Optimizing Ingress Routing with LISP across Multiple VXLAN/EVPN Sites
|
|
- Richard Bishop
- 7 years ago
- Views:
Transcription
1 White Paper Optimizing Ingress Routing with LISP across Multiple VXLAN/EVPN Sites 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 18
2 Contents What You Will Learn... 3 LISP Overview... 3 Why Use LISP in the Data Center... 4 Mobility across Multiple Data Centers with Ingress Route Optimization... 4 VXLAN Overview... 5 VXLAN EVPN Overview... 5 VXLAN EVPN Integration with LISP... 6 Host Move Detection in a VXLAN EVPN Fabric... 6 Host Mobility across VXLAN EVPN Fabrics... 8 Summary Functional Roles and Configuration Hardware and Software Details Border Spine Configuration in Data Center 1 (BGP AS 65001) Border Leaf Configuration in Data Center 2 (BGP AS 65002) LISP Map-System Database Configuration Branch Site Configuration Verification Conclusion Appendix: Other Benefits of LISP in the Data Center IPv6 Enablement Multitenancy and Large-Scale VPNs Efficient Multihoming at the WAN Edge For More Information Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 18
3 What You Will Learn Locator/Identity Separation Protocol (LISP) is a data center interconnect (DCI) solution that provides a simplified way of handling multitenant connectivity in the fabric and mobility semantics across fabrics. This document describes how to integrate Virtual Extensible LAN (VXLAN) Ethernet Virtual Private Network (EVPN) fabric with LISP, using a configuration example. LISP, when integrated with VXLAN EVPN fabric, can help solve route optimization problems that result from workload mobility across data center fabrics. This document assumes that you have a basic knowledge of VXLAN, EVPN, and LISP technologies. LISP Overview Locator/Identity Separation Protocol is a new routing architecture that creates a model by separating the device identity, known as the endpoint identifier (EID), and the routing locator (RLOC). The EIDs are assigned to the end hosts, and the RLOCs are assigned to the devices (primarily routers) that make up the global routing system. This separation adds flexibility to the network in a single protocol, helping enable mobility, scalability, and security. LISP uses a dynamic tunneling approach rather than preconfigured tunnel endpoints. It s designed to work in a multihomed environment and supports communication between LISP and non-lisp sites for internetworking. The main benefits of LISP include simplified WAN edge multihoming with ingress traffic engineering capabilities, multitenancy over the Internet, simplified IPv6 transition support, and IP mobility for geographically dispersed data centers. In the traditional approach, an IPv4/IPv6 address represents both a device s identity and location, as shown in Figure 1. Figure 1. Traditional IP Address In LISP, an IPv4/IPv6 address represents a device s identity only, and the RLOC identifies the location, as shown in Figure Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 18
4 Figure 2. IP Address in LISP Why Use LISP in the Data Center The Biggest use case of LISP in a data center environment is ingress route optimization due to workload mobility. Mobility across Multiple Data Centers with Ingress Route Optimization In today s enterprise data center deployments, server virtualization and high availability requires workloads to move from one data center to another across geographically dispersed locations. This mobility brings the challenge of route optimization when virtual servers move: how best to route traffic to the virtual server s current location? It also brings the challenge of maintaining the server s identity (IP address) when the server moves: how to retain the IP address across moves so that clients can continue to send traffic to it regardless of the server s current location. With LISP, when virtual servers move, the IP address and EIDs don t change; and only the RLOC identifiers change. As endpoints move, traffic is routed to these endpoints in their correct location following the best possible path (Figure 3). Figure 3. LISP IP Address Mobility between Data Centers There are other use cases of LISP in the data center, which are discussed in the Appendix section Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 18
5 VXLAN Overview Virtual Extensible LAN is a MAC address-in-user Datagram Protocol (UDP) tunneling mechanism. It identifies the Layer 2 segment through a 24-bit segment identifier called the VXLAN network identifier (VNI). The large VNI range allows the fabric to scale to 16 million segments, whereas a traditional Layer 2 network can scale to only 4096 VLANs. The original Layer 2 frame has a VXLAN header added and is then placed in a UDP-IP packet, thus enabling VXLAN to tunnel a layer packet over a Layer 3 network. Figure 4 shows the VXLAN packet format. Figure 4. VXLAN Packet Format VXLAN is an overlay technology that provides Layer 2 connectivity for workloads residing at noncontiguous points in the data center network. VXLAN provides flexibility by allowing workloads to be placed anywhere, and it offers the traffic separation required in a multitenant environment. Unlike in traditional Layer 2 technologies, VXLAN packets are transported through the underlay using IP information (Layer 3 header) and can take advantage of Equal-Cost Multipath (ECMP) Layer 3 routing. VXLAN EVPN Overview VXLAN