Always Up: High Availability Features for Cisco Catalyst 6500/Cisco 7600 Switches and Routers
|
|
|
- Sara Green
- 10 years ago
- Views:
Transcription
1 Always Up: High Availability Features for Cisco Catalyst 6500/Cisco 7600 Switches and Routers prepared for Cisco Systems September 2004
2 C O N T E N T S Executive Summary...2 Introduction...5 GLBP Baseline Tests...8 NSF/SSO Testing: A Complex Configuration OSPF NSF/SSO Failover BGP NSF/SSO Failover Multicast Multilayer Switching NSF/SSO Failover NSF/SSO Protection for Upper-Layer Services NSF/SSO Failover for Wireless LAN Traffic GBase-CX4 Throughput Conclusion Acknowledgements About Opus One I L L U S T R A T I O N S Figure 1: Key Factors for Network Infrastructure...3 Figure 2: Comparing VRRP and GLBP...6 Figure 3: The GLBP Test Bed...8 Table 1: GLBP Failover Tests Figure 4: The OSPF NSF/SSO Test Bed Table 2: Failover With Various Cisco Redundancy Methods Table 3: OSPF NSF/SSO Failover Times Figure 5: OSPF NSF/SSO Traffic Classification, Supervisor Figure 6: OSPF NSF/SSO Traffic Classification, Supervisor Table 4: OSPF NSF/SSO Traffic Classification, Supervisor Table 5: OSPF NSF/SSO Traffic Classification, Supervisor Figure 7: The BGP NSF/SSO Test Bed Table 6: BGP NSF/SSO Failover Times Figure 8: BGP NSF/SSO Traffic Classification, Supervisor Figure 9: BGP NSF/SSO Traffic Classification, Supervisor Table 7: BGP NSF/SSO Traffic Classification, Supervisor Table 8: BGP NSF/SSO Traffic Classification, Supervisor Table 9: BGP NSF/SSO VoIP Traffic Handling Figure 10: MMLS/NSF/SSO Failover Test Bed Figure 11: MMLS/NSF/SSO Failover for Supervisor Table 10: MMLS/NSF/SSO Failover Times Table 12: NSF/SSO Supervisor Failover With Long-Lived HTTP Sessions Table 13: NSF/SSO Supervisor Failover With Long-Lived HTTP and HTTPS Sessions34 Figure 12: WLSM with NSF/SSO Failover Test Bed Figure 13: WLSM Failover With NSF/SSO Table 13: 10GBase-CX4 Performance Page 2 of 40
3 Executive Summary High availability ranks among the top network infrastructure requirements more so than security, standards support, performance, or even price. There s good reason for this kind of thinking: High availability features increase uptime and prevent losses in productivity and revenue. A recent study by Infonetics Research makes clear the importance of high availability features. When asked to name their top requirements for WAN and Internet infrastructure, network managers rated high availability well ahead of nearly all other factors 1. Figure 1 below presents results from the Infonetics study. Figure 1: Key Factors for Network Infrastructure 70% 58% 58% 62% 64% Percentage of respondents rating 6 or 7 60% 50% 40% 30% 20% 10% 12% 23% 30% 33% 38% 49% 55% 0% MPLS Packetized voice Integrated CSU/DSU Copper and optical interfaces Protocol transparency Integrated security Standards-based Price/performance ratio Ease of configuration High availability Manageability Cisco Systems is addressing the requirement for resilient network infrastructure by adding several new features to its Cisco Catalyst 6500 series switches and Cisco 7600 series routers Gateway Load Balancing Protocol (GLBP), Non-Stop Forwarding (NSF), and Stateful Switchover (SSO). These features ensure greater uptime with no loss in functionality of existing switch or router features. Cisco commissioned Opus One, an independent networking consultancy, to conduct performance tests measuring the effectiveness of Cisco s new resiliency mechanisms. 1 Infonetics Research, User Plans for WAN and Internet Access, US/Canada, Page 3 of 40
4 Opus One not only tested each resiliency mechanism, but also applied many of the factors at work in large enterprise settings: Unicast and multicast traffic; voice over IP traffic; Policy Based Routing; QoS enforcement; attacks using spoofed IP addresses; and very large access control lists. In addition to the resiliency tests, Opus One tested Cisco s new 10GBase-CX4 interfaces, a cost-effective new standard for running 10-gigabit Ethernet over copper. Among the key findings of Opus One s tests: NSF/SSO provides zero packet loss on any of 4 million flows despite the loss of a Supervisor Engine card and 10,000 OSPF routes when line cards are equipped with Distributed Forwarding Card (DFC) modules NSF/SSO provides zero packet loss on any of 4 million flows despite the loss of a Supervisor Engine card and 10,000 BGP routes when line cards are equipped with Distributed Forwarding Card (DFC) modules No loss in functionality during or after Supervisor Engine failure for any of the following features: Policy Based Routing, access control lists, rate limiting, and Unicast Reverse Path Forwarding (urpf, which protects against the use of spoofed IP addresses in DoS attacks) Thanks to enhanced wiring-closet device resilience provided by Cisco's new Gateway Load-Balancing Protocol (GLBP), first-hop router or switch recovery of 2.01 seconds or less Perfect load balancing across protected VLANs and subnets using GLBP, making full use of two uplinks to each wiring closet and doubling capacity compared with VRRP NSF/SSO failover times are virtually identical with unicast and multicast traffic, even when 10,000 s,g mroutes are involved Minimal degradation of voice over IP audio quality during Supervisor Engine failover NSF/SSO protects upper-layer session state through tight integration with other services modules for Cisco Catalyst switches NSF/SSO delivers high availability to wireless as well as wired clients through tight integration with the new Wireless LAN Services Module (WLSM) for Cisco Catalyst 6500 series switches Line-rate throughput for the new 10GBase-CX4 interfaces Page 4 of 40
5 These results underscore the ability of Cisco Catalyst 6500 series switches and Cisco 7600 series routers to deliver near-perfect uptime, despite the loss of a Supervisor Engine card. This report is organized as follows. An introduction describes the various high availability mechanisms tested. Then we move on to discuss test bed configuration, procedures and results from tests of GLBP, NSF/SSO with OSPF, NSF/SSO with BGP, and NSF/SSO with IP multicast traffic. Introduction Our tests focused on three of Cisco s resiliency features for Cisco Catalyst 6500 series switches and Cisco 7600 series routers: the Gateway Load Balancing Protocol (GLBP), Non-Stop Forwarding (NSF), and Stateful Switchover (SSO). We also benchmarked the performance of new 10Gbase-CX interfaces, which give the Cisco Catalyst 6500 and Cisco gigabit-Ethernet-over-copper capability. The Gateway Load Balancing Protocol is a patent-pending evolution of Cisco s Hot Standby Router Protocol (HSRP). With first-hop router redundancy protocols such as the Virtual Router Redundancy Protocol (VRRP) or Cisco s Hot Standby Routing Protocol (HSRP), only a single active forwarder is permitted per protected subnet/vlan 2. In addition, VRRP permits only one of the two uplinks from each wiring closet to be active; the other is held in standby mode and cannot be used to carry traffic. GLBP, in contrast, allows the use of both redundant uplinks during normal operation. This allows both GLBP routers to be "active forwarders" simultaneously. With GLBP, both GLBP routers are active in the routed topology. The rest of the network will see equal-cost paths to the protected subnet, and traffic to that subnet is load-balanced across the two routers. In the reverse direction, a patent-pending method load-balances traffic from end-stations between the two GLBP routers. With GLBP, failover times are configurable. The net result: GLBP doubles available bandwidth while allowing users to deploy a single subnet in the wiring closet. GLBP can be said to be an active-active protocol, while VRRP is an active-passive protocol. VRRP supports a single active uplink from the wiring closet at any one time. GLBP, in contrast, makes use of both uplinks during normal operation. Further, it balances the load across uplinks. Our test results confirmed that GLBP distributes loads evenly across links. In fact, the load was so evenly distributed in our tests that interface counters on each of two Cisco Catalyst switches running GLBP matched to the packet. 2 RFC 3768 describes VRRP, while RFC 2281 describes HSRP. Page 5 of 40
