Informatica Universiteit van Amsterdam. Open-source network operating systems: feature evaluation. Erik Puijk,

Size: px
Start display at page:

Download "Informatica Universiteit van Amsterdam. Open-source network operating systems: feature evaluation. Erik Puijk,"

Transcription

1 Bachelor Informatica Informatica Universiteit van Amsterdam Open-source network operating systems: feature evaluation of SONiC Erik Puijk, June 7, 2018 Supervisor(s): Dr. Paola Grosso, Lukasz Makowski MSc Signed:

2 2

3 Abstract Open network switches are increasing in popularity and allow the deployment of different open-source network operating systems (NOS). In contrast to locked-in switches, open switches with an open-source NOS have been tested less extensively as they are quite new phenomena. This thesis examines whether open switches with an open-source network operating system, namely SONiC, can be deployed successfully to perform fundamental networking operations. Furthermore, it examines for what use cases SONiC is suitable and beneficial. We experiment with open switches in various topologies to examine the deployment of fundamental OSI Layer 2 and Layer 3 networking features. We conclude that all SONiC-supported features we tested can be deployed successfully. Moreover, we examine several use cases of open switches with SONiC and conclude that SONiC is most suitable for use cases in large-scale data centers and enterprise networks. 3

4 4

5 Contents 1 Introduction 7 2 Open networking background Open switches Network operating systems ASIC communication ASIC control module SONiC Quagga Networking features Layer 2 features Layer 3 features Experiments Preparatory phase Mellanox SN2100 and ONIE Arista 7050QX-32S and Aboot Feature tests Layer 2 features Layer 3 features Result overview Discussion Ease of use Use case scenarios for open switches Current use cases Example use cases Conclusions Future research Acknowledgements 37 9 Bibliography Appendix 41 5

6 6

7 CHAPTER 1 Introduction Network switches are essential in computer networks, to connect devices and forward frames between them on the OSI data link layer (Layer 2)[1]. Some switches are also capable of OSI Layer 3 features, such as the routing of segments among networks using IP. In this thesis, we discuss exactly this category of devices. Traditionally, switches are sold with locked-in hardware with a pre-installed network operating system (NOS) on them, without the possibility for a network administrator to install third-party NOS s or other software on them. An open switch, in contrast, does allow the user to install another operating system on the device. Open switches thus give network administrators more possibilities to customize the switch to their own needs, possibly explaining their rising popularity. Another advantage of this category of switches is the reduction of expenses, due to the possibility to install low-cost software. In the past, this cost reduction would be compensated by an increase in operational costs, because using the switches would require hiring external Linux-expertise to configure the switches [2]. However, as Linux expertise has grown over the past few years, this barrier for using open switches has become much thinner. Also, large manufacturers such as Dell and HP have been developing open switches on which NOS s like Cumulus Networks or Pica8 are already installed [3]. This removed another obstacle from companies using the switches because no manual installation is required. The increasing popularity raises questions about the suitability for use in real networks, the ease of use and how their feature sets compare to those of traditional switches. Considering that open switches are relatively new compared to locked-in switches, there is still need for testing and evaluation to assess whether open switches can replace traditional switches without loss of functionality, performance or ease of use, which the reduction in costs might not weigh up to. In this context, we examine the functioning of open switches running an open-source network operating system, namely SONiC, in a network. We study whether open switches with SONiC are able to deploy several fundamental networking features. In addition, we examine which use cases benefit from the open and flexible nature of open switches with SONiC. We therefore set out to answer the following two research questions: 1. Which networking features can be successfully deployed on open switches with SONiC? 2. Which use cases are (more) easily supported by open switches with SONiC? Chapter 2 provides background information about open networking, open switches, network operating systems (SONiC specifically) and routing suites. Chapter 3 will briefly discuss several networking features that will later be used in our experiments. Chapter 4 contains the experiments we performed to answer our first research question. In chapter 5, we discuss the experimental methods and results and other findings obtained during this research. In chapter 6, we examine several use cases of open switches with SONiC. Lastly, in chapter 7 we return to our research questions, formulate a conclusion and suggest possibilities for future research. 7