Ethernet Virtual Private Network is a standards-based overlay solution that deploys VXLAN fabric with a Border Gateway Protocol (BGP)-based control plane that specifies the BGP EVPN control plane for overlays. The Cisco BGP control-plane solution for VXLAN uses the proven features of BGP to provide a more scalable, flexible, and policy-based alternative. It uses Multiprotocol BGP (MP-BGP) to distribute the required overlay reachability information. MP-BGP introduced new network layer reachability information (NLRI) called EVPN NLRI. This information carries both Layer 2 MAC address and Layer 3 IP address information at the same time (Figure 5). VXLAN EVPN provides significant advantages in the overlay network by getting the Layer 3 routing as close to the end host as possible. The BGP control plane is used to reduce flooding behavior and proactively distribute end-host information to participating VXLAN tunnel endpoints (VTEPs). The BGP control plane is used to: Discover VTEPs dynamically Distribute attached host MAC and IP addresses and avoid the need for the flood-and-learn mechanism for unknown unicast traffic Terminate Address Resolution Protocol (ARP) requests early to avoid flooding Many data centers today deploy a two-tier spine-and-leaf architecture for better scalability and flexibility. The traditional Layer 2 networks are contained in the leaf (top of rack) switches. VXLAN EVPN is used to extend these Layer 2 domains over the Layer 3 network for connectivity between the leaf switches. The leaf switches (which are also VTEP devices) run Multiprotocol Interior BGP (MP-iBGP) and peer with route reflectors that run on the spine switches. The function of the route reflectors is to reflect BGP updates between ibgp peers so that they don t need to form a fully meshed ibgp peering topology Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 18
6 Figure 5. BGP EVPN Control Plane for VXLAN VXLAN EVPN Integration with LISP Host Move Detection in a VXLAN EVPN Fabric In the VXLAN EVPN fabric, the host routes and MAC address information are distributed in the MP-BGP EVPN control plane, which means that the fabric itself performs the host detection. The LISP site gateways use these host routes for triggering the LISP mobility encapsulation and decapsulation. LISP, when integrated with VXLAN fabric, provides ingress route optimization for traffic from the clients to the data center (Figure 6). Figure 6. LISP Functional Roles in A VXLAN Fabric For detailed configuration of VXLAN using the EVPN control plane, please see the following white paper: - _Toc Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 18
7 When a virtual machine or host attaches to a leaf or top-of-rack (ToR) switch, the Layer 2 information is transported to its peers in the fabric using MP-BGP. This approach helps ensure connectivity between hosts within a data center fabric (Figure 7). Figure 7. Host 1 in VLAN 1000 Attaches to Leaf or ToR Switch 1 and Is Associated with VNI 5000 When the virtual machine or host moves from one leaf switch to another, the new leaf switch detects that a virtual machine has moved behind it by snooping on Domain Host Configuration Protocol (DHCP) or ARP packets. It populates the reachability information in MP-BGP and advertises the updated MAC address route to its peers with an updated sequence number (Figure 8). Figure 8. Host 1 Moves from Leaf or ToR Switch 1 to Leaf or ToR Switch Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 18
8 When the original leaf or ToR switch receives the route update with the modified sequence number, it sends a withdraw message for the stale reachability information (Figure 9). Figure 9. BGP Control Plane: Old Route Withdrawn from Leaf or ToR Switch 1 Host Mobility across VXLAN EVPN Fabrics When the leaf or ToR switch detects a host movement across data centers, it injects that host route into the MP-BGP EVPN control plane with an updated sequence number. The sequence number is a mobility community attribute that represents the state of mobility. It increments every time the server moves from one location to another. This sequence number attribute has to be carried to the original leaf or ToR switch from which the host moved, because it needs to withdraw that particular host route from BGP. The host route withdrawal happens only when the leaf or ToR switch receives a route with an updated sequence number. LISP currently cannot carry the mobility community attribute across the data center through the WAN. To help LISP achieve mobility semantics across VXLAN EVPN fabrics, you need to establish an Exterior BGP (egbp) relationship between the data centers. This ebgp relationship is used to carry the mobility community attribute in BGP EVPN across the data center sites for the stale reachability information (Figure 10 and figure 13) Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 18
9 Figure 10. HOST Mobility across Data Centers with LISP In Figure 10: 1. The end system or server, after moving to a new location, sends a DHCP and ARP packet to join the new network. 2. The leaf or ToR switch detects the new host and redistributes the IP address and MAC reachability information in the MP-BGP EVPN control plane with an updated sequence number. This sequence number attribute is carried across the data centers using an ebgp relationship between AS and When the original leaf or ToR switch receives the route information with an updated sequence number, it withdraws its original route from BGP. When the host first comes online (before moving across data centers), the sequence number attribute will be 0. This value indicates that this was the first time that the host is coming online in any data center (Figure 11). Figure 11. Host Mobility with Sequence Number Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 18
