APPN Configurations: Recommendations & Limitations. Johnathan Harter z/os CommServer Development
|
|
- Rosa Garrison
- 5 years ago
- Views:
Transcription
1 Configurations: Recommendations & Limitations Johnathan Harter z/os CommServer Development 1
2 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 2
3 Node Types Defines Only Two Types Of Nodes End Nodes (s) - Session endpoints only (no intermediate routing) CP-CP sessions with one adjacent NN at a time (Network Node Server or NNS) Network Nodes (NNs) - Session endpoints or intermediate nodes CP-CP sessions with any adjacent NN and served s Specialized End Nodes (VTAM Only) Migration Data Hosts (MDHs) - Support both and Subarea (CP and CDRM) Specialized Network Nodes (Most Are VTAM Only) Composite Network Nodes (CNNs) - Activates and/or owns NCPs Interchange Nodes (ICNs) - Support both and Subarea (CP and CDRM) Central Directory Servers (CDServer) - version of "CMC" (resource directory) Dependent LU Servers (DLUSs) - version of "CMC" (resource ownership) Extended Border Nodes (EBNs) - version of SNI Gateway Virtual Routing Nodes (VRNs) - Used to represent Connection Networks NNs That Can Act Like s Branch Extenders (BEXs) Peripheral and Extended Border Nodes (PBNs and EBNs) 3
4 Node Type Examples V R N CNN, ICN Subarea MDH CDS, EBN Subarea BEX EBN 4
5 Node Type Recommendations Define As Many Nodes As s As Possible s do not participate in "network-wide" functions Maintaining network topology Searching for resources (LUs) s can dedicate more resources (storage, CPU) to production work Define As Few NNs As Possible Network topology database is smaller Easier to optimize session routes Network search overhead is reduced Use Specialized NNs As Needed CNNs are needed as long as there are NCPs ICNs are needed if sessions span /Subarea boundaries CDServers are recommended for all but the smallest networks DLUSs are used when dependent LUs are moved from NCPs to DLURs BEXs are used to minimize network topology in Branch Office environments EBNs are needed for multi-subnetwork connectivity VRNs provide meshed connectivity between nodes without meshed defintions 5
6 Interchange Node HPR Limitations Legend ER/VR Subarea (FID4) (FID2) (FID2) HPR Pure Session One RTP pipe can be used for the entire path ICN Session RTP pipe out of ICN is always only one-hop Remainder of session path can use a single RTP pipe 6
7 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 7
8 Central Directory Servers FIND(LUB) NN2 L LUA A NN1 CDS NN4 LUB B NN3 Used To Minimize Broadcast Searching Network Topology DB identifies which NNs are CDServers Non-CDServer NNs query a CDServer instead of broadcasting CDServers query other CDServers before broadcasting Other Searches That Can Also Occur Broadcast Search (if no CDServers have current information) Serial ICN Search of attached subarea networks Too Many CDServers Can Mean Too Much Searching 8
9 Central Directory Server Recommendations FIND(LUB) NN2 L LUA A NN1 CDS NN4 LUB B NN3 Choose Number Of CDServers Based On Network Size 3 or fewer NNs - No CDServers are needed 4 or more NNs - At least 1 CDServer is recommended Second CDServer is also okay (in case of failure) 6 or more NNs - At least 2 CDServers are recommended More than 4 CDServers is probably too many (not recommended) 9
10 Central Directory Server Placement A NN1 CDS CPSVCMG Weight = 60 NN3 C CPSVCMG Weight = 30 CPSVCMG Weight = 30 B NN2 CPSVCMG Weight = 60 NN4 CDS D Choose CDServers Based On Network Geography (Assumes no subnetwork boundaries) Define a CDServer in each physical data center (location) Define links and CPSVCMG COS to prefer local CDServer Most NNs choose a CDServer based on weight of Locate path Define links between local NNs to resolve to a lower weight Define links between remote NNs to resolve to a higher weight Non-CDServer NNs will choose local CDServer Remote CDServers are used as backup (assuming a path exists) Data Center 1 Data Center 2 10
11 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 11