8 8

9 CHAPTER 2 Open networking background 2.1 Open switches Generally, a switch can be represented as a stack of four layered components. Figure 2.1 shows these components. Control and management plane Network operating system Hardware Silicon/ASIC Figure 2.1: Layered component stack of a switch. The silicon, or ASIC (application-specific integrated circuit), is a specified hardware element designed for a specific task. In the case of switches, this task is to quickly send packets through the network [4]. The hardware-layer includes all other physical components of the switch, like the interfaces, the input/output-ports, the LEDs and the power supply [5]. The network operating system (NOS) controls the hardware and the underlying ASIC for networking purposes and allows control and management plane applications to use the hardware. Control plane and management plane applications provide particular features to the user of the switch, in addition to those of the underlying operating system [6]. To understand the difference between open switches and traditional switches, one needs to consider the manner in which the above components interact with each other. Switches in which the NOS and the underlying hardware are disintegrated, meaning that they can be changed independently of each other, are called open switches. In traditional (locked-in) switches, this is not possible, for the switch is delivered with pre-installed software that cannot be changed. Open switches thus give the user more choice in what NOS to run. Open switches can be separated into subcategories. Bare metal switches provide the hardware required to run, and allow the user to load the NOS of choice. The manufacturers of bare metal switches are original design manufacturers (ODMs) for well-known switch merchants, which means that the ODMs products are re-branded and sold by other companies. A boot-loader allows the user to boot an NOS of choice on the device [7]. 9

10 2.2 Network operating systems A network operating system is a key component in the aforementioned component stack of open switches. The NOS controls the hardware of the device and provides applications on the switch with the hardware and software resources they need. These resources might for example be memory allocation or input and output resources ASIC communication The aforementioned application-specific integrated circuits (ASICs) are designed to handle a specific task. In networking switches, the ASIC is designed and optimized for quickly processing incoming packets according to the routing table. In order for an NOS to be able to program the ASIC, several APIs have been developed to communicate with the ASIC. The Switch Abstraction Interface 1 (SAI) is a well-known method. It is an open source framework that aims to abstract away from the ASIC, which differs for each vendor, so software can be programmed for use in multiple different switches without any changes. This allows for more freedom in the use of software independently from the hardware choice [8]. Another, less adopted method for ASIC communication is the use of SDKs developed by the ASIC vendor. In practice, this approach is not included in open-source software for open switches considering changes in the SDKs would need the application to be modified. Examples of these SDKs are SwitchX SDK by Mellanox [9] and OpenNSL by Broadcom [10] ASIC control module On top of the ASIC API, the ASIC control module provides an interface for control plane applications to communicate with the hardware. It also presents the current state of the hardware to the user of the switch. Control plane apps can use the ASIC control module to read from or write to data stored in the hardware. These applications therefore are independent from the hardware in the machine they are running on. Figure 2.2 shows the role of the ASIC control module and the ASIC API in the component stack illustrated before. Control and management plane Network operating system ASIC control module ASIC API Hardware Silicon/ASIC Figure 2.2: ASIC control module and ASIC API in the layered component stack

11 2.3 SONiC SONiC 2 (Software for Open Networking in the Cloud) is an open-source network operating system that claims to include all features to have a fully functional Layer 3 network device. It is under constant development by Microsoft. The latest release, SONiC , supports features including BGP, LLDP, link aggregation/lacp and VLAN (trunking) [11]. SONiC is Linux-based and runs on Debian Jessie. The SONiC architecture is depicted in figure 2.3. Figure 2.3: An overview of SONiC components [12]. SONiC uses SAI for programming the ASIC, which makes SONiC compatible with all ASICs that are supported by SAI. The SONiC Object Library 3 allows external applications to interact with each other and with SONiC applications. Switch State Service The Switch State Service (SwSS) acts as the ASIC control module for SONiC, using a database to interface between the network applications running on the switch and the switch hardware. Figure 2.4 shows the SwSS architecture. Network applications use a database named APP DB for reading and writing. Orchestration agents are responsible for synchronization between APP DB and another database, namely ASIC DB. To provide universality, the databases are set up as keyvalue storage. SwSS allows network applications running on SONiC to be completely independent from the hardware they are running on

