10/100/1000 orSFP ,4x10 Gig SFP+, with 580W AC power)S5710-52C-EI(48xEthernet 10/100/1000 ports,4x10 Gig SFP+, with 2 interface slots, without powermodule)S5710-52C-PWR-EI(48xEthernet 10/100/1000 PoE+ ports, 4x10 Gig SFP+, with 2 interface slots, withoutpower module)8xGig SFP interface card(used in S5710-EI series)8xEthernet 10/100/1000 ports interface card(used in S5710-EI series)4xGig SFP interface card(including 4xGig SFP optical interface, extend channel card)(used in S5700-EI series)2x10GE SFP+ interface card(used in S5710-EI series)2x10GE SFP+ interface card(used in S5700-SI and S5700-EI series)4x10GE SFP+ optical interface card(including 4x10GE SFP+ interface, extend channel card)(used in S5700-SIand S5700-EI series)Ethernet Stack Interface Card(Including stack card,100cm stack cable)Ethernet Stack Interface Card(Including stack card,300cm stack cable)150W AC Power Module150W DC Power Module500W AC PoE Power Module580W AC PoE Power Module 1150W AC PoE Power Module Product List2-11Huawei Enterprise Sx700 Series Switch ProductCopyright © Huawei Technologies Co., Ltd. 2015. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.Trademark Notice, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd.Other trademarks, product, service and company names mentioned are the property of their respective owners.General DisclaimerThe information in this document may contain predictive statements including,without limitation, statements regarding the future financial and operating results,future product portfolio, new technology, etc. There are a number of factors thatcould cause actual results and developments to differ materially from thoseexpressed or implied in the predictive statements. Therefore, such information isprovided for reference purpose only and constitutes neither an offer nor anacceptance. Huawei may change the information at any time without notice.。
Data SheetCisco 900 Series Integrated Services RoutersContentsProduct Overview 3 Features and Benefits 4 Platform Support 5 Product Specifications 7 Cisco IOS Software Licensing and Packaging 11 Ordering Information 12 Our Experts Recommend 13 Cisco and Partner Services 14 For More Information 14 Cisco Capital 14 Document History 15The Cisco® 900 Series Integrated Services Routers (ISRs) combine Internet access, comprehensive security, and wireless services in a single high-performance device that is easy to deploy and manage. They are well suited for deployment as Customer Premises Equipment (CPE) in enterprise small branch offices and in service provider managed-service environments.Product OverviewThe Cisco 900 Series ISRs deliver integrated security and threat defense, protecting networks from both known and new Internet vulnerabilities and attacks. These powerful, fixed-configuration routers provide secure broadband and Metro Ethernet and wireless LTE WAN connectivity. Service providers offering both managed Ethernet and wireless LTE WAN services can deploy them in customer locations as CPE. Centralized and remote management capabilities are available through web-based tools and Cisco IOS®Software for full visibility and control of network configurations at the remote site.The 900 Series ISRs simplify the deployment of Ethernet WAN services, with end-to-end Operations, Administration, and Maintenance (OA&M), Service-Level Agreement (SLA) monitoring and verification, and configuration management.The Cisco 900 Series ISRs come with a 4-port managed switch, providing LAN ports to connect multiple devices. Figures 1 and 2 show the C921-4P and C926-4P models.Figure 1.C921-4P ISR Front, Back, and Top ViewsFigure 2.C926-4P ISR Front, Back, and Top ViewsFeatures and BenefitsTable 1 describes some of the business needs enterprises have in branch offices and other edge networking locations and how the Cisco 900 Series ISRs fulfill those requirements.Table 1.How the Cisco 900 Series ISRs Address Edge Networking ChallengesPlatform SupportTable 2 describes the interfaces and integrated capabilities supported by each of the Cisco 900 Series ISR models.Table 2.Cisco 900 Series ISRs Ethernet and DSL only SKUsTable 3.Cisco 900 Series ISRs LTE SKUsTable 4.Cisco LTE 2.5 Bands SupportedTable 5.Cisco LTEProduct SpecificationsTable 5 shows Cisco IOS Software features and general system specifications for the 900 Series ISRs. Table 6.Cisco IOS Software Features and System SpecificationsCisco IOS Software Licensing and PackagingCisco IOS Universal ImageA single Cisco IOS Universal image encompassing all functions is delivered with the platform. Advanced features can be enabled simply by activating a software license on the Universal image. Technology packages and feature licenses, enabled through right-to-use licenses, simplify software delivery and decrease the operational costs of deploying new features.Three major technology licenses are available on the Cisco 900 Series; these licenses can be activated through the Cisco software activation process identified at https:///go/sa. The following licenses are available:●IP Base: This technology package is the default●Application Experience (APP): This license includes data and application performance features●Security (SEC) or Security with No Payload Encryption (SEC-NPE): This license includes features forsecuring network infrastructureTable 7 lists the part numbers and features for each of the licenses. Table 8 lists the part numbers for the software images.Table 7. LicensesTable 8. Software ImagesOrdering InformationTable 6 lists the part numbers and Cisco IOS Software image details for each of the Cisco 900 Series ISR models. To place an order, visit the Cisco Ordering Home Page . To download software, visit the Cisco Software Center. Table 9. Product Part Numbers and Software ImagesFor additional