6 Figure 2 below compares forwarding paths for VRRP (on the left) and GLBP (on the right.) Figure 2: Comparing VRRP and GLBP Core Core Core Core Uplink A 100 % Uplink B 0 % Uplink A 50 % Uplink B 50 % L2 wiring closet switch VRRP L2 wiring closet switch GLBP GLBP also enhances routing resiliency. If one GLBP router fails, another is instantly able to forward traffic to/from the core network since its routing adjacencies are already established. This is not the case with VRRP. Non-Stop Forwarding (NSF) makes use of the industry-standard graceful restart mechanisms developed by the IETF. It preserves layer-3 forwarding state during the loss and restart of a routing session, as might occur due to the failure of a Supervisor card. Without NSF, reconvergence after loss of a routing session may take tens of seconds or even minutes. For example, the OSPF routing protocol s default timer values require 40 seconds to pass before a router will declare a routing session to be dead. Then a new routing session must be re-established, followed by a potentially lengthy exchange of routing updates. Our tests show that NSF can reduce this interval to 2 seconds or less for packets centrally switched by the failed Supervisor Engine card, or zero loss if NSF/SSO is used in conjunction with line cards equipped with Cisco s Distributed Forwarding Card (DFC) modules. Page 6 of 40
7 Cisco s NSF works with EIGRP, BGP, OSPF, and IS-IS. We used OSPF and BGP in these enterprise-focused tests. Stateful Switchover (SSO) is Cisco s method of preserving layer-2 forwarding state despite the failure of a Supervisor Engine card. SSO synchronizes layer-2 forwarding tables and spanning tree topology state between redundant Supervisor cards in the same chassis. This ensures forwarding will continue even after the loss of an active Supervisor card, and that no spanning tree topology change will be triggered by the failover to the standby Supervisor. Page 7 of 40
8 GLBP Baseline Tests The Gateway Load Balancing Protocol feature of Cisco IOS provides both fault tolerance and load-sharing, something we demonstrated in tests involving multiple failure scenarios. As noted in the introduction, GLBP improves on existing redundancy technologies like Virtual Router Redundancy Protocol (VRRP) by providing activeactive rather than active-standby availability of redundant routers. Figure 3 below illustrates the test bed used in the GLBP baseline tests. Four Cisco Catalyst 6500 switches designated A, B, C, and D are interconnected with 10-gigabit Ethernet circuits. 3 While we used Cisco Catalyst switches for this project, the same features are available on Cisco 7600 series routers. Figure 3: The GLBP Test Bed SmartBits TeraRouting 40 hosts per port 160 hosts total VLAN /24 L2 10GE C6509(A) 10GE L3 GLBP VIP = L3 C6509(B) 10GE (Copper) C6509(D) L3 10GE C6509(C) 2,500 OSPF networks per port 10,000 OSPF networks total SmartBits TeraRouting 3 We used Cisco Catalyst 6500 series switches for these tests, but all test results in this document apply equally to Cisco 7600 series routers. Any references to Cisco Catalyst switches in text cover the Cisco 7600 series routers as well. Page 8 of 40
9 Switch A represents a layer-2 wiring-closet device. Behind it, a SmartBits traffic analyzer/generator offers traffic from 40 emulated hosts on each of four switch ports, for a total of 160 emulated hosts. The interfaces linking Switch A with Switches B and C share a common VLAN ID. Switches B and C represent redundant layer-3 devices at the core of the network. These two GLBP-enabled routers share a single virtual IP address used by end-stations (emulated by the SmartBits) as their default gateway. By responding to end-station ARP requests with alternating MAC addresses representing Switch B or C, GLBP directs endstations to use one or the other GLBP router as their default gateway. In this way, traffic from the end-stations is balanced evenly across the A-B and A-C links. This virtual IP address is in the same VLAN and IP subnet as the end-stations being protected by GLBP. Switch D represents another layer-3 core device with a large number of networks behind it. A SmartBits attached to Switch D establishes OSPF adjacencies and advertises 2,500 networks behind each of four interfaces, for a total of 10,000 networks. We offered test traffic to four ports on Switch A, destined to all 10,000 networks beyond Switch D, at a rate of 1 million packets per second. At that rate, each dropped packet represents 1 microsecond of failover time. We ran this test multiple times: First as a baseline case with no failure to verify that GLBP load-balanced traffic as claimed, and then with separate failover test cases involving a link failure and failures of the Supervisor 720 card in Switch B and the Supervisor 2 card in Switch C. By testing both Supervisor 720 and Supervisor 2 scenarios, we covered the major portion of Cisco's installed base of users. This validated the functionality of GLBP in either environment, or indeed in a hybrid network as used in these tests. In the no-failure baseline, we verified that the system under test could forward to all ports at 1 million packets per second with zero loss. This test also determined that GLBP balanced the load across the A-B and A-C links. We verified load balancing using the Cisco Catalyst 6500 port counters, which showed uniform distribution of packets across the two paths. We then verified the accuracy of the Cisco Catalyst port counters by comparing them with SmartBits transmit and receive counters. All the counters matched: Load balancing was perfect across the A-B and A-C links. Next, we offered the same traffic and tested the effects of link failure. Approximately 30 seconds into the 60-second test, we physically disconnected the A-C link, forcing GLBP to redirect all traffic onto the A-B link. GLBP worked correctly here: All traffic arrived at the destination ports with zero loss despite the loss of the A-C link. Since ample bandwidth existed on the A-B link to carry Page 9 of 40
10 traffic redirected from the A-C link, zero loss was the expected result. We noted that there was no routing protocol convergence needed on Switch B, allowing traffic to be forwarded with no delay. In the next test case, we forced a Supervisor card failure by removing the active Supervisor 720 card from Switch B approximately 30 seconds into the test. This removal forced GLBP to redirect traffic onto the A-C link and through Switch C. In three trials, the failover took an average of 1.2 seconds. This test result represents the time needed for flows to be redirected and switched through Switch C. We then repeated the test while removing the active Supervisor 2 card from Switch C, thus forcing the system to redirect traffic via Switch B. This time, the failover took an average of 2.0 seconds over three trials. Table 1 below summarizes results from the GLBP failover tests. Table 1: GLBP Failover Tests Test case GLBP, Supervisor 720 card failure in Switch B GLBP, Supervisor 2 card failure in Switch C Failover time (seconds) Page 10 of 40
11 NSF/SSO Testing: A Complex Configuration Large-scale enterprise networks are anything but simple, and we used an accordingly complex setup in our NSF/SSO tests. The test bed configuration modeled many aspects of large-scale production networks, involving not only multiple OSPF areas or BGP autonomous systems, but also many other factors that can affect network performance. The features simultaneously active in this test included all of the following: Policy-Based Routing (PBR). It is often desirable for administrative or technical reasons to override OSPF or BGP shortest-path calculations and force some traffic to use high-cost links. For this event, the Cisco Catalyst 6500 switches were configured to enforce PBR on a subset of test traffic. The expected result was that the switches would continue to enforce policy during and after a failover, sending specified traffic and only specified traffic over a high-cost link. Access Control Lists (ACLs). We used a 10,000-line access control list in this test. That is considerably larger than the ACLs in use at even many large organizations, and thus considerably more stressful a test case. The 9,999th rule required routers to discard all test traffic with a particular destination IP address and TCP port number. Placing this rule at the bottom of the list forced the switches to compare every packet to nearly 10,000 entries before making a forwarding decision. The expected result was that the switches would drop all traffic matching the 9,999th rule during and after failover, demonstrating that ACLs remain in effect at all times. To simplify results tracking, we configured the Spirent SmartBits traffic generator/analyzer to send all traffic matching the 9999th rule to a single destination interface. Therefore, we expected one SmartBits interface to receive zero packets before, during, and after a failover. Unicast Reverse Path Forwarding (urpf). Denial-of-service and other attacks commonly originate from spoofed IP addresses. Tracing spoofed addresses to their actual origin can be quite difficult. If a packet with a spoofed address originates from a directly attached subnet, ACLs can help by blocking traffic not originating from that subnet. However, such ACLs do nothing to stop forged packets sourced from one or more hops away. Cisco s hardware-based Unicast Reverse Path Forwarding (urpf) feature compares the source address of every received packet with the known shortestpath route back to the source subnet. If the packet s source interface does not represent the shortest known path back to the source subnet, urpf discards the packet thus blocking the attack and saving the network from possible meltdown. Page 11 of 40
