APPN Configurations: Recommendations & Limitations. Johnathan Harter z/os CommServer Development

Size: px
Start display at page:

Download "APPN Configurations: Recommendations & Limitations. Johnathan Harter z/os CommServer Development"

Transcription

1 Configurations: Recommendations & Limitations Johnathan Harter z/os CommServer Development 1

2 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 2

3 Node Types Defines Only Two Types Of Nodes End Nodes (s) - Session endpoints only (no intermediate routing) CP-CP sessions with one adjacent NN at a time (Network Node Server or NNS) Network Nodes (NNs) - Session endpoints or intermediate nodes CP-CP sessions with any adjacent NN and served s Specialized End Nodes (VTAM Only) Migration Data Hosts (MDHs) - Support both and Subarea (CP and CDRM) Specialized Network Nodes (Most Are VTAM Only) Composite Network Nodes (CNNs) - Activates and/or owns NCPs Interchange Nodes (ICNs) - Support both and Subarea (CP and CDRM) Central Directory Servers (CDServer) - version of "CMC" (resource directory) Dependent LU Servers (DLUSs) - version of "CMC" (resource ownership) Extended Border Nodes (EBNs) - version of SNI Gateway Virtual Routing Nodes (VRNs) - Used to represent Connection Networks NNs That Can Act Like s Branch Extenders (BEXs) Peripheral and Extended Border Nodes (PBNs and EBNs) 3

4 Node Type Examples V R N CNN, ICN Subarea MDH CDS, EBN Subarea BEX EBN 4

5 Node Type Recommendations Define As Many Nodes As s As Possible s do not participate in "network-wide" functions Maintaining network topology Searching for resources (LUs) s can dedicate more resources (storage, CPU) to production work Define As Few NNs As Possible Network topology database is smaller Easier to optimize session routes Network search overhead is reduced Use Specialized NNs As Needed CNNs are needed as long as there are NCPs ICNs are needed if sessions span /Subarea boundaries CDServers are recommended for all but the smallest networks DLUSs are used when dependent LUs are moved from NCPs to DLURs BEXs are used to minimize network topology in Branch Office environments EBNs are needed for multi-subnetwork connectivity VRNs provide meshed connectivity between nodes without meshed defintions 5

6 Interchange Node HPR Limitations Legend ER/VR Subarea (FID4) (FID2) (FID2) HPR Pure Session One RTP pipe can be used for the entire path ICN Session RTP pipe out of ICN is always only one-hop Remainder of session path can use a single RTP pipe 6

7 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 7

8 Central Directory Servers FIND(LUB) NN2 L LUA A NN1 CDS NN4 LUB B NN3 Used To Minimize Broadcast Searching Network Topology DB identifies which NNs are CDServers Non-CDServer NNs query a CDServer instead of broadcasting CDServers query other CDServers before broadcasting Other Searches That Can Also Occur Broadcast Search (if no CDServers have current information) Serial ICN Search of attached subarea networks Too Many CDServers Can Mean Too Much Searching 8

9 Central Directory Server Recommendations FIND(LUB) NN2 L LUA A NN1 CDS NN4 LUB B NN3 Choose Number Of CDServers Based On Network Size 3 or fewer NNs - No CDServers are needed 4 or more NNs - At least 1 CDServer is recommended Second CDServer is also okay (in case of failure) 6 or more NNs - At least 2 CDServers are recommended More than 4 CDServers is probably too many (not recommended) 9

10 Central Directory Server Placement A NN1 CDS CPSVCMG Weight = 60 NN3 C CPSVCMG Weight = 30 CPSVCMG Weight = 30 B NN2 CPSVCMG Weight = 60 NN4 CDS D Choose CDServers Based On Network Geography (Assumes no subnetwork boundaries) Define a CDServer in each physical data center (location) Define links and CPSVCMG COS to prefer local CDServer Most NNs choose a CDServer based on weight of Locate path Define links between local NNs to resolve to a lower weight Define links between remote NNs to resolve to a higher weight Non-CDServer NNs will choose local CDServer Remote CDServers are used as backup (assuming a path exists) Data Center 1 Data Center 2 10

11 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 11

12 Connection Networks (Virtual Routing Nodes) Why Are VRNs Important? To minimze link definitions between nodes that share a common transport Token Ring, X25, ATM, EE To simplify adding new nodes b Without VRNs Links must be defined between each pair of nodes for optimal routing 4 nodes, 12 links (4x3) 5 nodes, 20 links (5x4) 'n' nodes, n*(n-1) links NNa d b c With VRNs Links are defined to CP-CP partners and to Virtual Routing Node only 4 nodes, 8 links (4x2) 5 nodes, 10 links (5x2) 'n' nodes, nx2 links Direct links between other nodes are created dynamically NNa VRN d c 12