information and details about Cisco IOS Software licensing and packaging on the 900 Series, please visit:https:///c/en/us/support/routers/900-series-integrated-services-routers-isr/products-licensing-information-listing.htmlFor the Cisco 900 Series ISR Hardware and Software Installation Guide, go to:https:///c/en/us/support/routers/900-series-integrated-services-routers-isr/products-installation-guides-list.htmlhttps:///c/en/us/support/routers/900-series-integrated-services-routers-isr/products-installation-and-configuration-guides-list.htmlOur Experts RecommendCisco 900 Series Integrated Services Routers At-a-GlanceViewers of This Document Also Viewed∙Cisco 900 Series Integrated Services Routers Ordering Guide∙Cisco 900 Series Integrated Services Routers FAQ∙Cisco 1000 Series Integrated Services Routers Ordering Guide∙Cisco 1000 Series Integrated Services Routers FAQ∙Cisco 4000 Family Integrated Services Router Data Sheet∙Cisco 890 Series Integrated Services Routers - Data SheetCisco and Partner ServicesServices from Cisco and our certified partners can help you reduce the cost and complexity of branch-office deployments. We have the depth and breadth of experience across technologies to architect a blueprint for a branch-office solution to meet your company's needs. Planning and design services align technology with business goals and can increase the accuracy, speed, and efficiency of deployment. Technical services help maintain operational health, strengthen software application functions, solve performance problems, and lower expenses. Optimization services are designed to continually improve performance and help your team succeed with new technologies. For more information, visithttps:///go/services.Cisco Smart Net Total Care® technical support for the 900 Series ISRs is available on a one-time or annual contract basis. Support options range from help-desk assistance to proactive, onsite consultation. All support contracts include:●Major Cisco IOS Software updates in protocol, security, bandwidth, and feature improvements●Full access rights to technical libraries for technical assistance, electronic commerce, andproduct information●24-hour access to the industry’s largest dedicated technical support staffFor More InformationFor more information about the Cisco 900 Series ISRs, visit https:///go/isr900 or contact your local Cisco account representative.Cisco CapitalFlexible Payment Solutions to Help you Achieve your ObjectivesCisco Capital makes it easier to get the right technology to achieve your objectives, enable business transformation and help you stay competitive. We can help you reduce the total cost of ownership, conserve capital, and accelerate growth. In more than 100 countries, our flexible payment solutions can help you acquire hardware, software, services and complementary third-party equipment in easy, predictable payments. Learn more.Document HistoryPrinted in USAs C78-741615-03 04/20。
专利名称:Reliable multi-unicast发明人:MICHAEL KRAUSE,RENATO JOHN RECIO 申请号:AU5285200申请日:20000524公开号:AU5285200A公开日:20001212专利内容由知识产权出版社提供摘要:A reliable multicast service is operated between a source device and multiple destination devices participating in a multicast group. The source device includes a first source application instance (AI) producing a first unit of work stream, and communication services (CS). Each destination device in the multicast group includes CS, and at least one destination AI which consumes units of work. Communication services/fabric provide communication between the source device and the multiple destination devices. Multiple source and destination resources (SDRs) implement corresponding multiple reliable transport services between the source device and corresponding multiple destination devices in the multicast group for delivery of the first unit of work stream to the corresponding destination devices and guaranteeing strong ordering of the first unit of work stream received at the corresponding destination devices.申请人:HEWLETT-PACKARD COMPANY,IBM CORPORATION,COMPAQ COMPUTER CORP.,ADAPTEC, INC.更多信息请下载全文后查看。
Highlights SecureNETGEAR ProSAFE VPN Firewalls provide both secure IPsec site-to-site tunnels and IPsec secure access for remote clients and also support client-less SSL VPN as well as secure L2TP and PPTP connections. Employing a true SPI firewall with customizable firewall rules, this VPN router is a high-performance, SNMP-manageable, network solution that furnishes multidimensional security including denial-of-service (DoS) protection, stateful packet inspection (SPI), URL keyword filtering, logging, reporting, and real-time alerts.FlexibleProSAFE VPN Firewalls work perfectly with ISP modems, including cable or DSL broadband connections.Wireless-N connectivity 1 and Gigabit LAN/WAN ports keep your data moving at top speed and a configurable DMZ port allows for flexible server deployment. With Network Address Translation (NAT) routing and classical routing, all the users in your small office can access your broadband connection at the same time. VLAN support allows for guest networks plus better network segmentation and IPv6 support will enable you to future proof your network.ReliableModels with multiple WAN ports can operate in either a load-balancing or fail-over configuration. The load-balancing configuration enables maximum throughput by utilizing WAN connections to distribute traffic across two broadband connections, possibly with different ISP providers. Alternatively, a second WAN port may be configured as a failover connection in case the primary connection fails, for another method of providing high reliability.The rugged metal unit houses advanced, high-quality electronics, and is backed by the industry-best ProSAFE Lifetime Hardware Warranty*, Lifetime