10 After the host moves from one location to another, the sequence number is updated to 1, which triggers the route update through the ebgp connection and the route withdrawal from the original leaf or ToR switch (Figure 12). Figure 12. Host Mobility with Sequence Number 1 3. When the LISP site gateway (also running MP-BGP EVPN in the fabric) detects this new host, it sends a map-register message to the map-system database to register the new IP address in its own data center (BGP AS 65002). 4. When the map system receives the map-register message from BGP, AS sends a map-notify message to the old LISP site gateways, notifying them that the host has moved from their data center. This message helps ensure that the LISP site gateways install a Null 0 route for that prefix in their routing tables. This Null 0 prefix indicates that the host is in a location remote to that data center. Figure 13. LISP Map System Updates 5. When the clients in the remote branch sites try to send traffic to the LISP site gateways at which the host was present (BGP AS 65001) before the mobility event, the site gateways see that the host is reachable through a Null 0 route. This event triggers a solicit-map request (SMR) from the site gateways to the LISP-enabled router in the branch site asking it to update its database. 6. The branch router then sends a map request to the mapping system asking for the new location of the host. This request is relayed to the LISP site gateways to which the host has moved (BGP AS 65002) Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 18
11 7. The LISP site gateways in BGP AS unicast a map reply to the LISP-enabled branch router asking it to update its database with the new location. Now data traffic starts to flow to the correct data center (BGP AS 65002). Summary LISP as a solution is very easy to configure (with just a few commands, as shown in the configurations that follow), and it provides an optimal way to resolve ingress route optimization challenges that result from workload mobility across data centers. The Cisco Nexus 7000 Series and 7700 platform are switches with comprehensive feature sets that can be used to implement the VXLAN-to-LISP solution discussed in this document using the F3 line cards. F3 line cards provide multiple-data-plane encapsulation in hardware and control-plane protocols. VXLAN encapsulation is implemented in hardware on the southbound side, and LISP is implanted in hardware on the northbound side on the F3 cards, making the Cisco Nexus 7000 Series and 7700 platform with F3 line cards an excellent solution. Functional Roles and Configuration Figure 14 shows the topology of the LISP solution. Figure 14. Topology * In this topology the EBGP EVPN relationship between the two data centers is through an Layer 3 Data-center Interconnect (DCI). The Layer 3 connection between the data centers is highlighted using green dotted lines in the above topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 18
12 Hardware and Software Details Table 1 summarizes the hardware and software versions used in the configuration example. Table 1. Hardware and Software Used in Configuration Example Functional Role Hardware Platform Software Version Border spine and border leaf Cisco Nexus 7000 Series and 7700 platform with F3 line card Cisco NX-OS Software Release 7.2 Map server and map resolver Cisco ASR 1000 Series Aggregation Services Routers Cisco IOS XE Software Release Border Spine Configuration in Data Center 1 (BGP AS 65001) This section summarizes the steps for configuring LISP for hand-off from VXLAN on the border spine or border leaf switch. Step 1. Enable the LISP control plane. Step 2. Configure the LISP map-server and map-resolver reachability. Step 3. Configure the LISP hand-off for the tenant VRF instances. The following example shows a configuration for a two-tenant VRF instance Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 18
13 * If you need to configure additional EID (IP address) subnets to map to the VRF instance, then you will have to create another dynamic EID subnet name. Example: The LISP instance ID provides a means of maintaining unique address spaces in the control and data plane. Instance IDs are numerical tags defined in the LISP canonical address format (LCAF). The instance ID has been added to LISP to support virtualization. When multiple organizations within a LISP site are using private addresses as EID prefixes, their address spaces must remain segregated to prevent address duplication. An instance ID in the address encoding can be used to create multiple segmented VPNs within a LISP site at which you want to keep using EID-prefix-based subnets. The LISP instance ID is currently supported in LISP ingress tunnel routers and egress tunnel routers (ITRs and ETRs), map server (MS), and map resolver (MR). The LISP locator VRF is used to associate a VRF table through which the routing locator address space is reachable with a router LISP instantiation Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 18
