Technote: AIX EtherChannel Load Balancing Options

Size: px
Start display at page:

Download "Technote: AIX EtherChannel Load Balancing Options"

Transcription

1 AIX EtherChannel Load Balancing Options Document Author: Cindy K Young Additional Author(s): Jorge R Nogueras Doc. Organization: Document ID: TD Advanced Technical Support Document Revised: 10/28/2003 Product(s) covered: AIX; Ethernet; pseries; RS/6000; TCP/IP Abstract: This article is an overall view of the user-configurable AIX V5 EtherChannel load balancing behavior options, including the new Hash Mode parameter. AIX EtherChannel Load Balancing Options This article is an overall view of the user-configurable AIX EtherChannel load balancing behavior options, including the new Hash Mode parameter. Introduction. A new SMIT menu option called "Hash Mode" appears when AIX users install software APARs available in November, The menu gives mode EtherChannel users the option of distributing outgoing traffic based upon TCP or UDP port s. Software support is provided in APAR IY48331 for AIX V 5.1 and APAR IY48170 for AIX V 5.2 Load balancing behavior. Two SMIT-selectable load balancing methods for outgoing traffic are offered -- round robin, which spreads the outgoing traffic evenly across all the adapters in the EtherChannel; and, which selects the adapter by algorithm. The Hash Mode parameter, shown in the following SMIT configuration menu, determines the numerical used in the algorithm. Change / Show Characteristics of an EtherChannel / Link Aggregation Type or select s in entry fields. Press Enter AFTER making all desired changes. EtherChannel / Link Aggregation EtherChannel / Link Aggregation Adapters Backup Adapter Delete Backup Adapter Add Main Adapter Delete Main Adapter Add Backup Adapter Enable Alternate Alternate Enable Gigabit Ethernet Jumbo Frames Mode Hash Mode Internet to Ping [] Number of Retries [3] Retry Timeout (sec) [1] Apply change to DATABASE only ent6 ent1,ent2,ent4,ent5 NONE [0x ] The following chart summarizes the valid load balancing option combinations offered in the SMIT screen. 1 of 5 12/10/04 10:27 AM

2 MODE or 8023ad round robin HASH MODE src_dst_port src_port dst_port OUTGOING TRAFFIC DISTRIBUTION (across adapter ports within the EtherChannel) The traditional AIX behavior. The adapter selection algorithm uses the last byte of the destination IP address (for TCP/IP traffic) or MAC address (for ARP and other n-ip traffic). This mode is typically the best initial choice for a server with a large number of clients. The outgoing adapter path is selected via algorithm using the combined source and destination TCP or UDP port s. Average the TCP/IP address suffix s in the "Local" and "Foreign" columns shown by netstat -an command. Since each connection has a unique TCP or UDP port, the three port-based hash modes provide additional adapter distribution flexibility when there are several, separate TCP or UDP connections between an IP address pair. The adapter selection algorithm uses the source TCP or UDP port. In netstat -an command output, the port is the TCP/IP address suffix in the "Local" column. The outgoing adapter path is selected via algorithm using the destination system port. In netstat -an command output, the TCP/IP address suffix in the "Foreign" column is the TCP or UDP destination port. Outgoing traffic is spread evenly across all the adapter ports in the EtherChannel. This mode is the typical choice for two hosts connected back-to-back (i.e. without an intervening switch). Round Robin. All outgoing traffic is spread evenly across all of the adapters in the EtherChannel. It provides the highest bandwidth optimization for the AIX server system. While round robin distribution is the ideal way to utilize all the links equally, AIX administrators should consider that it also introduces the potential for out-of-order packets at the receiving system. Standard algorithm. The algorithm is used for both and IEEE 802.3ad-style link aggregations. AIX divides the last byte of the "numerical " by the number of adapters in the EtherChannel and uses the to identify the outgoing link. If the is zero, the first adapter in the EtherChannel is selected; one means second adapter, and so on. (The adapters are selected in the order they are listed in the SMIT menu.) The "Hash Mode" selection determines the numerical used in the calculation. By, the last byte of the destination IP or MAC address is used in the calculation, but the source and/or destination TCP or UDP port s may also be utilized. These alternatives allow the AIX administrator to fine-tune the distribution of outgoing traffic across the real adapters in the EtherChannel. In mode, the adapter selection algorithm is applied to the last byte of the destination IP address for IP traffic. For ARP and other n-ip traffic, the same formula is applied on the last byte of the destination MAC address. Unless there is an adapter failure which causes a failover, all traffic between a host pair in mode goes out over the same adapter. For IP traffic, the port selected could be changed by selecting a different hash mode or by implementing a different IP address (perhaps via IP aliases) at the target system. In src_dst_port hash mode, the source and destination port s are added, then divided by two. The resultant whole number ( decimals) is plugged into the algorithm. TCP or UDP traffic is sent on the adapter selected by the algorithm and selected hash mode. Non-TCP or UDP traffic will fall back to the algorithm, meaning the last byte of either the destination IP or MAC address. Incoming traffic distribution. Remember that the AIX adapter selection applies to outgoing packets only. The packets incoming to the AIX system are governed by the algorithm configured at the switch. The traffic distribution schemes used by the two components need t match -- the algorithms can be (and often are) different. For example, the switch might direct packets based on the XOR of source and destination MAC addresses. In this case, the destination MAC address is the same for packets going to the AIX system, but the different source address causes the packets to be sent over different adapters. Understanding packet distribution. Curious about how packets are being distributed over the ports on your system? Use the entstat or netstat command to view aggregate statistics of all the adapters in the EtherChannel. For example, netstat -v ent6 reports the key information about EtherChannel device ent6. Statistics for outgoing packets are a result of AIX's configuration. If round robin is configured, for example, 2 of 5 12/10/04 10:27 AM