13 Interchange Node HPR Limitations For VRNs Legend ER/VR Subarea (FID4) (FID2) (FID2) HPR VRN Pure Session One RTP pipe can be used for the entire path ICN Session RTP pipe out of ICN is always only one-hop Remainder of session path can use a single RTP pipe 13

14 Connection Network Recommendations Use Connection Networks Whenever Possible To: Minimize link definitions Achieve optimal session paths Simplify adding new nodes On NNs, s and MDHs: Any type of Connection Network can be defined Independent of z/os CS release On Interchange Nodes (ICNs): Any type of Connection Network can be defined on all releases that have not yet reached End Of Service If you are still running pre-v1r4 z/os CS nodes as Interchange Nodes Define ISR-capable Connection Networks only! (TR & X25) Predefine HPR-only (EE) links from ICNs to all adjacent nodes (instead of defining HPR-only Connection Networks on ICNs) 14

15 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 15

16 Session Services Extensions Was Originally Designed For LU 6.2 Sessions Only All sessions were initiated by the Primary LU (PLU-Initiated) No SLU-Initiated sessions (REQSESS, LOGAPPL or SLU logons) No Third-party Initiated sessions (CLSDST PASS) All LUs were multi-session capable. No requirement for: Session queuing (SIMLOGON Q) Printer Sharing (RELREQ) Session Services Extensions (SSE) Created by Architecture and VTAM for VTAM V4R1 (first release) Optional "tower" on top of base or NN function Extended the Architecture to support existing subarea functions Provided seamless migration path from subarea to networking No impact to existing applications or external customers Unsupported by most products Co-exists very well with non-sse capable nodes 16

17 Session Services Extensions Exploitation L AS/400 NN2 VTAM A VTAM NN1 VTAM NN4 VTAM B AS/400 NN3 SSE Exploitation Requirements Owning CP and NNS of both the OLU and DLU must support SSE Intermediate NNs do not have to support SSE On Locate path or BIND (session) path Sessions between A, NN1, NN4, B can use SSE 17

18 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 18

19 Dependent LU Requester/Server (With SSE) Supports Dependent LUs Without DLUR! Dependent LUs attach as usual Must appear adjacent to VTAM/NCP Session path must include owning VTAM Possibly through owned NCPs only HPR is only possible to VTAM (NCP cannot be an RTP endppoint) DLUR Extends This Support To: Remove VTAM/NCP adjacency requirement DLURs can be located in remote sites More fully exploit HPR RTPs can extend out to the DLUR Route traffic more intelligently Session paths need not include the owning VTAM (but owning VTAM maintains session awareness) DLUS DLUR Control flows Session path Boundary Function Control flows Session path Boundary Function 19

20 Dependent LU Requester Placement DLUS DLUS DLUR Cisco SNASw CS/NT DLURs CS/Linux DLUR In Gateway No hit to downstream devices Fewer control sessions and RTPs More resources used by gateway Gateway is single point of failure DLUR In End Stations Best performance and availability HPR routes around failing gateway Fewer resources used by gateway More control sessions and RTPs 20

21 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 21

22 Branch Extenders Data Center Data Center NN Branch... Branch NN BEX Branch... BEX Branch NN Common Configuration Central data center supporting many remote branches Topology updates and searches can overwhelm branch network nodes Branch Extender Objectives Reduce TDUs & searches to branches Eliminate trial-and-error searching of branches for branch resources Intended for single-enterprise networks How BEX Node Works Acts like to data center (uplinks) Acts like NN to branch s (downlinks) NNs are not allowed below a BEX! L nodes are allowed below a BEX Resource Registration is forwarded into data center by BEX More efficient than EBN searching HPR to BEX and downstream s DLUR on BEX (but not below) 22

23 Cascaded and Parallel Branch Extenders BEX BEX Branch NN NN BEX or NN? Branch BEX NN Cascaded BEX Nodes Resource Registration requests are forwarded through each BEX node Can be used in "regional data center" configurations to reduce the number of DLURs Parallel BEX Nodes Divide ownership and backup, or Use duplicate TICs for high availability What about BEX-to-BEX link? Predefined link does not work If needed, define branch VRN instead 23

24 Branch Extender Limitations SSE Suppport BEX Is Not Required To Support SSE SSE is not supported below a BEX node! Downstream VTAMs are not recommended Limited to LU 6.2 (PLU-Init) Sessions Traffic can overload BEX node(s) BEX NN DLUR Support BEX nodes can be DLURs DLURs are not supported below a BEX node! If cascasded BEX nodes are used, highest level BEX node must be the DLUR Dependent LU passthrough function may be needed on lower level BEX nodes BEX Branch NN Connection Network (VRN) Support VRNs can be exploited within the branch VRNs cannot be used to route around a BEX BEX node acting as NNS will always be on the path of sessions into the data center 24