12 We tested urpf by generating packets with spoofed source addresses. These were not just any spoofed addresses; we used legitimate source addresses from other subnets in the test network, forcing the Cisco Catalyst switches to distinguish between legitimate and spoofed traffic. The expected result was that urpf would block all packets offered with spoofed addresses, both during and after a failover. In this case, packets with spoofed addresses represented 20 percent of all traffic offered to one of the switches; thus, we expected loss of exactly 20 percent on each destination interface for traffic received from this switch. Further, we expected the system to forward traffic from legitimate sources (packets from the same source network as the spoofed traffic), demonstrating that urpf distinguishes between legitimate and spoofed addresses. QoS Enforcement. Opus One examined the ability of the Cisco Catalyst switches to classify traffic, apply a rate limiter, and forward packets to the appropriate priority queues during and after a Supervisor card failure. We offered all test traffic with a diff-serv codepoint (DSCP) value of 63, the highest possible priority. For a subset of test traffic, the switches were configured to enforce a very low forwarding rate of 2,000 packets per second. Rather than simply dropping packets above that rate, the rate limiter was configured to mark down any traffic exceeding 2,000 pps with a lower DSCP value of 40. The expected result was that the Cisco Catalysts would forward all traffic to the expected priority queues, and correctly re-mark DSCPs for any traffic exceeding the rate limiter s maximum setting. This re-marking capability is an important safeguard for devices enforcing QoS policies; it prevents errant or maliciously mismarked packets from using all available bandwidth by claiming high-priority status. By default, Cisco Catalyst 6500 series switches re-mark all ingress traffic with a normal DSCP value of 0 unless otherwise configured. IP Telephony. In addition to the various other conditions, we offered voice-over- IP (VoIP) traffic to determine whether the switches would protect audio quality by ensuring low, consistent delay during and after the failure of a Supervisor card. Using the SmartVoIP/QoS application for the SmartBits, we offered G.711- encoded VoIP traffic and used the application s Perceptual Speech Quality Measurement (PSQM) scores to determine audio quality. We offered voice traffic both with and without a Supervisor card failover. The expected result was minimal variation in PSQM scores across the two test cases. We mixed this alphabet soup of factors PBR, ACLs, urpf, QoS, and VoIP together, introducing all features simultaneously in our tests of with NSF/SSO failover with OSPF and BGP. Page 12 of 40
13 OSPF NSF/SSO Failover We tested the effects of NSF/SSO in OSPF networks using a complex configuration modeling many aspects of large-scale enterprise networks. The test included not only multiple OSPF areas but also numerous other factors including Policy Based Routing, a 10,000-line access control list, Unicast Reverse Path Forwarding, QoS enforcements, and VoIP traffic. Figure 4 below illustrates the test bed used in the OSPF NSF/SSO event. OSPF Area 0 represents the core switches in a data center. Area 1 represents internal subnets at a local site, while Area 4 represents subnets at remote sites. Figure 4: The OSPF NSF/SSO Test Bed OSPF Area 1 SmartBits(A) TeraRouting SmartBits(B) SmartVOIP/QoS L3 OSPF Area 0 10GE C6509(A) 10GE L3 OSPF High Cost Path 8 L3 C6509(B) 10GE (Copper) 802.3ad C6509(D) L3 10GE C6509(C) OSPF Area 4 SmartBits emulates 40 users per port, total of 200 users in subnet SmartBits advertises 2,000 OSPF routes per port, 10,000 routes in total SmartBits(A) TeraRouting SmartBits(B) SmartVOIP/QoS The test bed differed from that used in the GLBP baseline tests in these respects: All switches are configured as layer-3 routers running OSPF with graceful restart extensions. The TeraRouting application for SmartBits advertises 1,000 networks behind each of 10 interfaces, for a total of 10,000 routes advertised. The test traffic represents Page 13 of 40
14 200 hosts on each of these 10,000 networks, for a total of 2 million layer-3 flows on the test bed. Switch A has seven edge interfaces. On five of these, the TeraRouting application for SmartBits advertises 1,000 networks behind each interface. On the other two interfaces, we generate voice traffic using the SmartVoIP/QoS application. Switches B and C communicate with Switch A using router interfaces and OSPF. Also, Switches B and C are interconnected using an IEEE 802.3ad link aggregation group (LAG) consisting of eight interfaces on each switch. The devices treat this LAG as an OSPF path with a higher cost than the other 10- gigabit Ethernet interswitch links. The Switch D configuration uses seven edge router interfaces. On five of the interfaces, the TeraRouting application brings up OSPF adjacencies and advertises 1,000 routes behind each interface. SmartVoIP/QoS offers voice traffic on two additional interfaces concurrently with the routed data traffic. To ensure all traffic flowed through the device under test (either Switch B or C in the diagram), we adjusted OSPF cost metrics in Switch A and D to force the traffic through the appropriate switch. For each test, we began with a baseline case with no failure to verify there was zero packet loss under normal conditions. Then we repeated the test and removed an active Supervisor card with traffic running, forcing failover to a redundant Supervisor card in the same switch. We ran the baseline and failover cases for both Switches B and C. In tests of Supervisor 720 failover on Switch B, we offered 64-byte packets at a rate of 1 million pps. Thus, each dropped packet represented 1 microsecond of failover time. When we removed the active Supervisor card from Switch B, it took an average of 1.4 seconds (over three trials) for the secondary Supervisor card to become active. Some loss was expected in this test, since the loss of an active Supervisor 720 card also means the loss of the data plane (switch fabric) over which packets are forwarded. In tests of Supervisor 2 failover on switch C, we used 256-byte packets and a rate of 333,333 pps. At this rate, each dropped packet represented 3 microseconds of failover time. The change in packet sizes did not affect the test results. These were tests of resilience, not measurements of forwarding performance. As such, forwarding rate and packet length are not major factors in gathering accurate results. In the Supervisor 2 failover test, we observed packet loss equivalent to about 0.4 seconds of failover time (again averaged over three trials). As in the Supervisor 720 failover test, Page 14 of 40
15 some loss was expected here as well, even though Cisco Catalysts equipped with Supervisor 2 cards use a separate module for the switch fabric. The loss occurs because the line cards we used were not equipped with the Distributed Forwarding Card (DFC) daughtercards. As a result, packet headers are inspected by the active Supervisor Engine, which makes a centralized forwarding decision on behalf of the line cards. Thus, loss of a Supervisor card leads to momentary loss of forwarding capability in a no-dfc configuration. It is possible to achieve zero loss with Supervisor 2 cards when line cards are equipped with DFC daughtercards. The DFCs place an independent forwarding engine on the line cards, obviating the need for Supervisor lookups. Further, Cisco claims that there is zero packet loss with the Supervisor 720 in situations where the switch fabric is not in the data path in other words, where the ingress and egress for a flow are on the same side of the switch fabric. However, time constraints prevented us from verifying this claim. To demonstrate zero loss when DFCs are present, we reran the tests using three Cisco Catalysts with DFC-equipped 10-gigabit Ethernet line cards. The OSPF configuration was essentially the same as before, with each of 10 SmartBits interfaces advertising 1,000 routes. Also, as before, we offered 256-byte packets at a rate of 333,333 pps, so that each dropped packet represented 3 microseconds of failover time. This time, there was zero loss in the NSF/SSO failover case. This result demonstrates that NSF/SSO resiliency, when used in conjunction with DFC-equipped line cards, will result in no downtime for end-users, even during a Supervisor Engine card failure. Separately, we used each of three Cisco resiliency mechanisms in tests with DFCequipped cards to show the relative efficiency of each mechanism: Route processor redundancy plus (RPR+) Stateful switchover (SSO) NSF/SSO Table 2 below shows the failover times with the various redundancy mechanisms configured on the Cisco Catalyst switches. Note that NSF/SSO represents a massive improvement over SSO and RPR+. Table 2: Failover With Various Cisco Redundancy Methods Failover time Test case (seconds) RPR+ with Supervisor 2 and DFC-equipped line cards SSO with Supervisor 2 and DFC-equipped line cards NSF/SSO with Supervisor 2 and DFC-equipped line cards 0 Page 15 of 40
