Post on 14-Dec-2015
Sales Guide for DES-3810 Series
Aug 2011
D-Link HQ
D-Link Confidential
Agenda
Product Introduction• Positioning Overview• Product Overview• Target Market
Competitive Comparison & Analysis• Positioning Highlight• Key Comparison• Art of the War
Technology Briefing
D-Link Confidential
Campus / Enterprise Telecom / Metro
DES-3028/52 Series
L3
L2
DES-3528/52 Series
DES-3200 Series
DES-3800 Series
DES-3810 Series
Positioning Overview D-Link Fast Ethernet Managed Switch Product Portfolio
NextGeneration
NextGeneration
D-Link Confidential
Product Overview Position Highlights
L3 Fast Ethernet enterprise/metro solution• More powerful metro features than existing DES-3800 series• Ideal for entry level enterprise, midmarket, branch office and metro access
Deliver high availability, security and reliability • Advanced QoS, multicast and L2 VPN features guarantee the performance for triple play
service and ISP Service Level Agreement (SLA)• Rich AAA, access control features help administrators well-manage the visitors of the
networks• Powerful L3 routing protocols and L2 VPN functions make it suitable for the business
gateway / ISP access• Fully IPv6 support, future proven• Switch Resource Management (SRM) function helps users optimize the system resource
for different environment• Various attack prevention features and redundancy protocols• Power saving features save your money, save the earth.
D-Link Confidential
Product Models
Software Images
Product Overview Model Overview
24 port 10/100Base-TX + 4 Combo 1000Base-T/ 100/1000SFP
DES-3810-28
48 port 10/100Base-TX + 2 Combo 1000Base-T/ 100/1000SFP + 2 1000SFP
DES-3810-52
For Enterprise, Campus, HospitalL2/L3 features, Routing, Multicasting, Security, QoS, AAA, OAM
StandardImage (SI)
For Telecom, IPv6 networksAll SI features, VPWS, BGPv4, IPv6 routing, SRM
EnhancedImage (EI)
Q4’
11
Q4’
11
D-Link Confidential
Product OverviewHigh Flexibility Uplink ports
DES-3810-28 supports 4 combo GE/SFP ports; DES-3810-52 supports 2 SFP + 2 combo GE/SFP ports
4 SFP ports provides the ability of 2G aggregation ring or dual ring topology
GE copper ports provide cost-effective cat.5 uplinks to core switches
Aggregation Ring
Remote District
Rack / Wiring Closet
1G Fiber1G Copper
D-Link Confidential
Product OverviewPort Comparison
Competitor Port Count Remark
D-Link DES-3810-28 24 FE + 4 Combo GE/SFP
HP E3500-24 20 FE + 4 Combo GE/SFP Less supported client ports
HP E5500-24 24 FE + 4 SFPRequires expensive fiber & transceivers for uplink in the cabinet
HP A3600-24 SI/EIHP A3600-24TP SIHP A3610-24HP A3610-24-TP
24 FE + 4 SFP24 FE + 2 GE + 2 SFP24 FE + 4 SFP24 FE + 2 GE + 2 SFP
Huawei S3328TP-SI/EI 24 FE + 2 SFP + 2 Combo GE/SFP
Cisco 3750-24TSCisco 3750-Metro
24 FE + 2 SFP24 FE + 2 SFP + 2ES
Requires expensive fiber transceivers for uplink in the cabinet
D-Link DES-3810-52 48 FE + 2 SFP + 2 Combo GE/SFP
HP E3500-48 44 FE + 4 Combo GE/SFP Less supported client ports
HP E5500-48 48 FE + 4 SFPRequires expensive fiber transceivers for uplinks in the cabinet
HP A3600-48 SI/EIHP AS3610-48
48 FE + 4 SFP48 FE + 4 SFP
Requires expensive fiber transceivers for uplinks in the cabinet
Huawei S3352P-SI/EI 48 FE + 4 SFPRequires expensive fiber transceivers for uplinks in the cabinet
Cisco 3750-48TS 48 FE + 4 SFPRequires expensive fiber transceivers for uplinks in the cabinet
D-Link Confidential
Target Applications Enterprise Access/Aggregation
DES-3810 Stack
DES-3810
ECMP & PBR provides redundant/load sharing capability of uplink.
IMPB, ARP Spoofing Prevention, DHCP Server Screening, BPDU Attack Protection, and L3 Control Packet Filtering expel threats out of core networks.
MAC, WAC, and Compound authentication provide clientless/easy-to-deploy mechanisms to authenticate users and devices.
Embedded DHCP server, auto-configuration, and trap/e-mail alerts make the network management much easier.