Technical Support*, and Lifetime Next Business Day Replacement*.1On Supported ModelsProSAFE ® VPN Firewall Series Data SheetFVS318G, FVS318N, FVS336G and SRX5308Page 1 of 5Essential Business-class Network ProtectionNETGEAR ® ProSAFE ® business-class VPN Firewalls are high performingrouters that deliver Stateful Packet Inspection (SPI), Virtual Private Network (VPN), Network Address Translation (NAT), AES and 3DES Encryption, Denial of Service (DoS) protection and provide full secure network access between headquarter locations, remote/branch offices and remote workers. This makes it the ideal solution to provide businesses with the essential network security needed to stop unwanted intrusions.Features and BenefitsHardware Accelerated Network Processor• High Performance LAN-to-WAN throughput for today’s and tomorrow’s broadband speeds Essential Business Networking Features• IPv4/IPv6 Support • 802.1Q VLAN • QoS• NAT and Classical Routing • SIP ALG, VPN Passthrough Secure Firewall• Stateful Packet Inspection (SPI)• DoS attack protection• Block TCP/UDP packet floods • Port/service blocking • Hardware DMZ port • MAC Address filter• Web object and keyword blockingSecure VPN Remote Access• SSL VPN – clientless remote access, anywhere, anytime• IPsec VPN – secure site-to-site tunnels and client-based remote access• Industry-strength encryption algorithms • IKE authentication protects against unauthorized remote access • L2TP and PPTP Server 1Bandwidth Management• Control end user bandwidth consumption with Bandwidth Profiles• Prioritize traffic with Quality of Service (QoS) • WAN Traffic MeteringDual or Quad WAN Ports 1• Connect multiple broadband connections simultaneously• 2 modes of session-based WAN load balancing • WAN failover for maximum uptimeEasy to use• Auto Detect connects to your ISP quickly • DHCP (client and server) for fast deployment • Intuitive Web management GUI• IPsec VPN Wizard allows for easy VPN setup • SNMP, telnet management support• SYSLOG and emailed logs enable thorough network monitoring Reliable NETGEAR Hardware• Industry-grade metal casing • High-quality electronics • Lifetime Hardware Warranty • Lifetime Technical Support• Lifetime Next Business Day Replacement1ProSAFE ® VPN Firewall Series Data SheetFVS318G, FVS318N, FVS336G and SRX5308ProSAFE® VPN Firewall Series Data SheetFVS318G, FVS318N, FVS336G and SRX5308 Technical SpecificationsPage 3 of 5ProSAFE® VPN Firewall Series Data SheetFVS318G, FVS318N, FVS336G and SRX5308 Technical SpecificationsPage 4 of 5Technical Specifications1 On Supported Models2Actual performance may vary depending on network traffic and environment.* This product comes with a limited warranty that is valid only if purchased from a NETGEAR authorized reseller, and modifications to product may void the warranty; covers hardware, fans, and internal power supplies—not software or external power supplies; see /about/warranty/ for details. Lifetime technical support includes basic phone support for 90 days from purchase date and lifetime online chat support when purchased from a NETGEAR authorized reseller.NETGEAR, the NETGEAR Logo and ProSAFE are trademarks of NETGEAR, Inc. in the United States and/or other countries. Other brand names mentioned herein are for identification purposes only and may be trademarks of their respective holder(s). Information is subject to change without notice. © 2015 NETGEAR, Inc. All rights reserved.NETGEAR,Inc.350E.PlumeriaDrive,SanJose,CA95134-1911USA,1-888-NETGEAR(638-4327),E-mail:****************,DS-ProSAFE VPN Firewall Series-4ProSAFE ® VPN Firewall Series Data SheetFVS318G, FVS318N, FVS336G and SRX5308Page 5 of 5。
LOAD BALANCING FOR RELIABLE MULTICAST Chao Gong,Ovidiu Daescu,Raja Jothi,Balaji Raghavachari,Kamil SaracDepartment of Computer ScienceUniversity of Texas at DallasRichardson,TX,USA{cxg010700,daescu,raja,rbk,ksarac}@ABSTRACTNew applications emerge along with the rapid growth of the Internet.Many functionalities other than packet for-warding are being proposed to be added into routers for supporting those new applications.Those functionalities significantly improve the performances of the applications, but they incur overheads on routers at the same time.It is a thorny problem to reach a balance between the appli-cation performance and the functionality overhead.In this paper,we study that problem in the context of reliable mul-ticast.We term it load-balanced agent activation problem (LBAAP).We regard the message implosion at multicast session source as the performance and the NAK message suppression agent at router as the functionality.We de-velop a polynomial running time algorithm for the LBAAP problem in single multicast tree case.We conjecture the LBAAP problem in multiple multicast tree case is NP-Hard and propose a heuristic for it.KEY WORDSLoad balancing,Reliable multicast,NAK suppression.1IntroductionReliable multicast provides reliable data transport from a single source to multiple receivers in the Internet.The chief challenge in reliable multicast is scalability.One main difficulty in making reliable multicast scalable is feedback message implosion at the multicast session source.As the number of receivers increases,their feedback messages back to the source will eventually overwhelm the comput-ing resources and even the link bandwidth at the source.The usual approach to ensure reliable delivery in re-liable multicast protocols is Negative Acknowledgement (NAK).That is,receivers send out NAK messages to in-form the source about packet loss.When a packet loss oc-curs close to the source,most of the receivers will detect the loss and send out NAK messages.A large amount of these NAKs can result in implosion at the source.One common approach to avoid feedback message implosion is feedback message