LOAD BALANCING FOR RELIABLE MULTICAST

合集下载

德尔EMC S5048F-ON 25GbE开放网络交换机说明说明书

德尔EMC S5048F-ON 25GbE开放网络交换机说明说明书

The Dell EMC S5048-ON switch is an innovative, future-ready T op-of-Rack (T oR) open networking switch providing excellent capabilities and cost-effectiveness for the enterprise, mid-market, Tier2 cloud and NFV service providers with demanding compute and storage traffic environments.The S5048F-ON 25GbE switch is Dell’s latest disaggregated hardware and software data center networking solution that provides backward compatible 25GbE server port connections, 100GbE uplinks, storage optimized architecture, and a broad range of functionality to meet the growing demands of today’s data center environment now and in the future.The compact S5048F-ON model design provides industry-leading density with up to 72 ports of 25GbE or up to 48 ports of 25GbE and 6 ports of 100GbE in a 1RU form factor.Using industry-leading hardware and a choice of Dell’s OS9 or select 3rd party network operating systems and tools, the S5048F-ON delivers non-blocking performance* for workloads sensitive to packet loss. The compact S5048F-ON model provides multi rate speed enabling denser footprints and simplifying migration to 25GbE server connections and 100GbE fabrics. Priority-based flow control (PFC), data center bridge exchange (DCBX) and enhanced transmission selection (ETS) make the S5048F-ON an excellent choice for DCB environments.Maximum performance and functionalityThe Dell EMC Networking S-Series S5048F-ON is a high-performance, multi-function, 10/25/40/50/100 GbE T oR switch purpose-built for applications in high-performance data center, cloud and computing environments.In addition, the S5048F-ON incorporates multiple architectural features that optimize data center network flexibility, efficiency, and availability, including IO panel to PSU airflow or PSU to IO panel airflow for hot/cold aisle environments, and redundant, hot-swappable power supplies and fans. Key applications• Organizations looking to enter the software-defined data center era with a choice of networking technologies designed to deliver theflexibility they need• Native high-density 25 GbE T oR server access in high-performance data center environments• 25 GbE backward compatible to 10G and 1G for future proofing and data center server migration to faster uplink speeds.• Capability to support mixed 25G and 10G servers on front panel ports • iSCSI storage deployment including DCB converged lossless transactions • Suitable as a T oR or Leaf switch in 100G Active Fabric implementations • As a high speed VXLAN L2 gateway that connects the hypervisor-based overlay networks with non-virtualized infrastructure• Emerging applications requiring hardware support for new protocols Key features• 1RU high-density 25/10/1 GbE T oR switch with up to forty eight ports of native 25 GbE (SFP28) ports supporting 25 GbE without breakout cables• Multi-rate 100GbE ports support 10/25/40/50/100 GbE• 3.6 Tbps (full-duplex) non-blocking, store and forward switching fabric delivers line-rate performance under full load*• Scalable L2 and L3 Ethernet switching with QoS and a full comple-ment of standards-based IPv4 and IPv6 features, including OSPF and BGP routing support• L2 multipath support via Virtual Link Trunking (VLT) and multiple VLT (mVLT) multi-chassis link aggregation technology• VRF-lite enables sharing of networking infrastructure and provides L3 traffic isolation across tenants• Open Automation Framework adding automated configuration and provisioning capabilities to simplify the management of networkenvironments• Jumbo frame support for large data transfers• 128 link aggregation groups with up to eight members per group, using enhanced hashing• Redundant, hot-swappable power supplies and fans• I/O panel to power supply airflow or power supply to I/O panel airflow • T ool-less enterprise ReadyRails™ mounting kits reducing time and resources for switch rack installation• Power-efficient operation up to 45°C helping reduce cooling costs in temperature-constrained deployments (Dell EMC Fresh Air 2.0compliant)• Converged network support for DCB and ECN capability• Supports the open source Open Network Install Environment (ONIE) for zero touch installation of alternate network operating systems• Fibre Channel, FCoE, FCoE transit (FIP Snooping) and NPIV ProxyDELL EMC NETWORKING S5048F-ONHigh-performance open networking top-of-rack switch with native 25G server ports and 100G network fabric connectivity**future deliverable48 line-rate 25 Gigabit Ethernet SFP28 ports6 line-rate 100 Gigabit Ethernet QSFP28 ports1 RJ45 console/management port with RS232signaling1 Micro-USB type B optional console port1 10/100/1000 Base-T Ethernet port used asmanagement port1 USB type A port for the external mass storage Size: 1 RU, 1.72 h x 17.1 w x 18” d(4.4 h x 43.4 w x 45.7 cm d)Weight: 22lbs (9.98kg)ISO 7779 A-weighted sound pressure level: 59.6 dBA at 73.4°F (23°C)Power supply: 100–240 VAC 50/60 HzMax. thermal output: 1956 BTU/hMax. current draw per system:5.73A/4.8A at 100/120V AC2.87A/2.4A at 200/240V ACMax. power consumption: 573 Watts (AC)T yp. power consumption: 288 Watts (AC) with all optics loadedMax. operating specifications:Operating temperature: 32° to 113°F (0° to 45°C) Operating humidity: 10 to 90% (RH), non-condensingFresh Air Compliant to 45°CMax. non-operating specifications:Storage temperature: –40° to 158°F (–40° to70°C)Storage humidity: 5 to 95% (RH), non-condensing RedundancyT wo hot swappable redundant power suppliesHot swappable redundant fansPerformanceSwitch fabric capacity: 3.6TbpsForwarding capacity: Up to 2,678 MppsPacket buffer memory: 22MB (16MB supported in initial release)CPU memory: 8GBMAC addresses: 132K (in scaled-l2-switch mode) ARP table: 82K (in scaled-l3-hosts mode)IPv4 routes: Up to 128KIPv6 routes: Up to 64K (20k currently supported) Multicast hosts: Up to 8KLink aggregation: 128 groups, 32 members per LAG groupLayer 2 VLANs: 4KMSTP: 64 instancesLAG Load Balancing: Based on layer 2, IPv4 or IPv6 header, or tunnel inner header contentsQoS data queues: 8QoS control queues: 12QoS: 1024 entries per TileIngress ACL: 1024 entries per TileEgress ACL: 1k entries per TilePre-Ingress ACL: 1k entries per TileIEEE Compliance802.1AB LLDP802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN T agging, Double VLAN T agging,GVRP802.1Qbb PFC802.1Qaz ETS802.1s MSTP802.1w RSTP802.1X Network Access Control802.3ab Gigabit Ethernet (1000BASE-T) orbreakout802.3ac Frame Extensions for VLAN T agging 802.3ad Link Aggregation with LACP 802.3ba 40 Gigabit Ethernet (40GBase-SR4,40GBase-CR4, 40GBase-LR4, 100GBase-SR10, 100GBase-LR4, 100GBase-ER4) onoptical ports802.3bj 100 Gigabit Ethernet802.3u Fast Ethernet (100Base-TX) on mgmtports802.3x Flow Control802.3z Gigabit Ethernet (1000Base-X) with QSAANSI/TIA-1057 LLDP-MEDForce10 PVST+Jumbo MTU support 9,416 bytesLayer2 Protocols4301 Security Architecture for IPSec*4302 IPSec Authentication Header*4303 ESP Protocol*802.1D Compatible802.1p L2 Prioritization802.1Q VLAN T agging802.1s MSTP802.1w RSTP802.1t RPVST+802.3ad Link Aggregation with LACPVL T Virtual Link T runkingRFC Compliance768 UDP793 TCP854 T elnet959 FTP1321 MD51350 TFTP2474 Differentiated Services2698 T wo Rate Three Color Marker3164 Syslog4254 S SHv2General IPv4 Protocols791 I Pv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1191 Path MTU Discovery1305 NTPv41519 CIDR1542 BOOTP (relay)1858 IP Fragment Filtering2131 DHCP (server and relay)5798 V RRP3021 31-bit Prefixes3046 D HCP Option 82 (Relay)1812 Requirements for IPv4 Routers1918 Address Allocation for Private Internets2474 Diffserv Field in IPv4 and Ipv6 Headers2596 A ssured Forwarding PHB Group3195 Reliable Delivery for Syslog3246 E xpedited Assured Forwarding4364 V RF-lite (IPv4 VRF with OSPF and BGP)*General IPv6 Protocols1981 Path MTU Discovery*2460 I Pv62461 Neighbor Discovery*2462 S tateless Address AutoConfig2463 I CMPv62675 Jumbo grams3587 Global Unicast Address Format4291 IPv6 Addressing2464 T ransmission of IPv6 Packets over EthernetNetworks2711 IPv6 Router Alert Option4007 I Pv6 Scoped Address Architectureand Routers4291 IPv6 Addressing Architecture4861 Neighbor Discovery for IPv64862 I Pv6 Stateless Address Autoconfiguration5095 Deprecation of T ype 0 Routing Headers in IPv6IPv6 Management support (telnet, FTP, TACACS,RADI US, SSH, NTP)RIP1058 RIPv12453 R I Pv2OSPF (v2/v3)1587 NSSA (not supported in OSPFv3)1745 OSPF/BGP interaction1765 OSPF Database overflow2154 MD52328 OSPFv22370 Opaque LSA3101 OSPF NSSA3623 O SPF Graceful Restart (Helper mode)*BGP1997 Communities2385 M D52439 R oute Flap Damping2545 B GP-4 Multiprotocol Extensions for IPv6I nter-Domain Routing2796 Route Reflection2842 C apabilities2858 M ultiprotocol Extensions2918 Route Refresh3065 C onfederations4271 BGP-44360 E xtended Communities4893 4-byte ASN5396 4-byte ASN Representation5492 C apabilities AdvertisementMulticast1112 IGMPv12236 I GMPv23376 IGMPv3MSDPPIM-SMPIM-SSMNetwork Management1155 SMIv11157 SNMPv11212 Concise MIB Definitions1215 SNMP Traps1493 Bridges MIB1850 OSPFv2 MIB1901 Community-Based SNMPv22011 IP MIB2096 I P Forwarding T able MIB2578 SMI v22579 T extual Conventions for SMIv22580 C onformance Statements for SMIv22618 RADIUS Authentication MIB2665 E thernet-Like Interfaces MIB2674 Extended Bridge MIB2787 VRRP MIB2819 RMON MIB (groups 1, 2, 3, 9)2863 I nterfaces MIB3273 RMON High Capacity MIB3410 SNMPv33411 SNMPv3 Management Framework3412 Message Processing and Dispatching for theSimple Network Management Protocol (SNMP)3413 SNMP Applications3414 User-based Security Model (USM) forSNMPv33415 VACM for SNMP3416 SNMPv23417 Transport mappings for SNMP3418 SNMP MIB3434 R MON High Capacity Alarm MIB3584 C oexistance between SNMP v1, v2 and v3 4022 I P MIB4087 IP Tunnel MIB4113 UDP MIB4133 Entity MIB4292 M IB for IP4293 M IB for IPv6 T extual Conventions4502 R MONv2 (groups 1,2,3,9)5060 PIM MIBANSI/TIA-1057 LLDP-MED MIBDell_ITA.Rev_1_1 MIBdraft-ietf-idr-bgp4-mib-06 BGP MIBv1IEEE 802.1AB LLDP MIBIEEE 802.1AB LLDP DOT1 MIBIEEE 802.1AB LLDP DOT3 MIB sFlowv5 sFlowv5 MIB (version 1.3)DELL-NETWORKING-BGP4-V2-MIB(draft-ietf-idr-bgp4-mibv2-05)DELL-NETWORKING-IF-EXTENSION-MIBDELL-NETWORKING-LINK-AGGREGATION-MIB DELL-NETWORKING-COPY-CONFIG-MIBDELL-NETWORKING-PRODUCTS-MIBDELL-NETWORKING-CHASSIS-MIBDELL-NETWORKING-SMIDELL-NETWORKING-TCDELL-NETWORKING-TRAP-EVENT-MIBDELL-NETWORKING-SYSTEM-COMPONENT-MIB DELL-NETWORKING-FIB-MIBDELL-NETWORKING-FPSTATS-MIBDELL-NETWORKING-ISIS-MIBDELL-NETWORKING-FIPSNOOPING-MIBDELL-NETWORKING-VIRTUAL-LINK-TRUNK-MIB DELL-NETWORKING-DCB-MIBDELL-NETWORKING-OPENFLOW-MIBDELL-NETWORKING-BMP-MIBDELL-NETWORKING-BPSTATS-MIBSecuritydraft-grant-tacacs-02 TACACS+2404 The Use of HMACSHA-1-96 within ESP and AH 2865 R ADI US3162 Radius and IPv63579 RADIUS support for EAP3580 802.1X with RADIUS3768 EAP3826 A ES Cipher Algorithm in the SNMP User Base Security Model4250, 4251, 4252, 4253, 4254 SSHv24301 Security Architecture for IPSec4302 I PSec Authentication Header4807 IPsecv Security Policy DB MIBData center bridging802.1Qbb Priority-Based Flow Control802.1Qaz Enhanced Transmission Selection (ETS)* Data Center Bridging eXchange (DCBx)DCBx Application TLV (iSCSI, FCoE*) Regulatory complianceSafetyUL/CSA 60950-1, Second EditionEN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group DifferencesEN 60825-1 Safety of Laser Products Part 1: Equipment Classification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication SystemsIEC 62368-1FDA Regulation 21 CFR 1040.10 and 1040.11 Emissions & ImmunityFCC Part 15 (CFR 47) (USA) Class AICES-003 (Canada) Class AEN55032: 2015 (Europe) Class ACISPR32 (International) Class AAS/NZS CISPR32 (Australia and New Zealand) Class AVCCI (Japan) Class AKN32 (Korea) Class ACNS13438 (T aiwan) Class ACISPR22EN55022EN61000-3-2EN61000-3-3EN61000-6-1EN300 386EN 61000-4-2 ESDEN 61000-4-3 Radiated ImmunityEN 61000-4-4 EFTEN 61000-4-5 SurgeEN 61000-4-6 Low Frequency Conducted Immunity NEBSGR-63-CoreGR-1089-CoreATT-TP-76200VZ.TPR.9305RoHSRoHS 6 and China RoHS compliantCertificationsJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2009, Class A Warranty1 Year Return to DepotLearn more at /NetworkingIT Lifecycle Servicesfor NetworkingExperts, insights and easeOur highly trained experts, withinnovative tools and proven processes,help you transform your IT investments into strategic advantages.Plan & DesignLet us analyze yourmultivendor environmentand deliver a comprehensivereport and action plan to buildupon the existing network andimprove performance.Deploy & IntegrateGet new wired or wirelessnetwork technology installedand configured with ProDeploy.Reduce costs, save time, andget up and running fast.EducateEnsure your staff builds theright skills for long-termsuccess. Get certified on DellEMC Networking technologyand learn how to increaseperformance and optimizeinfrastructure.Manage & SupportGain access to technical expertsand quickly resolve multivendornetworking challenges withProSupport. Spend less timeresolving network issues andmore time innovating.OptimizeMaximize performance fordynamic IT environments withDell EMC Optimize. Benefitfrom in-depth predictiveanalysis, remote monitoringand a dedicated systemsanalyst for your network.RetireWe can help you resell or retireexcess hardware while meetinglocal regulatory guidelines andacting in an environmentallyresponsible way.Learn more at/lifecycleservices*Future release**Packet sizes over 147 Bytes。