25 Agenda Node Types Central Directory Servers (CDServers) Connection Networks (VRNs) Session Services Extensions (SSE) Dependent LU Requesters/Servers (DLUR/DLUS) Branch Extenders (BEX) Extended Border Nodes (EBN) 25

26 Extended Border Nodes NN NN EBN EBN EBN NETA NETB NETC Peripheral Boundary Extended Boundary EBNs Provide "Multi-Subnetwork Connectivity" (" SNI") Optional "tower" on top of "base NN function plus SSE" Restricts Topology flows over subnetwork boundaries, but... Allows searches ( Locates) and sessions to cross subnetwork boundaries (user-controlled, dynamic, or combination of both) EBNs Support Two Types Of Subnetwork Boundary Peripheral boundary (EBN on only one side of boundary) EBN acts like an to adjacent non-native NN Not the same as Peripheral Border Node (AS/400 version) Extended boundary (EBN on both sides of boundary; recommended) 26

27 Peripheral Boundary Limitations EBN NN NN EBN EBN EBN Peripheral Boundary Peripheral Boundary Extended Boundary Peripheral Boundary Must Be First And/Or Last Network Boundaries On The Session Path All intermediate subnetwork boundaries on session path must be Extended If used with two or more subnetwork boundaries: EBNs must be on the "inside" of the peripheral boundaries Peripheral Boundary Must Be The ONLY Connection To The Adjacent Subnetwork (Direct or Indirect!) No other Extended or Peripheral subnetwork boundaries No Subarea or SNI connections No L connections Parallel links (between the same two nodes) are allowed 27

28 Peripheral Boundary Examples Does this configuration look OK? NO! BN3 has TWO links into the same peripheral network Can cause routing loops that are not detectable NN7 NETC BN6 NETA 9 BN1 BN3 NN2 NN5 BN4 NETA 8 NETB How about this configuration? NO AGAIN! Although BN3 does not have two links to the same peripheral network, there is still more than one path into the subnetworks containing NN2 and NN5 The same undetectable routing loops can occur NN7 NETC BN6 NETA 9 BN1 BN3 NN2 NN5 NETB NETB BN4 NETA 8 28

29 Extended Border Nodes And SSE OLU NN NN EBN EBN EBN NN DLU NETA NETB NETC CP(OLU) NNS(OLU) NNS(DLU) NNS(OLU) NNS(DLU) NNS(OLU) NNS(DLU) CP(DLU) SSE Are Supported Across Subnetwork Boundaries Which nodes must be SSE Capable? Owning CP and NNS of both the OLU and DLU in each subnetwork Intermediate NNs in each subnetwork do not have to support SSE All Extended Boundaries provide full SSE support SSE support is a prerequisite for EBN functions Not all Peripheral Boundaries provide SSE support Depends on the capabilities of the non-native NN 29

30 Extended Border Nodes And DLUR/DLUS NETA 9 BN1 DLUS BN3 NN7 PLU1 NETC BN6 BN4 NETA 8 PLU2 BN2 DLUR1 NETB NN5 DLUR2 NETB DLUR, DLUS And PLU Can Each Be In Different Subnetworks What types of boundaries are allowed? All Three "Paths" Must Be Considered: DLUS-To-DLUR: CPSVRMGR session path One Peripheral Boundary is allowed: Border Node must be on DLUS-side DLUS-To-PLU: Locate path Extended Boundaries only (even if SSE is supported by adjacent NN) PLU-To-DLUR: End-user session path One Peripheral Boundary is allowed: Border Node must be on PLU-side 30

31 Global Connection Networks (GVRNs) NETA 9 BN1 BN3 NN7 NETC VRN BN6 GVRN BN4 NETA 8 BN2 NETB NN5 NETB Local VRNs (TR, X25, ATM and EE): Connection Network (VRN) can only be used natively (within a subnetwork) Cross-subnetwork sessions must traverse the EBNs on Locate path Global VRNs (EE only): Connection Network (VRN) can be used across subnetwork boundaries Allows cross-subnetwork sessions to use a direct (dynamically created) link Can be used to eliminate EBNs as a potential performance bottle-neck 31

32 Global Connection Network Limitations NETA 9 BN1 BN3 NN7 NETC VRN BN6 GVRN BN4 NETA 8 BN2 NETB NN5 NETB Global Connection Networks: Require "Extended Boundaries" along the entire Locate path Are only used between OLU and DLU subnetworks Not used to or from intermediate subnetworks on Locate path Are not used when the OLU or DLU are "in subarea". However... Once RTPs are established, they can be path switched over GVRNs Can be exploited by Branch Extenders, but not by downstream nodes Multiple EE (G)VRNs, IPv6 (G)VRNs and Firewalls are supported 32