suppression.In this scheme,a special functionality,called NAK suppression agent,is set up on internal nodes in a multicast tree.NAK messages are only unicasted from a node to its nearest an-cestor in the multicast tree on which the NAK suppression agent is activated.The ancestor node just forwards one NAK up the tree and suppresses all duplicate NAKs.NAK suppression agents are software modules located at routers. The NAK suppression agent can be turned on(activated)or turned off(deactivated)on a router for a given reliable mul-ticast session passing through that router.The NAK suppression agent is helpful for implosion prevention,which is a key issue in reliable multicast per-formance.But at the same time it incurs memory and pro-cessing overheads on routers and increases the transmis-sion delay of NAK from receiver to source.The NAK suppression agent must store sequence number informa-tion for each outstanding NAK message in order to be able to suppress future duplicate NAKs.NAKs are extracted from IP fast forwarding path for more detailed process at the router where the NAK suppression agent is activated. The NAK suppression agent examines every received NAK to decide whether to forward it upstream or suppress it. Moreover,in order to eliminate the security vulnerability of false NAK[1],the NAK suppression agent needs to de-ploy some authentication mechanism which is time con-suming.Those NAK processing procedures consume the computing resources on routers and result in longer trans-mission delay for NAKs being transferred from receivers to the source.Excessively long delay causes problems such as the possibility that a source will not receive any NAK un-til the corresponding data packet is deleted from the send buffer.Given a multicast tree,the approach to activate NAK suppression agent is a difficult issue.On one hand,a trivial approach which activates NAK suppression agent on each internal node in a multicast tree precludes implosion at the source.But this approach leads to high total memory and processing overheads on those nodes,as well as long NAK transmission delay.On the other hand,activating NAK suppression agent on just a few nodes in a multicast tree reduces the total overheads and transmission delay.But this approach may fail to prevent implosion at the source, or even worse,may overload some nodes with excessive NAK messages and degrade the performance of all traffic through those nodes.If activating NAK suppression agent on a few nodes far away from the root,the source may still suffer implosion;if activating NAK suppression agent on a few nodes near the root,these nodes may be overwhelmed by a large volume of NAKs.Consequently the performance of the multicast session through these nodes may deterio-rate.In the context of multiple multicast trees,the situa-tion becomes more complicated.If many multicast ses-sions pass through a router,the trivial approach mentioned above will activate NAK suppression functionality for all sessions,and the resultant memory requirement will over-load the router.A naive solution to avoid the memory over-load on routers is to deactivate NAK suppression function-ality for one randomly chosen session on the overloaded router.However,such a solution has a deficiency that the casual selection of the session being“dropped”may trig-ger implosion at the source or overload other routers in that session with excessive NAKs.Reaching a compromise between the performance of reliable multicast and the overheads of the functionality supporting reliable multicast is a complex problem.In this paper we explore that problem.Specifically,we study the Load-Balanced Agent Activation Problem(LBAAP): How to determine the number and placement ofNAK suppression agents in order to prevent im-plosion at multicast session sources by incurringthe minimal total memory and processing over-heads on routers and without overloading anyrouter?As far as we know,this problem has not been ad-dressed before.In this paper,we examine the LBAAP problem in different contexts and propose corresponding algorithms.When considering to establish a new service,it is in the concern of Internet Service Providers(ISPs)to reduce their own costs such as keeping routers below certain loads or cutting down traffic.While reliable multicast has not been widely deployed yet,we believe that studying the re-lationship between the performance and overheads of reli-able multicast will foster its deployment.Along with the rapid growth of the Internet,more and more functionalities other than packet forwarding are be-ing proposed to be added into routers for supporting new emerging applications.These applications include web caches[2],content delivery networks[3],multicast com-munication services[4],etc.In addition,the increasing rate of cyber-attacks in the Internet necessitates the devel-opment of effective defense mechanisms,most of which require additional supports from routers[5,6].Those func-tionalities incur non-trivial overheads on the routers host-ing them.Our work is an instance of studying the bal-ance between the application performance supported and the overheads introduced by the additional functionalities at routers.The rest of this paper is organized as follows.In Sec-tion2,we define and analyze the LBAAP problem.We survey related work in Section3.In Section4,we study the LBAAP problem in single tree case and in multiple tree case.In Section5,we discuss the limitations of our pro-posed algorithms in deployment and possible extensions. Finally,we summarize our work in Section6.2Problem FormulationIn this section,we introduce the multicast tree model, definitions,and assumptions used in this paper and de-scribe the LBAAP problem in detail.In NAK suppression scheme,a tree structure is con-structed