12 Connection Networks (Virtual Routing Nodes) Why Are VRNs Important? To minimze link definitions between nodes that share a common transport Token Ring, X25, ATM, EE To simplify adding new nodes b Without VRNs Links must be defined between each pair of nodes for optimal routing 4 nodes, 12 links (4x3) 5 nodes, 20 links (5x4) 'n' nodes, n*(n-1) links NNa d b c With VRNs Links are defined to CP-CP partners and to Virtual Routing Node only 4 nodes, 8 links (4x2) 5 nodes, 10 links (5x2) 'n' nodes, nx2 links Direct links between other nodes are created dynamically NNa VRN d c 12
13 Interchange Node HPR Limitations For VRNs Legend ER/VR Subarea (FID4) (FID2) (FID2) HPR VRN Pure Session One RTP pipe can be used for the entire path ICN Session RTP pipe out of ICN is always only one-hop Remainder of session path can use a single RTP pipe 13
14 Connection Network Recommendations Use Connection Networks Whenever Possible To: Minimize link definitions Achieve optimal session paths Simplify adding new nodes On NNs, s and MDHs: Any type of Connection Network can be defined Independent of z/os CS release On Interchange Nodes (ICNs): Any type of Connection Network can be defined on all releases that have not yet reached End Of Service If you are still running pre-v1r4 z/os CS nodes as Interchange Nodes Define ISR-capable Connection Networks only! (TR & X25) Predefine HPR-only (EE) links from ICNs to all adjacent nodes (instead of defining HPR-only Connection Networks on ICNs) 14
15 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 15
16 Session Services Extensions Was Originally Designed For LU 6.2 Sessions Only All sessions were initiated by the Primary LU (PLU-Initiated) No SLU-Initiated sessions (REQSESS, LOGAPPL or SLU logons) No Third-party Initiated sessions (CLSDST PASS) All LUs were multi-session capable. No requirement for: Session queuing (SIMLOGON Q) Printer Sharing (RELREQ) Session Services Extensions (SSE) Created by Architecture and VTAM for VTAM V4R1 (first release) Optional "tower" on top of base or NN function Extended the Architecture to support existing subarea functions Provided seamless migration path from subarea to networking No impact to existing applications or external customers Unsupported by most products Co-exists very well with non-sse capable nodes 16
17 Session Services Extensions Exploitation L AS/400 NN2 VTAM A VTAM NN1 VTAM NN4 VTAM B AS/400 NN3 SSE Exploitation Requirements Owning CP and NNS of both the OLU and DLU must support SSE Intermediate NNs do not have to support SSE On Locate path or BIND (session) path Sessions between A, NN1, NN4, B can use SSE 17
18 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 18
19 Dependent LU Requester/Server (With SSE) Supports Dependent LUs Without DLUR! Dependent LUs attach as usual Must appear adjacent to VTAM/NCP Session path must include owning VTAM Possibly through owned NCPs only HPR is only possible to VTAM (NCP cannot be an RTP endppoint) DLUR Extends This Support To: Remove VTAM/NCP adjacency requirement DLURs can be located in remote sites More fully exploit HPR RTPs can extend out to the DLUR Route traffic more intelligently Session paths need not include the owning VTAM (but owning VTAM maintains session awareness) DLUS DLUR Control flows Session path Boundary Function Control flows Session path Boundary Function 19
20 Dependent LU Requester Placement DLUS DLUS DLUR Cisco SNASw CS/NT DLURs CS/Linux DLUR In Gateway No hit to downstream devices Fewer control sessions and RTPs More resources used by gateway Gateway is single point of failure DLUR In End Stations Best performance and availability HPR routes around failing gateway Fewer resources used by gateway More control sessions and RTPs 20
21 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 21
22 Branch Extenders Data Center Data Center NN Branch... Branch NN BEX Branch... BEX Branch NN Common Configuration Central data center supporting many remote branches Topology updates and searches can overwhelm branch network nodes Branch Extender Objectives Reduce TDUs & searches to branches Eliminate trial-and-error searching of branches for branch resources Intended for single-enterprise networks How BEX Node Works Acts like to data center (uplinks) Acts like NN to branch s (downlinks) NNs are not allowed below a BEX! L nodes are allowed below a BEX Resource Registration is forwarded into data center by BEX More efficient than EBN searching HPR to BEX and downstream s DLUR on BEX (but not below) 22