3 statistics will be nearly identical for each underlying adapter. The incoming packet statistics reflect the network switch configuration. Use the netstat -an command to view the TCP or UDP source and destination port address s. Predicting adapter utilization -- Example Environment. The effects of different hash mode s on the adapter selection algorithm are best illustrated in an example. In this fictitious environment, the EtherChannel (ent6) is configured as IP address (the en6 interface) and is comprised of individual adapters ent1, ent2, ent4, ent5. To demonstrate the adapter selection, the example system communicates with six systems with sequential IP addresses ranging from through The outgoing adapter port is selected via the mathematical of the calculation hash mode numerical / the number of real adapters in the EtherChannel. There are four adapters in this EtherChannel, so the numerical is always divided by four. The numerical changes from the last byte of the destination IP address to the source port, then to the destination port, and then to the average of the two port s in the four Hash Modes. It is this change in numerical that causes the variation in the adapter selection. The result of the calculation is the mathematical. If the is zero, the first adapter in the SMIT list is selected. In the example, this is adapter ent1. If the is three, the fourth adapter (ent5 in our sample) is selected, and so forth. The complete matchup of the s, the selection order, and the actual adapters in the example are shown in the following figure. Remainder Adapter in list Actual Adapter 0 1st ent1 1 2nd ent2 2 3rd ent4 3 4th ent5 Figure 1: Adapter selection in the sample environment. The following partial netstat -an command output shows IP addresses and TCP/UDP ports for nine active connections the local system might have with the remote systems through In this case, the "Local " column reflects the EtherChannel's IP address and the "Foreign " column reflects the IP address of the remote system. The numerical s appended to these local and foreign IP addresses are the source and destination ports, respectively, used in three of the four hash modes. # netstat -an Active Internet connections (including servers) Proto Recv-Q Send-Q Local Foreign udp tcp tcp tcp tcp tcp tcp tcp tcp The following chart shows the mathematical result (the ) of applying the four hash modes to the algorithm. Check the in the Figure 1 chart to identify the real outgoing adapter selected. Line # Default src_port dst_port src_dst_port * / / of 5 12/10/04 10:27 AM