12 Figure 2.4: The design of Switch State Service, showing the relation between APP DB, ASIC DB and the orchestration agents [12]. Since SONiC is open-sourced, the networking community can contribute to the improvement of SONiC. In addition, SONiC can be extended with other open-source software, be it third-party or proprietary. Figure 2.5 shows how SONiC is a part of the Open Compute Project, which is an organization that has as its main goal to design and deploy the most efficient and scalable hardware for use in data centers. OCP certified switches can use SONiC through SAI to run a Layer 2 or Layer 3 switch, and in addition allows the user to extend the NOS with third-party or OCP software components [13]. Figure 2.5: SONiC as an open switching platform for OCP users [13] Quagga Routing suites are control plane software collections that offer a variety of routing protocols to run on top of a network operating system. A routing suite exchanges routing information with other routers and updates routing information in the kernel. Quagga 4 is an example of a routing suite and provides BGP routing functionality for SONiC. It is open-source and currently supports GNU/Linux and BSD. There are two main Quagga processes present on a SONiC device: bgpd and zebra. Figure 2.6 shows how Quagga and SONiC interact when a BGP route advertisement is received. First, this advertisement is passed to bgpd, short for BGP daemon. The BGP daemon processes this route and determines whether it should be placed in the kernel routing table. If so, the route is passed to zebra, which after additional filtering updates the routing table in APP DB. This is

13 done with fpmsyncd, which is a Forwarding Plane Manager and programs the forwarding plane. Fpmsyncd uses the SONiC Object Library API. SONiC handles updating the kernel routing table. Zebra is also capable of selecting the best route across different routing protocols, but as SONiC supports only BGP this is not applicable to a SONiC device. Figure 2.6: The interaction between Quagga and SONiC when a new BGP route is received [12]. Quagga determines whether a new route should be placed in the routing table, after which SONiC takes care of updating the kernel routing table. 13

14 14

15 CHAPTER 3 Networking features This chapter briefly covers several networking features or protocols that are relevant to this research. We selected both OSI Layer 2 and 3 features that we consider fundamental to a data center switch. 3.1 Layer 2 features Layer 2 of the OSI model is the data link layer. It provides mechanisms to allow communication between devices within the same local area network (LAN). Data elements transferred on the data link layer are called (link-layer) frames. A frame is transferred between two devices on a physical link, and MAC addresses are used to address link-layer frames. The Ethernet protocol is a well-known example of a Layer 2 protocol and is used often in local area networks and wide area networks. WiFi is an alternative technology, although it is used only in local area networks [14]. LLDP The Link Layer Discovery Protocol (LLDP) allows networking devices to advertise information about their identity and capabilities. LLDP is useful for managing network resources and provides a vendor-independent mechanism for devices to exchange device information within a network. Each interface of a device sends out a frame consisting of an LLDP Data Unit (LLDPDU). An LLDPDU consists of a sequence of type-length-value (TLV) structures, each containing specific information. Each LLDPDU contains the following mandatory TLVs: Chassis ID, Port ID and Time To Live. Furthermore, optional TLVs can be included as well, such as system name, system capabilities and port description. LLDPDU frames are sent at a fixed interval, to keep the information up-to-date [15]. LACP The Link Aggregation Control Protocol (LACP) can be used to combine multiple physical ports and form a single logical channel. This process is also called link aggregation. To higher layer protocols, the aggregated links form a single channel. Link aggregation provides increased throughput due to the use of multiple physical links. It also adds redundancy because even with a physical link-failure, traffic is still capable of flowing through the logical link by making use of the other (operative) physical links [16]. STP The Spanning Tree Protocol (STP) aims at constructing and managing a loop-free topology in a bridged network. STP is supposed to prevent loops in a topology and guarantees that there are unique paths to all destinations within a topology. This is critical in local area networks, for 15