23 Cascaded and Parallel Branch Extenders BEX BEX Branch NN NN BEX or NN? Branch BEX NN Cascaded BEX Nodes Resource Registration requests are forwarded through each BEX node Can be used in "regional data center" configurations to reduce the number of DLURs Parallel BEX Nodes Divide ownership and backup, or Use duplicate TICs for high availability What about BEX-to-BEX link? Predefined link does not work If needed, define branch VRN instead 23
24 Branch Extender Limitations SSE Suppport BEX Is Not Required To Support SSE SSE is not supported below a BEX node! Downstream VTAMs are not recommended Limited to LU 6.2 (PLU-Init) Sessions Traffic can overload BEX node(s) BEX NN DLUR Support BEX nodes can be DLURs DLURs are not supported below a BEX node! If cascasded BEX nodes are used, highest level BEX node must be the DLUR Dependent LU passthrough function may be needed on lower level BEX nodes BEX Branch NN Connection Network (VRN) Support VRNs can be exploited within the branch VRNs cannot be used to route around a BEX BEX node acting as NNS will always be on the path of sessions into the data center 24
25 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 25
26 Extended Border Nodes NN NN EBN EBN EBN NETA NETB NETC Peripheral Boundary Extended Boundary EBNs Provide "Multi-Subnetwork Connectivity" (" SNI") Optional "tower" on top of "base NN function plus SSE" Restricts Topology flows over subnetwork boundaries, but... Allows searches ( Locates) and sessions to cross subnetwork boundaries (user-controlled, dynamic, or combination of both) EBNs Support Two Types Of Subnetwork Boundary Peripheral boundary (EBN on only one side of boundary) EBN acts like an to adjacent non-native NN Not the same as Peripheral Border Node (AS/400 version) Extended boundary (EBN on both sides of boundary; recommended) 26
27 Peripheral Boundary Limitations EBN NN NN EBN EBN EBN Peripheral Boundary Peripheral Boundary Extended Boundary Peripheral Boundary Must Be First And/Or Last Network Boundaries On The Session Path All intermediate subnetwork boundaries on session path must be Extended If used with two or more subnetwork boundaries: EBNs must be on the "inside" of the peripheral boundaries Peripheral Boundary Must Be The ONLY Connection To The Adjacent Subnetwork (Direct or Indirect!) No other Extended or Peripheral subnetwork boundaries No Subarea or SNI connections No L connections Parallel links (between the same two nodes) are allowed 27
28 Peripheral Boundary Examples Does this configuration look OK? NO! BN3 has TWO links into the same peripheral network Can cause routing loops that are not detectable NN7 NETC BN6 NETA 9 BN1 BN3 NN2 NN5 BN4 NETA 8 NETB How about this configuration? NO AGAIN! Although BN3 does not have two links to the same peripheral network, there is still more than one path into the subnetworks containing NN2 and NN5 The same undetectable routing loops can occur NN7 NETC BN6 NETA 9 BN1 BN3 NN2 NN5 NETB NETB BN4 NETA 8 28
29 Extended Border Nodes And SSE OLU NN NN EBN EBN EBN NN DLU NETA NETB NETC CP(OLU) NNS(OLU) NNS(DLU) NNS(OLU) NNS(DLU) NNS(OLU) NNS(DLU) CP(DLU) SSE Are Supported Across Subnetwork Boundaries Which nodes must be SSE Capable? Owning CP and NNS of both the OLU and DLU in each subnetwork Intermediate NNs in each subnetwork do not have to support SSE All Extended Boundaries provide full SSE support SSE support is a prerequisite for EBN functions Not all Peripheral Boundaries provide SSE support Depends on the capabilities of the non-native NN 29