33 For More Information... URL Content IBM eserver zseries Mainframe Servers Networking: IBM zseries Servers IBM Enterprise Servers: Networking Technologies Communications Server product overview z/os Communications Server Communications Server for Linux on zseries Communication Controller for Linux on zseries Communications Server products - white papers, product documentation, etc. ITSO redbooks Communications Server technical Support Technical support documentation (techdocs, flashes, presentations, white papers, etc.) Request For Comments (RFC) IBM Education Assistant 33

EBN Searching In APPN/HPR Border Node Networks. Johnathan Harter z/os CommServer Development

EBN Searching In APPN/HPR Border Node Networks. Johnathan Harter z/os CommServer Development Searching In /HPR Border Node Networks Johnathan Harter z/os CommServer Development yoda@us.ibm.com 1 Agenda Searching Using ALIAS Names Who Is My Network Node Server (NNS)? Introduction To Extended Border

More information

Securing Enterprise Extender

Securing Enterprise Extender Securing Enterprise Extender Sam Reynolds IBM z/os Communications Server Design samr@us.ibm.com Ray Romney Cisco Systems romney@cisco.com Tony Amies William Data Systems Product Architect tony.amies@willdata.com

More information

SNA Strategy and Migration Considerations

SNA Strategy and Migration Considerations Enterprise Networking Solutions Strategy and Migration Considerations Sam Reynolds samr@us.ibm.com February 4, 2013 SHARE 2013 Winter Technical Conference Session 12845 Agenda Enterprise Network Solutions

More information

Designing APPN Internetworks

Designing APPN Internetworks CHAPTER 6 Designing APPN Internetworks Advanced Peer-to-Peer Networking (APPN) is a second generation of the Systems Network Architecture (SNA) from IBM. It moves SNA from a hierarchical, mainframe-centric

More information

Dependent LUs and DLUR/DLUS

Dependent LUs and DLUR/DLUS Dependent LUs and DLUR/DLUS Document ID: 12240 Contents Introduction Prerequisites Requirements Components Used Conventions DLUR/DLUS Fundamentals DLUR/DLUS Session Service Extensions DLUR/DLUS Routing

More information

Understanding Enterprise Extender Part I. Concepts and Considerations

Understanding Enterprise Extender Part I. Concepts and Considerations Understanding Enterprise Extender Part I. Concepts and Considerations Sam Reynolds samr@us.ibm.com IBM z/os Communications Server Design Agenda Understanding EE: Concepts and Considerations SNA: Dead or

More information

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved. 1 Migrating APPN to SNASw Scenarios Session 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda Old Cisco APPN Problems and Challenges How New Cisco APPN

More information

Enterprise Extender: Concepts and Considerations

Enterprise Extender: Concepts and Considerations Enterprise Extender: Concepts and Considerations SHARE 2012 Winter Technical Conference Session 10821 Sam Reynolds samr@us.ibm.com IBM z/os Communications Server Design Agenda What is Enterprise Extender?

More information

Enterprise Extender on z/os Communications Server: SNA Hints and Tips

Enterprise Extender on z/os Communications Server: SNA Hints and Tips Enterprise Networking Solutions Enterprise Extender on z/os Communications Server: SNA Hints and Tips Sam Reynolds samr@us.ibm.com March 5, 2015 SHARE 2015 Winter Technical Conference Session 16745 Agenda

More information

z/os CS Enterprise Extender Hints & Tips

z/os CS Enterprise Extender Hints & Tips z/os Communications Server z/os CS Enterprise Extender Hints & Tips z/os CS Design & Development, Raleigh Copyright International Business Machines Corporation 2013. All rights reserved. Sam Reynolds -

More information

Enterprise Extender: Recent Enhancements and Coming Attractions

Enterprise Extender: Recent Enhancements and Coming Attractions z/os Communications Server Enterprise Extender: Recent Enhancements and Coming Attractions z/os CS Development, Raleigh Sam Reynolds - samr@us.ibm.com Agenda Enterprise Extender with z/os V1R9 CS HPR Path

More information

Configuring SNA Switching Services

Configuring SNA Switching Services Configuring SNA Switching Services This chapter describes SNA Switching Services (SNASw), which supersedes all functionality previously available in the Advanced Peer-to-Peer Networking (APPN) feature

More information

Understanding Enterprise Extender Part II. Nuts and Bolts

Understanding Enterprise Extender Part II. Nuts and Bolts Understanding Enterprise Extender Part II. Nuts and Bolts Sam Reynolds samr@us.ibm.com IBM z/os Communications Server Design Agenda Understanding EE: Concepts and Considerations SNA: Dead or Alive? Enterprise

More information

Solutions in an SNA/IP (EE) Network

Solutions in an SNA/IP (EE) Network High Performance Switching and Routing Solutions in an SNA/IP (EE) Network Howard Johnson, Brocade Communications Dr. Steve Guendert, Brocade Communications 3 August 2010 (4:30pm 5:30pm) Room 102 1 Legal