16 loops can cause Ethernet frames to be switched around endlessly. For instance, when a switch receives an ARP packet, it broadcasts this packet through all of its interfaces (except the one the ARP packet was received on). If a loop exists in the network of the switch, it will eventually receive its own broadcast ARP packet, which will be broadcast again. This endless process is known as a broadcast storm and it is one of the phenomena STP should prevent [17]. It does so by selecting a Root Bridge, and then creates a loop-free topology by blocking particular interfaces such that all other bridges have a shortest path to the Root Bridge [18]. Figure 3.1: Example of how STP creates a loop-free topology with shortest paths to the Root Bridge [19] Figure 3.1 shows an example of a topology with a loop. Switch A is selected as Root Bridge, thus all other switches should have a shortest path to switch A. By blocking the link between switch B and switch C, the loop in the topology is removed and all switches have a shortest path to switch A. VLAN (trunking) A Virtual Local Area Network (VLAN) can be described as an isolated and partitioned broadcast domain at OSI Layer 2. A Local Area Network (LAN) can be partitioned into several Virtual LANs to create multiple (logically) separate networks despite the (possible) presence of a physical connection to other devices that are not in the VLAN. This is achieved by configuring VLANs on a switch and specifying which switch interface belongs to which VLAN. The ability to define isolated broadcast domains using software makes VLAN a well-known networking feature. It allows network administrators to create multiple separated broadcast domains without having to change the physical wiring of the network [20]. A trunk link can be used to transport frames from multiple VLANs, for instance to interconnect two switches that have configured the same VLANs. This is achieved by using tags in link-layer frames to specify what VLAN a frame belongs to. These trunk links are therefore called tagged links. Links that can only transport frames from one specific VLAN are called untagged links and thus the frames that are transported on these links do not contain a VLAN tag. Figure 3.2 shows an example. The entirely blue or entirely red links are untagged links for VLAN 100 and 200 respectively, and the frames transported on these links do not contain a VLAN tag. The link between switch 1 and 2 is a tagged link, for it must transport frames from both VLAN 100 and 200 and thus a tag must be used to indicate the corresponding VLAN for a particular packet. 16

17 Figure 3.2: Example of a VLAN configuration with two switches and two VLANs [21]. trunk link between switch 1 and 2 transports traffic from both VLAN 100 and VLAN 200. The 3.2 Layer 3 features Layer 3 of the OSI model, the network layer, is responsible for the routing of data between different local area networks (LANs). Network-layer packets are addressed using unique and hierarchical IP addresses [14]. Routers are devices that forward packets to their destination by determining the route to be taken by the packet to reach its destination. In a network, routers communicate with each other to exchange information about the availability of subnets. This is done by routing protocols, which in addition define policies or algorithms that determine the best route to a destination when multiple routes are available. Inter-VLAN routing Inter-VLAN routing is used when traffic must flow between different VLANs, which in some cases may be necessary. Typically, this is accomplished by specifying a VLAN interface for each relevant VLAN, allowing the switch to route the traffic between VLANs through these VLAN interfaces. Figure 3.3 shows an example of a router (R1) that routes between VLANs. When PC A sends traffic destined for PC B, the traffic is first tagged with VLAN 20. When this traffic reaches router R1, it routes this traffic to VLAN 30 by using the configured VLAN interfaces. Then, this traffic can proceed to PC B with the VLAN 30 tag. Figure 3.3: Example of a topology in which inter-vlan routing is needed [22]. Router R1 uses the VLAN interface addresses to route the traffic from VLAN 20 to VLAN

18 BGP An autonomous system (AS) is a selection of IP prefixes that is managed by a certain network administrator. Commonly, such autonomous systems are managed by internet providers or large companies. The Border Gateway Protocol (BGP) is a well-known routing protocol used for routing between different autonomous systems, but can also be used to route within an AS. Routers running BGP can set up sessions with each other using TCP to exchange routing information, for instance subnet availability. BGP provides several mechanisms to control the propagation of routes, such as route-maps. Route maps allow the network administrator to define rules for certain prefixes [23]. For instance, there may be rules to drop an incoming route or change it before placing it in the routing table. BGP is used commonly in large-scale data centers because it scales well compared to other routing protocols [24]. 18