30 Extended Border Nodes And DLUR/DLUS NETA 9 BN1 DLUS BN3 NN7 PLU1 NETC BN6 BN4 NETA 8 PLU2 BN2 DLUR1 NETB NN5 DLUR2 NETB DLUR, DLUS And PLU Can Each Be In Different Subnetworks What types of boundaries are allowed? All Three "Paths" Must Be Considered: DLUS-To-DLUR: CPSVRMGR session path One Peripheral Boundary is allowed: Border Node must be on DLUS-side DLUS-To-PLU: Locate path Extended Boundaries only (even if SSE is supported by adjacent NN) PLU-To-DLUR: End-user session path One Peripheral Boundary is allowed: Border Node must be on PLU-side 30
31 Global Connection Networks (GVRNs) NETA 9 BN1 BN3 NN7 NETC VRN BN6 GVRN BN4 NETA 8 BN2 NETB NN5 NETB Local VRNs (TR, X25, ATM and EE): Connection Network (VRN) can only be used natively (within a subnetwork) Cross-subnetwork sessions must traverse the EBNs on Locate path Global VRNs (EE only): Connection Network (VRN) can be used across subnetwork boundaries Allows cross-subnetwork sessions to use a direct (dynamically created) link Can be used to eliminate EBNs as a potential performance bottle-neck 31
32 Global Connection Network Limitations NETA 9 BN1 BN3 NN7 NETC VRN BN6 GVRN BN4 NETA 8 BN2 NETB NN5 NETB Global Connection Networks: Require "Extended Boundaries" along the entire Locate path Are only used between OLU and DLU subnetworks Not used to or from intermediate subnetworks on Locate path Are not used when the OLU or DLU are "in subarea". However... Once RTPs are established, they can be path switched over GVRNs Can be exploited by Branch Extenders, but not by downstream nodes Multiple EE (G)VRNs, IPv6 (G)VRNs and Firewalls are supported 32
33 For More Information... URL Content IBM eserver zseries Mainframe Servers Networking: IBM zseries Servers IBM Enterprise Servers: Networking Technologies Communications Server product overview z/os Communications Server Communications Server for Linux on zseries Communication Controller for Linux on zseries Communications Server products - white papers, product documentation, etc. ITSO redbooks Communications Server technical Support Technical support documentation (techdocs, flashes, presentations, white papers, etc.) Request For Comments (RFC) IBM Education Assistant 33
EBN Searching In APPN/HPR Border Node Networks. Johnathan Harter z/os CommServer Development
Searching In /HPR Border Node Networks Johnathan Harter z/os CommServer Development yoda@us.ibm.com 1 Agenda Searching Using ALIAS Names Who Is My Network Node Server (NNS)? Introduction To Extended Border
More informationSecuring Enterprise Extender
Securing Enterprise Extender Sam Reynolds IBM z/os Communications Server Design samr@us.ibm.com Ray Romney Cisco Systems romney@cisco.com Tony Amies William Data Systems Product Architect tony.amies@willdata.com
More informationSNA Strategy and Migration Considerations
Enterprise Networking Solutions Strategy and Migration Considerations Sam Reynolds samr@us.ibm.com February 4, 2013 SHARE 2013 Winter Technical Conference Session 12845 Agenda Enterprise Network Solutions
More informationDesigning APPN Internetworks
CHAPTER 6 Designing APPN Internetworks Advanced Peer-to-Peer Networking (APPN) is a second generation of the Systems Network Architecture (SNA) from IBM. It moves SNA from a hierarchical, mainframe-centric
More informationDependent LUs and DLUR/DLUS
Dependent LUs and DLUR/DLUS Document ID: 12240 Contents Introduction Prerequisites Requirements Components Used Conventions DLUR/DLUS Fundamentals DLUR/DLUS Session Service Extensions DLUR/DLUS Routing
More informationUnderstanding Enterprise Extender Part I. Concepts and Considerations
Understanding Enterprise Extender Part I. Concepts and Considerations Sam Reynolds samr@us.ibm.com IBM z/os Communications Server Design Agenda Understanding EE: Concepts and Considerations SNA: Dead or
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
2001, Cisco Systems, Inc. All rights reserved. 1 Migrating APPN to SNASw Scenarios Session 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda Old Cisco APPN Problems and Challenges How New Cisco APPN
More informationEnterprise Extender: Concepts and Considerations
Enterprise Extender: Concepts and Considerations SHARE 2012 Winter Technical Conference Session 10821 Sam Reynolds samr@us.ibm.com IBM z/os Communications Server Design Agenda What is Enterprise Extender?