More information

Sysplex Networking Technology Overview

Sysplex Networking Technology Overview Summer 2010 Technical Conference Sysplex Networking Technology Overview Thursday, August 5, 2010, 11:00 AM - 12:00 PM Enterprise Networking Solutions Gus Kassimis - kassimis@us.ibm.com Sam Reynolds - samr@us.ibm.com

More information

Mainframe Networking 101 Share Session 15422

Mainframe Networking 101 Share Session 15422 Mainframe Networking 101 Share Session 15422 6 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 06/23/2014 Applied Expert Systems, Inc. 2014 1 Agenda Requirements for Communication

More information

November Copyright (C) The Internet Society (1998). All Rights Reserved.

November Copyright (C) The Internet Society (1998). All Rights Reserved. Network Working Group Request for Comments: 2455 Obsoletes: 2155 Category: Standards Track B. Clouston Cisco Systems B. Moore IBM Corporation November 1998 Definitions of Managed Objects for APPN Status

More information

Mainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler -

Mainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler - Mainframe Networking 101 Share Session 6 Junie Sanders jrsandler@cisco.com Kevin Manweiler - kmanweil@cisco.com 2 Agenda Requirements for Communication What are Networking Architectures? Networking Architectures

More information

TN3270 Server Commands

TN3270 Server Commands TN3270 Server Commands Use the commands in this chapter to configure and monitor the Cisco Mainframe Channel Connection (CMCC) products, which include the Channel Interface Processor (CIP) and the Channel

More information

Medco Health Solutions Inc. Bob Mundhenk Executive Director of Technology

Medco Health Solutions Inc. Bob Mundhenk Executive Director of Technology CCL Customer Experiences zexpo Session October 2006 Beth Duncan, IBM East Region zseries New Workload Team eadunca@us.ibm.com Miami Dade County Craig Koller Senior Operating Systems Programmer CNK@miamidade.gov

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Configuring VLAN CHAPTER

Configuring VLAN CHAPTER CHAPTER 10 LMS collects data about devices so that you can configure and manage Virtual Local Area Network (VLAN) in your network. You must set up your LMS server properly to ensure that Data Collection

More information

Chicago Area VM Enthusiasts - IBM Communications Server for Linux on zseries

Chicago Area VM Enthusiasts - IBM Communications Server for Linux on zseries Enterprise ing Solutions Chicago Area VM Enthusiasts - IBM Communications Server for Linux on zseries Alfred B Christensen - alfredch@us.ibm.com Enterprise ing Solutions aleigh, North Carolina, USA Trademarks

More information

SIP RFC 2782 Compliance with DNS SRV Queries

SIP RFC 2782 Compliance with DNS SRV Queries SIP RFC 2782 Compliance with DNS SRV Last Updated: December 21, 2011 Effective with Cisco IOS XE Release 2.5, the Domain Name System Server (DNS SRV) query used to determine the IP address of the user

More information

How IBM Can Identify z/os Networking Issues without tracing

How IBM Can Identify z/os Networking Issues without tracing How IBM Can Identify z/os Networking Issues without tracing Wed, August 12, 1:45-2:45 Session 17536 Speakers: Ernie Gilman, IBM (egilman@us.ibm.com) Dean Butler, IBM (butlerde@us.ibm.com) Abstract Running

More information

Towards the OSA and beyond Using Wireshark for EE Problem Analysis

Towards the OSA and beyond Using Wireshark for EE Problem Analysis Towards the OSA and beyond Using Wireshark for EE Problem Analysis Matthias Burkhard IBM Germany mburkhar@de.ibm.com Wednesday, Feb. 6 2013 Session # 12853 www.linkedin.com/in/matthias Burkhard Twitter:

More information

Exploring VTAM's Performance Parameters

Exploring VTAM's Performance Parameters Exploring VTAM's Performance Parameters Angela Schmitz AS Communication Consultant Services August 06, 2012 Session 11330 email: 73064.754@compuserve.com 1 Whether a seasoned VTAM Systems Programmer for

More information

ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS

ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS 51-10-60 DATA COMMUNICATIONS MANAGEMENT ENTERPRISE EXTENDER: A BETTER WAY TO USE IP NETWORKS Richard J. Tobacco INSIDE Talking Transport; By Air, Land, or Sea: Link Selection; Taking Familiar Routes: Connection

More information

SYSTEMS ADMINISTRATION USING CISCO (315)

SYSTEMS ADMINISTRATION USING CISCO (315) Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure

More information

SNA over Frame Relay - The Frame Relay Forum - - The APPN Implementers Workshop -