Data Center
D-Link Confidential
Target ApplicationsTelecom Access of Enterprises
VPWS Tu
nnel
TunnelVPWS
ISP MPLS Core
DES-3810
DES-3810
DES-3810
HQ
Branch
Branch
GVRPSTP
VLAN
QinQ & L2PT
GVRPSTP
VLAN
GVRPSTP
VLAN
ETTB CPE for business subscribers
Up to 4 GE FTTB interfaces providing higher bandwidth to customers and fault tolerance capability
Provides L2 transparency to customers through the ISP network
Y.1731, 802.1ag/3ah Ethernet OAMimproves the efficiency of ISPnetwork management
D-Link Confidential
Target Applications Enterprise Routers for Remote Sites
Internet
DES-3810
DES-3810
DES-3810
HQ
Branch
Branch
RIPOSPF
Larger routing table provides the capability for a large-scale enterprise
Border Gateway Protocol (BGP) allows central routing management of all remote sites regardless of physical connections
CPE
CPE
CPE
RIPOSPF
BGP
RIPOSPF
BGPBGP
VPN VP
N
VPN
D-Link Confidential
Agenda
Product Introduction• Positioning Overview• Product Overview• Target Market
Competitive Comparison & Analysis• Positioning Highlight• Key Comparison• Art of the War
Technology Briefing
D-Link Confidential
STP RSTP ERPS
Topology Type Any Topology Any Topology Ring / Multiple Ring
Convergence Time 30-50 seconds 1 second 50-200 ms!
Technology BriefingEthernet Ring Protection Switching (ERPS)
First industry standard (ITU-T G.8032) on Ethernet ring protection switching
Support interconnected ring or multiple rings application
Best case: 50ms recovery time for 16-node ring with <1,200 Km circumference
Aggregation Ring
Access RingMasterMaster
Link Down!
Link Down!
Disable Blocking
D-Link Confidential
Single user/service per port, with bandwidth limit (Port Bandwidth Control)Multiple users/services per port, with bandwidth limit (Flow-based Bandwidth Control)Multiple users/services per port, with bandwidth limit and guaranteed bandwidth (Three Color Marker & Policing)Two Rate Three Color Market & Policing• Committed Information Rate (CIR): Guarantees the bandwidth of each service
by limiting the bandwidth of each other.• Peak Information Rate (PIR): Allows services to take
the unused bandwidth for better bandwidth usage.• Traffic Policing: Drops or remarks the packet
priority tag for traffic exceeding CIR. Doing best-effort forwarding when peak of eachservice are conflicted.
Total UNI (User Network Interface) Bandwidth
CIRCIR
PIR
CIR
PIR
PIR
VoIP
IPTV
Data
Technology BriefingBandwidth Control & Three Color Marker
D-Link Confidential
To lower the packet lose rate, almost all switch controllers have built-in expensive buffer memory to prevent the data re-transmission.
Switch stores the traffic in buffer memory and delays the transmission until the egress bandwidth is available.
However, the best-effort traffic shaping is no longer enough for the QoS requirement nowadays.
Store to buffer
TimeData
Max. Switching Capacity
bps
Buffer Memory
TimeData
bps
Delay Forwarding
Technology BriefingTraffic Shaping
Delay Forwarding
D-Link Confidential
To well manage the buffer resource, DES-3810 supports some advanced features:• Reserve buffer memory for important services• Configurable buffer size for each important service
- Excess Burst Size (EBS)- Peak Burst Size (PBS)- Committed Burst Size (CBS)
Store to PBS/EBS
Store to CBS
PIR/EIR
CIR
Guaranteed Forwarding
PIR/EIR
CIR
Buffer Memory
IPTV
Data
Time
bpsEBS for IPTV
CBS for IPTV
CBS for Data
Guaranteed Forwarding
Store to CBS
Store to PBS/EBS
Delay Forwarding
Max. Switching Capacity
Overall Output
Technology BriefingTraffic Shaping (Continue)
No reservation forData exceeding PIR
Delay Forwarding
Drop
D-Link Confidential
Technology BriefingSmoothed Deficit Weighted Round Robin (SDWRR)
Accurate and fair scheduling is required to make the egress bandwidth usage more proper nowadays• Fair Queue (FQ), WFQ, Deficit Round Robin (DRR), WDRR: Forward/scheduling
decision made by byte count and utilization of queues, the true weight of each queue.
• Smoothed round-robin mechanism makes rapid passes for each queue and use more turns for high queues instead of waiting all packets transmitted in high queues.