More informationEnterprise Extender on z/os Communications Server: SNA Hints and Tips
Enterprise Networking Solutions Enterprise Extender on z/os Communications Server: SNA Hints and Tips Sam Reynolds samr@us.ibm.com March 5, 2015 SHARE 2015 Winter Technical Conference Session 16745 Agenda
More informationz/os CS Enterprise Extender Hints & Tips
z/os Communications Server z/os CS Enterprise Extender Hints & Tips z/os CS Design & Development, Raleigh Copyright International Business Machines Corporation 2013. All rights reserved. Sam Reynolds -
More informationEnterprise Extender: Recent Enhancements and Coming Attractions
z/os Communications Server Enterprise Extender: Recent Enhancements and Coming Attractions z/os CS Development, Raleigh Sam Reynolds - samr@us.ibm.com Agenda Enterprise Extender with z/os V1R9 CS HPR Path
More informationConfiguring SNA Switching Services
Configuring SNA Switching Services This chapter describes SNA Switching Services (SNASw), which supersedes all functionality previously available in the Advanced Peer-to-Peer Networking (APPN) feature
More informationUnderstanding Enterprise Extender Part II. Nuts and Bolts
Understanding Enterprise Extender Part II. Nuts and Bolts Sam Reynolds samr@us.ibm.com IBM z/os Communications Server Design Agenda Understanding EE: Concepts and Considerations SNA: Dead or Alive? Enterprise
More informationSolutions in an SNA/IP (EE) Network
High Performance Switching and Routing Solutions in an SNA/IP (EE) Network Howard Johnson, Brocade Communications Dr. Steve Guendert, Brocade Communications 3 August 2010 (4:30pm 5:30pm) Room 102 1 Legal
More informationSysplex Networking Technology Overview
Summer 2010 Technical Conference Sysplex Networking Technology Overview Thursday, August 5, 2010, 11:00 AM - 12:00 PM Enterprise Networking Solutions Gus Kassimis - kassimis@us.ibm.com Sam Reynolds - samr@us.ibm.com
More informationMainframe Networking 101 Share Session 15422
Mainframe Networking 101 Share Session 15422 6 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 06/23/2014 Applied Expert Systems, Inc. 2014 1 Agenda Requirements for Communication
More informationNovember Copyright (C) The Internet Society (1998). All Rights Reserved.
Network Working Group Request for Comments: 2455 Obsoletes: 2155 Category: Standards Track B. Clouston Cisco Systems B. Moore IBM Corporation November 1998 Definitions of Managed Objects for APPN Status
More informationMainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler -
Mainframe Networking 101 Share Session 6 Junie Sanders jrsandler@cisco.com Kevin Manweiler - kmanweil@cisco.com 2 Agenda Requirements for Communication What are Networking Architectures? Networking Architectures
More informationTN3270 Server Commands
TN3270 Server Commands Use the commands in this chapter to configure and monitor the Cisco Mainframe Channel Connection (CMCC) products, which include the Channel Interface Processor (CIP) and the Channel
More informationMedco Health Solutions Inc. Bob Mundhenk Executive Director of Technology
CCL Customer Experiences zexpo Session October 2006 Beth Duncan, IBM East Region zseries New Workload Team eadunca@us.ibm.com Miami Dade County Craig Koller Senior Operating Systems Programmer CNK@miamidade.gov
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationConfiguring VLAN CHAPTER
CHAPTER 10 LMS collects data about devices so that you can configure and manage Virtual Local Area Network (VLAN) in your network. You must set up your LMS server properly to ensure that Data Collection
More informationChicago Area VM Enthusiasts - IBM Communications Server for Linux on zseries
Enterprise ing Solutions Chicago Area VM Enthusiasts - IBM Communications Server for Linux on zseries Alfred B Christensen - alfredch@us.ibm.com Enterprise ing Solutions aleigh, North Carolina, USA Trademarks
More informationSIP RFC 2782 Compliance with DNS SRV Queries
SIP RFC 2782 Compliance with DNS SRV Last Updated: December 21, 2011 Effective with Cisco IOS XE Release 2.5, the Domain Name System Server (DNS SRV) query used to determine the IP address of the user
More informationHow IBM Can Identify z/os Networking Issues without tracing
How IBM Can Identify z/os Networking Issues without tracing Wed, August 12, 1:45-2:45 Session 17536 Speakers: Ernie Gilman, IBM (egilman@us.ibm.com) Dean Butler, IBM (butlerde@us.ibm.com) Abstract Running
More informationTowards the OSA and beyond Using Wireshark for EE Problem Analysis
Towards the OSA and beyond Using Wireshark for EE Problem Analysis Matthias Burkhard IBM Germany mburkhar@de.ibm.com Wednesday, Feb. 6 2013 Session # 12853 www.linkedin.com/in/matthias Burkhard Twitter:
More informationExploring VTAM's Performance Parameters