4 / / / / / / / 2 1 * here the address s are first averaged (added, then divided by two). The resultant whole number (excluding decimals) is divided by the four adapters in the example environment. Figure 2. Comparison of results: Standard adapter selection algorithm with various hash mode options. Observations. In the hash mode, the numerical used in the calculation is the last byte in the destination system IP address. Because this number is the same for all connections to the same destination IP address, all traffic between a host pair in mode goes out over the same adapter. Using this hash mode, traffic will be fairly well spread over the adapters if the random nature of the IP addresses result in an even selection and if all of the remote systems do generally the same things (meaning, for instance, one IP address does t have a huge download). In this example, the traffic is unbalanced when using src_port hash mode. Traffic shown on line 1 is sent out adapter ent1 and traffic shown on lines 2-9 will be sent over adapter ent5. Adapters ent2 and ent4 are t used. Why? The source port address is 23 (the well-kwn port for telnet) on all of these connections, hinting at the way the connection was established. This indicates that for the connections on lines 2-9 the remote system telnet'ed to the local system. In dst_port hash mode, the outgoing traffic is fairly well balanced across the adapters in the EtherChannel. If, however, the local system established the connections, you might see the same results skew seen in the src_port hash. In src_dst_port hash mode, the averaging of the fields seems to balance the outgoing traffic fairly well. The skew in s disappears. So, regardless of the direction in which the connection is initiated, the resulting s distribute across the adapter ports. Considerations. The single most important consideration when choosing a load balancing method is nature of the traffic that is being sent across the EtherChannel. Yet, the final choice will probably be a trade-off that provides the best distribution for a subset of this traffic. Depending upon the environment, one administrator may choose to accommodate the majority of the traffic while ather opts to design for the most important form of traffic. There is single choice that will yield a perfect distribution all the time because the type of traffic being handled by the typical EtherChannels varies. It may, for example, handle mixtures of streaming TCP traffic one moment, some ARP traffic the next, then a huge file transfer followed by short-lived UDP exchanges. Administrators can use these key questions begin the process of selecting the mode of operation and hash mode best suited for an environment. Look for patterns and predictability. Network attachment. Is the local system connected to an Ethernet switch? Is it connected directly (back-to-back) with ather host? Direction of connection establishment. Do remote systems typically connect to the local host? Is the local system a server for client systems? Does the local host establish connections to other hosts? IP addresses. Look for IP address patterns. Does the local host have a few, but long-lived TCP connections with the same remote hosts? Conversely, does it have many, short-lived connections to a variety of remote hosts? Traffic type. The main traffic load may be TCP/IP, but ARP and other n-ip traffic is distributed differently in mode. Is there any other significant type of traffic? Is there a key application that generates a predictable load? Conclusions. The results of any mode can be skewed if the numeric s are skewed. In fact, the load balancing options have been added since the initial AIX V4.3.3 EtherChannel implementation for just this reason. There is one-size-fits-all solution to unique environments. The trick is to choose a mode that results in varied numeric s so that the load is distributed across all of the adapters in the EtherChannel. Generally speaking, round robin is ideal for back-to-back connections running jumbo frames. In this environment, there is intervening switch, so there is chance that processing at the switch could alter 4 of 5 12/10/04 10:27 AM

5 the packet delivery time, order, or adapter path. On this direct cable network path, the receiver sees packets exactly as sent. Jumbo frames (9000 byte MTU) always yield better file transfer performance than traditional 1500 byte MTUs. In this case, however, they add ather benefit. These larger packets take longer to send so it is less likely that the receiving host would be continuously interrupted with out-of-order packets. Round robin mode can be implemented in other environments but at increased risk of out-of-order packets at the receiving system. This risk is particularly high when there are few, long-lived, streaming TCP connections. When there are many such connections between a host pair, packets from different connections could be intermingled, thereby decreasing the chance of packets for the same connection arriving out-of-order. Check for out-of-order packet statistics in the "tcp" section of the netstat -s command output. A steadily-increasing indicates a potential problem in traffic sent from an EtherChannel. If out-of-order packets are a problem on a system that must use traditional Ethernet MTUs and must be switch attached, try the various hash modes offered in mode operation. If particular hash mode is obvious, administrators may try each of them, testing and analyzing the results before moving to the next. Each mode has a particular strength but the "" and "src_dst_port" modes are the logical starting points as they are more widely applicable. The hash mode works well when the local host establishes connections to many different IP addresses. It is a good first choice for most busy systems because the random nature of IP address traffic tends to distribute the traffic in an acceptable manner. If the local host establishes lengthy connections to few IP addresses, look at one of the TCP or UDP hashing options. The "src_dst_port" hash mode option is probably the best initial choice because considers both the source and the destination TCP or UDP port s. In this mode, all of the packets in one TCP or UDP connection are sent over a single adapter so they are guaranteed to arrive in order, but the traffic is still spread because connections (even to the same host) may be sent over different adapters. The results of this hash mode aren't skewed by the connection establishment direction because it uses both the source and destination TCP or UDP port s. Use the "src_port" or "dst_port" hash mode options if port s change from one connection to ather and the "src_dst_port" option is t yielding a desirable distribution. For instance, if the local host is an FTP server, the source TCP or UDP port will be more or less constant across connections. The netstat -s command would reflect 21, which is the FTP well-kwn port. In this case, the "dst_port" hash mode option would be a better choice. If, on the other hand, the local host primarily establishes connections to other machines, the source TCP or UDP port s will be random, making the "src_port" hash mode a better option. Classification: Software Category: Planning and Design Platform(s): RS/6000 or IBM eserver pseries O/S: AIX Keywords: AIX EtherChannel, NIB, network interface backup, load, balancing, traffic, SMIT, configuration, methods, options, hash mode,, algorithm 5 of 5 12/10/04 10:27 AM