德尔(Dell)EMG力源N3200-ON 规格表说明书

德尔(Dell)EMG力源N3200-ON 规格表说明书

The N3200 switch series offers power-efficient and resilient 1GbE and 1/2.5/5/10GbE Multigigabit range of switching solution for advanced Layer 3 distribution for offices and campus networks. The series has high-performance capabilities and wire-speed performance utilizing a non-blocking architecture to easily handle unexpected traffic loads. Use dual internal hot-swappable 80PLUS Platinum certified power supplies for high availability and power efficiency. The switches offer simple management and scalability via an 400Gbps (full duplex) high-availability stacking architecture that allows management of up to 12 switches from a single IP address.Modernize campus network architectures Modernize campus network architectures with a power-efficient and resilient 1/2.5/5/10GbE switching solution with dense options of 802.3at (30W) or 802.3bt (60W/90W) PoE solutions to deliver clean power to wide range network devices such as wireless access points (APs), Voice-over-IP (VoIP) handsets, video conferencing systems, security cameras, LED luminaires and many more.Achieve high availability and full bandwidth utilizationwith Multichassis Link Aggregation (MLAG). N3200 series switches support MLAG to create active/active loop-free redundancy without spanning tree. Server roomscan deliver reliable server and storage connectivity with features to help save time and avoid configuration errors. N3200 supports VRF-lite, allowing it to be partitioned into multiple virtual routers with isolated control and data planes on the same physical switch. For greater interoperabilityin multivendor networks, N3200 switches offer the latest open-standard protocols.Leverage familiar tools and practicesAll N-Series switches include Dell EMC Networking OS6, designed for easier deployment, greater interoperability and a lower learning curve for network administrators.OS6 common command line interface (CLI) and graphic user interface (GUI) are intuitive, so skilled network administrators can get productive quickly. N3200 switches also support the Open Network Install Environment (ONIE), enabling installation of alternate network operating systems.Deploy with confidence at any scaleN3200 series switches help create performance assurance with a data rate up to 1560Gbps (full duplex) and a forwarding rate up to 2167Mpps. Scale easily with built-in rear stacking ports. Switch stacks of up to 6241/2.5/5/10GbE/25GbE ports can be managed from a single screen using the highly available stacking architecturefor high-density aggregation with seamless redundant availability. The N-series switches’ lifetime warranty covers software upgrades, hardware repair or replacement, and optics and cables purchased with the switch.¹Dell EMC PowerSwitchN3200-ON Series SwitchesHigh performance Open networking 1GbE and 10GbE Multigigabit switchesfor modern campus networks1 Select Networking products carry a Lifetime Limited Warranty with Basic Hardware Service (repair or replacement) for life. Repair or replacement does not include troubleshooting, configuration, or other advanced service provided by Dell EMC ProSupport. See details at https:///en-us/work/shop/networkingwarranty/cp/networkingwarrantyHardware, performance and efficiency• 1GbE Switches: 1RU switches with up to 48 line-rate 1GbE ports of copper or fiber, and four integrated10GbE SFP+ ports. PoE variants with up to 48 ports of 802.3at (30W) PoE.• Multigig Switches: 1RU switches with up to 48 line-rate 1G/2.5G/ 5G/10GbE copper ports with four integrated 25GbE SFP28 ports. PoE variants with up to 48 portsof 802.3bt (90W) PoE.• 400Gbps stacking bandwidth using two 100GbE QSFP28integrated rear stacking ports.• Available with dual 80PLUS Platinum certified hot swappableinternal power supplies. Optional external power supply to extend PoE budgets on specific models.• Variable speed fan operation helps decrease cooling and power costs.• Energy-Efficient Ethernet and lower power PHYs reduce power to inactive ports and idle links, providing energy savings from the power cord to the port.• Dell EMC Fresh Air compliance for operation in environments up to 113°F (45°C) reduces coolingcosts.Deploying, configuring and managing• USB auto-configuration rapidly deploys the switch without complex TFTP configurations or sendingtechnical staff to remote offices.• Management via an intuitive and familiar CLI, embedded web server (GUI), SNMP-basedmanagement console application (including Dell EMC OpenManage Network Manager), Telnet or serialconnection.• Private VLAN extensions and Private VLAN Edge support.• AAA authorization, TACACS+ accounting and RADIUS support for comprehensive secure access support.• Authentication tiering allows network administrators to tier port authentication methods such as 802.1x, MAC Authentication Bypass and Captive Portal in priorityorder so that a single port can provide flexible access and security.• Achieve high availability and full bandwidth utilization with MLAG and support firmware upgrades withouttaking the network offline.• Layer 3 Advanced IPv4 and IPv6 functionality including BGP, VRF, BFD, PIM-SM/DM/SSM, IGMP/MLD, RIPv1/ v2, OSPFv2/v3• VXLAN support in hardware only ²• MACsec support in N3248PXE-ON hardware only ²2 Can be used if enabled by ON partner network operating system.3 Planned in Roadmap4 Auto-negotiation not supported, using 1G optics require manual configuration and all 4x10G SFP+ or 4x25G SFP28 ports to be set to same speed. 100M speed not supported.5 Auto-negotiation not supported, using 10G cables or optics require manual configuration and all 4x25G SFP28 ports to be set to same speed. 100M/1G speed not supported.Hardware specificationsPhysical2 integrated rear 100GbE QSFP28 stacking ports (except N3208PX-ON)Out-of-band management port(10/100/1000BASE-T)USB (Type A) port for configuration via USB flash driveMicroUSB (Type B) console port (MicroUSB to USB connector cable included)RJ45 console port with RS232 signaling(RJ-45 to female DB-9 connector cable included)Auto-negotiation for speed and flow control Auto-MDI/MDIX, port mirroringFlow-based port mirroring Broadcast storm controlEnergy-Efficient Ethernet per port settings Redundant variable speed fansAir flow: I/O to power supplyPower supply:Integrated 320W (N3208PX-ON),550W (N3224T-ON, N3224F-ON,N3248TE-ON, N3248X-ON),1050W (N3224P-ON, N3248P-ON),1600W (N3224PX-ON, N3248PXE-ON)Dual firmware images on-boardSwitching engine model: Store and forwardChassisSize (1RU, H x W x D):N3208PX-ON: 1.71 in x 11 in x 12.28 in;All other models: 1.71 in x 17.09 in x 15.75 in (power supply/fan tray handle adds add’l 1.18 in)Approximate weight (Switch with 1 PSU installed):8.44lbs/3.83kg (N3208PX-ON),13.75lbs/6.24kg (N3224T-ON),14.25lbs/6.46kg (N3224F-ON),15.6lbs/7.08kg(N3224P-ON),16lbs/7.26kg (N3224PX-ON,15.4lbs/6.99kg (N3248TE-ON),16.7lbs/7.57kg (N3248P-ON),16.1lbs/7.3kg (N3248X-ON),17.6lbs/7.98kg (N3248PXE-ON)2-post rack mounting kitEnvironmentalPower supply efficiency: 87% or better in all operating modesMax. thermal output (BTU/hr):2821 (N3208PX-ON), 686 (N3224T-ON), 764 (N3224F-ON), 3220 (N3224P-ON), 9344 (N3224PX-ON), 723 (N3248TE-ON), 5719 (N3248P-ON), 1637 (N3248X-ON), 18224 (N3248PXE-ON)Power consumption max (watts):900 (N3208PX-ON), 201 (N3224T-ON),224 (N3224F-ON), 944 (N3224P-ON),2740 (N3224PX-ON), 212 (N3248TE-ON), 1677 (N3248P-ON), 480 (N3248X-ON), 5344 (N3248PXE-ON)Operating temperature: 32° to 113°F (0° to 45°C)Operating relative humidity: 95%Storage temperature: –40° to 158°F(–40° to 70°C)Storage relative humidity: 95%PerformanceCPU memory: 4GBSSD: 8GB (32GB for N3248TE-ON)Packet buffer memory:8MB (4MB for N3208PX-ON and 32MB forN3248X-ON and N3248PXE-ON)Switch fabric capacity (full-duplex):88Gbps (N3208PX-ON),528Gbps (N3224T-ON, N3224F-ON,N3224P-ON),576Gbps (N3248TE-ON, N3248P-ON),1080Gbps (N3224PX-ON),1560Gbps (N3248X-ON, N3248PXE-ON)Forwarding rate:122Mpps (N3208PX-ON),733Mpps (N3224T-ON, N3224F-ON,N3224P-ON),800Mpps (N3248TE-ON, N3248P-ON),1500Mpps (N3224PX-ON),2167Mpps (N3248X-ON, N3248PXE-ON)Line-rate Layer 2 switching: All (non-blocking)Line-rate Layer 3 routing: All (non-blocking)Network Operating System specificationsSoftware specifications listed below areapplicable for OS6. For detailed specificationsof NOS, please contact your Dell Technologiesrepresentative.Scaling performanceMAC addresses: 32KLink aggregation:128 LAG groups, 144 dynamic ports perstack, 8 member ports per LAGPriority queues per port: 8Static routes: 1,024 (IPv4)/1,024 (IPv6)Dynamic routes: 8,158 (IPv4)/4,096 (IPv6)OSPF routing interfaces: 8,158RIP routing interfaces: 512ECMP next hops per route: 16ECMP groups: 1024VLAN routing interfaces: 128VLANs supported: 4,094Protocol-based VLANs: SupportedMulticast forwarding entries:1,536 (IPv4), 512 (IPv6)ARP entries: 6,144NDP entries: 2,560Access control lists (ACL): SupportedMAC and IP-based ACLs: SupportedTime-controlled ACLs: SupportedMax number of ACLs: 100Max ACL rules system-wide: 3,914Max rules per ACL: 1,023Max ACL rules per interface (IPv4):1,023 (ingress), 511 (egress)Max ACL rules per interface (IPv6):1,021 (ingress), 509 (egress)Max VLAN interfaces with ACLs applied: 24IEEE compliance802.1AB LLDPDell Voice VLANDell ISDP802.1D Bridging, Spanning Tree802.1p Ethernet Priority (User Provisioningand Mapping)Dell Adjustable WRR and Strict QueueScheduling802.1Q VLAN Tagging, Double VLANTagging, GVRP802.1S Multiple Spanning Tree (MSTP)802.1v Protocol-based VLANs802.1W Rapid Spanning Tree (RSTP)Dell RSTP-Per VLANDell Spanning tree optional features: STProot guard, BPDU guard, BPDUfiltering802.1X Network Access Control, Auto VLAN802.2 Logical Link Control802.3 10BASE-T802.3ab Gigabit Ethernet (1000BASE-T)802.3ac Frame Extensions for VLANTagging802.3ad Link Aggregation with LACP802.3at PoE (N3224P-ON, N3248P-ON,N3208PX-ON, N3224PX-ON,N3248PXE-ON)802.3bt PoE (N3208PX-ON, N3224PX-ON,N3248PXE-ON)802.3AX LAG Load BalancingDell Multi-Chassis LAG (MLAG)Dell Policy Based Forwarding802.3az Energy Efficient Ethernet (EEE)802.3u Fast Ethernet (100BASE-TX) onmanagement ports802.3x Flow Control802.3z Gigabit Ethernet (1000BASE-X)802.3bz 1G/2.5G/5G/10GANSI LLDP-MED (TIA-1057)Dell EqualLogic iSCSI Auto-configurationMTU 9,216 bytesGeneral Internet protocolsGeneral Internet protocols are supported.For a detailed list, please contact your DellTechnologies representative.General IPv4 protocolsGeneral IPv4 protocols are supported. Fora detailed list, please contact your DellTechnologies representative.General IPv6 protocolsGeneral IPv6 protocols are supported. Fora detailed list, please contact your DellTechnologies representative.Layer 3 functionality1058 RIPv11724 RIPv2 MIB Extension1765 OSPF DB overflow1850 OSPF MIB2082 RIP-2 MD5 Auth2328 OSPFv22338 VRRP2370 OpaqueDell Policy Based Routing2453 RIPv22740 OSPFv32787 VRRP MIB3101 NSSA3137 OSPF Stub Router Advert3623 Graceful Restart3768 VRRP4271 BGP5187 OSPFv3 Graceful Routing RestartMulticast1112 IGMPv12236 IGMPv22365 Admin scoped IP2710 MLDv12932 IPv4 MIB2933 IGMP MIB3810 MLDv23973 PIM-DM4541 IGMP v1/v2/v3 Snooping and Querier5060 PIM MIB5061 PIM MIB3376 IGMPv3Dell Static IP MulticastDraft-ietf-pim-sm-bsr-05Draft-ietf-idmr-dvmrp-v3-10 DVMRPDraft-ietf-magma-igmp-proxy-06.txtIGMP/MLD ProxyingDraft-ietf-magma-igmpv3-and-routing-05.txtdraft-ietf-idmr-dvmrp-mib-11draft-ietf-magma-mgmd-mib-05draft-ietf-pim-bsr-mib-06IEEE 802.1ag draft 8.1 – Connectivity FaultManagement (CFM)IEEE 802.1p GMRP Dynamic L2 MulticastRegistrationQuality of service2474 DiffServ Field2475 DiffServ Architecture2597 Assured Fwd PHBDell Port Based QoS Services (TCP/UDP) ModeDell Red/WREDDell Flow Based QoS ServicesDell Audio Video Bridging Mode (IPv4/IPv6)Dell UDLD2697 srTCM4115 trTCMNetwork Management and SecurityDell L4 Trusted Mode1155 SMIv11157 SNMPv11212 Concise MIB Definitions1213 MIB-II1215 SNMP Traps1286 Bridge MIB1442 SMIv21451 Manager-to-Manager MIB1492 TACACS+1493 Managed objects for Bridges MIB 1573 Evolution of Interfaces1612 DNS Resolver MIB Extensions1643 Ethernet-like MIB1757 RMON MIB1867 HTML/2.0 Forms with file uploadextensions1901 Community-based SNMPv21907 SNMPv2 MIB1908 Coexistence between SNMPv1/v2 2011 IP MIB2012 TCP MIB2013 UDP MIB2068 HTTP/1.12096 IP Forwarding Table MIB2233 Interfaces Group using SMIv22246 TLS v12271 SNMP Framework MIB 2295 Transport Content Negotiation2296 Remote Variant Selection2576 Coexistence between SNMPv1/v2/v32578 SMIv22579 Textual Conventions for SMIv22580 Conformance Statements for SMIv22613 RMON MIB2618 RADIUS Authentication MIB2620 RADIUS Accounting MIB2665 Ethernet-like Interfaces MIB2666 Identification of Ethernet chipsets2674 Extended Bridge MIB2737 ENTITY MIB2818 HTTP over TLS2819 RMON MIB (groups 1, 2, 3, 9)2856 Text Conv. For High Capacity DataTypes2863 Interfaces MIB2865 RADIUS2866 RADIUS Accounting2868 RADIUS Attributes for Tunnel Prot.2869 RADIUS Extensions3410 Internet Standard Mgmt. Framework3411 SNMP Management Framework3412 Message Processing and Dispatching3413 SNMP Applications3414 User-based security model3415 View-based control model3416 SNMPv23417 Transport Mappings3418 SNMP MIB3577 RMON MIB3580 802.1X with RADIUS3737 Registry of RMON MIB4086 Randomness Requirements4113 UDP MIB4251 SSHv2 Protocol4252 SSHv2 Authentication4253 SSHv2 Transport4254 SSHv2 Connection Protocol4419 SSHv2 Transport Layer Protocol4521 LDAP Extensions4716 SECSH Public Key File Format5246 TLS v1.26101 SSL6398 IP Router AlertDell Enterprise MIB supporting routingfeaturesdraft-ietfhubmib- etherifmib- v3-00.txt (ObsoletesRFC 2665)Other certificationsN-Series products have the necessary featuresto support a PCI compliant network topology.Regulatory, environment and othercomplianceSafety and emissionsAustralia/New Zealand: ACMA RCA Class ACanada: ICES Class A; cULChina: CCC Class A; NALEurope: CE Class AJapan: VCCI Class AUSA: FCC Class A; NRTL UL; FDA 21 CFR1040.10 and 1040.11Eurasia Customs Union: EAC Germany: GSmarkProduct meets EMC and safety standards inmany countries inclusive of USA, Canada,EU, Japan, China. For more country-specificregulatory information, and approvals, pleasesee your Dell Technologies representative.RoHSProduct meets RoHS compliance standards inmany countries inclusive of USA, EU, China,and India. For more country-specific RoHScompliance information, please see your DellTechnologies representative.EU WEEEEU Battery DirectiveREACHEnergyJapan: JEL© 2021 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. IT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, with innovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & DesignLet us analyze your multivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running fast.EducateEnsure your staff builds the right skills for long-term success. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic ITenvironments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remotemonitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at/ServicesContact a Dell Technologies ExpertView more resourcesJoin the conversationwith@DellNetworkingLearn more about Dell EMC Networking solutions。