for each reliable multicast session.In that tree, the leaves represent the receivers,and the rest nodes,called internal nodes,represent the routers which are NAK sup-pression capable and on the multicast forwarding path.The root of the tree denotes the edge router connecting with the multicast session source.If we assume all of the routers in the network are NAK suppression capable,then the tree mentioned above overlaps the raw multicast tree,otherwise it overlays the raw multicast tree.Since the discussion in this paper is based on the tree structure defined above,we refer to it as multicast tree in the following sections.The number of the children of a particular node in a multicast tree is the degree of that node.Assuming in the worst case,one single packet loss near the source makes every receiver emit a NAK message,and every NAK ar-rives at its destination.If a NAK suppression agent is acti-vated on an internal node in a multicast tree,then the degree of that node means the minimal number of NAKs received by that agent in the worst case.For example,consider an internal node v hosting an agent a,the more agents ac-tivated on v’s children which are internal nodes,the less NAKs received by agent a.If an agent is activated on each of the children of v that are internal nodes,then in the worst case,each child that is an internal node just forwards one NAK upstream and suppresses others,and each child that is a leaf sends out one NAK,the number of NAKs received by agent a is the same as the degree of node v.The weight of a node in a multicast tree is defined as follows:if the node is a leaf,its weight is1;if the node is an internal node hosting an agent,its weight is1;otherwise its weight is the sum of the weights of all of its children.We can regard the weight of a node as the number of NAKs sent up the tree from/via that node in the worst case,though it is not always true in an asymmetric network.If an agent is acti-vated on an internal node v which does not host an agent, then the number of NAKs received by the agent on node v in the worst case is the old value of the weight of node v, and the new value of the weight becomes1.The definition of weight is illustrated in Figure1,where the number be-side each node is the weight of the node.In Figure1-a,no agent is activated in the tree,so weight(v2)=1+1=2 and weight(v1)=2+1=3.In Figure1-b,an agent is ac-tivated on node v2,so weight(v2)=1and weight(v1)= 1+1=2.We assume that the multicast session source expects to receive just one NAK for a single packet loss.Hence a NAK suppression agent is always activated on the root of multicast tree in order to guarantee the source to receive no more than one NAK for a single packet loss.We also as-sume a NAK suppression agent supports just one multicast session,then multiple agents need activating on a router in order to handle multiple multicast sessions.The majorityv 2v v 13(a)(b)112131Figure 1.(a)No agent is activated on any internal node.(b)An agent is activated on internal node v 2.of the memory overhead introduced by a NAK suppression agent is the amount of the memory recording the state infor-mation of NAKs,the amount of the memory storing agent’s code itself is negligible.And the processing overhead on a router is not proportional to the number of agents on that router,but the number of arriving NAKs.Hence,assum-ing an agent to support single session or multiple sessions makes little difference to the LBAAP problem.We define the processing overhead introduced by an agent to be the number of the NAKs received by the agent due to a single packet loss in the worst case defined above.The processing overhead on a router is the sum of the processing overheads of all of the agents activated on the router.We assume the memory overhead introduced by an agent is constant,and with value of 1.Hence the memory overhead on a router is the number of the agents activated on the router.In a multicast tree,the sum of the memory overheads introduced by all NAK suppression agents is the number of agents,and the sum of the processing overheads intro-duced by all agents is the total number of the NAK mes-sages received by those agents in the worst case.In the worst case,each receiver sends one NAK message to its nearest NAK suppression agent,and each agent except the one on the root forwards one NAK up to its nearest ances-tor.Therefore the total processing overhead equals the sum of the number of receivers and the number of agents mi-nus 1.So minimizing the number of agents is equivalent to minimizing the total memory and processing overheads on routers.The transmission delay of NAKs from a re-ceiver to the source is proportional to the number of agents on the multicast forwarding path from the source to the re-ceiver.Hence,in most cases,minimizing the number of agents means reducing the NAK transmission delay.The Load-Balanced Agent Activation Problem (LBAAP)can be formulated as below:Given a memory load bound and a processing load bound on routers,the objective is to determine the minimal number of NAK suppression agents and locate the routers to activate those agents such that the memory and processing overheads on each router are not higher than the memory and processing load bounds,respectively.The memory load bound on routers specifies the amount of the memory devoted for the NAK suppression functionality.In other words,how many NAK suppres-sion agents can be activated on a router.The processing load bound on routers indicates the upper limit of the pro-cessing overhead on a router.The processing load bound reflects not only the amount of computing resources avail-able for NAK processing on a router,but also the amount of bandwidth available for receiving NAKs.Given certain memory and processing load bounds