SNA over Frame Relay - The Frame Relay Forum - - The APPN Implementers Workshop - SNA over Frame Relay - The Frame Relay Forum - - The APPN Implementers Workshop - September 30, 1997 David Sinicrope IBM Corporation Networking Architecture and System Design P.O. Box 12195 Research Triangle

More information

The z/vm Virtual Switch Advancing the Art of Virtual Networking

The z/vm Virtual Switch Advancing the Art of Virtual Networking Alan Altmark z/vm and Linux IT Consultant, IBM Lab Services March 2011 The z/vm Virtual Switch Advancing the Art of Virtual Networking Session 8441 Note References to IBM products, programs, or services

More information

SG Personal Communications for Coax, LAN, and WAN Users DOS, Windows 3.1, and OS/2. November 1996

SG Personal Communications for Coax, LAN, and WAN Users DOS, Windows 3.1, and OS/2. November 1996 SG24-4688-00 Personal Communications for Coax, LAN, and WAN Users DOS, Windows 3.1, and OS/2 November 1996 IBML International Technical Support Organization SG24-4688-00 Personal Communications for Coax,

More information

Cisco Troubleshooting Cisco IP Telephony and Video (CTCOLLAB)

Cisco Troubleshooting Cisco IP Telephony and Video (CTCOLLAB) Cisco 300-080 Troubleshooting Cisco IP Telephony and Video (CTCOLLAB) http://killexams.com/pass4sure/exam-detail/300-080 Question: 213 Which two troubleshooting tools would initially be the best to use

More information

New Face of z/os Communications Server: V2R1 Configuration Assistant

New Face of z/os Communications Server: V2R1 Configuration Assistant New Face of z/os Communications Server: V2R1 Configuration Assistant Kim Bailey (ktekavec@us.ibm.com) IBM August 14, 2013 Session # 13630 Agenda What is the Configuration Assistant and how can it help

More information

Network-Level High Availability

Network-Level High Availability This chapter describes Cisco NX-OS network high availability and includes the following sections: Information About, page 1 Licensing Requirements, page 2 Spanning Tree Protocol, page 2 Virtual Port Channels,

More information

Enterprise Workload Manager Overview and Implementation

Enterprise Workload Manager Overview and Implementation Enterprise Workload Manager Overview and Implementation Silvio Sasso IBM ITS Delivery for z/os sisa@ch.ibm.com 2006 IBM Corporation Trademarks The following are trademarks of the International Business

More information

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,

More information

Managing Site-to-Site VPNs

Managing Site-to-Site VPNs CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Data Sheet Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building

More information

About this Guide. Intended Audience

About this Guide. Intended Audience About this Guide Intended Audience This document describes how you can use the Cisco Channel Interface Processor (CIP) and the Channel Port Adapter (CPA) in conjunction with the Telnet 3270 (TN3270) Server

More information

Managing Site-to-Site VPNs: The Basics

Managing Site-to-Site VPNs: The Basics CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels

More information

IBM. Networking Getting started with System i communications. IBM i 7.1

IBM. Networking Getting started with System i communications. IBM i 7.1 IBM IBM i Networking Getting started with System i communications 7.1 IBM IBM i Networking Getting started with System i communications 7.1 Note Before using this information and the product it supports,

More information

Locator ID Separation Protocol (LISP) Overview

Locator ID Separation Protocol (LISP) Overview Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address: Endpoint identifiers (EIDs) assigned to end hosts.

More information

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 8 Monitoring VLANs, page 22 Where to Go Next,

More information

Networking APPC, APPN, and HPR

Networking APPC, APPN, and HPR IBM Systems - iseries Networking APPC, APPN, and HPR Version 5 Release 4 IBM Systems - iseries Networking APPC, APPN, and HPR Version 5 Release 4 Note Before using this information and the product it

More information

How to Manage TCP/IP with NetView for z/os V5R4. Ernie Gilman IBM August 5 th 2010 Session 7618

How to Manage TCP/IP with NetView for z/os V5R4. Ernie Gilman IBM August 5 th 2010 Session 7618 How to Manage TCP/IP with NetView for z/os V5R4 Ernie Gilman IBM August 5 th 2010 Session 7618 AGENDA Addressing Networking Challenges with IBM NetView for z/os V5.4 z/os Communication Server Network Management

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Configuring Hosted NAT Traversal for Session Border Controller

Configuring Hosted NAT Traversal for Session Border Controller Configuring Hosted NAT Traversal for Session Border Controller The Cisco IOS Hosted NAT Traversal for Session Border Controller Phase-1 feature enables a Cisco IOS Network Address Translation (NAT) Session

More information

VLANs over IP Unnumbered SubInterfaces

VLANs over IP Unnumbered SubInterfaces The VLANs over IP Unnumbered Subinterfaces feature allows IP unnumbered interface support to be configured on Ethernet VLAN subinterfaces. This feature also provides support for DHCP on VLAN subinterfaces.