- EtherChannel - Port Aggregation

- EtherChannel - Port Aggregation 1 Port Aggregation - EtherChannel - A network will often span across multiple switches. Trunk ports are usually used to connect switches together. There are two issues with using only a single physical

More information

NAS 307 Link Aggregation

NAS 307 Link Aggregation NAS 307 Link Aggregation Set up link aggregation on your ASUSTOR NAS A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Have a basic understanding of

More information

How To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4

How To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4 Cisco - Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switch...Page 1 of 10 Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches Document ID: 12023 Contents

More information

Using Virtual Switches in PowerVM to Drive Maximum Value of 10 Gb Ethernet

Using Virtual Switches in PowerVM to Drive Maximum Value of 10 Gb Ethernet Using Virtual Switches in PowerVM to Drive Maximum Value of 10 Gb Ethernet by Glenn E. Miller Certified IT Specialist Power Systems, AIX and PowerHA IBM Corporation and Kris Speetjens IT Architect Nobius

More information

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012 MikroTik RouterOS Workshop Load Balancing Best Practice Warsaw MUM Europe 2012 MikroTik 2012 About Me Jānis Meģis, MikroTik Jānis (Tehnical, Trainer, NOT Sales) Support & Training Engineer for almost 8

More information

How To Configure Virtual Host with Load Balancing and Health Checking

How To Configure Virtual Host with Load Balancing and Health Checking How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article

More information

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

Configuring IPS High Bandwidth Using EtherChannel Load Balancing Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

6/8/2011. Document ID: 12023. Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction

6/8/2011. Document ID: 12023. Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction Page 1 of 9 Products & Services Understanding EtherChannel Load Balancing and Redundancy on Catalyst Switches Document ID: 12023 Contents Introduction Prerequisites Requirements Components Used Conventions

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

2.0 Dual WAN Select Dual-WAN, you will see the following screen shot, Figure 0.1(Dual-WAN Screen Shot) Figure 0.1(Dual-WAN Screen Shot)

2.0 Dual WAN Select Dual-WAN, you will see the following screen shot, Figure 0.1(Dual-WAN Screen Shot) Figure 0.1(Dual-WAN Screen Shot) Dual WAN Configuration 1.0 Login First login to Management UI, (192.168.1.1) default router IP You will be requiring entering the user name and password, which are both admin by default. Select System

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2 BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

MULTI WAN TECHNICAL OVERVIEW

MULTI WAN TECHNICAL OVERVIEW MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site!

Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site! Network Pop Quiz 5 Brought to you by www.rmroberts.com please visit our site! This is a set of questions to help you prepared for the CompTIA Network+ certification examination. You should not exceed twenty

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN-001391-01 vsphere 6.0 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

QNAP and Failover Technologies

QNAP and Failover Technologies QNAP and Failover Technologies USE MC/S WITH QNAP NAS Copyright 2009. QNAP Systems, Inc. All Rights Reserved. How to connect an iscsi initiator on Windows 2008 with MC/S feature QNAP provides you what

More information

LotWan Appliance User Guide USER GUIDE

LotWan Appliance User Guide USER GUIDE LotWan Appliance User Guide USER GUIDE Copyright Information Copyright 2014, Beijing AppEx Networks Corporation The description, illustrations, pictures, methods and other information contain in this document