德尔·韦玛网络S4048T-ON交换机说明书

德尔·韦玛网络S4048T-ON交换机说明书

The Dell EMC Networking S4048T-ON switch is the industry’s latest data center networking solution, empowering organizations to deploy modern workloads and applications designed for the open networking era. Businesses who have made the transition away from monolithic proprietary mainframe systems to industry standard server platforms can now enjoy even greater benefits from Dell EMC open networking platforms. By using industry-leading hardware and a choice of leading network operating systems to simplify data center fabric orchestration and automation, organizations can tailor their network to their unique requirements and accelerate innovation.These new offerings provide the needed flexibility to transform data centers. High-capacity network fabrics are cost-effective and easy to deploy, providing a clear path to the software-defined data center of the future with no vendor lock-in.The S4048T-ON supports the open source Open Network Install Environment (ONIE) for zero-touch installation of alternate network operating systems, including feature rich Dell Networking OS.High density 1/10G BASE-T switchThe Dell EMC Networking S-Series S4048T-ON is a high-density100M/1G/10G/40GbE top-of-rack (ToR) switch purpose-builtfor applications in high-performance data center and computing environments. Leveraging a non-blocking switching architecture, theS4048T-ON delivers line-rate L2 and L3 forwarding capacity within a conservative power budget. The compact S4048T-ON design provides industry-leading density of 48 dual-speed 1/10G BASE-T (RJ45) ports, as well as six 40GbE QSFP+ up-links to conserve valuable rack space and simplify the migration to 40Gbps in the data center core. Each40GbE QSFP+ up-link can also support four 10GbE (SFP+) ports with a breakout cable. In addition, the S4048T-ON incorporates multiple architectural features that optimize data center network flexibility, efficiency and availability, including I/O panel to PSU airflow or PSU to I/O panel airflow for hot/cold aisle environments, and redundant, hot-swappable power supplies and fans. S4048T-ON supports feature-rich Dell Networking OS, VLT, network virtualization features such as VRF-lite, VXLAN Gateway and support for Dell Embedded Open Automation Framework.• The S4048T-ON is the only switch in the industry that supports traditional network-centric virtualization (VRF) and hypervisorcentric virtualization (VXLAN). The switch fully supports L2 VX-• The S4048T-ON also supports Dell EMC Networking’s Embedded Open Automation Framework, which provides enhanced network automation and virtualization capabilities for virtual data centerenvironments.• The Open Automation Framework comprises a suite of interre-lated network management tools that can be used together orindependently to provide a network that is flexible, available andmanageable while helping to reduce operational expenses.Key applicationsDynamic data centers ready to make the transition to software-defined environments• High-density 10Gbase-T ToR server access in high-performance data center environments• Lossless iSCSI storage deployments that can benefit from innovative iSCSI & DCB optimizations that are unique only to Dell NetworkingswitchesWhen running the Dell Networking OS9, Active Fabric™ implementation for large deployments in conjunction with the Dell EMC Z-Series, creating a flat, two-tier, nonblocking 10/40GbE data center network design:• High-performance SDN/OpenFlow 1.3 enabled with ability to inter-operate with industry standard OpenFlow controllers• As a high speed VXLAN Layer 2 Gateway that connects thehypervisor based ovelray networks with nonvirtualized infrastructure Key features - general• 48 dual-speed 1/10GbE (SFP+) ports and six 40GbE (QSFP+)uplinks (totaling 72 10GbE ports with breakout cables) with OSsupport• 1.44Tbps (full-duplex) non-blocking switching fabric delivers line-rateperformance under full load with sub 600ns latency• I/O panel to PSU airflow or PSU to I/O panel airflow• Supports the open source ONIE for zero-touch• installation of alternate network operating systems• Redundant, hot-swappable power supplies and fansDELL EMC NETWORKING S4048T-ON SWITCHEnergy-efficient 10GBASE-T top-of-rack switch optimized for data center efficiencyKey features with Dell EMC Networking OS9Scalable L2 and L3 Ethernet switching with QoS and a full complement of standards-based IPv4 and IPv6 features, including OSPF, BGP and PBR (Policy Based Routing) support• Scalable L2 and L3 Ethernet switching with QoS and a full complement of standards-based IPv4 and IPv6 features, including OSPF, BGP andPBR (Policy Based Routing) support• VRF-lite enables sharing of networking infrastructure and provides L3traffic isolation across tenants• Increase VM Mobility region by stretching L2 VLAN within or across two DCs with unique VLT capabilities like Routed VL T, VLT Proxy Gateway • VXLAN gateway functionality support for bridging the nonvirtualizedand the virtualized overlay networks with line rate performance.• Embedded Open Automation Framework adding automatedconfiguration and provisioning capabilities to simplify the management of network environments. Supports Puppet agent for DevOps• Modular Dell Networking OS software delivers inherent stability as well as enhanced monitoring and serviceability functions.• Enhanced mirroring capabilities including 1:4 local mirroring,• Remote Port Mirroring (RPM), and Encapsulated Remote PortMirroring (ERPM). Rate shaping combined with flow based mirroringenables the user to analyze fine grained flows• Jumbo frame support for large data transfers• 128 link aggregation groups with up to 16 members per group, usingenhanced hashing• Converged network support for DCB, with priority flow control(802.1Qbb), ETS (802.1Qaz), DCBx and iSCSI TLV• S4048T-ON supports RoCE and Routable RoCE to enable convergence of compute and storage on Active FabricUser port stacking support for up to six units and unique mixed mode stacking that allows stacking of S4048-ON with S4048T-ON to providecombination of 10G SFP+ and RJ45 ports in a stack.Physical48 fixed 10GBase-T ports supporting 100M/1G/10G speeds6 fixed 40 Gigabit Ethernet QSFP+ ports1 RJ45 console/management port with RS232signaling1 USB 2.0 type A to support mass storage device1 Micro-USB 2.0 type B Serial Console Port1 8 GB SSD ModuleSize: 1RU, 1.71 x 17.09 x 18.11”(4.35 x 43.4 x 46 cm (H x W x D)Weight: 23 lbs (10.43kg)ISO 7779 A-weighted sound pressure level: 65 dB at 77°F (25°C)Power supply: 100–240V AC 50/60HzMax. thermal output: 1568 BTU/hMax. current draw per system:4.6 A at 460W/100VAC,2.3 A at 460W/200VACMax. power consumption: 460 WattsT ypical power consumption: 338 WattsMax. operating specifications:Operating temperature: 32°F to 113°F (0°C to45°C)Operating humidity: 5 to 90% (RH), non-condensing Max. non-operating specifications:Storage temperature: –40°F to 158°F (–40°C to70°C)Storage humidity: 5 to 95% (RH), non-condensingRedundancyHot swappable redundant powerHot swappable redundant fansPerformance GeneralSwitch fabric capacity:1.44Tbps (full-duplex)720Gbps (half-duplex)Forwarding Capacity: 1080 MppsLatency: 2.8 usPacket buffer memory: 16MBCPU memory: 4GBOS9 Performance:MAC addresses: 160KARP table 128KIPv4 routes: 128KIPv6 hosts: 64KIPv6 routes: 64KMulticast routes: 8KLink aggregation: 16 links per group, 128 groupsLayer 2 VLANs: 4KMSTP: 64 instancesVRF-Lite: 511 instancesLAG load balancing: Based on layer 2, IPv4 or IPv6headers Latency: Sub 3usQOS data queues: 8QOS control queues: 12Ingress ACL: 16KEgress ACL: 1KQoS: Default 3K entries scalable to 12KIEEE compliance with Dell Networking OS9802.1AB LLDP802.1D Bridging, STP802.1p L2 Prioritization802.1Q VLAN T agging, Double VLAN T agging,GVRP802.1Qbb PFC802.1Qaz ETS802.1s MSTP802.1w RSTP802.1X Network Access Control802.3ab Gigabit Ethernet (1000BASE-T)802.3ac Frame Extensions for VLAN T agging802.3ad Link Aggregation with LACP802.3ae 10 Gigabit Ethernet (10GBase-X) withQSA802.3ba 40 Gigabit Ethernet (40GBase-SR4,40GBase-CR4, 40GBase-LR4) on opticalports802.3u Fast Ethernet (100Base-TX)802.3x Flow Control802.3z Gigabit Ethernet (1000Base-X) with QSA 802.3az Energy Efficient EthernetANSI/TIA-1057 LLDP-MEDForce10 PVST+Max MTU 9216 bytesRFC and I-D compliance with Dell Networking OS9General Internet protocols768 UDP793 TCP854 T elnet959 FTPGeneral IPv4 protocols791 IPv4792 ICMP826 ARP1027 Proxy ARP1035 DNS (client)1042 Ethernet Transmission1305 NTPv31519 CIDR1542 BOOTP (relay)1812 Requirements for IPv4 Routers1918 Address Allocation for Private Internets 2474 Diffserv Field in IPv4 and Ipv6 Headers 2596 Assured Forwarding PHB Group3164 BSD Syslog3195 Reliable Delivery for Syslog3246 Expedited Assured Forwarding4364 VRF-lite (IPv4 VRF with OSPF, BGP,IS-IS and V4 multicast)5798 VRRPGeneral IPv6 protocols1981 Path MTU Discovery Features2460 Internet Protocol, Version 6 (IPv6)Specification2464 Transmission of IPv6 Packets overEthernet Networks2711 IPv6 Router Alert Option4007 IPv6 Scoped Address Architecture4213 Basic Transition Mechanisms for IPv6Hosts and Routers4291 IPv6 Addressing Architecture4443 ICMP for IPv64861 Neighbor Discovery for IPv64862 IPv6 Stateless Address Autoconfiguration 5095 Deprecation of T ype 0 Routing Headers in IPv6IPv6 Management support (telnet, FTP, TACACS, RADIUS, SSH, NTP)VRF-Lite (IPv6 VRF with OSPFv3, BGPv6, IS-IS) RIP1058 RIPv1 2453 RIPv2OSPF (v2/v3)1587 NSSA 4552 Authentication/2154 OSPF Digital Signatures Confidentiality for 2328 OSPFv2 OSPFv32370 Opaque LSA 5340 OSPF for IPv6IS-IS1142 Base IS-IS Protocol1195 IPv4 Routing5301 Dynamic hostname exchangemechanism for IS-IS5302 Domain-wide prefix distribution withtwo-level IS-IS5303 3-way handshake for IS-IS pt-to-ptadjacencies5304 IS-IS MD5 Authentication5306 Restart signaling for IS-IS5308 IS-IS for IPv65309 IS-IS point to point operation over LANdraft-isis-igp-p2p-over-lan-06draft-kaplan-isis-ext-eth-02BGP1997 Communities2385 MD52545 BGP-4 Multiprotocol Extensions for IPv6Inter-Domain Routing2439 Route Flap Damping2796 Route Reflection2842 Capabilities2858 Multiprotocol Extensions2918 Route Refresh3065 Confederations4360 Extended Communities4893 4-byte ASN5396 4-byte ASN representationsdraft-ietf-idr-bgp4-20 BGPv4draft-michaelson-4byte-as-representation-054-byte ASN Representation (partial)draft-ietf-idr-add-paths-04.txt ADD PATHMulticast1112 IGMPv12236 IGMPv23376 IGMPv3MSDP, PIM-SM, PIM-SSMSecurity2404 The Use of HMACSHA- 1-96 within ESPand AH2865 RADIUS3162 Radius and IPv63579 Radius support for EAP3580 802.1X with RADIUS3768 EAP3826 AES Cipher Algorithm in the SNMP UserBase Security Model4250, 4251, 4252, 4253, 4254 SSHv24301 Security Architecture for IPSec4302 IPSec Authentication Header4303 ESP Protocol4807 IPsecv Security Policy DB MIBdraft-ietf-pim-sm-v2-new-05 PIM-SMwData center bridging802.1Qbb Priority-Based Flow Control802.1Qaz Enhanced Transmission Selection (ETS)Data Center Bridging eXchange (DCBx)DCBx Application TLV (iSCSI, FCoE)Network management1155 SMIv11157 SNMPv11212 Concise MIB Definitions1215 SNMP Traps1493 Bridges MIB1850 OSPFv2 MIB1901 Community-Based SNMPv22011 IP MIB2096 IP Forwarding T able MIB2578 SMIv22579 T extual Conventions for SMIv22580 Conformance Statements for SMIv22618 RADIUS Authentication MIB2665 Ethernet-Like Interfaces MIB2674 Extended Bridge MIB2787 VRRP MIB2819 RMON MIB (groups 1, 2, 3, 9)2863 Interfaces MIB3273 RMON High Capacity MIB3410 SNMPv33411 SNMPv3 Management Framework3412 Message Processing and Dispatching forthe Simple Network ManagementProtocol (SNMP)3413 SNMP Applications3414 User-based Security Model (USM) forSNMPv33415 VACM for SNMP3416 SNMPv23417 Transport mappings for SNMP3418 SNMP MIB3434 RMON High Capacity Alarm MIB3584 Coexistance between SNMP v1, v2 andv34022 IP MIB4087 IP Tunnel MIB4113 UDP MIB4133 Entity MIB4292 MIB for IP4293 MIB for IPv6 T extual Conventions4502 RMONv2 (groups 1,2,3,9)5060 PIM MIBANSI/TIA-1057 LLDP-MED MIBDell_ITA.Rev_1_1 MIBdraft-grant-tacacs-02 TACACS+draft-ietf-idr-bgp4-mib-06 BGP MIBv1IEEE 802.1AB LLDP MIBIEEE 802.1AB LLDP DOT1 MIBIEEE 802.1AB LLDP DOT3 MIB sFlowv5 sFlowv5 MIB (version 1.3)DELL-NETWORKING-SMIDELL-NETWORKING-TCDELL-NETWORKING-CHASSIS-MIBDELL-NETWORKING-PRODUCTS-MIBDELL-NETWORKING-SYSTEM-COMPONENT-MIBDELL-NETWORKING-TRAP-EVENT-MIBDELL-NETWORKING-COPY-CONFIG-MIBDELL-NETWORKING-IF-EXTENSION-MIBDELL-NETWORKING-FIB-MIBIT Lifecycle Services for NetworkingExperts, insights and easeOur highly trained experts, withinnovative tools and proven processes, help you transform your IT investments into strategic advantages.Plan & Design Let us analyze yourmultivendor environment and deliver a comprehensive report and action plan to build upon the existing network and improve performance.Deploy & IntegrateGet new wired or wireless network technology installed and configured with ProDeploy. Reduce costs, save time, and get up and running cateEnsure your staff builds the right skills for long-termsuccess. Get certified on Dell EMC Networking technology and learn how to increase performance and optimize infrastructure.Manage & SupportGain access to technical experts and quickly resolve multivendor networking challenges with ProSupport. Spend less time resolving network issues and more time innovating.OptimizeMaximize performance for dynamic IT environments with Dell EMC Optimize. Benefit from in-depth predictive analysis, remote monitoring and a dedicated systems analyst for your network.RetireWe can help you resell or retire excess hardware while meeting local regulatory guidelines and acting in an environmentally responsible way.Learn more at/lifecycleservicesLearn more at /NetworkingDELL-NETWORKING-FPSTATS-MIBDELL-NETWORKING-LINK-AGGREGATION-MIB DELL-NETWORKING-MSTP-MIB DELL-NETWORKING-BGP4-V2-MIB DELL-NETWORKING-ISIS-MIBDELL-NETWORKING-FIPSNOOPING-MIBDELL-NETWORKING-VIRTUAL-LINK-TRUNK-MIB DELL-NETWORKING-DCB-MIBDELL-NETWORKING-OPENFLOW-MIB DELL-NETWORKING-BMP-MIBDELL-NETWORKING-BPSTATS-MIBRegulatory compliance SafetyCUS UL 60950-1, Second Edition CSA 60950-1-03, Second Edition EN 60950-1, Second EditionIEC 60950-1, Second Edition Including All National Deviations and Group Differences EN 60825-1, 1st EditionEN 60825-1 Safety of Laser Products Part 1:Equipment Classification Requirements and User’s GuideEN 60825-2 Safety of Laser Products Part 2: Safety of Optical Fibre Communication Systems FDA Regulation 21 CFR 1040.10 and 1040.11EmissionsInternational: CISPR 22, Class AAustralia/New Zealand: AS/NZS CISPR 22: 2009, Class ACanada: ICES-003:2016 Issue 6, Class AEurope: EN 55022: 2010+AC:2011 / CISPR 22: 2008, Class AJapan: VCCI V-3/2014.04, Class A & V4/2012.04USA: FCC CFR 47 Part 15, Subpart B:2009, Class A RoHSAll S-Series components are EU RoHS compliant.CertificationsJapan: VCCI V3/2009 Class AUSA: FCC CFR 47 Part 15, Subpart B:2009, Class A Available with US Trade Agreements Act (TAA) complianceUSGv6 Host and Router Certified on Dell Networking OS 9.5 and greater IPv6 Ready for both Host and RouterUCR DoD APL (core and distribution ALSAN switch ImmunityEN 300 386 V1.6.1 (2012-09) EMC for Network Equipment\EN 55022, Class AEN 55024: 2010 / CISPR 24: 2010EN 61000-3-2: Harmonic Current Emissions EN 61000-3-3: Voltage Fluctuations and Flicker EN 61000-4-2: ESDEN 61000-4-3: Radiated Immunity EN 61000-4-4: EFT EN 61000-4-5: SurgeEN 61000-4-6: Low Frequency Conducted Immunity。