on the routers through which a multicast tree pass,minimiz-ing the number of NAK suppression agents means mini-mizing the total memory and processing overheads and re-ducing the NAK transmission delay.In addition,locating routers to activate NAK suppression agent without exceed-ing the specified bounds of memory and processing capa-bility prevents overloading routers and achieves load bal-ancing among routers.In this work,we assume that the multicast tree topol-ogy is already known and relatively stable.Typically ISPs have access to multicast tree information within their do-mains.Our work concerns NAK suppression agent acti-vation within a domain.If a multicast tree spans several domains,our algorithms can be used to find an activation of agents in each domain,for the portion of the multicast tree that spans that domain.In addition,our tracetree pro-posal [7]can be used to collect multicast tree topologies efficiently.Finally,in most applications that use reliable multicast,such as one-to-many file transfer,the set of re-ceivers is mostly static and is known to the source in ad-vance.As a result,the collected tree topology is relatively stable during the application lifetime.3Related WorkIn theoretic aspect,the LBAAP problem resembles two well-known graph theoretic problems:the k -median prob-lem and the facility location problem.Given a graph with n nodes,the k -median problem is to select k out of n nodes as service centers so as to minimize the sum of the cost of each node accessing its nearest service center among those k se-lected nodes.Tamir [8]studies the k -median problem in a tree topology and gives an optimal algorithm.Li et al.[9]use a similar approach to optimally place web proxies in a tree topology with a web server at the root.Qiu et al.[10]study the same problem in a graph topology and propose various heuristics.Krishnan et al.[2]study the problem of optimal placement of web caches.Shah et al.[11]deal with the k -median problem in the context of content-based multicast.In the facility location problem,besides the cost of accessing the nearest service center (facility),there is also a cost of building facility onto a node to make it become a service center,the objective is to find a solution (both the number and locations of the facilities)of the minimal total cost [12].Guha et al.[13]introduce the Load Balanced Facility Location Problem wherein the constraint of having a minimum load on facility nodes is added to the origi-nal problem.They prove that problem is NP-Complete and present a constant factor approximation algorithm for it.In practical aspect,Papadopoulos and Laliotis [14]in-vestigate the performance of reliable multicast under vari-ous deployment strategies of the supporting functionality. In addition,lots of study has been done on the placement of other kinds of functionality agents in the context of re-liable multicast[15,16].The objective of these works is to reduce the number of retransmissions,latency,and re-source utilization.4Load-Balanced Agent Activation Problem We examine the LBAAP problem in both single tree case and multiple tree case,and propose corresponding solu-tions.4.1LBAAP in Single Tree CaseIn the context of a single multicast tree,at most one NAK suppression agent needs to be activated on a router.As long as the memory load bound is not set to be0,the memory overhead introduced by an agent will not overload routers. So we don’t consider the memory overload issue in single tree case.Because the degree of an internal node is the lower limit of the processing overhead introduced by an agent on the node,we assume the processing load bound is never set to be smaller than the degree of any internal node in the tree.The LBAAP problem in single tree case can be defined as follows:Given a multicast tree T rooted at r, with leaves denoting receivers,and internal nodes denot-ing routers.The memory load bound on internal nodes is MB and MB≥1.The processing load bound on internal nodes is P B.The processing overhead on an internal node v is pd(v).The goal is to select a set of internal nodes,R, to activate a NAK suppression agent on each node in R, satisfying the following conditions:1.r∈R,2.∀v∈R,pd(v)≤P B,and3.the size of R is minimal.We first show a canonical activation of agents,then present an algorithm to find such solution in linear time. Given an optimal activation of NAK suppression agent in a multicast tree with a processing load bound P B,we can transform this activation into another optimal activation which satisfies the following two conditions:1.For any internal node v which hosts an agent butwhose parent p does not,if we deactivate the agent on node v,and activate an agent on v’s parent p,then the processing overhead introduced by the agent on p will exceed the processing load bound P B.2.For any internal node v which hosts an agent and hassiblings,the processing overhead on node v is not smaller than the weight of any of its siblings.Given an optimal activation of agent in a multicast tree with a processing load bound P B,we can transform this activation as follows.First we move each agent as high in the multicast tree as possible without violating the load constraint.In other words,if an agent is activated on a node v but no agent is activated on v’s parent p,then it must be the case that if we do not activate the agent on v/*T is multicast tree rooted at r*/ LBAAP(T,PB){/*PB is processing load bound*/nagents:=0pd(r):=ActivateAgent(r)activate NAK suppression agent on rnagents:=nagents+1return nagents}/*activate NAK suppression agent in the subtree rooted at v*/ActivateAgent(v){if v is a leaf node then return weight(v)else{weight(v):=0for each child u of v doweight(v):=weight(v)+ActivateAgent(u)while weight(v)>PB do{select an internal node