Exploring VTAM's Performance Parameters Angela Schmitz AS Communication Consultant Services August 06, 2012 Session 11330 email: 73064.754@compuserve.com 1 Whether a seasoned VTAM Systems Programmer for
More informationENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS
51-10-60 DATA COMMUNICATIONS MANAGEMENT ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS Richard J. Tobacco INSIDE Talking Transport; By Air, Land, or Sea: Link Selection; Taking Familiar Routes: Connection
More informationSYSTEMS ADMINISTRATION USING CISCO (315)
Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure
More informationSNA over Frame Relay - The Frame Relay Forum - - The APPN Implementers Workshop -
SNA over Frame Relay - The Frame Relay Forum - - The APPN Implementers Workshop - September 30, 1997 David Sinicrope IBM Corporation Networking Architecture and System Design P.O. Box 12195 Research Triangle
More informationThe z/vm Virtual Switch Advancing the Art of Virtual Networking
Alan Altmark z/vm and Linux IT Consultant, IBM Lab Services March 2011 The z/vm Virtual Switch Advancing the Art of Virtual Networking Session 8441 Note References to IBM products, programs, or services
More informationSG Personal Communications for Coax, LAN, and WAN Users DOS, Windows 3.1, and OS/2. November 1996
SG24-4688-00 Personal Communications for Coax, LAN, and WAN Users DOS, Windows 3.1, and OS/2 November 1996 IBML International Technical Support Organization SG24-4688-00 Personal Communications for Coax,
More informationCisco Troubleshooting Cisco IP Telephony and Video (CTCOLLAB)
Cisco 300-080 Troubleshooting Cisco IP Telephony and Video (CTCOLLAB) http://killexams.com/pass4sure/exam-detail/300-080 Question: 213 Which two troubleshooting tools would initially be the best to use
More informationNew Face of z/os Communications Server: V2R1 Configuration Assistant
New Face of z/os Communications Server: V2R1 Configuration Assistant Kim Bailey (ktekavec@us.ibm.com) IBM August 14, 2013 Session # 13630 Agenda What is the Configuration Assistant and how can it help
More informationNetwork-Level High Availability
This chapter describes Cisco NX-OS network high availability and includes the following sections: Information About, page 1 Licensing Requirements, page 2 Spanning Tree Protocol, page 2 Virtual Port Channels,
More informationEnterprise Workload Manager Overview and Implementation
Enterprise Workload Manager Overview and Implementation Silvio Sasso IBM ITS Delivery for z/os sisa@ch.ibm.com 2006 IBM Corporation Trademarks The following are trademarks of the International Business
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,
More informationManaging Site-to-Site VPNs
CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building
More informationAbout this Guide. Intended Audience
About this Guide Intended Audience This document describes how you can use the Cisco Channel Interface Processor (CIP) and the Channel Port Adapter (CPA) in conjunction with the Telnet 3270 (TN3270) Server
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationIBM. Networking Getting started with System i communications. IBM i 7.1
IBM IBM i Networking Getting started with System i communications 7.1 IBM IBM i Networking Getting started with System i communications 7.1 Note Before using this information and the product it supports,
More informationLocator ID Separation Protocol (LISP) Overview
Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address: Endpoint identifiers (EIDs) assigned to end hosts.
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 8 Monitoring VLANs, page 22 Where to Go Next,
More informationNetworking APPC, APPN, and HPR
IBM Systems - iseries Networking APPC, APPN, and HPR Version 5 Release 4 IBM Systems - iseries Networking APPC, APPN, and HPR Version 5 Release 4 Note Before using this information and the product it
More informationHow to Manage TCP/IP with NetView for z/os V5R4. Ernie Gilman IBM August 5 th 2010 Session 7618
How to Manage TCP/IP with NetView for z/os V5R4 Ernie Gilman IBM August 5 th 2010 Session 7618 AGENDA Addressing Networking Challenges with IBM NetView for z/os V5.4 z/os Communication Server Network Management
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationConfiguring Hosted NAT Traversal for Session Border Controller
Configuring Hosted NAT Traversal for Session Border Controller The Cisco IOS Hosted NAT Traversal for Session Border Controller Phase-1 feature enables a Cisco IOS Network Address Translation (NAT) Session
More informationVLANs over IP Unnumbered SubInterfaces
The VLANs over IP Unnumbered Subinterfaces feature allows IP unnumbered interface support to be configured on Ethernet VLAN subinterfaces. This feature also provides support for DHCP on VLAN subinterfaces.