16 Table 3 below summarizes OSPF NSF/SSO failover times for tests of Switches B and C, tested both with and without DFC-equipped line cards. Table 3: OSPF NSF/SSO Failover Times Failover time Test case (seconds) Switch B with Supervisor average failover time Switch C with Supervisor average failover time Switch C with Supervisor and DFC-equipped line cards, average failover time Although failover times were the primary metrics in this test, these were not the only measurements. We also sought to determine whether the system would continue to enforce the various other conditions related to QoS enforcement, policy-based routing, access control lists, unicast reverse path forwarding, and voice quality. To verify QoS enforcement, we captured packets on egress interfaces and examined their DSCPs. In all cases, the switches marked down the DSCP of out-of-contract packets from the initial value of 63 to a value of 40. To show the effects of the other traffic conditions, we configured the TeraRouting test application to classify packets into five groups. Figure 5 below shows results of this classification for one baseline test and three trials of the Supervisor 720 failover test. Page 16 of 40
17 Figure 5: OSPF NSF/SSO Traffic Classification, Supervisor 720 8,000,000 7,400,000 7,347,954 7,352,778 7,354,765 7,000,000 6,000,000 Forwarding rate (pps) 5,000,000 4,000,000 3,000,000 Pass PBR ACL-Drop* urpf-drop* Both-Drop* 2,000,000 1,000, , , , , Baseline Supervisor 720 failover, trial 1 Supervisor 720 failover, Supervisor 720 failover, trial 2 trial 3 *A forwarding rate of 0 is a perfect result for these traffic classes. The Pass group was test traffic we expected the switches to forward. We also expected the system to forward packets belonging to the PBR group, but only across the highcost link between Switches B and C (something we verified by examining the switches packet counters, and comparing them with those of the TeraRouting application). We expected the system under test to drop all traffic belonging to the final three groups: The ACL-Drop group represented test traffic matching the 9,999th deny rule of a 10,000-entry ACL. The urpf-drop group represented packets with a spoofed source IP address. The Both-Drop group represented packets that matched both the ACL and urpf conditions. As indicated in Figure 5, a forwarding rate of 0 was a perfect result for these final three groups. A major goal of adding all these additional features was to verify that the NSF/SSOenabled switches would always enforce the various rules, even during and after failover. This is important in demonstrating that the system remains protected from attack, even during and after failover. Also note that the forwarding rates are quite consistent across multiple trials. Figure 6 below presents results of the failover test for the active Supervisor 2 card in Switch C. Page 17 of 40
18 Figure 6: OSPF NSF/SSO Traffic Classification, Supervisor 2 3,000,000 2,500,000 2,466,667 2,459,873 2,462,598 2,462,726 Forwarding rate (pps) 2,000,000 1,500,000 1,000,000 Pass PBR ACL-Drop* urpf-drop* Both-Drop* 500, , , , , Baseline Supervisor 2 failover, trial 1 Supervisor 2 failover, trial 2 Supervisor 2 failover, trial 3 *A forwarding rate of 0 is a perfect result for these traffic classes. Once again, the switches enforced all the various conditions, both during and after a failover. Tables 4 and 5 below present the OSPF NSF/SSO traffic classification results in tabular form. Page 18 of 40
19 Table 4: OSPF NSF/SSO Traffic Classification, Supervisor 720 Supervisor 720 failover, trial 1 (pps) Supervisor 720 failover, trial 2 (pps) Supervisor 720 failover, trial 3 (pps) Failover average (pps) Baseline Group (pps) Pass 7,400,000 7,347,954 7,352,778 7,354,765 7,351,832 PBR 800, , , , ,764 ACL-Drop* urpf-drop* Both-Drop* Table 5: OSPF NSF/SSO Traffic Classification, Supervisor 2 Supervisor 2 failover, trial 1 (pps) Supervisor 2 failover, trial 2 (pps) Supervisor 2 failover, trial 3 (pps) Failover average (pps) Baseline Group (pps) Pass 2,466,667 2,459,873 2,462,598 2,462,726 2,461,732 PBR 266, , , , ,132 ACL-Drop* urpf-drop* Both-Drop* *A forwarding rate of 0 is a perfect result for these traffic classes. We also measured voice call quality during the failover event. We offered G.711-encoded voice traffic concurrently with routed data traffic, and used Perceptual Speech Quality Measurement (PSQM) scoring to assess audio quality. As described in ITU recommendation P.861, PSQM scoring predicts the subjective quality of speech without requiring subjective testing. 4 PSQM scoring works on a sliding scale. In Spirent s SmartVoIP/QoS application, the best possible PSQM score for a G.711 codec is 0.4, meaning a jury would rate an audio sample as having the highest audio quality. The worst score in SmartVoIP/QoS is 6.5, meaning a jury would consider audio to be unintelligible. In a baseline test with no failover, we recorded a PSQM score of 0.4, the best possible with a G.711 codec. With the failure of an active Supervisor 720 card, the PSQM scores rose to anywhere from 1.8 to 2.0 higher than the baseline score, to be sure, but still nowhere near the 6.5 worst score. These slightly elevated scores are due to the momentary loss of the data path (the switch fabric) integrated into the Supervisor 720 card. 4 Spirent Communications. Voice Over IP Available at Page 19 of 40
20 There was less degradation in the Supervisor 2 failover tests, where PSQM scores ranged from 0.9 to 1.2. Again, these scores are nowhere near the levels where users would consider voice signals to be unintelligible. The lower PSQM scores reflect the fact that the Supervisor 2 and switch fabric are located on separate cards. SmartVoIP/QoS also records latency and jitter measurements. Note that both metrics remained low and consistent across all trials. Table 6 below presents VoIP traffic measurements taken during the OSPF NSF/SSO tests. Page 20 of 40
21 Table 7: OSPF NSF/SSO VoIP Traffic Handling Average Test case Average PSQM latency across 3 switch hops (usec) Average jitter across 3 switch hops (usec) Baseline Supervisor 720 failover, trial Supervisor 720 failover, trial Supervisor 720 failover, trial Supervisor 2 failover, trial Supervisor 2 failover, trial Supervisor 2 failover, trial Page 21 of 40
22 BGP NSF/SSO Failover We reran the NSF/SSO tests using BGP to test the effects of NSF/SSO on this routing protocol, the most popular method of connecting different domains on public networks. Figure 7 below shows the test bed for the BGP NSF/SSO failover tests. The physical test bed was identical to that of the OSPF NSF/SSO event. In terms of BGP configuration, Switch A and D resided in their own autonomous systems (ASs), while switches B and C shared a common AS (and also shared a common OSPF area for administrative traffic). This models the scenario in which data center devices (Switches B and C here) exchange traffic with multiple external domains over BGP. Figure 7: The BGP NSF/SSO Test Bed AS 1001 to 1005 SmartBits(A) SmartBits(B) AS 100 TeraRouting SmartVOIP/QoS AS 200 L2 10GE C6509(A) 10GE AS 300 L3 BGP High Cost Path 8 L3 OSPF Area 3 AS 400 C6509(B) 10GE (Copper) 802.3ad C6509(D) L3 10GE C6509(C) AS 1006 to 1010 AS 500 SmartBits(A) TeraRouting SmartBits(B) SmartVOIP/QoS As in the OSPF tests, we measured the failover times for redundant Supervisor 720 modules (in Switch B) and Supervisor 2 modules (in Switch C). In the Supervisor 720 failover tests, it took approximately 1.2 seconds to fail over from an active to a standby Supervisor card, averaged over three trials. Here again, some loss is expected, since removing an active Supervisor 720 card also removes the switch fabric over which packets are forwarded. Page 22 of 40