容错纠错存在的问题及对策

容错纠错存在的问题及对策

容错纠错存在的问题及对策简介:随着科技的不断发展,人们对于容错纠错技术的需求也越来越高。

然而,尽管容错纠错技术在很多领域都有广泛的应用,但仍然存在一些问题需要解决。

本文将讨论容错纠错存在的问题,并提出相应的对策。

一、容错纠错存在的问题1.1 难以100%保证数据完整性容错纠错技术可以通过增加冗余信息来确保数据在传输或存储过程中不丢失或损坏,但并不能完全保证数据的完整性。

无论是硬盘存储还是网络传输,都存在一定概率出现错误。

这就意味着在极小概率情况下,数据仍可能会丢失或损坏。

1.2 对系统资源消耗较大为了增加冗余信息和实现容错纠错功能,系统需要额外分配一部分资源用于相关计算和存储。

这样就会导致系统性能降低,并且资源消耗较大。

对于某些对实时性要求较高或资源受限的系统来说,这种消耗可能会成为瓶颈。

1.3 算法复杂度高容错纠错技术所使用的纠错算法往往非常复杂,需要消耗大量的计算资源和时间。

尤其是对于大规模数据传输或存储场景来说,这样的计算复杂度会成为一个挑战。

高复杂度不仅延长了处理时间,还增加了系统出错概率。

二、解决容错纠错存在问题的对策2.1 引入多种容错机制针对数据完整性无法100%保证的问题,可以引入多种容错机制来提高可靠性。

例如,除了使用冗余信息进行错误检测和纠正外,还可以采用备份策略,在不同位置保存数据副本,并定期进行校验。

当发现错误时,可以从备份中恢复数据。

2.2 优化资源分配为了减轻容错技术对系统资源的消耗,可以优化资源分配策略。

根据具体应用场景的需求和系统特点,合理安排计算和存储资源。

通过技术手段对冗余信息进行压缩或编码处理,减少所需的存储空间和计算能力。

2.3 算法优化与硬件协同设计针对算法复杂度高的问题,可以通过算法优化和硬件协同设计来提高运算效率。

在算法层面上,可以通过改进纠错算法的逻辑和流程,优化计算过程。

在硬件层面上,可以采用特定的处理器或硬件加速技术,提升容错纠错技术的执行效率。

双网卡冗余技术

双网卡冗余技术

双网卡冗余技术双网卡冗余服务器典型技术我个人认为使用NIC Express绑定多网卡,在当今这个数据时代具有一定的实际意义,无论是对于互联网服务器还是局域网服务器的用户都有启发,当我们为服务器绑定多网卡形成阵列之后,不仅可以扩大服务器的网络带宽,而且可以有效均衡负载和提高容错能力,避免服务器出现传输瓶颈或者因某块网卡故障而停止服务。

也许你会说,在当今千兆网卡早已普及的时代,还费劲绑定几块百兆网卡做什么?其实绑定多网卡的目的并不是仅仅为了提高带宽,这样做还有一个最大的优点就是多块网卡可以有效增强服务器的负载承受能力和冗余容错能力。

也许你也经历过,当使用单块10M/100M网卡在局域网里拷贝1G以上大文件的时候,经常会出现电脑停止响应,或者速度奇慢接近死机的情况,当多网卡绑定之后,这种情况会得到明显改善。

所谓双网卡,就是通过软件将双网卡绑定为一个IP地址,这个技术对于许多朋友来说并不陌生,许多高档服务器网卡(例如intel8255x系列、3COM服务器网卡等)都具有多网卡绑定功能,可以通过软硬件设置将两块或者多块网卡绑定在同一个IP地址上,使用起来就好象在使用一块网卡,多网卡绑定的优点不少,首先,可以增大带宽,假如一个网卡的带宽是100M,理论上两块网卡就是200M,三块就是300M,当然实际上的效果是不会是这样简单的增加的,不过经实际测试使用多个网卡对于增加带宽,保持带宽的稳定性肯定是有裨益的,如果交换机等相关条件不错的话,这个效果还是很能令人满意;其次,可以形成网卡冗余阵列、分担负载,双网卡被绑定成“一块网卡”之后,同步一起工作,对服务器的访问流量被均衡分担到两块网卡上,这样每块网卡的负载压力就小多了,抗并发访问的能力提高,保证了服务器访问的稳定和畅快,当其中一块发生故障的时候,另一块立刻接管全部负载,过程是无缝的,服务不会中断,直到维修人员到来。

先下载一个软件NICExpress下载完软件,先不忙安装,咱们还是先准备好硬件。

Sophos UTM 产品说明说明书

Sophos UTM 产品说明说明书

Sophos UTM Feature ListGeneral ManagementÌCustomizable dashboardÌRole-based administration: Auditor, read-only and manager for all functionsÌNo-charge, centralized management of multipleUTMs via Sophos UTM Manager (SUM)ÌConfigurable update serviceÌReusable system object definitions for networks, services, hosts, time periods, users and groups, clients and servers ÌPoint & Click IPS rule managementÌSelf-service user portal for one-click VPN setupÌConfiguration change trackingÌManual or fully automated backup and restore optionsÌEmail or SNMP trap notification optionsÌSNMP supportÌOne-time password (OTP) / Two-factor authentication(2FA) supports OATH protocol for WebAdmin, User Portal, SSL VPN, IPSec VPN, HTML5 Portal and SSH Login*ÌOne-click secure access for Sophos customer support** Network Routing and ServicesÌRouting: static, multicast (PIM-SM)and dynamic (BGP, OSPF)ÌNAT static, masquerade (dynamic)ÌP rotocol independent multicast routing with IGMP snooping ÌBridging with STP support and ARP broadcast forwarding ÌW AN link balancing: 32 Internet connections, auto-link health check, automatic failover, automatic andweighted balancing and granular multipath rulesÌZ ero-config active/passive high- availabilityÌA ctive/active clustering for up to 10 appliancesÌ802.3ad interface link aggregationÌQoS with full control over bandwidth pools anddownload throttling using Stochastic Fairness Queuingand Random Early Detection on inbound trafficÌF ull configuration of DNS, DHCP and NTPÌS erver load balancingÌI Pv6 supportÌR ED supportÌVLAN DHCP support and tagging**ÌMultiple bridge support**Network ProtectionÌStateful deep packet inspection firewallÌIntrusion protection: Deep packet inspectionengine, 18,000+ patternsÌSelective IPS patterns for maximumperformance and protectionÌIPS pattern aging algorithm for optimal performance*ÌFlood protection: DoS, DDoS and portscan blockingÌCountry blocking by region or individual country(over 360 countries) with separate inbound/outbound settings and exceptionsÌSite-to-site VPN: SSL, IPSec, 256- bit AES/3DES,PFS, RSA, X.509 certificates, pre-shared keyÌRemote access: SSL, IPsec, iPhone/iPad/Cisco VPN client supportÌVoIP handling for SIP and H.323 connectionsÌConnection tracking helpers: FTP, IRC, PPTP, TFTPÌIdentity-based rules and configuration withAuthentication Agent for usersAdvanced Threat Protection*ÌDetect and block network traffic attempting tocontact command and control servers usingDNS, AFC, HTTP Proxy and firewallÌIdentify infected hosts on the network Sandstorm Protection***ÌCloud-based sandbox to detect, block and gain visibility into evasive zero-day targeted attacks in active content such as executables, PDFs, Office Documents, and more ÌPreviously unseen suspicious files aredetonated in the cloud-sandbox and monitoredbefore being released to the end-userÌComplete reporting on all suspicious file activityincluding detailed sandbox analysis results AuthenticationÌTransparent, proxy authentication (NTLM/Kerberos) or client authenticationÌAuthentication via: Active Directory, eDirectory,RADIUS, LDAP and TACACS+ÌSingle sign-on: Active directory, eDirectoryÌSophos Transparent Authentication Suite (STAS)provides AD agent for transparent reliable SSOauthentication with Microsoft Active Directory***ÌSSL supportÌTools: server settings check, username/passwordtesting and authentication cache flushÌGraphical browser for users and groupsÌAutomatic user creationÌScheduled backend synchronization prefetchÌComplex password enforcementWeb ProtectionÌURL Filter database with 35 million+ sitesin 96 categories and 65+ languagesÌApplication Control: Accurate signatures andLayer 7 patterns for thousands of applicationsÌDynamic application control based onproductivity or risk thresholdÌView traffic in real-time, choose to block or shapeÌMalware scanning: HTTP/S, FTP and web-based email via dual independent antivirus engines (Sophos & Avira) block all forms of viruses, web malware, trojans and spywareÌFully transparent HTTPS filtering of URLs*ÌOption for selective HTTPS Scanning of untrusted sites**ÌAdvanced web malware protectionwith JavaScript emulation*ÌLive Protection real-time in-the-cloud lookupsfor the latest threat intelligenceÌPotentially unwanted application (PUA) download blocking*ÌMalicious URL reputation filtering backed by SophosLabs ÌReputation threshold: set the reputation threshold awebsite requires to be accessible from internal networkÌActive content filter: File extension, MIME type,JavaScript, ActiveX, Java and FlashÌTrue-File-Type detection/scan within archive files**ÌYouTube for Schools enforcementÌSafeSearch enforcementÌGoogle Apps enforcement*Web PolicyÌAuthentication: Active Directory, eDirectory,LDAP, RADIUS, TACACS+ and local databaseÌSingle sign-on: Active Directory,eDirectory, Apple Open DirectoryÌProxy Modes: Standard, (Fully) Transparent, Authenticated, Single sign-on and Transparent with AD SSO*ÌTransparent captive portal with authenticationÌSupport for separate filtering proxies in different modesÌTime, user and group-based access policiesÌBrowsing quota time policies and quota reset option**ÌAllow temporary URL filter overrides with authentication ÌClient Authentication Agent for dedicated per-user tracking ÌCloning of security profilesÌCustomizable user-messages for events in local languages ÌCustom HTTPS verification CA supportÌSetup wizard and context sensitive online helpÌCustomizable block pagesÌCustom categorization to override categoriesor create custom categories*ÌSite tagging for creating custom site categories**ÌAuthentication and filtering options by device typefor iOS, Android, Mac, Windows and others*ÌPolicy testing tool for URLs, times,users and other parameters*Email ProtectionÌReputation service with spam outbreak monitoring based on patented Recurrent-Pattern-Detection technologyÌAdvanced spam detection techniques: RBL, heuristics,SPF checking, BATV, URL scanning, grey listing, RDNS/HELO checks, expression filter and recipient verification ÌBlock spam and malware during the SMTP transaction ÌDetects phishing URLs within e-mailsÌGlobal & per-user domain and address black/white lists ÌRecipient Verification against Active Directory accountÌE-mail scanning with SMTP and POP3 supportÌDual antivirus engines (Sophos & Avira)ÌTrue-File-Type detection/scan within archive files**ÌScan embedded mail formats: Block maliciousand unwanted files with MIME type checkingÌQuarantine