More informationNetworking Get Started With iseries Communications
IBM Systems - iseries Networking Get Started With iseries Communications Version 5 Release 4 IBM Systems - iseries Networking Get Started With iseries Communications Version 5 Release 4 Note Before using
More informationz/os Communications Server Hints and Tips
z/os Communications Server Hints and Tips Todd Valler tevaller@us.ibm.com IBM Enterprise Networking Solutions Friday, August 8, 2014 Session: 15519 z/os Communications Server Social Media http://facebook.com/ibmcommserver
More informationHP Advanced SAN Architecture.
HP HP0-815 Advanced SAN Architecture http://killexams.com/exam-detail/hp0-815 Answer: A QUESTION: 207 What is a design property of the Core+Edge+Leaf SAN topology? A. It allows many devices to share a
More informationExam Questions
Exam Questions 300-080 CTCOLLAB Troubleshooting Cisco IP Telephony and Video https://www.2passeasy.com/dumps/300-080/ 1. An IP phone that is connected through a Cisco Catalyst 3750 Series Switch is failing
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationEnterprise Extender EE: We Bring Good things to Life!
Enterprise Extender EE: We Bring Good things to Life! Jayasimha Buddiga Verizon Business jayasimha.buddiga@verizonbusiness.com Judy Miskill Social Security Administration judy.miskill@ssa.gov Session 8311
More informationSecurizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN
Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP
More informationImplementing SBC Firewall Traversal and NAT
CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationIBM. Availability Implementing high availability. IBM i 7.1
IBM IBM i Availability Implementing high availability 7.1 IBM IBM i Availability Implementing high availability 7.1 Note Before using this information and the product it supports, read the information
More informationFront Novell Guide to NLSP Migration
Front Novell Guide to NLSP Migration Front : 1 2 Novell Guide to NLSP Migration About This Guide.......................................... 7 Introduction..................................... 7 NetWare
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationNetworking TCP/IP routing and workload balancing
System i Networking TCP/IP routing and workload balancing Version 6 Release 1 System i Networking TCP/IP routing and workload balancing Version 6 Release 1 Note Before using this information and the product
More informationMPLS in the DCN. Introduction CHAPTER
CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information
More informationIBM i Version 7.2. Networking TCP/IP routing and workload balancing IBM
IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM Note Before using this information and the product it supports,
More informationIPv6 Switching: Provider Edge Router over MPLS
Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4
More informationCS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC
CS2060 - High Speed Networks Dr.G.A.Sathish Kumar Professor EC UNIT V PROTOCOLS FOR QOS SUPPORT UNIT V PROTOCOLS FOR QOS SUPPORT RSVP Goals & Characteristics RSVP operations, Protocol Mechanisms Multi
More informationExam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.
Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer
More informationStateful Network Address Translation 64
The feature provides a translation mechanism that translates IPv6 packets into IPv4 packets and vice versa. The stateful NAT64 translator algorithmically translates the IPv4 addresses of IPv4 hosts to
More informationScalability Considerations
3 CHAPTER This chapter presents the following steps to selecting Cisco products for a VPN solution: Sizing the headend Choosing Cisco products that can be deployed for headend devices Product sizing and
More informationMPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses
MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses The Multiprotocol Label Switching (MPLS) VPN Inter-AS with Autonomous System Boundary Routers (ASBRs) Exchanging VPN-IPv4 Addresses feature allows
More informationConfiguring NAT for High Availability
Configuring NAT for High Availability Last Updated: December 18, 2011 This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient
More informationRedbooks Paper. Networking Overview for Linux on zseries. Introduction. Networking options. Simon Williams
Redbooks Paper Simon Williams Networking Overview for Linux on zseries Introduction As new hardware is introduced and z/vm virtualization technology evolves, an ever increasing number of networking options
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationGetting Started with IPM
CHAPTER 2 Getting Started with IPM The chapter provides information on starting the IPM application and configuring a collector to gather response time data. It includes the following major sections: Starting
More informationSPLITTING IPV4 NETWORKS INTO SUBNETS (CLASS, CIDR, VLSM)
SPLITTING IPV4 NETWORKS INTO SUBNETS (CLASS, CIDR, VLSM) LAB GUIDELINES 1. Lab Target. To study the principles, tools and techniques for dividing the ISP address block allocated to the enterprise into
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationexam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
More informationChapter 8: Subnetting IP Networks
Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number
More informationLecture (02) Network Protocols and Standards
Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components
More informationSwitches running the LAN Base feature set support only static routing on SVIs.