23 In the Supervisor 2 failover tests, the transition from primary to secondary Supervisor card took about 0.4 seconds (again, averaged over three trials). This is roughly equivalent to the result from the OSPF failover tests. Even though there were separate switch fabric cards in Switch C, some loss was still expected: As in the OSPF tests, the line cards were not equipped with Distributed Forwarding Cards (DFCs) and thus packet headers were sent to the active Supervisor card for a centralized forwarding decision to be made. This configuration represents a worst-case scenario. It is possible to achieve zero loss with Supervisor 2 cards when line cards are equipped with DFC daughtercards. The DFCs add an independent switching engine to the card and obviate the need for Supervisor lookups. To demonstrate zero loss when DFCs are present, we reran the BGP failover tests using three Cisco Catalysts with DFC-equipped 10-gigabit Ethernet line cards. The BGP configuration was essentially the same as before, with each of 10 SmartBits interfaces advertising routes to 1,000 networks. This time, there was zero loss in the NSF/SSO failover case. This result demonstrates that NSF/SSO resiliency, when used in conjunction with DFC-equipped line cards, will result in no downtime for end-users, even during a Supervisor Engine card failure. Table 6 below summarizes Supervisor failover times for tests of Switches B and C, tested both with and without DFC-equipped line cards. Table 6: BGP NSF/SSO Failover Times Failover time Test case (seconds) Switch B with Supervisor 720 average failover time Switch C with Supervisor 2 average failover time Switch C with Supervisor and DFC-equipped line cards, average failover time We also tracked various classes of traffic in the BGP NSF/SSO tests to verify the switches enforced various policy rules in place. Once again, policy enforcement was flawless: The Cisco Catalysts adhered to all the various policy rules before, during, and after failover. In the area of QoS enforcement, we verified with captured traffic that the switches marked down out-of-contract packets with a lower DSCP value. This was true for both the Supervisor 720 and Supervisor 2 failover test cases. Page 23 of 40
24 We also verified PBR worked correctly by examining the switches port counters and comparing these with those of the TeraRouting test application. For enforcement of various other policy rules including PBR, ACLs, and urpf the switches again performed as expected. With BGP running, traffic that should have been dropped was dropped, and traffic that should have been forwarded (except for the small amount of loss during failover) was sent to the correct destinations. Figures 8 and 9 below summarize the results of traffic classification during the BGP NSF/SSO failover tests. Figure 8: BGP NSF/SSO Traffic Classification, Supervisor 720 8,000,000 7,400,000 7,367,160 7,357,651 7,353,649 7,000,000 Aggregate forwarding rate (pps) 6,000,000 5,000,000 4,000,000 3,000,000 2,000,000 Pass PBR ACL-Drop URPF-Drop Both-Drop 1,000, , , , , Baseline Supervisor 720 failover, trial 1 Supervisor 720 failover, trial 2 Supervisor 720 failover, trial 3 Page 24 of 40
25 Figure 9: BGP NSF/SSO Traffic Classification, Supervisor 2 3,000,000 2,500,000 2,466,667 2,462,622 2,462,651 2,462,723 Aggregate forwarding rate (pps) 2,000,000 1,500,000 1,000,000 Pass PBR ACL-Drop URPF-Drop Both-Drop 500, , , , , Baseline Supervisor 2 failover, trial 1 Supervisor 2 failover, trial 2 Supervisor 2 failover, trial 3 As in the OSPF tests, note that results are very consistent across multiple failover trials. More importantly, in no case did a failover cause traffic to be misrouted. Tables 7 and 8 below present the BGP NSF/SSO traffic classification results in tabular form. Table 7: BGP NSF/SSO Traffic Classification, Supervisor 720 Supervisor 720 failover, trial 1 (pps) Supervisor 720 failover, trial 2 (pps) Supervisor 720 failover, trial 3 (pps) Failover average (pps) Group Baseline Pass 7,400,000 7,367,160 7,357,651 7,353,649 7,359,487 PBR 800, , , , ,273 ACL-Drop urpf-drop Both-Drop Page 25 of 40
26 Table 8: BGP NSF/SSO Traffic Classification, Supervisor 2 Supervisor 2 failover, trial 1 (pps) Supervisor 2 failover, trial 2 (pps) Supervisor 2 failover, trial 3 (pps) Failover average (pps) Group Baseline Pass 2,466,667 2,462,622 2,462,651 2,462,723 2,462,665 PBR 266, , , , ,233 ACL-Drop urpf-drop Both-Drop When it came to handling VoIP traffic, the switches running NSF/SSO did even better with BGP than with OSPF. In a baseline test with no failover, we recorded a PSQM score of 0.4, the best possible score with a G.711 codec. With the failure of an active Supervisor 720 card, the PSQM scores rose to anywhere from 1.5 to 1.8 higher than the baseline score, to be sure, but still nowhere near the 6.5 worst score. Voice tests in the Supervisor 2 failover case with BGP produced invalid results. Note that PSQM scores in the failover trials were virtually identical to those from the baseline test, strongly suggesting voice traffic was not subject to failover. The most likely explanation is that we forgot to reset the OSPF metrics from a previous test, thereby causing voice traffic to be forwarded through the other switch and not the DUT. We present all results below, but only for the sake of completeness. Table 9 below summarizes results the VoIP measurements taken during the BGP NSF/SSO tests. Page 26 of 40
27 Table 9: BGP NSF/SSO VoIP Traffic Handling Average Average PSQM latency (usec) Average jitter Test case (usec) Supervisor 720 baseline Supervisor 720 failover, trial Supervisor 720 failover, trial Supervisor 720 failover, trial Supervisor 2 baseline Supervisor 2 failover, trial Supervisor 2 failover, trial Supervisor 2 failover, trial Invalid result; see comments in text. 6 Invalid result; see comments in text. 7 Invalid result; see comments in text. Page 27 of 40
28 Multicast Multilayer Switching NSF/SSO Failover Just as NSF/SSO increases network availability for unicast and broadcast traffic, Cisco Multicast Multilayer Switching NSF/SSO (MMLS/NSF/SSO) provides resiliency for multicast traffic. Protection of multicast routing state is especially important given that multicast applications, almost by definition, are intended to serve large numbers of users. Cisco asked Opus One to measure failover time for a network handling a mix of multicast and unicast traffic, including concurrent multicast and VoIP sessions. Figure 10 below shows the test bed for the MMLS/NSF/SSO failover event. One SmartBits interface attached to Switch A emulates 10 multicast sources, each sending traffic to 1,000 groups. This created a total of 10,000 s,g mroutes in the system under test, thus forcing it to cope with a large amount of multicast routing table state. 8 Figure 10: MMLS/NSF/SSO Failover Test Bed OSPF Area 1 SmartBits(A) TeraRouting SmartBits(B) SmartVOIP/QoS 10,000 multicast sources (1,000 groups, 10 sources/group) OSPF Area 0 10GE L3 C6509(A) 10GE L3 OSPF High Cost Path 8 L3 C6509(B) 10GE (Copper) 802.3ad C6509(D) L3 10GE C6509(C) OSPF Area 4 Hosts on 3 interfaces join 1,000 IGMPv2 groups SmartBits(A) TeraRouting SmartBits(B) SmartVOIP/QoS 8 We intended to use 10,000 groups, but a problem in the TeraRouting test application prevented us from using that configuration. The substitute configuration 1,000 multicast groups, each with 10 sources still results in 10,000 s,g mroute entries in the Cisco Catalyst 6500 s multicast routing tables. Page 28 of 40
29 We used Protocol Independent Multicast-Sparse Mode (PIM-SM) as our multicast routing protocol, running on all switches. To create a single point of failure and a single multicast path through the test network, we used a combination of OSPF route metrics in Switches A and D to force all unicast traffic via the device under test. Since PIM-SM uses the underlying unicast routing protocol to calculate multicast routes, this configuration also forced all multicast traffic to use the device under test. We also configured a single PIM-SM Rendezvous Point (RP) for the whole test network. The RP was configured on the device under test, so that a failure of the online Supervisor card would also affect this critical function. Further, in Switch D, the last-hop router, we configured the PIM-SM shortest-path-tree (SPT) threshold so that shortest-path mroutes would be created, adding further multicast state to the device under test. This test also involved unicast traffic routed over OSPF. Four SmartBits interfaces two attached to Switches A and D each brought up OSPF adjacencies and advertised 2,500 external routes, for a total of 10,000 unicast routes. We configured the SmartBits to emulate 200 hosts on each of these external networks. This made for a total of 4 million unique unicast flows. Voice traffic was also present, as in previous tests. We