unscannable or over-sized messagesÌFilter mail for unlimited domains and mailboxesÌAutomatic signature and pattern updatesÌSophos Live Anti-Virus real-time cloud lookups** Email Encryption and DLPÌPatent-pending SPX encryption for one-way message encryption*ÌRecipient self-registration SPX password management**ÌAdd attachments to SPX secure replies**ÌTransparent en-/decryption and digitalsigning for SMTP e-mailsÌCompletely transparent, no additionalsoftware or client requiredÌSupports S/MIME, OpenPGP, and TLS standardsÌPGP key server supportÌAllows content/virus scanning even for encrypted e-mails ÌCentral management of all keys and certificates- no key or certificate distribution requiredÌDLP engine with automatic scanning of emailsand attachments for sensitive data*ÌPre-packaged sensitive data type contentcontrol lists (CCLs) for PII, PCI, HIPAA, andmore, maintained by SophosLabs*Email ManagementÌUser-quarantine reports mailed outdaily at customizable timesÌLog Management service supportÌCustomizable User Portal for end-usermail management, in 15 languagesÌAnonymization of reporting data to enforce privacy policy ÌOver 50 Integrated reportsÌPDF and CSV exporting of reportsÌCustomizable email footers and disclaimersÌSetup wizard and context sensitive online helpÌEmail header manipulation support**End-User PortalÌSMTP quarantine: view and releasemessages held in quarantineÌSender blacklist/whitelistÌHotspot access informationÌDownload the Sophos Authentication Agent (SAA)ÌDownload remote access clientsoftware and configuration filesÌHTML5 VPN portal for opening clientless VPN connections to predefined hosts using predefined servicesÌDownload HTTPS Proxy CA certificatesVPNÌPPTP, L2TP, SSL, IPsec, HTML5-based and Ciscoclient-based remote user VPNs, as well as IPsec, SSL,Amazon VPC-based site-to-site tunnels and SophosRemote Ethernet Device (RED) plug-and-play VPNÌIPv6 SSL VPN support***VPN IPsec ClientÌAuthentication: Pre-Shared Key (PSK), PKI(X.509), Smartcards, Token and XAUTHÌEncryption: AES (128/192/256), DES, 3DES(112/168), Blowfish, RSA (up to 2048 Bit), DHgroups 1/2/5/14, MD5 and SHA-256/384/512ÌIntelligent split-tunneling for optimum traffic routingÌNAT-traversal supportÌClient-monitor for graphical overview of connection status ÌMultilingual: German, English and FrenchÌIPsec Tunnel BindingVPN SSL ClientÌProven SSL-(TLS)-based securityÌMinimal system requirementsÌProfile support for varying levels of accessÌSupports MD5, SHA, DES, 3DES and AESÌWorks through all firewalls, regardless of proxies and NAT ÌSupport for iOS and AndroidClientless VPNÌTrue clientless HTML5 VPN portal for accessingapplications securely from a browser on any device VPN One-ClickÌEasy setup and installations of every client within minutes ÌDownload of client-software, individual configurationfiles, keys and certificates one click away fromthe Security Gateway end-user portalÌAutomatic installation and configuration of the clientÌNo configuration required by end userVPN REDÌCentral Management of all REDappliances from Sophos UTMÌNo configuration: Automatically connectsthrough a cloud-based provisioning serviceÌSecure encrypted tunnel using digital X.509certificates and AES256- encryptionÌRED sites are fully protected by the Network, Weband Mail security subscriptions of the Central UTM.ÌVirtual Ethernet for reliable transfer ofall traffic between locationsÌIP address management with centrally definedDHCP and DNS Server configurationÌRemotely de-authorize RED devicesafter a select period of inactivityÌCompression of tunnel traffic* (RED50, RED 10 revision 2, 3)ÌVLAN port configuration options* (RED 50)ÌSupport for RED 15w with integrated 802.11n WiFi AP*** Secure Wi-FiÌSimple plug-and-play deployment,automatically appearing in the UTMÌCentral monitor and manage all access points (APs) and wireless clients through the built-in wireless controller ÌIntegrated security: All Wi-Fi traffic isautomatically routed through the UTMÌWireless 802.11 b/g/n at 2.4 GHz and 5GHz (AP 50)ÌPower-over-Ethernet 802.3af (AP 30/50)ÌMultiple SSID support: Up to 8ÌStrong encryption supports state-of-the-artwireless authentication including WPA2-Enterpriseand IEEE 802.1X (RADIUS authentication)ÌWireless guest Internet access with customizablesplash pages on your captive portalÌVoucher-based guest access for daily or weekly access ÌTime-based wireless network accessÌWireless repeating and bridging meshednetwork mode with AP 50ÌHotspot backend authentication support*(RADIUS, TACACS, LDAP, AD)ÌAutomatic channel selection background optimization**ÌMulti-tenant hotspot administration**ÌSupport for HTTPS login support**Web Application Firewall ProtectionÌReverse proxyÌURL hardening engineÌForm hardening engineÌDeep-linking controlÌDirectory traversal preventionÌSQL injection protectionÌCross-site scripting protectionÌDual-antivirus engines (Sophos & Avira)ÌHTTPS (SSL) encryption offloadingÌCookie signing with digital signaturesÌPath-based routingÌOutlook anywhere protocol supportÌReverse authentication (offloading) for form-basedand basic authentication for server access*ÌPersistent session cookie support***Web Application Firewall ManagementÌAuto server discovery scans attachednetworks and identifies web serversÌIntegrated load balancer spreadsvisitors across multiple serversÌPredefined firewall profiles for MicrosoftOutlook Web Access (OWA)ÌQuick server switch allows easy maintenanceÌSkip individual checks in a granular fashion as required ÌMatch requests from source networksor specified target URLsÌSupport for logical and/or operatorsÌAssists compatibility with various configurationsand non-standard deploymentsÌOptions to change WAF performance parameters**ÌUpload custom WAF rules**ÌScan size limit option**ÌAllow/Block IP ranges**ÌWildcard support for server paths**ÌAutomatically append a prefix/suffix for authentication** UTM Endpoint ProtectionÌWindows endpoint protection with SophosAntivirus and device controlÌOn-access, on-demand or scheduled scanningfor malware, viruses, spyware and TrojansÌPUA scanningÌLive Protection Antivirus provides real-time, in-the-cloud lookups for the latest threat intelligenceÌHIPS with suspicious behavior detectionÌWeb protection with malicious site protectionÌDownload scanningÌDevice control including removable storage, optical media, modems, Bluetooth, wireless, infrared and more * New in UTM Accelerated (9.2)** New in UTM Advantage (9.3)*** New in UTM Elevated (9.4)ÌWeb in Endpoint enforcement of web policy and webmalware scanning on the endpoint with full policyand reporting synchronization with the UTMUTM Endpoint ManagementÌFully managed within the UTMÌEasy deployment from the UTM using using our installer ÌMonitor connected endpoints, threat statusand device utilization with full log accessÌAlerts for infected endpoints*SEC Endpoint Integration*ÌI ntegration with Sophos Enterprise ConsoleEndpoint Management provides UTM webpolicy and reporting for Web in EndpointLogging and ReportingÌLogging: Remote syslog, nightly rotation, email/ftp/SMB/SSH archiving and log management serviceÌOn-box reporting: Packet filter, intrusion protection,bandwidth and day/week/month/year scalesÌIdentity-based reportingÌPDF or CSV report exportingÌE xecutive report scheduling and archivingÌR eactive reporting engine crafts reports as you click on data ÌS ave, instantly email or subscribe recipients to any reports ÌP DF and CSV exporting of reportsÌN ightly compression and rotation of logsÌL og file archiving: On-box, FTP, SMB, SSH, Email and Syslog ÌH undreds of on-box reportsÌD aily activity reportingÌU RL filter override reportÌP er-user tracking and auditingÌA nonymization of reporting data to enforce privacy policy ÌF ull transaction log of all activity in human-readable formatUnited Kingdom and Worldwide Sales Tel: +44 (0)8447 671131Email:****************North American SalesToll Free: 1-866-866-2802Email:******************Australia and New Zealand SalesTel: +61 2 9409 9100Email:****************.auAsia SalesTel: +65 62244168Email:********************Oxford, UK | Boston, USA© Copyright 2016. Sophos Ltd. All rights reserved.Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners.1129-02.13DD.dsna.simple。