WRR
DRR/WFQ
WRR
SmoothedRound-robin
First RoundSecond Round
D-Link Confidential
Compatible with existing MPLS network, using LDP for label switching
Transparency of subscriber’s L3 routing protocol in ISP network, reduces the effort of ISP and also provides better extensibility in subscriber networks
Co-works with QinQ and L2PT to provide L2 transparency to customers
Technology BriefingVirtual Private Wire Service (VPWS)
D-Link Confidential
Switch Resource Management templates allow user optimizing the switch databases for different application.• Routing Mode: For applications requires larger routing tables such as company gateway• VPWS Mode: For applications requires lots of L2 VPN tunnels such as ISP access switch
Technology BriefingSwitch Resource Management (SRM)
ApplicationMode
Routing Mode VPWS Mode
IPv4 Unicast Route 7286 3190
IPv4 Host Entry 3575 1728
IPv6 Unicast Routes 1821 797
Dynamic NDP 1821 797
IPv6 Static Routes 128 128
IPv4 Multicast Routes 1024 1024
IPv6 Multicast Routes 256 256
IPv4 Interface 256 (Guarantee) 256 (Guarantee)
IPv6 Interface 32 (Guarantee) 32 (Guarantee)
Q in Q 1024 1024 (Guarantee)
VPWS tunnel for PW 32 32 (Guarantee)
PW Pseudo Wires 496 496 (Guarantee)
IPv6 Tunnel 128 128
D-Link Confidential
Link OAM• Check the link status hop-by-hop• IEEE802.3ah• Live & death check• Failure indication (Power, link, critical events)• Discovery
Technology BriefingOAM
ISP Cloud
Local ISP Cloud Local ISP CloudVPN Service
Link OAM Link OAM Link OAM Link OAM Link OAM Link OAM… … … …
Service OAM for customer level
Service OAM for ISP level
Service OAM for local ISP Service OAM for local ISP
Service OAM• Check the channel status of different
service levels• IEEE802.1ag, ITU-T Y.1731• Live & death check• Performance Monitoring• Management Operation• Test Operation
D-Link Confidential
Y.1731 is a super set of IEEE 802.1ag, providing better OAM control for customers
Both Y.1731 and 802.1ag support:• Continuity Check Message (CCM): Loss of connectivity defect detection• Loopback Message (LBM): Defect localization• Link Trace Message (LTM): Verification of network configuration
Y.1731 also support: Note
• Alarm Indication Signal (AIS): Alarm suppression of server (customer) layer• Locked (LCK): Indication of service unavailability due to maintenance activities• Test: Throughput, frame loss and bit error measurement• Loss measurement (LM): Frame loss measurement• Delay measurement (DM): Frame delay measurement• Maintenance Communication Channel (MCC)• Experimental OAM (EXP)• Vendor Specific OAM (VSP)
Technology BriefingITU-T Y.1731
Note: DES-3810 supports AIS, LCK only
D-Link Confidential
IGMP / PIM
IGMP SnoopingLegacy Device
Host-based IGMP Snooping
Access LayerAggregation Layer
IP STB IP STB
IP STB
Technology BriefingHost-based IGMP Snooping
Bandwidth of Ethernet allows multiple IPTV channels in the same time
Host-based IGMP Snooping is future proofing for IPTV service:• Multiple IPTV under a single port.
Channel surfing of one IPTV does not effect others
• Support fast leave for quick channel switch
D-Link Confidential
IP STB 1
Internet Internet
IPTV Partner 1
IPTV Partner 2
IP STB 2
ISP DHCPServer 1
ISP DHCPServer 2
IP STB 1 IP STB 2 IP STB 1 IP STB 2
Insert customized string
Option 82 Option 60 Option 61
Technology Briefing DHCP Relay Option 60/61
The DHCP options provide accurate IP manageability for network administrators• DHCP option 82: Assign IP based on circuit ID (client VLAN, port, or switch's MAC address)• DHCP option 60: Assign IP based on pre-defined string• DHCP option 61: Assign IP based on MAC address or pre-defined string
Insert MAC
Insert a user-defined string
Insert MAC
Relay to different DHCP server based
on inserted MAC
Relay to different DHCP server based on inserted string
D-Link Confidential
Change pair, no need to change cable• Usually multi-pair cables are used for the network
construction of cabinets or buildings• Detecting various of errors
- Lines of specific pair is left open - Two lines of a pair is shorted - Lines of different pair are short - Cable does not exist or quality is too bad
Locating the position of cable errors, saving time on cable repair Note
Technology BriefingCable Diagnostics
Note: DES-3810 supports distance check on GE port only