configured Spirent s SmartVoIP/QoS application to generate G.711-encoded voice calls on each of four interfaces two each attached to Switches A and D. As in earlier tests, Switches B and C were linked with an 802.3ad link aggregation group (LAG) configured as a high-cost OSPF path. We then configured Policy-Based Routing (PBR) on the device under test and forwarded a selected subset of the traffic across this link as in previous tests of OSPF and BGP NSF/SSO failover. Switches B and C were equipped with redundant Supervisor cards. Switch B used dual Supervisor Engine 720 cards, while Switch C used dual Supervisor Engine 2 cards. The test procedure for this event was similar to that of previous tests: We first brought up all the necessary routing protocols and through the use of OSPF cost metrics on Switches A and D, forced all traffic to flow through the device under test either Switch B or C. Once we had verified the routing path, we began to transmit both multicast and unicast test traffic. Then we ran a baseline test with no Supervisor card failure to verify the system could forward all traffic with zero loss. For the failover tests, we physically removed one of the Supervisor cards from either Switch B or C approximately 30 seconds after we began offering data and voice traffic. Page 29 of 40
30 Since we offered traffic at a rate of 1 million pps per interface, each dropped packet represented 1 microsecond of failover time. Figure 11 below presents results from the MMLS/NSF/SSO failover test. Over three trials, multicast and unicast failover times ranged from approximately 1.4 to 1.6 seconds. Figure 11: MMLS/NSF/SSO Failover for Supervisor Failover time (seconds) Multicast traffic Unicast traffic Trial 1 Trial 2 Trial 3 There is no extra performance penalty to protecting multicast traffic with MMLS/NSF/SSO resiliency. The test results show this in two ways: First, failover times are nearly identical for multicast and unicast traffic. Second, failover times in this event are roughly equivalent to those from earlier OSPF and BGP tests. The IOS version available at test time in August 2004 supported multicast resilience on the Supervisor 720 card, but not on the Supervisor 2 card. Accordingly, we tested IP multicast NSF/SSO failover only on Switch B, equipped with redundant Supervisor 720 cards. Table 10 below summarizes multicast and unicast results in tabular form. Page 30 of 40
31 Table 10: MMLS/NSF/SSO Failover Times Multicast failover (seconds) Unicast failover (seconds) Test case Baseline NA NA Trial Trial Trial As with the unicast tests, we also measured voice call quality while offering a mix of multicast and unicast data traffic. With the failure of an active Supervisor 720 card, PSQM scores ranged from 1.8 to 2.0 higher than the baseline score of 0.4 but well below the worst possible score of 6.5. SmartVoIP/QoS also records latency and jitter measurements. Both latency and jitter remained low and consistent across all trials. Table 11 below presents VoIP traffic measurements taken during the IP multicast NSF/SSO tests. Table 11: MMLS/NSF/SSO VoIP Traffic Handling Average Average PSQM latency (usec) Average jitter (usec) Baseline Supervisor 720 failover, trial Supervisor 720 failover, trial Supervisor 720 failover, trial Page 31 of 40
32 NSF/SSO Protection for Upper-Layer Services NSF/SSO not only provides resiliency at the network layer, but also works in concert with the various services modules available for Cisco Catalyst 6500 series switches. The result of this tight integration between NSF/SSO and the various services modules is higher availability for applications as well as network infrastructure. Although this report focuses primarily on NSF/SSO and MMLS/NSF/SSO at the network layer, we also sought to determine what effect, if any, the loss of a Supervisor card would have on upper-layer connection state for three services modules: The Firewall Services Module (FWSM), the Content Switching Module (CSM), and the SSL Services Modules. We tested the interaction of upper-layer services and NSF/SSO by establishing approximately 900,000 HTTP sessions using the Spirent Avalanche and Reflector test instruments. Then, as in earlier tests discussed in this report, we physically removed the active Supervisor card from the switch under test. In the Switch B Supervisor failover tests, a Cisco Catalyst 6509 maintained 900,003 concurrent HTTP sessions, with no loss of client TCP connections. In the Switch C failover tests, a Cisco Catalyst 6509 maintained 900,008 concurrent sessions, again with no loss in connectivity for clients. In both tests, traffic continued to flow uninterrupted through the same FWSM, CSM, and SSL Services Modules on each switch. In no case was traffic failed over to the integrated services modules on the other switch, nor did the services modules lose connection state. Although NSF/SSO preserves L2 and L3 forwarding in the event of a Supervisor card failure, note that it does not preserve upper-layer connection state. For example, NSF/SSO will not save TCP connection state if a single (non-redundant) integrated services module fails. For this reason, Cisco recommends the use of NSF/SSO in conjunction with redundant services modules for maximum reliability: The services modules provide high availability for layer 4-7 connections, while NSF/SSO adds resiliency with non-stop forwarding at layers 2 and 3. Table 12 below summarizes results from the NSF/SSO failover tests with HTTP traffic. Entries in green italic type show the number of concurrent connections after loss of a Supervisor module. Page 32 of 40
33 Table 12: NSF/SSO Supervisor Failover With Long-Lived HTTP Sessions Established TCP connections, loss of Switch B Supervisor 720 Established TCP connections, loss of Switch C Supervisor 2 module Elapsed time (seconds) 4 900, , , , , , , , , , , , , , (post-failover) 900, , (post-failover) 900, , (post-failover) 900, , (post-failover) 900, , (post-failover) 900, , (post-failover) 900, , (post-failover) 900, , (post-failover) 900, ,008 In tests involving both HTTP and HTTPS, we observed behavior similar to that of other events involving SSL: A small loss in connectivity during the failover, followed by modest gain in concurrent connections. Table 13 below summarizes results from the NSF/SSO failover tests. Entries in green italic type show the number of concurrent connections after the loss of a Supervisor module. Page 33 of 40
34 Table 13: NSF/SSO Supervisor Failover With Long-Lived HTTP and HTTPS Sessions Established TCP connections, loss of Switch B Supervisor 720 Established TCP connections, loss of Switch C Supervisor 2 module Elapsed time (seconds) 4 200, , , , , , , , , , , , , , (post-failover) 200, , (post-failover) 200, , (post-failover) 200, , (post-failover) 200, , (post-failover) 200, , (post-failover) 200, , (post-failover) 200, , (post-failover) 200, ,019 Page 34 of 40
35 NSF/SSO Failover for Wireless LAN Traffic With the fast-growing adoption of wireless LAN infrastructure in enterprise networks, ensuring high availability for wireless clients has taken on new significance. The recently introduced Wireless Services Module (WLSM) for the Cisco Catalyst 6500 takes full advantage of NSF/SSO, ensuring the same highly available network infrastructure for wired and wireless end-stations alike. The WLSM occupies a single slot in Cisco Catalyst 6500 series switches. No separate infrastructure is needed for WLAN management, thus protecting investment in existing equipment. The WLSM on the Cisco Catalyst 6500 serves as central ingress for all wireless traffic, both on the control and data planes, not only managing traffic from wireless clients but also ensuring high availability through the use of NSF/SSO. Although this report focuses primarily on NSF/SSO and related services, the WLSM also delivers the same level of security and management services through tight integration with other Cisco Catalyst services modules such as those for firewall and intrusion detection. A separate report in this series examines the WLSM s security and performance in more detail. Cisco asked Opus One to determine failover times for wireless traffic forwarded through a Cisco Catalyst 6500 switch equipped with a WLSM and redundant Supervisor Engine 720 cards. Figure 12 below shows the test bed for the wireless NSF/SSO failover event. Virtual clients attached to a pair of Cisco Aironet 1100 access points which, in turn, attached to a Cisco Catalyst 6500 switch. The switch housed two Supervisor 720 cards, one in Active mode and the other in Standby mode. Page 35 of 40