负载均衡load balance的英文缩写

负载均衡load balance的英文缩写

负载均衡load balance的英文缩写Title: Load Balance (LB): The Cornerstone of Efficient Resource ManagementIntroductionIn the realm ofputing and networking, one term that frequently crops up is "Load Balance" or LB for short. This concept plays a pivotal role in optimizing resource utilization, enhancing system performance, and ensuring fault tolerance. In this article, we will delve into the intricacies of load balancing, its significance, and how it contributes to efficient resource management.What is Load Balancing?Load balancing refers to the methodical distribution of network traffic across multiple servers to optimize resource utilization, enhance responsiveness, and avoid overloading any single server. It is an essentialponent of fault-tolerant systems as it ensures that no single point of failure exists.The Importance of Load BalancingThe importance of load balancing can be summed up in three main points:1. Improved Performance: By distributing the workload evenly across multiple servers, each server operates within its optimal capacity, leading to better overall system performance.2. Enhanced Availability: If one server fails or needs maintenance, the load balancer redirects traffic to other available servers, thereby ensuring continuous service availability.3. Scalability: As the demand for services increases, new servers can be added to the system without disrupting existing services. This allows for easy expansion and scalability of the system.How does Load Balancing Work?Load balancing typically involves the use of a software or hardware device called a load balancer. The load balancer acts as a traffic cop, directing client requests to the various backend servers based on certain predefined algorithms and policies. These algorithms may consider factors such as server availability, server load, geographic location, or specific application requirements.Types of Load Balancing AlgorithmsThere are several types of load balancing algorithms, including:1. Round Robin: Each iing request is assigned to the next available server in a rotation.2. Least Connections: New requests are sent to the server with the fewest active connections.3. IP Hash: A hash function is used to determine which server should handle a request based on the client's IP address.4. Weighted Algorithms: Servers are assigned weights based on their processing power or capacity, and requests are distributed accordingly.ConclusionLoad balancing (LB) is a crucial aspect of modernputing and networking infrastructure. Its ability to distribute workloads efficiently, ensure high availability, and facilitate scalability makes it an indispensable tool for managing resources effectively. Understanding the concepts and mechanisms behind load balancing can help organizations make informed decisions about their IT infrastructure and improve the overall user experience.。

reliablemulticast protocol协议(一)

reliablemulticast protocol协议(一)

reliablemulticast protocol协议(一)Reliable Multicast Protocol1. IntroductionThe Reliable Multicast Protocol (RMP) is designed to provide efficient and reliable multicast communication for various applications. It aims to deliver multicast data to a group of recipients while ensuring reliable and ordered delivery. This protocol is particularly useful in scenarios where multiple recipients need to receive the same data simultaneously without any loss or duplication.2. Protocol OverviewThe RMP operates on a client-server architecture. The server sends multicast data to a group of clients, and the clients receive and process the data. The protocol guarantees the reliable delivery of data through various mechanisms such as acknowledgment, retransmission, and ordering.3. Protocol ComponentsThe RMP consists of the following main components:3.1. SenderThe sender is responsible for transmitting multicast data to a group of clients. It breaks the data into smaller chunks, assigns sequence numbers to each chunk, and sends them to the multicast address. The sender also maintains a list of unacknowledged chunks for retransmission purposes.3.2. ReceiverThe receiver is responsible for receiving and processing multicast data from the sender. It acknowledges the received chunks and requests retransmission for any missing orcorrupted chunks. The receiver also ensures the correct ordering of chunks based on sequence numbers.3.3. Group ManagementThe group management component handles the registration and removal of clients from the multicast group. It maintains a list of active clients and updates it as clients join or leave the group. This component ensures that multicast datais only sent to active clients.4. Protocol WorkflowThe RMP follows the following workflow:1.Sender sends multicast data to the group address.2.Receiver(s) join the multicast group and start listeningfor data.3.Receiver acknowledges the received chunks by sendingacknowledgment messages to the sender.4.Sender receives acknowledgments and updates the list ofunacknowledged chunks.5.If any chunks are not acknowledged within a specifiedtimeout period, the sender retransmits them to the group.6.Receiver continues to receive data, acknowledge it, andrequest retransmission if necessary.7.When the receiver receives all the expected chunks, itsignals the completion of data delivery.5. Protocol FeaturesThe RMP offers the following features:•Reliability: The protocol ensures that multicast data is reliably delivered to all active clients without loss orduplication.•Ordered Delivery: The protocol maintains the correct ordering of mult icast data at the receiver’s end.•Efficiency: The RMP optimizes the use of network resources, minimizing unnecessary retransmissions andconserving bandwidth.•Scalability: The protocol can handle large multicast groups with a large number of clients efficiently. •Dynamic Group Management: The protocol supports the dynamic addition and removal of clients from themulticast group.6. ConclusionThe Reliable Multicast Protocol (RMP) provides a reliable and efficient solution for multicast communication. It ensures that multicast data is delivered without loss or duplication, while maintaining the correct ordering of data. The protocol’s features and components make it suitable for a wide range of applications requiring multicast communication.7. Protocol Implementation7.1. Sender ImplementationThe sender implementation of the RMP involves the following steps:1.Break the data into smaller chunks.2.Assign sequence numbers to each chunk.3.Send the chunks to the multicast group address.4.Maintain a list of unacknowledged chunks.5.Handle acknowledgments by updating the list ofunacknowledged chunks.6.Retransmit any unacknowledged chunks after a specifiedtimeout period.7.2. Receiver ImplementationThe receiver implementation of the RMP involves the following steps:1.Join the multicast group and start listening for data.2.Receive the multicast data chunks.3.Acknowledge the received chunks by sendingacknowledgment messages to the sender.4.Request retransmission for any missing or corruptedchunks.5.Ensure the correct ordering of received chunks based onsequence numbers.6.Signal the completion of data delivery when all expectedchunks are received.7.3. Group Management ImplementationThe group management implementation of the RMP involves the following steps:1.Register clients to the multicast group.2.Update the list of active clients as clients join orleave the group.3.Ensure that multicast data is only sent to activeclients.8. Security ConsiderationsWhen implementing the RMP, the following security considerations should be taken into account: •Authentication: Implement mechanisms to authenticate clients and protect against unauthorized access to themulticast group.•Data Privacy: Use encryption to ensure the privacy of multicast data and prevent unauthorized interception. •Data Integrity: Implement measures to detect and prevent tampering with the multicast data during transmission.•Access Control: Define access control policies to restrict multicast group membership to authorizedclients only.9. ConclusionThe Reliable Multicast Protocol (RMP) provides a comprehensive and efficient solution for reliable multicast communication. Its sender, receiver, and group management components ensure reliable and ordered delivery of multicast data to a group of r ecipients. By following the protocol’s workflow and considering security considerations,applications can benefit from the RMP’s features and enhance their multicast communication capabilities.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