child u of v with largest weightactivate NAK suppression agent on unagents:=nagents+1pd(u):=weight(u)weight(v):=weight(v)-weight(u)+1weight(u):=1}return weight(v)}}Figure2.Algorithm.The global variable nagents counts the number of agents activated by the algorithm.but activate an agent on its parent p instead,the processing overhead on p,which is the same as the weight of p when no agent is activated on p,will exceed P B.Otherwise,we can do such transformation to obtain a new solution with the same number of agents.Second,we move each agent from the node where it is located to the sibling node whose weight is larger than the processing overhead introduced by the agent on current node,if possible.In other words, if we activate an agent on a child u of a node p,but not on another child v of p,then it must be the case that pd(u)≥weight(v).Otherwise,we do such transformation,then the processing overheads on all ancestor nodes of u remain same or decrease and we can obtain a new solution with the same number of agents.Figure2describes our proposed algorithm.Given a multicast tree T and a processing load bound P B,process multicast tree T from bottom to top,for every internal node v,if weight(v)>P B,select a child node,u,which is an internal node with the largest weight among all such nodes that are children of v,then activate NAK suppres-sion agent on u.After that activation,weight(v)reduces to weight(v)−weight(u)+1,and weight(u)becomes 1.Repeat above operation until weight(v)≤P B,then go to the next node.At last,activate NAK suppression agent on the root of the multicast tree.The correctness of the al-gorithm follows from the argument above on the canonical activation of agents.The running time of the algorithm is O(n·d),n is the number of the internal nodes in the mul-ticast tree,and d is the average degree of all internal nodes.4.2LBAAP in Multiple Tree CaseIn this section we consider the LBAAP problem in the con-text of multiple multicast trees.Suppose multiple multicastsessions pass through a router,if the memory load bound is smaller than the number of sessions,the router can’t ac-tivate NAK suppression agent for every session,it has to choose some of the sessions and does not offer NAK sup-pression support to them.A random selection of the session being“dropped”from a router may make excessive NAK messages flow to the source or some upstream router in that session.That may trigger implosion at the source or overload the upstream router with excessive NAKs.So an intelligent selection of the sessions being served is a must. Since a NAK suppression agent is always activated on the root of multicast tree,we assume no router to be the root of more than MB trees,wherein MB is the memory load bound.In other words,there is not any edge routers con-necting with more than MB multicast session sources.The LBAAP problem in multiple tree case can be defined as follows:Given a graph G=(V,E),with V denoting the set of nodes and E denoting the set of edges connecting the nodes.V h⊂V is the set of hosts and V r=V−V l is the set of routers.T={T1,T2,...T m}is a set of m multicast trees in G.Each tree T i∈T is rooted at r i∈V r.The leaves(receivers)and internal nodes(routers) in each tree belong to V h and V r,respectively.The mem-ory load bound on routers is MB,and the processing load bound on routers is P B.The memory overhead on a router v is md(v),and the processing overhead on v is pd(v). The goal is to select a set of nodes R⊆V r,for∀v∈R, activate n v(n v≥1)agents on it,satisfying the following conditions:1.r i∈R,for1≤i≤m,2.∀v∈R,md(v)≤MB,3.∀v∈R,pd(v)≤P B,and4. v∈R n v is minimal.As we will see in Section4.3,even in a simplified model,the LBAAP problem in multiple tree case turns out to be much harder than the single tree case.We conjecture it is NP-Hard based on the fact that a minor variation of the multi-tree LBAAP problem is NP-hard.Therefore,we focus on computing a feasible solution rather than comput-ing an optimal solution.We propose a heuristic to solve the LBAAP problem in multiple tree case.First at all,we define an operation on tree topology, removing node.Removing a node v from a tree T means to remove node v from tree T,and turn all of the children of v to be the children of v’s parent.The root of tree can not be removed.The heuristic proceeds in two steps:1.Tree Selection:Suppose the number of the multicasttrees passing through a router v is N v.For each node v∈V r,if N v≤MB,then all N v trees are selected as candidates which are supported by node v with NAK suppression agent.Otherwise we need to select MB out of N v trees in the following way.(a)For each tree T i passing through v,if v is theroot of T i,select tree T i as a candidate.(b)After step(a),if the number of candidates issmaller than MB,then for each of the rest trees,remove node v from the tree.Arrange these treesinto a list in decreasing order according to thedegree of the parent of node v in each tree.Se-lect trees from the beginning of the list as a can-didate until the number of candidates increasesto MB.For these trees selected as candidate,undo the operation of removing node v and re-store them to their previous topologies.2.Processing Load Bound Assignment:After makingtree selection for each node v∈V r,each tree remains the same topology or changes to a smaller topology by removing some internal nodes.We assign the pro-cessing load bound L=P BSince the trees in T do not share edges,we can treat each tree T i∈T independently and compute an optimal agent activation for T i using the LBAAP algorithm for sin-gle tree case.Assume this has been done for each tree in T.Then,on each node v,the number of agents is k v(0≤k v≤m)such that each agent supports just one tree.Since an agent may support multiple trees as long as its