19 CHAPTER 4 Experiments 4.1 Preparatory phase To examine whether open switches with SONiC can be deployed successfully in a network, we decided to perform experiments on the deployment of the fundamental networking features that were described in chapter 3. The SNE OpenLab has provided two open switches for this research. Mellanox SN Arista 7050QX-32S 2 The ASICs in these switches are manufactured by different vendors: Mellanox and Broadcom, respectively. This allows us to test two different ASIC types at once, and shows whether SONiC can run on two different ASICs. Both switches are capable of operating on OSI Layer 2 and Layer 3. Figures 4.1 and 4.2 show photos of Mellanox SN2100 and Arista 7050QX-32S, respectively. More details of the switches can be found in Appendix A. Figure 4.1: Mellanox SN2100. Figure 4.2: Arista 7050QX-32S

20 The open-source NOS used in the experiments is SONiC. Section 2.3 has briefly explained the architecture of SONiC and what features it supports. SONiC is under constant development and new features are added regularly. In addition, the absence of other network operating systems that support a wide variety of open switches made SONiC an obvious NOS to experiment with. Aside from SONiC, there are various open-source network operating systems, such as OPX. SONiC, however, supports a wide variety of switches and thus allows for the straightforward extension of this research to other supported devices. Details about the version of SONiC used in this research are provided in Appendix B Mellanox SN2100 and ONIE Mellanox SN2100 comes with Mellanox Onyx as NOS. Other operating systems can be installed over ONIE 3 (Open Network Install Environment). It is an open-source project by Cumulus Networks that allows creating an open networking environment and is present by default on various open switches [25]. Figure 4.3 shows how ONIE can be used to boot a network operating system. When a device boots for the first time, a low-level boot loader boots ONIE from flash Figure 4.3: Process of first time boot using ONIE [25]. memory. ONIE then fetches the image of the NOS supplied by the switch vendor and installs this image. The next time the device boots, ONIE is not used by default and the device goes straight in the NOS. ONIE can, however, still be used to uninstall the vendor NOS and install another (open source) NOS from an image provided over the network or via USB for instance [25] Arista 7050QX-32S and Aboot Arista 7050QX-32S runs Arista EOS by default. A component of this operating system is Aboot 4, which can be used to boot image files to run other operating systems. Boot parameters can be configured in files which are stored in flash memory. In addition, Aboot provides a shell which can be used to modify boot configuration [26]

21 4.2 Feature tests In the last chapter, we discussed several networking features we consider crucial to a network switch. The objective was to test whether each of the features worked correctly on Mellanox and Arista running SONiC. The results of the experiments possibly provide an insight into whether the switches can be deployed in a data center network as a replacement of traditional switches. For most experiments, we used SONiC s config db.json configuration file to set up our testing environment. Appendix C contains the most relevant configurations. Complete configuration files can be found in the GitHub repository Layer 2 features LLDP Methods The first feature to be tested was LLDP. To verify whether LLDP correctly exchanged device information, we considered the topology depicted in figure 4.4. We wanted to verify whether all mandatory LLDP TLVs were exchanged between Mellanox and Arista. This mandatory information is as follows [15]: Chassis ID Port ID Time To Live Furthermore, we examined whether any additional information, such as system information and device capabilities, is exchanged through LLDP as well. Mellanox SN2100 Ethernet32 Ethernet36 Ethernet16 Ethernet20 Arista 7050QX-32S Figure 4.4: Topology to analyze LLDP with Mellanox and Arista. Results SONiC provides the command show lldp neighbors to view the LLDP neighbor information registered by SONiC. Appendix D1 presents the complete output of this command. Both devices presented the mandatory LLDP information in their LLDP tables. SONiC runs LLDP so that the Chassis ID that was included is taken from the MAC address of the eth0 interfaces on both switches. In addition, LLDP exchanged correct system name and system description information, and also included device capabilities and which of these capabilities were currently in use. LACP Methods In addition, we tested LACP/link aggregation behaviour. With the topology depicted in figure 4.5, we tried to configure link aggregation combining the double links between Mellanox and Arista. We considered both Layer 2 link aggregation and Layer 3 link aggregation. The latter has an IP address configured for each link aggregation interface, while the former does not. A working port channel should provide redundancy in the sense that when one of the links fail, communication is still possible through the port channel by making use of the other link. Thus, to test an aggregated link, one can simulate a physical breakdown of one of the two links and examine whether communication is still possible between the two devices