14 Border Leaf Configuration in Data Center 2 (BGP AS 65002) Configuration of border leaf is the same as the border spine we discussed above For the other Border Spine in Data center 1(BGP AS 65001) and Border Leaf in Data center 2 (BGP AS 65002) the above configuration can be replicated. LISP Map-System Database Configuration Step 1. Configure the map server and map resolver on the switch. The map server and map resolver can be on either the same device or multiple devices. The scenario here uses an ASR 1000 Series router as the map server and map resolver Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 18
15 Branch Site Configuration Verification To check for the EID (host IP address) learned on the LISP site gateway on a Cisco Nexus 7000 Series or 7700 platform switch, use the configuration shown here. To check for LISP map-cache entries on the map server, use the configuration shown here Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 18
16 Conclusion This document provided a brief overview of VXLAN, VXLAN EVPN, and LISP before delving into how to integrate VXLAN EVPN with LISP. Appendix: Other Benefits of LISP in the Data Center LISP also supports these additional capabilities in your data center environment: IPv6 enablement Multitenancy and large-scale VPNs Efficient multihoming at the WAN edge IPv6 Enablement Enterprises wanting to use IPv6 often have problems because their current WAN supports only IPv4 traffic. LISP can help resolve this problem because you can transition to IPv6 in phases while still having other sites and the underlay network on IPv4. This technique is an efficient way to create and operate IPv6 islands within the current network deployment. You can do this using the existing IPv4 underlay by encapsulating IPv6 host packets within IPv4 headers. LISP provides support for both IPv4 and IPv6 EIDs and RLOCs (Figure 15). Figure 15. IPv6 Enablement with LISP 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 18
17 Multitenancy and Large-Scale VPNs LISP implements location and ID separation, which creates two namespaces: one for RLOCs (locations) and one for EIDs (IP addresses). These namespaces provide tenant separation using the LISP mapping system because LISP binds virtual routing and forwarding (VRF) to instance IDs. The LISP instance ID is a 24-bit value, which is included in the LISP header to provide control- and data-plane traffic separation. The LISP multitenancy solution also supports VPNs across enterprise networks to extend the network segmentation beyond local network boundaries. This extension is accomplished with multiple VRF instances using the LISP mapping system. Each VRF instance is tied to instance IDs for the address space (EID) in the VRF instance. This use case enables all the new VRF instances to be transported over one WAN network separated logically using VPNs (Figure 16). Figure 16. Multitenancy and Large-Scale VPNs Efficient Multihoming at the WAN Edge The built-in multihoming and traffic engineering features are one of the primary benefits of LISP. Multihoming with LISP is the capability to efficiently adjust the load on each WAN link without having to use advanced BGP traffic engineering. This is accomplished very simply by setting the RLOC weight. This approach enables you to manage and balance the utilization of the ingress bandwidth by setting the priorities. This design offers preference for egress tunnel routers (ETRs) over others, allowing some systems to act as primary ETRs and others to act as backups, thus inherently providing multihoming. This feature is implemented using the priority field, with lowerpriority systems being preferable over higher-priority systems (Figure 17). Figure 17. Multihoming at the WAN Edge 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 18
18 For More Information For a detailed understanding of VXLAN and LISP, see: Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 18
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationVXLAN Bridging & Routing
VXLAN Bridging & Routing Darrin Machay darrin@arista.com CHI-NOG 05 May 2015 1 VXLAN VM-1 10.10.10.1/24 Subnet A ESX host Subnet B ESX host VM-2 VM-3 VM-4 20.20.20.1/24 10.10.10.2/24 20.20.20.2/24 Load
More informationCisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures
White Paper Cisco Virtual Topology System: Data Center Automation for Next-Generation Cloud Architectures 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
More informationTransform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
More informationLISP Functional Overview
CHAPTER 2 This document assumes that the reader has prior knowledge of LISP and its network components. For detailed information on LISP components, their roles, operation and configuration, refer to http://www.cisco.com/go/lisp
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationCLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
More informationExtending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
More informationETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) NEXT-GENERATION VPN FOR ETHERNET SERVICES Alastair JOHNSON (AJ) February 2014 alastair.johnson@alcatel-lucent.com AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
More informationPreserve IP Addresses During Data Center Migration
