View
24
Download
0
Category
Preview:
DESCRIPTION
Communications Protocol Migration Made Easy. Terry Swiatkiwsky Digital Presence. Agenda. What is “Protocol Migration”? Basic methods Encapsulation Conversion Comparison Example: New devices and a new network Example: New network and a new application - PowerPoint PPT Presentation
Citation preview
Communications Protocol Communications Protocol Migration Made EasyMigration Made Easy
Terry SwiatkiwskyTerry Swiatkiwsky
Digital PresenceDigital Presence
AgendaAgenda
What is “Protocol Migration”?What is “Protocol Migration”?Basic methodsBasic methods EncapsulationEncapsulation ConversionConversion ComparisonComparison Example: New devices and a new networkExample: New devices and a new network Example: New network and a new applicationExample: New network and a new application
Software vs Hardware protocol conversionSoftware vs Hardware protocol conversionComNet Software Protocol ConverterComNet Software Protocol Converter
What is “Protocol Migration”?What is “Protocol Migration”?
Broadly speaking:Broadly speaking: Adopting a network protocol different to the Adopting a network protocol different to the
one currently being usedone currently being used Involving one or more of:Involving one or more of:
Replacing the network backboneReplacing the network backbone
Using a new protocol at the HostUsing a new protocol at the Host
Using a new protocol at the DeviceUsing a new protocol at the Device
Basic MethodsBasic Methods
Protocol Encapsulation (“Tunneling”)Protocol Encapsulation (“Tunneling”)
Protocol ConversionProtocol Conversion
Protocol Encapsulation (Tunneling)Protocol Encapsulation (Tunneling)
The legacy protocol at the end points (Device and Host) The legacy protocol at the end points (Device and Host) remain unchangedremain unchanged
Only the underlying network backbone is replacedOnly the underlying network backbone is replaced
Not suitable for incorporating new protocol devices (or Not suitable for incorporating new protocol devices (or hosts) into a legacy environmenthosts) into a legacy environment
The legacy protocol is sent over the new protocol by The legacy protocol is sent over the new protocol by encapsulating it with the new protocol’s header (a encapsulating it with the new protocol’s header (a “wrapper”)“wrapper”)
The new protocol’s header is removed when received at The new protocol’s header is removed when received at the other end.the other end.
Protocol EncapsulationProtocol Encapsulation
Protocol EncapsulationProtocol Encapsulation
Advantages:Advantages: Network costs may be lowerNetwork costs may be lower Network may be more reliable (alternate routing)Network may be more reliable (alternate routing) No changes required to actual Device or HostNo changes required to actual Device or Host
Disadvantages:Disadvantages: Additional hardware and/or software required at each Device and HostAdditional hardware and/or software required at each Device and Host Polling of legacy protocol may still be carried across new network (can Polling of legacy protocol may still be carried across new network (can
be ~30% of network traffic)be ~30% of network traffic) Potential flow control issues (eg. different protocol timing and network Potential flow control issues (eg. different protocol timing and network
latency issues – may cause timeouts, retransmissions)latency issues – may cause timeouts, retransmissions) Spending on additional hardware/software to preserve legacy Spending on additional hardware/software to preserve legacy
environment when could be investing in new technologyenvironment when could be investing in new technology Maintenance of legacy hardware continues.Maintenance of legacy hardware continues.
Protocol ConversionProtocol Conversion
The legacy protocol is actually terminated at The legacy protocol is actually terminated at some pointsome point
Legacy protocol is converted and data carried Legacy protocol is converted and data carried forward using only the new protocol (no forward using only the new protocol (no additional “wrapper”) additional “wrapper”)
Protocol ConversionProtocol Conversion
Protocol ConversionProtocol ConversionAdvantages:Advantages:
Lower network costsLower network costs Network may be more reliable (alternate routing)Network may be more reliable (alternate routing) Migration strategy to replace legacy environmentMigration strategy to replace legacy environment Costs incurred are directed toward real migration to new Costs incurred are directed toward real migration to new
protocolprotocol
Disadvantages:Disadvantages:
Additional hardware and/or software required at each endAdditional hardware and/or software required at each end
Comparison ofComparison ofConversion vs EncapsulationConversion vs Encapsulation
ConversionConversion EncapsulationEncapsulation
Allows network backbone replacementAllows network backbone replacement √√ √√Positions you closer to true migration from Positions you closer to true migration from legacy to new protocolslegacy to new protocols
√√
Less legacy hardware (than encapsulation)Less legacy hardware (than encapsulation) √√Less legacy maintenanceLess legacy maintenance √√Less network traffic (vs 2 protocol headers)Less network traffic (vs 2 protocol headers) √√ XXRetains legacy polling across networkRetains legacy polling across network XXAdditional legacy-oriented hardwareAdditional legacy-oriented hardware XXPotential protocol conflict issuesPotential protocol conflict issues XX
Note: These comparisons are generalizations. Your specific environment, objectives & priorities must be taken into consideration.