More information

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

24 Port Gigabit Ethernet Web Smart Switch. Users Manual

24 Port Gigabit Ethernet Web Smart Switch. Users Manual 24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------

More information

TalkShow Advanced Network Tips

TalkShow Advanced Network Tips TalkShow Advanced Network Tips NewTek Workflow Team TalkShow is a powerful tool to expand a live production. While connecting in a TalkShow unit is as simple as plugging in a network cord and an SDI cable,

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Link Load Balancing 2015-04-28 08:50:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Link Load Balancing... 3 Link Load Balancing... 4 Configuring

More information

Exam : EE0-511. : F5 BIG-IP V9 Local traffic Management. Title. Ver : 12.19.05

Exam : EE0-511. : F5 BIG-IP V9 Local traffic Management. Title. Ver : 12.19.05 Exam : EE0-511 Title : F5 BIG-IP V9 Local traffic Management Ver : 12.19.05 QUESTION 1 Which three methods can be used for initial access to a BIG-IP system? (Choose three.) A. serial console access B.

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Net Optics xbalancer and McAfee Network Security Platform Integration

Net Optics xbalancer and McAfee Network Security Platform Integration Under the McAfee SIA Partner Program, Net Optics is integrating its xbalancer with the McAfee Network Security Platform (NSP). This partnership will enable mutual customers to realize the benefits of load

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Networking Security IP packet security

Networking Security IP packet security Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

4G Business Continuity Solution. 4G WiFi M2M Router NTC-140W

4G Business Continuity Solution. 4G WiFi M2M Router NTC-140W 4G Business Continuity Solution 4G WiFi M2M Router NTC-140W Introduction Whether you run a small corner shop, are the plant manager of a factory or manage IT in a corporate office, you ll need a reliable

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Enabling NetFlow on Virtual Switches ESX Server 3.5

Enabling NetFlow on Virtual Switches ESX Server 3.5 Technical Note Enabling NetFlow on Virtual Switches ESX Server 3.5 NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and

More information

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009 Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208

More information

Wireshark Tutorial. Figure 1: Packet sniffer structure

Wireshark Tutorial. Figure 1: Packet sniffer structure Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

LINK AGGREGATION INTEROPERABILITY OF THE DELL POWERCONNECT 6200 SERIES

LINK AGGREGATION INTEROPERABILITY OF THE DELL POWERCONNECT 6200 SERIES LINK AGGREGATION INTEROPERABILITY OF THE DELL POWERCONNECT 6200 SERIES WITH CISCO IOS OR CISCO CATOS BASED SWITCHES By Bruce Holmes CONTENTS INTRODUCTION 3 LINK AGGREGATION WITH GIGABIT ETHERNET CISCO

More information

Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches

Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches 6 Quality of Service (QoS): Managing Bandwidth More Effectively on the Series 2600/2600-PWR and Series 2800 Switches Contents Introduction................................................... 6-3 Terminology................................................

More information

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

Application Note. Stateful Firewall, IPS or IDS Load- Balancing Application Note Stateful Firewall, IPS or IDS Load- Balancing Document version: v1.0 Last update: 8th November 2013 Purpose Improve scallability of the security layer Limitations when Load-Balancing firewalls

More information

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

Firewall Load Balancing

Firewall Load Balancing Firewall Load Balancing 2015-04-28 17:50:12 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Firewall Load Balancing... 3 Firewall Load Balancing...

More information

Configuring EtherChannels

Configuring EtherChannels CHAPTER 12 This chapter describes how to configure EtherChannels on the Cisco 7600 series router Layer 2 or Layer 3 LAN ports. For complete syntax and usage information for the commands used in this chapter,

More information

Chapter 11 Network Address Translation

Chapter 11 Network Address Translation Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Introduction to MPIO, MCS, Trunking, and LACP

Introduction to MPIO, MCS, Trunking, and LACP Introduction to MPIO, MCS, Trunking, and LACP Sam Lee Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201002-P210C lntroduction Many users confuse the

More information

Chapter 3. Internet Applications and Network Programming

Chapter 3. Internet Applications and Network Programming Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

Configuring Redundancy

Configuring Redundancy 7 CHAPTER This chapter describes how to configure redundancy and contains these sections: Configuring Fault Tolerance, page 7-1 Configuring HSRP, page 7-5 Configuring Interface and Device Tracking, page

More information

Innominate mguard Version 6

Innominate mguard Version 6 Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Load Balancing Router. User s Guide

Load Balancing Router. User s Guide Load Balancing Router User s Guide TABLE OF CONTENTS 1: INTRODUCTION... 1 Internet Features... 1 Other Features... 3 Package Contents... 4 Physical Details... 4 2: BASIC SETUP... 8 Overview... 8 Procedure...