LOAD BALANCING FOR RELIABLE MULTICAST Chao Gong,Ovidiu Daescu,Raja Jothi,Balaji Raghavachari,Kamil SaracDepartment of Computer ScienceUniversity of Texas at DallasRichardson,TX,USA{cxg010700,daescu,raja,rbk,ksarac}@ABSTRACTNew applications emerge along with the rapid growth of the Internet.Many functionalities other than packet for-warding are being proposed to be added into routers for supporting those new applications.Those functionalities significantly improve the performances of the applications, but they incur overheads on routers at the same time.It is a thorny problem to reach a balance between the appli-cation performance and the functionality overhead.In this paper,we study that problem in the context of reliable mul-ticast.We term it load-balanced agent activation problem (LBAAP).We regard the message implosion at multicast session source as the performance and the NAK message suppression agent at router as the functionality.We de-velop a polynomial running time algorithm for the LBAAP problem in single multicast tree case.We conjecture the LBAAP problem in multiple multicast tree case is NP-Hard and propose a heuristic for it.KEY WORDSLoad balancing,Reliable multicast,NAK suppression.1IntroductionReliable multicast provides reliable data transport from a single source to multiple receivers in the Internet.The chief challenge in reliable multicast is scalability.One main difficulty in making reliable multicast scalable is feedback message implosion at the multicast session source.As the number of receivers increases,their feedback messages back to the source will eventually overwhelm the comput-ing resources and even the link bandwidth at the source.The usual approach to ensure reliable delivery in re-liable multicast protocols is Negative Acknowledgement (NAK).That is,receivers send out NAK messages to in-form the source about packet loss.When a packet loss oc-curs close to the source,most of the receivers will detect the loss and send out NAK messages.A large amount of these NAKs can result in implosion at the source.One common approach to avoid feedback message implosion is feedback message suppression.In this scheme,a special functionality,called NAK suppression agent,is set up on internal nodes in a multicast tree.NAK messages are only unicasted from a node to its nearest an-cestor in the multicast tree on which the NAK suppression agent is activated.The ancestor node just forwards one NAK up the tree and suppresses all duplicate NAKs.NAK suppression agents are software modules located at routers. The NAK suppression agent can be turned on(activated)or turned off(deactivated)on a router for a given reliable mul-ticast session passing through that router.The NAK suppression agent is helpful for implosion prevention,which is a key issue in reliable multicast per-formance.But at the same time it incurs memory and pro-cessing overheads on routers and increases the transmis-sion delay of NAK from receiver to source.The NAK suppression agent must store sequence number informa-tion for each outstanding NAK message in order to be able to suppress future duplicate NAKs.NAKs are extracted from IP fast forwarding path for more detailed process at the router where the NAK suppression agent is activated. The NAK suppression agent examines every received NAK to decide whether to forward it upstream or suppress it. Moreover,in order to eliminate the security vulnerability of false NAK[1],the NAK suppression agent needs to de-ploy some authentication mechanism which is time con-suming.Those NAK processing procedures consume the computing resources on routers and result in longer trans-mission delay for NAKs being transferred from receivers to the source.Excessively long delay causes problems such as the possibility that a source will not receive any NAK un-til the corresponding data packet is deleted from the send buffer.Given a multicast tree,the approach to activate NAK suppression agent is a difficult issue.On one hand,a trivial approach which activates NAK suppression agent on each internal node in a multicast tree precludes implosion at the source.But this approach leads to high total memory and processing overheads on those nodes,as well as long NAK transmission delay.On the other hand,activating NAK suppression agent on just a few nodes in a multicast tree reduces the total overheads and transmission delay.But this approach may fail to prevent implosion at the source, or even worse,may overload some nodes with excessive NAK messages and degrade the performance of all traffic through those nodes.If activating NAK suppression agent on a few nodes far away from the root,the source may still suffer implosion;if activating NAK suppression agent on a few nodes near the root,these nodes may be overwhelmed by a large volume of NAKs.Consequently the performance of the multicast session through these nodes may deterio-rate.In the context of multiple multicast trees,the situa-tion becomes more complicated.If many multicast ses-sions pass through a router,the trivial approach mentioned above will activate NAK suppression functionality for all sessions,and the resultant memory requirement will over-load the router.A naive solution to avoid the memory over-load on routers is to deactivate NAK suppression function-ality for one randomly chosen session on the overloaded router.However,such a solution has a deficiency that the casual selection of the session being“dropped”may trig-ger implosion at the source or overload other routers in that session with excessive NAKs.Reaching a compromise between the performance of reliable multicast and the overheads of the functionality supporting reliable multicast is a complex problem.In this paper we explore that problem.Specifically,we study the Load-Balanced Agent Activation Problem(LBAAP): How to determine the number and placement ofNAK suppression agents in order to prevent im-plosion at multicast session sources by incurringthe minimal total memory and processing over-heads on routers and without overloading anyrouter?As far as we know,this problem has not been ad-dressed before.In this paper,we examine the LBAAP problem in different contexts and propose corresponding algorithms.When considering to establish a new service,it is in the concern of Internet Service Providers(ISPs)to reduce their own costs such as keeping routers below certain loads or cutting down traffic.While reliable multicast has not been widely deployed yet,we believe that studying the re-lationship between the performance and overheads of reli-able multicast will foster its deployment.Along with the rapid growth of the Internet,more and more functionalities other than packet forwarding are be-ing proposed to be added into routers for supporting new emerging applications.These applications include web caches[2],content delivery networks[3],multicast com-munication services[4],etc.In addition,the increasing rate of cyber-attacks in the Internet necessitates the devel-opment of effective defense mechanisms,most of which require additional supports from routers[5,6].Those func-tionalities incur non-trivial overheads on the routers host-ing them.Our work is an instance of studying the bal-ance between the application performance supported and the overheads introduced by the additional functionalities at routers.The rest of this paper is organized as follows.In Sec-tion2,we define and analyze the LBAAP problem.We survey related work in Section3.In Section4,we study the LBAAP problem in single tree case and in multiple tree case.In Section5,we discuss the limitations of our pro-posed algorithms in deployment and possible extensions. Finally,we summarize our work in Section6.2Problem FormulationIn this section,we introduce the multicast tree model, definitions,and assumptions used in this paper and de-scribe the LBAAP problem in detail.In NAK suppression scheme,a tree structure is con-structed for each reliable multicast session.In that tree, the leaves represent the receivers,and the rest nodes,called internal nodes,represent the routers which are NAK sup-pression capable and on the multicast forwarding path.The root of the tree denotes the edge router connecting with the multicast session source.If we assume all of the routers in the network are NAK suppression capable,then the tree mentioned above overlaps the raw multicast tree,otherwise it overlays the raw multicast tree.Since the discussion in this paper is based on the tree structure defined above,we refer to it as multicast tree in the following sections.The number of the children of a particular node in a multicast tree is the degree of that node.Assuming in the worst case,one single packet loss near the source makes every receiver emit a NAK message,and every NAK ar-rives at its destination.If a NAK suppression agent is acti-vated on an internal node in a multicast tree,then the degree of that node means the minimal number of NAKs received by that agent in the worst case.For example,consider an internal node v hosting an agent a,the more agents ac-tivated on v’s children which are internal nodes,the less NAKs received by agent a.If an agent is activated on each of the children of v that are internal nodes,then in the worst case,each child that is an internal node just forwards one NAK upstream and suppresses others,and each child that is a leaf sends out one NAK,the number of NAKs received by agent a is the same as the degree of node v.The weight of a node in a multicast tree is defined as follows:if the node is a leaf,its weight is1;if the node is an internal node hosting an agent,its weight is1;otherwise its weight is the sum of the weights of all of its children.We can regard the weight of a node as the number of NAKs sent up the tree from/via that node in the worst case,though it is not always true in an asymmetric network.If an agent is acti-vated on an internal node v which does not host an agent, then the number of NAKs received by the agent on node v in the worst case is the old value of the weight of node v, and the new value of the weight becomes1.The definition of weight is illustrated in Figure1,where the number be-side each node is the weight of the node.In Figure1-a,no agent is activated in the tree,so weight(v2)=1+1=2 and weight(v1)=2+1=3.In Figure1-b,an agent is ac-tivated on node v2,so weight(v2)=1and weight(v1)= 1+1=2.We assume that the multicast session source expects to receive just one NAK for a single packet loss.Hence a NAK suppression agent is always activated on the root of multicast tree in order to guarantee the source to receive no more than one NAK for a single packet loss.We also as-sume a NAK suppression agent supports just one multicast session,then multiple agents need activating on a router in order to handle multiple multicast sessions.The majorityv 2v v 13(a)(b)112131Figure 1.(a)No agent is activated on any internal node.(b)An agent is activated on internal node v 2.of the memory overhead introduced by a NAK suppression agent is the amount of the memory recording the state infor-mation of NAKs,the amount of the memory storing agent’s code itself is negligible.And the processing overhead on a router is not proportional to the number of agents on that router,but the number of arriving NAKs.Hence,assum-ing an agent to support single session or multiple sessions makes little difference to the LBAAP problem.We define the processing overhead introduced by an agent to be the number of the NAKs received by the agent due to a single packet loss in the worst case defined above.The processing overhead on a router is the sum of the processing overheads of all of the agents activated on the router.We assume the memory overhead introduced by an agent is constant,and with value of 1.Hence the memory overhead on a router is the number of the agents activated on the router.In a multicast tree,the sum of the memory overheads introduced by all NAK suppression agents is the number of agents,and the sum of the processing overheads intro-duced by all agents is the total number of the NAK mes-sages received by those agents in the worst case.In the worst case,each receiver sends one NAK message to its nearest NAK suppression agent,and each agent except the one on the root forwards one NAK up to its nearest ances-tor.Therefore the total processing overhead equals the sum of the number of receivers and the number of agents mi-nus 1.So minimizing the number of agents is equivalent to minimizing the total memory and processing overheads on routers.The transmission delay of NAKs from a re-ceiver to the source is proportional to the number of agents on the multicast forwarding path from the source to the re-ceiver.Hence,in most cases,minimizing the number of agents means reducing the NAK transmission delay.The Load-Balanced Agent Activation Problem (LBAAP)can be formulated as below:Given a memory load bound and a processing load bound on routers,the objective is to determine the minimal number of NAK suppression agents and locate the routers to activate those agents such that the memory and processing overheads on each router are not higher than the memory and processing load bounds,respectively.The memory load bound on routers specifies the amount of the memory devoted for the NAK suppression functionality.In other words,how many NAK suppres-sion agents can be activated on a router.The processing load bound on routers indicates the upper limit of the pro-cessing overhead on a router.The processing load bound reflects not only the amount of computing resources avail-able for NAK processing on a router,but also the amount of bandwidth available for receiving NAKs.Given certain memory and processing load bounds on the routers through which a multicast tree pass,minimiz-ing the number of NAK suppression agents means mini-mizing the total memory and processing overheads and re-ducing the NAK transmission delay.In addition,locating routers to activate NAK suppression agent without exceed-ing the specified bounds of memory and processing capa-bility prevents overloading routers and achieves load bal-ancing among routers.In this work,we assume that the multicast tree topol-ogy is already known and relatively stable.Typically ISPs have access to multicast tree information within their do-mains.Our work concerns NAK suppression agent acti-vation within a domain.If a multicast tree spans several domains,our algorithms can be used to find an activation of agents in each domain,for the portion of the multicast tree that spans that domain.In addition,our tracetree pro-posal [7]can be used to collect multicast tree topologies efficiently.Finally,in most applications that use reliable multicast,such as one-to-many file transfer,the set of re-ceivers is mostly static and is known to the source in ad-vance.As a result,the collected tree topology is relatively stable during the application lifetime.3Related WorkIn theoretic aspect,the LBAAP problem resembles two well-known graph theoretic problems:the k -median prob-lem and the facility location problem.Given a graph with n nodes,the k -median problem is to select k out of n nodes as service centers so as to minimize the sum of the cost of each node accessing its nearest service center among those k se-lected nodes.Tamir [8]studies the k -median problem in a tree topology and gives an optimal algorithm.Li et al.[9]use a similar approach to optimally place web proxies in a tree topology with a web server at the root.Qiu et al.[10]study the same problem in a graph topology and propose various heuristics.Krishnan et al.