Example: Migration to new network & devicesExample: Migration to new network & devices
The following slides will show migration progress comparing the Conversion and Encapsulation approaches…
Example: Migration to new network & devices Example: Migration to new network & devices (p2)(p2)
Example: Migration to new network & devices Example: Migration to new network & devices (p3)(p3)
Example: Migration to new network & devices Example: Migration to new network & devices (p4)(p4)
Another Example:Another Example:
Migration to new network & Application Migration to new network & Application (p1/3)(p1/3)
Migration to new network & Application Migration to new network & Application (p2/3)(p2/3)
Migration to new network & Application Migration to new network & Application (p3/3)(p3/3)
Software vs Hardware Protocol ConversionSoftware vs Hardware Protocol Conversion
Comparison ofComparison ofSoftware vs Hardware Protocol ConversionSoftware vs Hardware Protocol Conversion
SoftwareSoftware HardwareHardware
More efficient legacy comm’s handling on NonStopMore efficient legacy comm’s handling on NonStop √√ XXNo significant additional hardware No significant additional hardware √√ XXLess legacy maintenanceLess legacy maintenance √√ XXLower cost (hardware, deployment, operations)Lower cost (hardware, deployment, operations) √√ XXBackout possible using software onlyBackout possible using software only √√ XXNo changes in the NonStop configurationNo changes in the NonStop configuration XX √√
Note: These comparisons are generalizations. Your specific environment, objectives & priorities must be taken into consideration.
ComNetComNetSoftware Protocol Converter for NonStopSoftware Protocol Converter for NonStop
Provide a transparent connection between legacy devices and Provide a transparent connection between legacy devices and modern hosts, or modern devices and legacy hosts.modern hosts, or modern devices and legacy hosts.
ComNet handles the protocol conversion so that both the device ComNet handles the protocol conversion so that both the device and host believe they are using the same protocol.and host believe they are using the same protocol.
The ComNet solution offers a broad range of application and is ideal The ComNet solution offers a broad range of application and is ideal for a phased migration from legacy protocols to TCP/IP.for a phased migration from legacy protocols to TCP/IP.
ComNet - FeaturesComNet - Features
Converts any-to-any (supported) protocolConverts any-to-any (supported) protocol
Multiple backup connections per sessionMultiple backup connections per session
Dynamic configurationDynamic configuration
Loopback capabilitiesLoopback capabilities
Customizable with your own user-written routinesCustomizable with your own user-written routines
Powerful operator interface provides seamless global view and Powerful operator interface provides seamless global view and control over all ComNet sessionscontrol over all ComNet sessions
Scalable architecture to support thousands of sessionsScalable architecture to support thousands of sessions
Quick and easy to install.Quick and easy to install.
ComNet - ApplicationsComNet - Applications
MigrationMigration Software protocol converter as described earlierSoftware protocol converter as described earlier
Protocol Services APIProtocol Services API Write applications using simple OS calls (open, write, read) and ComNet Write applications using simple OS calls (open, write, read) and ComNet
will provide all protocol handling and manage backup connectionswill provide all protocol handling and manage backup connections
Enable Applications with Backup ConnectionsEnable Applications with Backup Connections ComNet can augment an existing connection with multiple backup ComNet can augment an existing connection with multiple backup
connectionsconnectionsTestingTesting
ComNet connects NonStop legacy comm’s to your LAN so now you can ComNet connects NonStop legacy comm’s to your LAN so now you can use PC-based test tools to test your application on the NonStop use PC-based test tools to test your application on the NonStop
Software Modem EliminatorSoftware Modem Eliminator Loopback connection between applications without any comm’s ports or Loopback connection between applications without any comm’s ports or
hardware modem eliminator; even between different protocols!hardware modem eliminator; even between different protocols!
Remote Device ConnectionRemote Device Connection Connect a legacy device in your own test lab, across a VPN, to a legacy Connect a legacy device in your own test lab, across a VPN, to a legacy
comm’s application on a remote NonStop (Itanium).comm’s application on a remote NonStop (Itanium).
ComNet - BenefitsComNet - BenefitsLow costLow cost
Maximizes your investment in existing software and hardware.Maximizes your investment in existing software and hardware. Avoids the expense of new protocol conversion hardware and its Avoids the expense of new protocol conversion hardware and its
deployment, maintenance and operational costs.deployment, maintenance and operational costs. ComNet is a software solution which is easy to install, maintain and ComNet is a software solution which is easy to install, maintain and
operate.operate. Flexible short term and long term licensing options.Flexible short term and long term licensing options.
ReliableReliable High availability is offered by multiple backup connections for every High availability is offered by multiple backup connections for every
session.session. Utilizes existing highly reliable HP NonStop communications hardware.Utilizes existing highly reliable HP NonStop communications hardware.
FlexibleFlexible Dynamic configuration maximizes uptime.Dynamic configuration maximizes uptime. Scalable across multiple processors.Scalable across multiple processors. Suitable for broad range of applicationSuitable for broad range of application
More InformationMore Information
www.www.comnetcomnetnonstopnonstop.com.com
enquiries@enquiries@comnetcomnetnonstopnonstop.com.com
Visit the Digital Presence display at the ITUGVisit the Digital Presence display at the ITUGHP Partner PavilionHP Partner Pavilion
Fill in our Questionnaire and be entered into our draw for a Fill in our Questionnaire and be entered into our draw for a Nikon Digital Camera.Nikon Digital Camera.
Recommended