22 PortChannel1 Mellanox SN2100 Ethernet32 Ethernet36 Ethernet16 Ethernet20 Arista 7050QX-32S Figure 4.5: Topology to analyze LACP with a port channel consisting of two physical links between Mellanox and Arista. Results Appendix C1.1 shows the configuration we set for a Layer 2 port channel between Mellanox and Arista. We were unable to configure a successful Layer 2 port channel. That is, SONiC could not successfully set up a port channel with no interface addresses. PortChannel1 failed to go UP on both devices. Listing 4.1 shows that PortChannel1 was stuck in DOWN state. admin@sonic - mellanox :~$ ip a show dev PortChannel1 4: PortChannel1 : <NO - CARRIER, BROADCAST, MULTICAST, UP > mtu 9100 qdisc noqueue state DOWN group default link / ether ec :0d:9a:8d:f1:c0 brd ff:ff:ff:ff:ff:ff Listing 4.1: PortChannel1 failed to go UP. Moreover, with teamdctl we were able to view the state of PortChannel1 within the SONiC teamd docker, which is responsible for link aggregation. On both Mellanox and Arista, no ports were present as slave of PortChannel1. Listing 4.2 shows this for Mellanox. It was confirmed by a SONiC collaborator that port channel functionality is currently aimed at Layer 3 port channels and not at Layer 2 port channels 6. admin@sonic - mellanox :~$ docker exec - it 7 e504bdc03e0 bash root@sonic - mellanox :/# teamdctl PortChannel1 state view setup : runner : lacp runner : active : yes fast rate : no Listing 4.2: No slave ports present for PortChannel1. Appendix C1.2 shows the configuration of the Layer 3 port channel. Layer 3 link aggregation did work correctly. In this case, PortChannel1 did go UP and allowed us to communicate between the interface IP addresses configured on PortChannel1 ( /24 on the Mellanox side and /24 on the Arista side). Also, teamdctl now showed us the correct slave ports for PortChannel1. In addition, Layer 3 link aggregation passed our redundancy tests. Listing 4.3 shows an example of this (some output has been omitted for brevity). Appendix D2 shows more complete output of the example. In listing 4.3, it can be seen on lines 4-14 that when both links are operational, communication through the port channel is possible. In lines 20-21, one can see that one of the links is not operational anymore. Line 27 shows that despite the fact that one link broke down, PortChannel1 is still operational. Next, lines show that communication is possible through the port channel even when one of the two links is not operational. This indicates that Layer 3 link aggregation provides a redundant connection between Mellanox and Arista

23 1 # ( both links up) 2 3 # (...) 4 Ethernet32 32,33,34,35 N/ A 9100 Ethernet32 up up 5 Ethernet36 36,37,38,39 N/ A 9100 Ethernet36 up up 6 # (...) 7 8 # ( communication is fine ) 9 10 admin@sonic - mellanox :~$ sudo ping PING ( ) 56(84) bytes of data bytes from : icmp_seq =1 ttl =64 time =0.362 ms bytes from : icmp_seq =2 ttl =64 time =0.220 ms bytes from : icmp_seq =3 ttl =64 time =0.320 ms 15 # (...) # ( link failure Ethernet32!) # (...) 20 Ethernet32 32,33,34,35 N/ A 9100 Ethernet32 down up 21 Ethernet36 36,37,38,39 N/ A 9100 Ethernet36 up up 22 # (...) # ( PortChannel1 still UP) # (...) 27 4: PortChannel1 : <BROADCAST, MULTICAST, UP, LOWER_UP > mtu 9100 qdisc noqueue state UP group default 28 # (...) # ( communication still working ) admin@sonic - mellanox :~$ sudo ping PING ( ) 56(84) bytes of data bytes from : icmp_seq =1 ttl =64 time =0.294 ms bytes from : icmp_seq =2 ttl =64 time =0.310 ms bytes from : icmp_seq =3 ttl =64 time =0.296 ms 37 # (...) Listing 4.3: Behaviour of PortChannel1 when link Ethernet32 (Mellanox)-Ethernet16 (Arista) fails (some output has been omitted for brevity). STP Methods We also examined the Spanning Tree Protocol. Considering the topology in figure 4.6, if no STP is configured at all, a broadcast storm may occur because there is a network loop. Broadcast messages sent from Mellanox to Arista out of both Ethernet32 and Ethernet36 will be circulated because Arista will broadcast these back to Mellanox through Ethernet20 and Ethernet16, respectively, leading to an endless broadcast storm. STP must prevent this by selecting a Root Bridge and blocking one of the links between Mellanox and Arista. Mellanox SN2100 Ethernet32 Ethernet36 VLAN 100 Ethernet16 Ethernet20 Arista 7050QX-32S Figure 4.6: Topology to analyze STP. The current version of SONiC does not have support for STP, but we decided to try to configure STP nevertheless using brctl. We placed the relevant ports in VLAN 100 and we first set the priority of the Mellanox bridge to 100 and of the Arista bridge to 200, meaning that Mellanox should be selected as Root Bridge and thus one of the Arista ports should be set in blocking state (lower priority indicates higher chance to be selected as Root Bridge). Also, we 23