Finding Feature Information, on page 1 Prerequisites for VLANs, on page 1 Restrictions for VLANs, on page 2 Information About VLANs, on page 2 How to Configure VLANs, on page 6 Monitoring VLANs, on page
More informationIP Addressing Modes for Cisco Collaboration Products
IP Addressing Modes for Cisco Collaboration Products IP Addressing Modes, page 1 Recommended IPv6 Addressing Modes for CSR 12.0 Products, page 3 IPv6 Addressing in Cisco Collaboration Products, page 9
More informationIP Addressing Modes for Cisco Collaboration Products
IP Addressing Modes for Cisco Collaboration Products IP Addressing Modes, on page 1 Recommended IPv6 Addressing Modes for CSR 12.1/12.0 Products, on page 2 IPv6 Addressing in Cisco Collaboration Products,
More informationUnit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6
5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing
More informationMapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications
Mapping of Address and Port () an ISPs Perspective E. Jordan Gottlieb Principal Engineer Charter Communications jordan.gottlieb@charter.com Agenda What is? Benefits of in Action Algorithms in Action Deployment
More informationOverlapping Ring Monitoring Algorithm in TIPC
Overlapping Ring Monitoring Algorithm in TIPC Jon Maloy, Ericsson Canada Inc. Montreal April 7th 2017 PURPOSE When a cluster node becomes unresponsive due to crash, reboot or lost connectivity we want
More informationInstructions for configuring Netware for SAA v.2.0 Server
Instructions for configuring Netware for SAA v.2.0 Server After installing the Netware for SAA v.2.0 on the Novell 4.1 server and applying patches there are some general steps in the configuration to go
More informationGRE and DM VPNs. Understanding the GRE Modes Page CHAPTER
CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationWhy Use ThinManager to Manage Thin Clients?
LEARNING SERIES: Why Use ThinManager to Manage Thin Clients? www.thinmanager.com Any explanation of ThinManager software requires an understanding of the underlying technology Microsoft Remote Desktop
More informationBTEC Level 3 Extended Diploma
BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward
More informationOSPFv3 Address Families
The Open Shortest Path First version 3 (OSPFv3) address families feature enables both IPv4 and IPv6 unicast traffic to be supported. With this feature, users may have two processes per interface, but only
More informationConfiguring RIP. Information About RIP CHAPTER
CHAPTER 23 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Routing Information Protocol (RIP). This chapter includes
More informationCOMP9332 Network Routing & Switching
COMP9332 Network Routing & Switching Switching in IP Networks with MPLS http://www.cse.unsw.edu.au/~cs9332 1 Lecture Overview This lecture introduces the concept of switching, which allows faster processing
More informationIP Multicast Technology Overview
IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationHIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson
HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features
More informationIBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server
z/os Communications Server IBM OA49911 - VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) Version 2 Release 2 Note: Links to related publications are from
More informationDynamic Routing: Exploiting HiperSockets and Real Network Devices
Dynamic Routing: Exploiting s and Real Network Devices Session 8447 Jay Brenneman rjbrenn@us.ibm.com Exploiting s and Real Network Devices Session 8447 Trademarks The following are trademarks of the International
More informationTivoli NetView Performance Monitor Version 2 Release 5
Software Announcement November 16, 1999 Tivoli NetView Performance Monitor Version 2 Release 5 Overview Tivoli NetView Performance Monitor Version 2 Release 5 (NPM) monitors, records, and interactively
More information