White Paper Preserve IP Addresses During Data Center Migration Configure Cisco Locator/ID Separation Protocol and Cisco ASR 1000 Series Aggregation Services Routers 2015 Cisco and/or its affiliates. All
More informationStretched Active- Active Application Centric Infrastructure (ACI) Fabric
Stretched Active- Active Application Centric Infrastructure (ACI) Fabric May 12, 2015 Abstract This white paper illustrates how the Cisco Application Centric Infrastructure (ACI) can be implemented as
More informationETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES
ETHERNET VPN (EVPN) OVERLAY NETWORKS FOR ETHERNET SERVICES Greg Hankins RIPE 68 RIPE 68 2014/05/12 AGENDA 1. EVPN Background and Motivation 2. EVPN Operations 3. EVPN
More informationDeploy Application Load Balancers with Source Network Address Translation in Cisco Programmable Fabric with FabricPath Encapsulation
White Paper Deploy Application Load Balancers with Source Network Address Translation in Cisco Programmable Fabric with FabricPath Encapsulation Last Updated: 5/19/2015 2015 Cisco and/or its affiliates.
More informationAnalysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationMPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationUsing OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
More informationScalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
More informationSimplify Your Route to the Internet:
Expert Reference Series of White Papers Simplify Your Route to the Internet: Three Advantages of Using LISP 1-800-COURSES www.globalknowledge.com Simplify Your Route to the Internet: Three Advantages of
More informationTRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
More informationMPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
More informationJuniper Networks EVPN Implementation for Next-Generation Data Center Architectures
Juniper Networks EVPN Implementation for Next-Generation Data Center Architectures Using Ethernet VPN to Address Evolving Data Center Requirements 1 Table of Contents Executive Summary... 3 Introduction...
More informationData Center Use Cases and Trends
Data Center Use Cases and Trends Amod Dani Managing Director, India Engineering & Operations http://www.arista.com Open 2014 Open Networking Networking Foundation India Symposium, January 31 February 1,
More informationData Center Infrastructure of the future. Alexei Agueev, Systems Engineer
Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports
More informationHow To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationWHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
More informationVirtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
More informationEVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
More informationPRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
More informationVPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationIPv6 over IPv4/MPLS Networks: The 6PE approach
IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25
More informationQuidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
More informationVirtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
More informationRoman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG
Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG North Core Distribution Access South North Peering #1 Upstream #1 Series of Tubes Upstream #2 Core Distribution Access Cust South Internet West
More informationExample: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor
642-902 Route: Implementing Cisco IP Routing Course Introduction Course Introduction Module 01 - Planning Routing Services Lesson: Assessing Complex Enterprise Network Requirements Cisco Enterprise Architectures
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationDemonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
More informationAvaya VENA Fabric Connect
Avaya VENA Fabric Connect Executive Summary The Avaya VENA Fabric Connect solution is based on the IEEE 802.1aq Shortest Path Bridging (SPB) protocol in conjunction with Avaya extensions that add Layer
More informationIntroducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
More informationInterconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
More informationData Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair
Data Center Network Virtualisation Standards Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair May 2013 AGENDA 1. Why standardise? 2. Problem Statement and Architecture
More informationSimplify Your Data Center Network to Improve Performance and Decrease Costs
Simplify Your Data Center Network to Improve Performance and Decrease Costs Summary Traditional data center networks are struggling to keep up with new computing requirements. Network architects should
More informationVXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure
W h i t e p a p e r VXLAN Overlay Networks: Enabling Network Scalability for a Cloud Infrastructure Table of Contents Executive Summary.... 3 Cloud Computing Growth.... 3 Cloud Computing Infrastructure
More informationRouter and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More informationMPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
More informationIntroduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
More informationMultitenancy Options in Brocade VCS Fabrics
WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.