More information

Networking Get Started With iseries Communications

Networking Get Started With iseries Communications IBM Systems - iseries Networking Get Started With iseries Communications Version 5 Release 4 IBM Systems - iseries Networking Get Started With iseries Communications Version 5 Release 4 Note Before using

More information

z/os Communications Server Hints and Tips

z/os Communications Server Hints and Tips z/os Communications Server Hints and Tips Todd Valler tevaller@us.ibm.com IBM Enterprise Networking Solutions Friday, August 8, 2014 Session: 15519 z/os Communications Server Social Media http://facebook.com/ibmcommserver

More information

HP Advanced SAN Architecture.

HP Advanced SAN Architecture. HP HP0-815 Advanced SAN Architecture http://killexams.com/exam-detail/hp0-815 Answer: A QUESTION: 207 What is a design property of the Core+Edge+Leaf SAN topology? A. It allows many devices to share a

More information

Exam Questions

Exam Questions Exam Questions 300-080 CTCOLLAB Troubleshooting Cisco IP Telephony and Video https://www.2passeasy.com/dumps/300-080/ 1. An IP phone that is connected through a Cisco Catalyst 3750 Series Switch is failing

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Enterprise Extender EE: We Bring Good things to Life!

Enterprise Extender EE: We Bring Good things to Life! Enterprise Extender EE: We Bring Good things to Life! Jayasimha Buddiga Verizon Business jayasimha.buddiga@verizonbusiness.com Judy Miskill Social Security Administration judy.miskill@ssa.gov Session 8311

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

Implementing SBC Firewall Traversal and NAT

Implementing SBC Firewall Traversal and NAT CHAPTER 15 The Session Border Controller (SBC) enables voice over IP (VoIP) signaling and media to be received from and directed to a device behind a firewall and NAT (Network Address Translator) at the

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

IBM. Availability Implementing high availability. IBM i 7.1

IBM. Availability Implementing high availability. IBM i 7.1 IBM IBM i Availability Implementing high availability 7.1 IBM IBM i Availability Implementing high availability 7.1 Note Before using this information and the product it supports, read the information

More information

Front Novell Guide to NLSP Migration

Front Novell Guide to NLSP Migration Front Novell Guide to NLSP Migration Front : 1 2 Novell Guide to NLSP Migration About This Guide.......................................... 7 Introduction..................................... 7 NetWare

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Networking TCP/IP routing and workload balancing

Networking TCP/IP routing and workload balancing System i Networking TCP/IP routing and workload balancing Version 6 Release 1 System i Networking TCP/IP routing and workload balancing Version 6 Release 1 Note Before using this information and the product

More information

MPLS in the DCN. Introduction CHAPTER

MPLS in the DCN. Introduction CHAPTER CHAPTER 5 First Published: January 3, 2008 Last Updated: January 3, 2008 Finding Support Information for Platforms and Cisco IOS and Catalyst OS Software Images Use Cisco Feature Navigator to find information

More information

IBM i Version 7.2. Networking TCP/IP routing and workload balancing IBM

IBM i Version 7.2. Networking TCP/IP routing and workload balancing IBM IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM Note Before using this information and the product it supports,

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC CS2060 - High Speed Networks Dr.G.A.Sathish Kumar Professor EC UNIT V PROTOCOLS FOR QOS SUPPORT UNIT V PROTOCOLS FOR QOS SUPPORT RSVP Goals & Characteristics RSVP operations, Protocol Mechanisms Multi

More information

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test. Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer

More information

Stateful Network Address Translation 64

Stateful Network Address Translation 64 The feature provides a translation mechanism that translates IPv6 packets into IPv4 packets and vice versa. The stateful NAT64 translator algorithmically translates the IPv4 addresses of IPv4 hosts to

More information

Scalability Considerations

Scalability Considerations 3 CHAPTER This chapter presents the following steps to selecting Cisco products for a VPN solution: Sizing the headend Choosing Cisco products that can be deployed for headend devices Product sizing and

More information

MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses

MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses MPLS VPN Inter-AS with ASBRs Exchanging VPN-IPv4 Addresses The Multiprotocol Label Switching (MPLS) VPN Inter-AS with Autonomous System Boundary Routers (ASBRs) Exchanging VPN-IPv4 Addresses feature allows

More information

Configuring NAT for High Availability

Configuring NAT for High Availability Configuring NAT for High Availability Last Updated: December 18, 2011 This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient

More information

Redbooks Paper. Networking Overview for Linux on zseries. Introduction. Networking options. Simon Williams

Redbooks Paper. Networking Overview for Linux on zseries. Introduction. Networking options. Simon Williams Redbooks Paper Simon Williams Networking Overview for Linux on zseries Introduction As new hardware is introduced and z/vm virtualization technology evolves, an ever increasing number of networking options