processing overhead does not exceed L,we would like to minimize the number of agents on each node by making single agent support multiple trees without violat-ing the load constraint,hence minimize the total number of agents.This is an instance of the integer bin packing problem which is known to be NP-Hard[17].5DiscussionThe NAK suppression agent activation algorithms pro-posed in this paper need multicast tree topologies as input. The deployment of these algorithms in practice is in cen-tralized manner.That is,the algorithms are implemented at a central server.The server collects the multicast tree topologies,invokes the algorithms,then commands the rel-evant routers to activate NAK suppression agent.If a mul-ticast group is dynamic,the multicast tree topology varies frequently,then the overheads of the algorithms on com-puting resources and network bandwidth will increase no-ticeably.On one hand,as we mentioned previously,due to the semantics of the applications using reliable multicast,the tree topology of a reliable multicast session is relatively stable during the lifetime of the session.On the other hand, if the structure of a multicast tree changes partially,i.e.,in a subtree,the agent activation algorithms can be applied on the subtree to compute a new activation of agents in the bined with the old activation of agents in the rest of the tree,the new agent activation works for the whole tree.When applying the agent activation algorithms on a subtree instead of the whole tree,the overheads on both computation and bandwidth are reduced.For instance, a router v hosts an agent for a multicast session,when the agent receives more NAKs than its upper limit,router v sends a request to the server to ask for recomputing the ac-tivation of agents in the subtree rooted at v.The server will discover current topology of the subtree,invoke agent acti-vation algorithms,and activate agents in the subtree.Several areas remain to be addressed in future work. One is to generalize the LBAAP problem by allowing dif-ferent nodes to have different load bounds,and develop corresponding algorithms.Another is to develop a NAK suppression agent activation approach which works in dis-tributed manner.6ConclusionIn this paper,we have explored the relationship between the performance of reliable multicast and the overheads of the functionality supporting reliable multicast.In particu-lar,We presented and studied the load-balanced agent acti-vation problem(LBAAP).We regard the implosion as the performance and the NAK suppression agent as the func-tionality.We developed a polynomial running time algo-rithm for the LBAAP problem in single tree case,and pro-posed a heuristic for the LBAAP problem in multiple tree case since we conjecture it is NP-Hard.Reliable multicast is one of many Internet applica-tions that require the aid of various functionality agents on routers.Those functionality agents introduce non-trivial overheads on the routers hosting them.Reaching a compro-mise between the performance of those applications and the overheads incurred by the functionalities supporting those applications is worth delving.References[1]J.Gemmell,T.Montgomery,T.Speakman,N.Bhaskar,andJ.Crowcroft,The PGM reliable multicast protocol,IEEE Network, 17(1),2003,16-22.[2]P.Krishnan,D.Raz,and Y.Shavitt,The cache location problem,IEEE/ACM Transactions on Networking,8(5),2000,568-582. [3] B.Krishnamurthy,C.Wills,and Y.Zhang,On the use and perfor-mance of content distribution networks,Proc.of SIGCOMM Work-shop on Internet Measurement,San Francisco,USA,2001,169-182.[4]K.Almeroth,The evolution of multicast:From the MBone to inter-domain multicast to Internet2deployment,IEEE Network,14(1), 2000,10-20.[5] A.Snoeren,C.Partridge,L.Sanchez,C.Jones,F.Tchakountio,B.Schwartz,S.Kent,and W.Strayer,Single-packet IP traceback,IEEE/ACM Transactions on Networking,10(6),2002,721-734. [6] A.Yaar,A.Perrig,and D.Song,SIFF:A stateless Internet flow filterto mitigate DDoS flooding attacks,Proc.of IEEE Symposium on Security and Privacy,Oakland,USA,2004,130-146.[7]K.Sarac and K.Almeroth,Tracetree:A scalable mechanism to dis-cover multicast tree topologies in the Internet,IEEE/ACM Transac-tions on Networking,12(5),2004.[8] A.Tamir,An O(pn2)algorithm for the p-median and related prob-lems on tree graphs,Operations Research Letters,19(2),1996,59-64.[9] B.Li,M.Golin,G.Italiano,X.Deng,and K.Sohraby,On the opti-mal placement of Web proxies in the Internet,Proc.of IEEE INFO-COM,New York,USA,1999,1282-1290.[10]L.Qiu,V.Padmanabhan,and G.V oelker,On the placement of Webserver replicas,Proc.of IEEE INFOCOM,Anchorage,USA,2001, 1587-1596.[11]R.Shah,R.Jain,and F.Anjun,Efficient dissemination of personal-ized information using content-based multicast,Proc.of IEEE IN-FOCOM,New York,USA,2002,930-939.[12]K.Jain and V.Vazirani,Approximation algorithms for metric facil-ity location and k-median problems using the primal-dual scheme and lagrangian relaxation,Journal of the ACM,48(2),2001,274-296.[13]S.Guha,A.Meyerson,and K.Munagala,Hierarchical placementand network design problems,Proc.of IEEE Symposium on Foun-dations of Computer Science,Redondo Beach,USA,2000,603-612.[14] C.Papadopoulos and liotis,Incremental deployment of arouter-assisted reliable multicast scheme,Proc.of International Workshop on Networked Group Communications,Palo Alto,USA, 2000,37-46.[15]S.Guha,A.Markopoulou,and F.Tobagi,Hierarchical reliable mul-ticast:Performance analysis and placement of proxies,Computer Communications,26(10),2003,2070-2081.[16]P.Ji,J.Kurose,and D.Towsley,Activating and deactivating repairservers in active multicast trees,Proc.of Tyrrhenian International Workshop on Digital Communications,Toarmina,Italy,2001,507-523.[17]S.Skiena,The Algorithm Design Manual(New York,Springer-Verlag,1998).。