More informationUsing the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
More informationCloud Computing and the Internet. Conferenza GARR 2010
Cloud Computing and the Internet Conferenza GARR 2010 Cloud Computing The current buzzword ;-) Your computing is in the cloud! Provide computing as a utility Similar to Electricity, Water, Phone service,
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationHow To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
More informationWHITEPAPER. Bringing MPLS to Data Center Fabrics with Labeled BGP
WHITEPAPER Bringing MPLS to Data Center Fabrics with Labeled BGP Bringing MPLS to Data Center Fabrics with Labeled BGP MPLS is a well-known and mature technology typically used in service provider environment.
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationCisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
More informationExpert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts
Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor
More informationWhat is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
More informationCisco IP Solution Center MPLS VPN Management 5.0
Cisco IP Solution Center MPLS VPN Management 5.0 As part of the Cisco IP Solution Center (ISC) family of intelligent network management applications, the Cisco ISC MPLS VPN Management application reduces
More informationNetwork Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
More informationthe Data Center Connecting Islands of Resources Within and Across Locations with MX Series Routers White Paper
White Paper Integrating SDN into the Data Center Connecting Islands of Resources Within and Across Locations with MX Series Routers Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationCONNECTING PHYSICAL AND VIRTUAL WORLDS WITH VMWARE NSX AND JUNIPER PLATFORMS
White Paper CONNECTING PHYSICAL AND VIRTUAL WORLDS WITH WARE NSX AND JUNIPER PLATFORMS A Joint Juniper Networks-ware White Paper Copyright 2014, Juniper Networks, Inc. 1 Connecting Physical and Virtual
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationSDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
More informationAPNIC elearning: Introduction to MPLS
2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security DNS/DNSSEC
More informationDEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING
DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING
More informationVirtual Machine Manager Domains
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 VMM Domain Policy Model, page 2 Virtual Machine Manager Domain Main Components,
More informationVirtual Subnet: A Scalable Cloud Data Center Interconnect Solution
Virtual Subnet: A Scalable Cloud Data Center Interconnect Solution draft-xu-virtual-subnet-06 Xiaohu Xu (xuxh@huawei.com) IETF82, TAIWAN Why VM Mobility across Data Centers Data center maintenance Applications
More informationCORD Fabric, Overlay Virtualization, and Service Composition
CORD Design Notes CORD Fabric, Overlay Virtualization, and Service Composition Saurav Das Open Networking Foundation Ali Al Shabibi, Jonathan Hart, Charles Chan and Flavio Castro Open Networking Lab Hyunsun
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationMPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
More informationBorder Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
More informationInterconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
More informationCloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
More informationVMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
More information20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
More informationWhat is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
More informationInter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
More informationInterconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)
Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs) 2-Interconnecting Cisco Networking Devices Part 2 (40 Hs) 1-Interconnecting
More informationBrocade Data Center Fabric Architectures
WHITE PAPER Brocade Data Center Fabric Architectures Building the foundation for a cloud-optimized data center. TABLE OF CONTENTS Evolution of Data Center Architectures... 1 Data Center Networks: Building
More informationEnterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,
More informationVMware Network Virtualization Design Guide. January 2013
ware Network Virtualization Technical WHITE PAPER January 2013 ware Network Virtualization Table of Contents Intended Audience.... 3 Overview.... 3 Components of the ware Network Virtualization Solution....
More informationCHAPTER 6 DESIGNING A NETWORK TOPOLOGY
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationLayer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationMPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
More informationCOURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
More informationConnecting Physical and Virtual Networks with VMware NSX and Juniper Platforms. Technical Whitepaper. Whitepaper/ 1
Connecting Physical and Virtual Networks with VMware NSX and Juniper Platforms Technical Whitepaper Whitepaper/ 1 Revisions Date Description Authors 08/21/14 Version 1 First publication Reviewed jointly
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More informationExamination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: December 15 2009 14:00 18:00 1. No help material is allowed - You
More informationTRILL Large Layer 2 Network Solution
TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network
More informationVMware. NSX Network Virtualization Design Guide
VMware NSX Network Virtualization Design Guide Table of Contents Intended Audience... 3 Overview... 3 Components of the VMware Network Virtualization Solution... 4 Data Plane... 4 Control Plane... 5 Management
More informationCampus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI rsm@nkn.in 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
More information