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

Getting Started with IPM

Getting Started with IPM CHAPTER 2 Getting Started with IPM The chapter provides information on starting the IPM application and configuring a collector to gather response time data. It includes the following major sections: Starting

More information

SPLITTING IPV4 NETWORKS INTO SUBNETS (CLASS, CIDR, VLSM)

SPLITTING IPV4 NETWORKS INTO SUBNETS (CLASS, CIDR, VLSM) SPLITTING IPV4 NETWORKS INTO SUBNETS (CLASS, CIDR, VLSM) LAB GUIDELINES 1. Lab Target. To study the principles, tools and techniques for dividing the ISP address block allocated to the enterprise into

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Chapter 8: Subnetting IP Networks

Chapter 8: Subnetting IP Networks Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

Switches running the LAN Base feature set support only static routing on SVIs.

Switches running the LAN Base feature set support only static routing on SVIs. Finding Feature Information, on page 1 Prerequisites for VLANs, on page 1 Restrictions for VLANs, on page 2 Information About VLANs, on page 2 How to Configure VLANs, on page 6 Monitoring VLANs, on page

More information

IP Addressing Modes for Cisco Collaboration Products

IP Addressing Modes for Cisco Collaboration Products IP Addressing Modes for Cisco Collaboration Products IP Addressing Modes, page 1 Recommended IPv6 Addressing Modes for CSR 12.0 Products, page 3 IPv6 Addressing in Cisco Collaboration Products, page 9

More information

IP Addressing Modes for Cisco Collaboration Products

IP Addressing Modes for Cisco Collaboration Products IP Addressing Modes for Cisco Collaboration Products IP Addressing Modes, on page 1 Recommended IPv6 Addressing Modes for CSR 12.1/12.0 Products, on page 2 IPv6 Addressing in Cisco Collaboration Products,

More information

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6

Unit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6 5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing

More information

Mapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications

Mapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications Mapping of Address and Port () an ISPs Perspective E. Jordan Gottlieb Principal Engineer Charter Communications jordan.gottlieb@charter.com Agenda What is? Benefits of in Action Algorithms in Action Deployment

More information

Overlapping Ring Monitoring Algorithm in TIPC

Overlapping Ring Monitoring Algorithm in TIPC Overlapping Ring Monitoring Algorithm in TIPC Jon Maloy, Ericsson Canada Inc. Montreal April 7th 2017 PURPOSE When a cluster node becomes unresponsive due to crash, reboot or lost connectivity we want

More information

Instructions for configuring Netware for SAA v.2.0 Server

Instructions for configuring Netware for SAA v.2.0 Server Instructions for configuring Netware for SAA v.2.0 Server After installing the Netware for SAA v.2.0 on the Novell 4.1 server and applying patches there are some general steps in the configuration to go

More information

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Why Use ThinManager to Manage Thin Clients?

Why Use ThinManager to Manage Thin Clients? LEARNING SERIES: Why Use ThinManager to Manage Thin Clients? www.thinmanager.com Any explanation of ThinManager software requires an understanding of the underlying technology Microsoft Remote Desktop

More information

BTEC Level 3 Extended Diploma

BTEC Level 3 Extended Diploma BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward

More information

OSPFv3 Address Families

OSPFv3 Address Families The Open Shortest Path First version 3 (OSPFv3) address families feature enables both IPv4 and IPv6 unicast traffic to be supported. With this feature, users may have two processes per interface, but only

More information

Configuring RIP. Information About RIP CHAPTER

Configuring RIP. Information About RIP CHAPTER CHAPTER 23 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Routing Information Protocol (RIP). This chapter includes

More information

COMP9332 Network Routing & Switching

COMP9332 Network Routing & Switching COMP9332 Network Routing & Switching Switching in IP Networks with MPLS http://www.cse.unsw.edu.au/~cs9332 1 Lecture Overview This lecture introduces the concept of switching, which allows faster processing

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction

More information

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

IBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server

IBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server z/os Communications Server IBM OA49911 - VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) Version 2 Release 2 Note: Links to related publications are from

More information

Dynamic Routing: Exploiting HiperSockets and Real Network Devices

Dynamic Routing: Exploiting HiperSockets and Real Network Devices Dynamic Routing: Exploiting s and Real Network Devices Session 8447 Jay Brenneman rjbrenn@us.ibm.com Exploiting s and Real Network Devices Session 8447 Trademarks The following are trademarks of the International

More information

Tivoli NetView Performance Monitor Version 2 Release 5

Tivoli NetView Performance Monitor Version 2 Release 5 Software Announcement November 16, 1999 Tivoli NetView Performance Monitor Version 2 Release 5 Overview Tivoli NetView Performance Monitor Version 2 Release 5 (NPM) monitors, records, and interactively

More information