[2]study the problem of optimal placement of web caches.Shah et al.[11]deal with the k -median problem in the context of content-based multicast.In the facility location problem,besides the cost of accessing the nearest service center (facility),there is also a cost of building facility onto a node to make it become a service center,the objective is to find a solution (both the number and locations of the facilities)of the minimal total cost [12].Guha et al.[13]introduce the Load Balanced Facility Location Problem wherein the constraint of having a minimum load on facility nodes is added to the origi-nal problem.They prove that problem is NP-Complete and present a constant factor approximation algorithm for it.In practical aspect,Papadopoulos and Laliotis [14]in-vestigate the performance of reliable multicast under vari-ous deployment strategies of the supporting functionality. In addition,lots of study has been done on the placement of other kinds of functionality agents in the context of re-liable multicast[15,16].The objective of these works is to reduce the number of retransmissions,latency,and re-source utilization.4Load-Balanced Agent Activation Problem We examine the LBAAP problem in both single tree case and multiple tree case,and propose corresponding solu-tions.4.1LBAAP in Single Tree CaseIn the context of a single multicast tree,at most one NAK suppression agent needs to be activated on a router.As long as the memory load bound is not set to be0,the memory overhead introduced by an agent will not overload routers. So we don’t consider the memory overload issue in single tree case.Because the degree of an internal node is the lower limit of the processing overhead introduced by an agent on the node,we assume the processing load bound is never set to be smaller than the degree of any internal node in the tree.The LBAAP problem in single tree case can be defined as follows:Given a multicast tree T rooted at r, with leaves denoting receivers,and internal nodes denot-ing routers.The memory load bound on internal nodes is MB and MB≥1.The processing load bound on internal nodes is P B.The processing overhead on an internal node v is pd(v).The goal is to select a set of internal nodes,R, to activate a NAK suppression agent on each node in R, satisfying the following conditions:1.r∈R,2.∀v∈R,pd(v)≤P B,and3.the size of R is minimal.We first show a canonical activation of agents,then present an algorithm to find such solution in linear time. Given an optimal activation of NAK suppression agent in a multicast tree with a processing load bound P B,we can transform this activation into another optimal activation which satisfies the following two conditions:1.For any internal node v which hosts an agent butwhose parent p does not,if we deactivate the agent on node v,and activate an agent on v’s parent p,then the processing overhead introduced by the agent on p will exceed the processing load bound P B.2.For any internal node v which hosts an agent and hassiblings,the processing overhead on node v is not smaller than the weight of any of its siblings.Given an optimal activation of agent in a multicast tree with a processing load bound P B,we can transform this activation as follows.First we move each agent as high in the multicast tree as possible without violating the load constraint.In other words,if an agent is activated on a node v but no agent is activated on v’s parent p,then it must be the case that if we do not activate the agent on v/*T is multicast tree rooted at r*/ LBAAP(T,PB){/*PB is processing load bound*/nagents:=0pd(r):=ActivateAgent(r)activate NAK suppression agent on rnagents:=nagents+1return nagents}/*activate NAK suppression agent in the subtree rooted at v*/ActivateAgent(v){if v is a leaf node then return weight(v)else{weight(v):=0for each child u of v doweight(v):=weight(v)+ActivateAgent(u)while weight(v)>PB do{select an internal node child u of v with largest weightactivate NAK suppression agent on unagents:=nagents+1pd(u):=weight(u)weight(v):=weight(v)-weight(u)+1weight(u):=1}return weight(v)}}Figure2.Algorithm.The global variable nagents counts the number of agents activated by the algorithm.but activate an agent on its parent p instead,the processing overhead on p,which is the same as the weight of p when no agent is activated on p,will exceed P B.Otherwise,we can do such transformation to obtain a new solution with the same number of agents.Second,we move each agent from the node where it is located to the sibling node whose weight is larger than the processing overhead introduced by the agent on current node,if possible.In other words, if we activate an agent on a child u of a node p,but not on another child v of p,then it must be the case that pd(u)≥weight(v).Otherwise,we do such transformation,then the processing overheads on all ancestor nodes of u remain same or decrease and we can obtain a new solution with the same number of agents.Figure2describes our proposed algorithm.Given a multicast tree T and a processing load bound P B,process multicast tree T from bottom to top,for every internal node v,if weight(v)>P B,select a child node,u,which is an internal node with the largest weight among all such nodes that are children of v,then activate NAK suppres-sion agent on u.After that activation,weight(v)reduces to weight(v)−weight(u)+1,and weight(u)becomes 1.Repeat above operation until weight(v)≤P B,then go to the next node.At last,activate NAK suppression agent on the root of the multicast tree.The correctness of the al-gorithm follows from the argument above on the canonical activation of agents.The running time of the algorithm is O(n·d),n is the number of the internal nodes in the mul-ticast tree,and d is the average degree of all internal nodes.4.2LBAAP in Multiple Tree CaseIn this section we consider the LBAAP problem in the con-text of multiple multicast trees.Suppose multiple multicastsessions pass through a router,if the memory load bound is smaller than the number of sessions,the router can’t ac-tivate NAK suppression agent for every session,it has to choose some of the sessions and does not offer NAK sup-pression support to them.A random selection of the session being“dropped”from a router may make excessive NAK messages flow to the source or some upstream router in that session.That may trigger implosion at the source or overload the upstream router with excessive NAKs.So an intelligent selection of the sessions being served is a must. Since a NAK suppression agent is always activated on the root of multicast tree,we assume no router to be the root of more than MB trees,wherein MB is the memory load bound.In other words,there is not any edge routers con-necting with more than MB multicast session sources.The LBAAP problem in multiple tree case can be defined as follows:Given a graph G=(V,E),with V denoting the set of nodes and E denoting the set of edges connecting the nodes.V h⊂V is the set of hosts and V r=V−V l is the set of routers.T={T1,T2,...T m}is a set of m multicast trees in G.Each tree T i∈T is rooted at r i∈V r.The leaves(receivers)and internal nodes(routers) in each tree belong to V h and V r,respectively.The mem-ory load bound on routers is MB,and the processing load bound on routers is P B.The memory overhead on a router v is md(v),and the processing overhead on v is pd(v). The goal is to select a set of nodes R⊆V r,for∀v∈R, activate n v(n v≥1)agents on it,satisfying the following conditions:1.r i∈R,for1≤i≤m,2.∀v∈R,md(v)≤MB,3.∀v∈R,pd(v)≤P B,and4. v∈R n v is minimal.As we will see in Section4.3,even in a simplified model,the LBAAP problem in multiple tree case turns out to be much harder than the single tree case.We conjecture it is NP-Hard based on the fact that a minor variation of the multi-tree LBAAP problem is NP-hard.Therefore,we focus on computing a feasible solution rather than comput-ing an optimal solution.We propose a heuristic to solve the LBAAP problem in multiple tree case.First at all,we define an operation on tree topology, removing node.Removing a node v from a tree T means to remove node v from tree T,and turn all of the children of v to be the children of v’s parent.The root of tree can not be removed.The heuristic proceeds in two steps:1.Tree Selection:Suppose the number of the multicasttrees passing through a router v is N v.For each node v∈V r,if N v≤MB,then all N v trees are selected as candidates which are supported by node v with NAK suppression agent.Otherwise we need to select MB out of N v trees in the following way.(a)For each tree T i passing through v,if v is theroot of T i,select tree T i as a candidate.(b)After step(a),if the number of candidates issmaller than MB,then for each of the rest trees,remove node v from the tree.Arrange these treesinto a list in decreasing order according to thedegree of the parent of node v in each tree.Se-lect trees from the beginning of the list as a can-didate until the number of candidates increasesto MB.For these trees selected as candidate,undo the operation of removing node v and re-store them to their previous topologies.2.Processing Load Bound Assignment:After makingtree selection for each node v∈V r,each tree remains the same topology or changes to a smaller topology by removing some internal nodes.We assign the pro-cessing load bound L=P BSince the trees in T do not share edges,we can treat each tree T i∈T independently and compute an optimal agent activation for T i using the LBAAP algorithm for sin-gle tree case.Assume this has been done for each tree in T.Then,on each node v,the number of agents is k v(0≤k v≤m)such that each agent supports just one tree.Since an agent may support multiple trees as long as its processing overhead does not exceed L,we would like to minimize the number of agents on each node by making single agent support multiple trees without violat-ing the load constraint,hence minimize the total number of agents.This is an instance of the integer bin packing problem which is known to be NP-Hard[17].5DiscussionThe NAK suppression agent activation algorithms pro-posed in this paper need multicast tree topologies as input. The deployment of these algorithms in practice is in cen-tralized manner.That is,the algorithms are implemented at a central server.The server collects the multicast tree topologies,invokes the algorithms,then commands the rel-evant routers to activate NAK suppression agent.If a mul-ticast group is dynamic,the multicast tree topology varies frequently,then the overheads of the algorithms on com-puting resources and network bandwidth will increase no-ticeably.On one hand,as we mentioned previously,due to the semantics of the applications using reliable multicast,the tree topology of a reliable multicast session is relatively stable during the lifetime of the session.On the other hand, if the structure of a multicast tree changes partially,i.e.,in a subtree,the agent activation algorithms can be applied on the subtree to compute a new activation of agents in the bined with the old activation of agents in the rest of the tree,the new agent activation works for the whole tree.When applying the agent activation algorithms on a subtree instead of the whole tree,the overheads on both computation and bandwidth are reduced.For instance, a router v hosts an agent for a multicast session,when the agent receives more NAKs than its upper limit,router v sends a request to the server to ask for recomputing the ac-tivation of agents in the subtree rooted at v.The server will discover current topology of the subtree,invoke agent acti-vation algorithms,and activate agents in the subtree.Several areas remain to be addressed in future work. One is to generalize the LBAAP problem by allowing dif-ferent nodes to have different load bounds,and develop corresponding algorithms.Another is to develop a NAK suppression agent activation approach which works in dis-tributed manner.6ConclusionIn this paper,we have explored the relationship between the performance of reliable multicast and the overheads of the functionality supporting reliable multicast.In particu-lar,We presented and studied the load-balanced agent acti-vation problem(LBAAP).We regard the implosion as the performance and the NAK suppression agent as the func-tionality.We developed a polynomial running time algo-rithm for the LBAAP problem in single tree case,and pro-posed a heuristic for the LBAAP problem in multiple tree case since we conjecture it is NP-Hard.Reliable multicast is one of many Internet applica-tions that require the aid of various functionality agents on routers.Those functionality agents introduce non-trivial overheads on the routers hosting them.Reaching a compro-mise between the performance of those applications and the overheads incurred by the functionalities supporting those applications is worth delving.References[1]J.Gemmell,T.Montgomery,T.Speakman,N.Bhaskar,andJ.Crowcroft,The PGM reliable multicast protocol,IEEE Network, 17(1),2003,16-22.[2]P.Krishnan,D.Raz,and Y.Shavitt,The cache location problem,IEEE/ACM Transactions on Networking,8(5),2000,568-582. [3] B.Krishnamurthy,C.Wills,and Y.Zhang,On the use and perfor-mance of content distribution networks,Proc.of SIGCOMM Work-shop on Internet Measurement,San Francisco,USA,2001,169-182.[4]K.Almeroth,The evolution of multicast:From the MBone to inter-domain multicast to Internet2deployment,IEEE Network,14(1), 2000,10-20.[5] A.Snoeren,C.Partridge,L.Sanchez,C.Jones,F.Tchakountio,B.Schwartz,S.Kent,and W.Strayer,Single-packet IP traceback,IEEE/ACM Transactions on Networking,10(6),2002,721-734. [6] A.Yaar,A.Perrig,and D.Song,SIFF:A stateless Internet flow filterto mitigate DDoS flooding attacks,Proc.of IEEE Symposium on Security and Privacy,Oakland,USA,2004,130-146.[7]K.Sarac and K.Almeroth,Tracetree:A scalable mechanism to dis-cover multicast tree topologies in the Internet,IEEE/ACM Transac-tions on Networking,12(5),2004.[8] A.Tamir,An O(pn2)algorithm for the p-median and related prob-lems on tree graphs,Operations Research Letters,19(2),1996,59-64.[9] B.Li,M.Golin,G.Italiano,X.Deng,and K.Sohraby,On the opti-mal placement of Web proxies in the Internet,Proc.of IEEE INFO-COM,New York,USA,1999,1282-1290.[10]L.Qiu,V.Padmanabhan,and G.V oelker,On the placement of Webserver replicas,Proc.of IEEE INFOCOM,Anchorage,USA,2001, 1587-1596.[11]R.Shah,R.Jain,and F.Anjun,Efficient dissemination of personal-ized information using content-based multicast,Proc.of IEEE IN-FOCOM,New York,USA,2002,930-939.[12]K.Jain and V.Vazirani,Approximation algorithms for metric facil-ity location and k-median problems using the primal-dual scheme and lagrangian relaxation,Journal of the ACM,48(2),2001,274-296.[13]S.Guha,A.Meyerson,and K.Munagala,Hierarchical placementand network design problems,Proc.of IEEE Symposium on Foun-dations of Computer Science,Redondo Beach,USA,2000,603-612.[14] C.Papadopoulos and liotis,Incremental deployment of arouter-assisted reliable multicast scheme,Proc.of International Workshop on Networked Group Communications,Palo Alto,USA, 2000,37-46.[15]S.Guha,A.Markopoulou,and F.Tobagi,Hierarchical reliable mul-ticast:Performance analysis and placement of proxies,Computer Communications,26(10),2003,2070-2081.[16]P.Ji,J.Kurose,and D.Towsley,Activating and deactivating repairservers in active multicast trees,Proc.of Tyrrhenian International Workshop on Digital Communications,Toarmina,Italy,2001,507-523.[17]S.Skiena,The Algorithm Design Manual(New York,Springer-Verlag,1998).。

相关文档
最新文档