More information

AT-S45 Version 1.0.7 Management Software for the AT-9410GB Gigabit Ethernet Switches. Software Release Notes

AT-S45 Version 1.0.7 Management Software for the AT-9410GB Gigabit Ethernet Switches. Software Release Notes AT-S45 Version 1.0.7 Management Software for the AT-9410GB Gigabit Ethernet Switches Product Documentation Software Release Notes Please read this document before you begin to use the AT-S45 management

More information

VERITAS Cluster Server Traffic Director Option. Product Overview

VERITAS Cluster Server Traffic Director Option. Product Overview VERITAS Cluster Server Traffic Director Option Product Overview V E R I T A S W H I T E P A P E R Table of Contents Traffic Director Option for VERITAS Cluster Server Overview.............................................1

More information

Aqua Connect Load Balancer User Manual (Mac)

Aqua Connect Load Balancer User Manual (Mac) Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...

More information

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics: Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged

More information

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010 IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010 Network configuration Reminder, configure your network in /etc/ rc.conf ( x = your IP, from.10 to...) ifconfig_bge0= 41.215.76.x/24

More information

Lab 8.3.2 Conducting a Network Capture with Wireshark

Lab 8.3.2 Conducting a Network Capture with Wireshark Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web

More information

Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation

Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation This chapter describes how to configure trunk groups and 802.3ad link aggregation. Trunk groups are manually-configured aggregate links containing

More information

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 craig@web400.com

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Chapter 4 Rate Limiting

Chapter 4 Rate Limiting Chapter 4 Rate Limiting HP s rate limiting enables you to control the amount of bandwidth specific Ethernet traffic uses on specific interfaces, by limiting the amount of data the interface receives or

More information

1.0 Basic Principles of TCP/IP Network Communications

1.0 Basic Principles of TCP/IP Network Communications Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

Terminal Server Configuration and Reference Errata

Terminal Server Configuration and Reference Errata Doc. No. 78-0944-06A0 June 14, 1993 Terminal Server Configuration and Reference Errata This document supplies corrections and additional informaiton for the 9.0 version of the Cisco publication Terminal

More information

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to

More information

Extending SANs Over TCP/IP by Richard Froom & Erum Frahim

Extending SANs Over TCP/IP by Richard Froom & Erum Frahim Extending SANs Over TCP/IP by Richard Froom & Erum Frahim Extending storage area networks (SANs) over a distance has become a necessity for enterprise networks. A single SAN island with one storage system

More information

AS/400e. TCP/IP routing and workload balancing

AS/400e. TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted

More information

NetFlow Subinterface Support

NetFlow Subinterface Support NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the

More information

Ethereal: Getting Started

Ethereal: Getting Started Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me

More information

Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP Addressing Overview Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

FortiOS Handbook - Load Balancing VERSION 5.2.2

FortiOS Handbook - Load Balancing VERSION 5.2.2 FortiOS Handbook - Load Balancing VERSION 5.2.2 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Load Balancing. FortiOS Handbook v3 for FortiOS 4.0 MR3

Load Balancing. FortiOS Handbook v3 for FortiOS 4.0 MR3 Load Balancing FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Load Balancing v3 8 February 2012 01-431-99686-20120208 Copyright 2012 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and

More information

Avaya P330 Load Balancing Manager User Guide

Avaya P330 Load Balancing Manager User Guide Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

FWSM introduction Intro 5/1

FWSM introduction Intro 5/1 Intro 5/0 Content: FWSM introduction Requirements for FWSM 3.2 How the Firewall Services Module Works with the Switch Using the MSFC Firewall Mode Overview Stateful Inspection Overview Security Context

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Network Management and Debugging. Jing Zhou

Network Management and Debugging. Jing Zhou Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Configuring Windows Server Clusters

Configuring Windows Server Clusters Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed

More information