36 Figure 12: WLSM with NSF/SSO Failover Test Bed Cisco Catalyst 6509 with WLSM and redundant Supervisor 720 engines GRE Tunnel AP#2 Aironet 1100 Wireless Access Point (802.11b) AP#1 VeriWave Test Point 1 (100 Simulated Users) Aironet 1100 Wireless Access Point (802.11b) Cisco Catalyst 3550 VeriWave Test Point 2 (100 Simulated Users) VeriWave Test Point 3 (Monitors Traffic) VeriWave Test Application To determine failover time, we used the VeriWave TestPoints test instrument to emulate 200 clients transmitting and receiving data at an aggregate rate of 1,000 packets per second. At that rate, each dropped packet was equivalent to 1 millisecond of failover time. (We began with baseline tests both with and without the WLSM active to verify that the system dropped zero data packets without a Supervisor failure.) We then removed the active Supervisor card while offering traffic, thus forcing a failover to the standby Supervisor card, and measured packet loss. We repeated the failover test three times. We expected some packet loss in these tests. The Supervisor 720 not only establishes and maintains routing protocol and spanning-tree state, but also integrates a 720-Gbit/s switch fabric. Since the loss of an active Supervisor card also means the temporary loss of the switch fabric, some packet loss is inevitable. Figure 13 below presents results from the NSF/SSO failover tests for the WLSM. The average failover time was seconds across three trials. As noted, this loss is a result of the temporary removal of the data path (the switch fabric) in the active Supervisor 720 card. Page 36 of 40
37 Without NSF/SSO, the normal routing protocol convergence mechanisms would apply. In the case of OSPF with default timer values, the router dead interval does not occur until 40 seconds (the period for the loss of three hello messages), followed by additional time to restart the routing session and reconverge the network. This last step may itself last many minutes, depending on the size of the network. With NSF/SSO, failover time is less than 2 seconds. Figure 13: WLSM Failover With NSF/SSO 2,000 1,800 1,772 1,767 1,790 1,600 Failover time (milliseconds) 1,400 1,200 1, Trial 1 Trial 2 Trial 3 Although we did not use this configuration in our tests, it is possible to achieve zero loss upon failure of a Supervisor card by using line cards equipped with Distributed Forwarding Card (DFC) modules. DFC modules include a local switching engine and switch fabric, obviating the need to go through a central fabric for traffic passing between ports on the same card. Unfortunately, DFC-equipped line cards were not available for inclusion in our tests. Even in this worst-case scenario without DFCs on the line cards, disruption was minimal. The failover tests demonstrate that loss of a layer-3 routing session introduces only a brief loss in forwarding capabilities. Page 37 of 40
38 10GBase-CX4 Throughput Cisco supplied Cisco Catalyst 6500 line cards with interfaces supporting 10GBase-CX4, the new standard for 10 gigabit Ethernet over copper cabling. As described in IEEE standard 802.3ak, CX4 uses twinaxial copper cabling and relatively inexpensive transceivers to link 10 gigabit devices at distances of up to 50 feet 9. CX4 offers excellent price/performance for data-center applications such as the switch interconnections used in these tests. Cisco asked Opus One to validate its claim of line-rate throughput for CX4 interfaces in the Cisco Catalyst Working with Spirent s SmartFlow application, we configured the SmartBits traffic generator/analyzer to offer test traffic to a pair of CX4 interfaces. Our test traffic consisted entirely of 64-byte packets, the shortest allowed in Ethernet and thus the most stressful possible load. We used bidirectional traffic to fully load the interfaces. Over a 60-second duration, the CX4 interfaces forwarded all traffic at line rate 14,880,952 pps in each direction, or nearly 30 million pps total with zero loss. Further, the switches delivered all packets in the sequence we offered them; the switches did not reorder frames in flight. The test results validate Cisco s claim of line-rate performance for CX4. Table 13 below summarizes results from the 10GBase-CX4 performance tests. Table 13: 10GBase-CX4 Performance Total packets transmitted (60 seconds) 1,785,714,228 Total packets received (60 seconds) 1,785,714,228 Total packets received in sequence 1,785,714,228 Bidirectional throughput (pps) 29,761,904 One-way throughput (pps) 14,880,952 9 IEEE 802.3ak documents are available at Page 38 of 40
39 Conclusion These tests demonstrate Cisco s new resiliency mechanisms working in a wide variety of settings. In all cases, these mechanisms greatly reduce or eliminate downtime, both in the control plane and in the data plane. To recap the major findings of these tests: Global Load Balancing Protocol (GLBP) reduces failover times from tens of seconds to user-defined values of 2 seconds or less, and doubles available bandwidth during normal operation compared with VRRP Non-Stop Forwarding/Stateful Switchover (NSF/SSO) preserves routing state for OSPF and BGP sessions despite the loss of a Supervisor card, ensuring that data traffic continues to be forwarded with little or no disruption NSF/SSO delivers zero packet loss when used in conjunction with line cards equipped with Distributed Forwarding Card (DFC) modules, even when handling millions of flows Networks remain protected from attack after the loss of a Supervisor card, since NSF/SSO ensures that all security mechanisms continue to work NSF/SSO is effective in protecting IP multicast traffic, even when 10,000 s,g mroutes are involved NSF/SSO protects upper-layer session state through tight integration with other services modules for Cisco Catalyst switches NSF/SSO delivers high availability to wireless as well as wired clients through tight integration with the new Wireless LAN Services Module (WLSM) for Cisco Catalyst 6500 series switches The new 10GBase-CX4 line card delivers 10-gigabit Ethernet line-rate throughput over copper cabling Although these tests covered many different technologies and resiliency mechanisms, the common thread among them all is high availability. With GLBP and NSF/SSO deployed on Cisco Catalyst 6500 series switches and Cisco 7600 series routers, network managers can now boost uptime to unprecedented levels. Page 39 of 40
40 Acknowledgements Opus One gratefully acknowledges the support of Spirent Communications, which supplied engineering assistance for this project. Spirent test engineers Mark Hall, Gary Hansen, and Brooks Hickman assisted with configuration of Spirent s TeraRouting, SmartFlow, and SmartVoIP/QoS test applications. Thanks also to VeriWave, which supplied its WaveTest system for assessing failover performance for wireless clients. About Opus One Opus One is a consulting and information technology firm based in Tucson, AZ. Founded in 1989, Opus One's corporate goal is to help our clients make the best use of information technology. We focus on efficient and effective solutions in the areas of data networking, electronic mail, and security. For more information, see or contact us at: Opus One 1404 East Lind Road Tucson, AZ Page 40 of 40
Chapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
Juniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
Five Pillars: Assessing the Cisco Catalyst 4948E for Data Center Service
Five Pillars: Assessing the Cisco Catalyst 4948E for Data Center Service August 2010 Page2 Contents Executive Summary... 3 Features and Manageability... 3 Fast Convergence With Flex Link... 4 Control Plane
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
Cisco Networking Academy CCNP Multilayer Switching
CCNP3 v5 - Chapter 5 Cisco Networking Academy CCNP Multilayer Switching Implementing High Availability in a Campus Environment Routing issues Hosts rely on a router to find the best path Issues with established
TechBrief Introduction
TechBrief Introduction Leveraging Redundancy to Build Fault-Tolerant Networks The high demands of e-commerce and Internet applications have required networks to exhibit the same reliability as the public
Virtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology. August 2011
FlexNetwork Architecture Delivers Higher Speed, Lower Downtime With HP IRF Technology August 2011 Page2 Executive Summary HP commissioned Network Test to assess the performance of Intelligent Resilient
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
CHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
LAB TESTING SUMMARY REPORT
Key findings and conclusions: Cisco Nonstop Forwarding with Stateful Switchover drastically reduces mean time to repair (MTTR) Delivered zero route flaps with BGP, OSPF, IS-IS and static routes during
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Networking and High Availability
yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.
Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center
Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center [email protected] www.globalknowledge.net Planning for the Redeployment of
RESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, [email protected] Campus Best Practices - Resilient network design Campus
Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
Cisco 7600/Catalyst 6500: Scaling Up for MPLS VPN Service with 10 Gigabit Ethernet
Cisco 7600/Catalyst 6500: Scaling Up for MPLS VPN Service with 10 Gigabit Ethernet By David Newman prepared for Cisco Systems January 2004 C O N T E N T S Executive Summary... 3 Introduction... 4 IPv4
Cisco Certified Network Professional - Routing & Switching
Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
This chapter covers four comprehensive scenarios that draw on several design topics covered in this book:
This chapter covers four comprehensive scenarios that draw on several design topics covered in this book: Scenario One: Pearland Hospital Scenario Two: Big Oil and Gas Scenario Three: Beauty Things Store
Avaya P333R-LB. Load Balancing Stackable Switch. Load Balancing Application Guide
Load Balancing Stackable Switch Load Balancing Application Guide May 2001 Table of Contents: Section 1: Introduction Section 2: Application 1 Server Load Balancing Section 3: Application 2 Firewall Load
Lab Testing Summary Report
Lab Testing Summary Report January 2015 Report SR140730F Product Category: Supervisor Engine Vendor Tested: Product Tested: Catalyst 4500E Supervisor Engine 8-E Key findings and conclusions: Tests achieved
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems
Introduction to HA Technologies: SSO/NSF with GR and/or NSR. Ken Weissner / [email protected] Systems and Technology Architecture, Cisco Systems 1 That s a lot of acronyms Some definitions HA - High Availability
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
IP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Lab Testing Summary Report
Lab Testing Summary Report November 2011 Report 111018 Product Category: Supervisor Engine Vendor Tested: Product Tested: Catalyst 4500E Supervisor Engine 7L-E Key findings and conclusions: Cisco Catalyst
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
High Availability Solutions & Technology for NetScreen s Security Systems
High Availability Solutions & Technology for NetScreen s Security Systems Features and Benefits A White Paper By NetScreen Technologies Inc. http://www.netscreen.com INTRODUCTION...3 RESILIENCE...3 SCALABLE
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Aruba Mobility Access Switch and Arista 7050S INTEROPERABILITY TEST RESULTS:
Aruba and INTEROPERABILITY TEST RESULTS: Aruba and Aruba and Table of Contents Executive summary 3 Scope and methodology 3 Interface connectivity 4 Port channels and link aggregation control protocol (LACP)
New Features in Cisco IOS Software Release 12.2(33)SXI2
. Product Bulletin New Features in Cisco IOS Software Release 12.2(33)SXI2 PB552599 This product bulletin introduces Cisco IOS Software Release 12.2(33)SXI2, highlighting the new features it offers. Introduction
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
Cisco 7600 Series Route Switch Processor 720
Cisco 7600 Series Route Switch Processor 720 Product Overview The Cisco 7600 Series Route Switch Processor 720 (RSP 720) is specifically designed to deliver high scalability, performance, and fast convergence
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results September 25, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between
Cisco Nexus 1000V Switch for Microsoft Hyper-V
Data Sheet Cisco Nexus 1000V Switch for Microsoft Hyper-V Product Overview Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual machine and cloud networking.
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic
Technical report, IDE1002, February 2010 Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic Master s Thesis in Computer Network Engineering ALI AKBAR EISAZADEH & NORA ESPAHBODI
FASTIRON II SWITCHES Foundry Networks award winning FastIron II family of switches provides high-density
Delivers Industry Leading Price, Performance and Flexibility to Wiring Closets, Desktops and Server Farms Provides High-density 10/100 Mbps Ethernet and Gigabit Ethernet Copper Connectivity to Workstations
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
- Redundancy and Load Balancing -
1 - Redundancy and Load Balancing - Importance of Redundancy High availability is critical in most environments. Even a brief outage due to hardware failure may be considered unacceptable. Consider the
Data Center Multi-Tier Model Design
2 CHAPTER This chapter provides details about the multi-tier design that Cisco recommends for data centers. The multi-tier design model supports many web service architectures, including those based on
NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1
NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
CCNP Switch 642-813 Questions/Answers Implementing High Availability and Redundancy
Which Catalyst 6500 switch component integrates on individual line modules as well as on the supervisor engine? A. CPU B. Flash C. ASIC D. NVRAM Answer: C Cisco Catalyst 6500 Series with Cisco IOS Software
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, [email protected]
Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches
Migration Guide Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide November 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
A New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University [email protected] ABSTRACT This paper
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Implementation of High Availability
6 CHAPTER High availability (HA) is not a standalone feature, but instead an approach to implementing a variety of interrelated features as tools to ensure business resilience and maintain end-to-end availability
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards
Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards Hot Standby Router Protocol (HSRP) is a Cisco proprietary protocol which allows several routers or multilayer switches to appear
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
network infrastructure: getting started with VoIP
hp procurve networking business may 2003 network infrastructure: getting started with VoIP technical brief table of contents introduction 2 network optimization for VoIP 2 bandwidth provisioning 3 end-to-end
Dante: Know It, Use It, Troubleshoot It.
Dante: Know It, Use It, Troubleshoot It. SymNet Composer, Symetrix next generation DSP platform, has arrived and is in full effect. SymNet Composer software manages all aspects of SymNet Dante DSP devices
Simulation of High Availability Internet Service Provider s Network
Abdullah Jameel Mahdi 1 and Anas Ali Hussain 2 1 Information and Communication department, Information Engineering Collage, Al-Nahrin University 2 Computer department, Engineering Collage, Al-Nahrin University
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
INTEGRATING FIREWALL SERVICES IN THE DATA CENTER NETWORK ARCHITECTURE USING SRX SERIES SERVICES GATEWAY
IMPLEMENTATION GUIDE INTEGRATING FIREWALL SERVICES IN THE DATA CENTER NETWORK ARCHITECTURE USING SRX SERIES SERVICES GATEWAY Although Juniper Networks has attempted to provide accurate information in this
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Leased Line + Remote Dial-in connectivity
Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer
Disaster-Resilient Backbone and Access Networks
The Workshop on Establishing Resilient Life-Space in the Cyber-Physical Integrated Society, March. 17, 2015, Sendai, Japan Disaster-Resilient Backbone and Access Networks Shigeki Yamada ([email protected])
Development of the FITELnet-G20 Metro Edge Router
Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing
DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch
DATA CENTER Best Practices for High Availability Deployment for the Brocade ADX Switch CONTENTS Contents... 2 Executive Summary... 3 Introduction... 3 Brocade ADX HA Overview... 3 Hot-Standby HA... 4 Active-Standby
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Clustering. Configuration Guide IPSO 6.2
Clustering Configuration Guide IPSO 6.2 August 13, 2009 Contents Chapter 1 Chapter 2 Chapter 3 Overview of IP Clustering Example Cluster... 9 Cluster Management... 11 Cluster Terminology... 12 Clustering
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Voice over IP Networks: Ensuring quality through proactive link management
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Cisco Catalyst 3750 Metro Series Switches
Cisco Catalyst 3750 Metro Series Switches Product Overview Q. What are Cisco Catalyst 3750 Metro Series Switches? A. The Cisco Catalyst 3750 Metro Series is a new line of premier, customer-located switches
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Chapter 1 Reading Organizer
Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small
Voice over IP- Session Initiation Protocol (SIP) Load Balancing in the IBM BladeCenter
Voice over IP- Session Initiation Protocol (SIP) Load Balancing in the IBM BladeCenter Solution Brief Load Balance Voice Over IP SIP traffic in your BladeCenter economically and efficiently with the Layer
H3C SR8800 RPR Technology White Paper
H3C 00 RPR Technology White Paper Keywords: RPR, IP ring network Abstract: Resilient Packet Ring (RPR) is an international standard for establishing IP ring networks, offering a highly efficient and reliable
2. Are explicit proxy connections also affected by the ARM config?
Achieving rapid success with WCCP and Web Security Gateway October 2011 Webinar Q/A 1. What if you are already using WCCP for Cisco waas on the same routers that you need to use WCCP for websense? Using
VRRP Technology White Paper
Issue 01 Date 2012-08-31 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
How To Switch In Sonicos Enhanced 5.7.7 (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (
You can read the recommendations in the user, the technical or the installation for SONICWALL SWITCHING NSA 2400MX IN SONICOS ENHANCED 5.7. You'll find the answers to all your questions on the SONICWALL