24 reversed the priorities so that Arista should be selected as Root Bridge and one of the Mellanox ports should be in blocking state. The relevant SONiC configurations (of the VLANs) can be found in Appendix C2. Results In both our tests the devices selected themselves as Root Bridge, meaning that all ports were set in forwarding state and the loop in our topology remained existent. Listings 4.4 and 4.5 show the results of the STP status on Mellanox and Arista (some output has been omitted for brevity). The full output can be found in Appendix D3. One can notice on lines 8 and 12 of both listings that all four ports are in forwarding state and in both cases the devices selected themselves as Root Bridge, which can be concluded from lines 3 and 4 in both listings. 1 admin@sonic - mellanox :~$ sudo brctl showstp Bridge 2 Bridge 3 bridge id ec0d9a8df1c0 4 designated root ec0d9a8df1c0 5 # (...) 6 7 Ethernet32 (1) 8 port id 8001 state forwarding 9 # (...) Ethernet36 (2) 12 port id 8002 state forwarding 13 # (...) Listing 4.4: Mellanox selected itself as Root Bridge (some output was omitted for brevity). 1 admin@sonic - arista :~$ sudo brctl showstp Bridge 2 Bridge 3 bridge id 00 c8.001 c737bf75c 4 designated root 00 c8.001 c737bf75c 5 # (...) 6 7 Ethernet16 (1) 8 port id 8001 state forwarding 9 # (...) Ethernet20 (2) 12 port id 8002 state forwarding 13 # (...) Listing 4.5: Arista selected itself as Root Bridge (some output was omitted for brevity). To investigate this behaviour, we used tcpdump to capture STP messages between Mellanox and Arista. We found that both devices were sending STP messages to each other, but no receiving STP messages were passed to the control plane. It was confirmed by a SONiC contributor that in the current version of SONiC, no interface trap is configured for STP messages, meaning that incoming STP messages are not passed to the control plane and thus STP is unable to operate correctly on SONiC 7. VLAN (trunking) Methods Additionally, we examined VLAN (trunking). We decided that for this experiment, and the other experiments following this one, it would be interesting to use several hosts in our testing topologies. In order to do so, we attached two physical servers to our topology and set up two virtual machines (VMs) to run on each host server. We used the same operating system on all four VMs (Linux deb9u3). We used Vagrant 8 to build and manage our virtual machine environment, and VirtualBox 9 for the virtual machine itself. Appendix B2 and B3 specify the Vagrant and VirtualBox versions

25 used in the experiments, respectively. To allow the VMs to participate in the network, we configured a bridge between the physical interfaces of the servers and the virtual interfaces of the VMs using the Vagrantfiles. The virtual interfaces could then be configured as if they were physical interfaces on four separate machines. The Vagrantfiles used in this experiment can also be found in the previously mentioned GitHub repository. To verify whether the switches are able to perform correct VLAN (trunking) functionality, we used the topology depicted in figure 4.7. For the SONiC configuration, Appendix C3 can be consulted. The link between Mellanox and Arista should be configured as a tagged (trunk) link, for it must carry frames that can belong to either VLAN 100 or VLAN 200. We examined whether the open switches allowed us to configure such tagged ports and whether packets can be delivered correctly within the same VLANs using the trunk link. For instance, VM A1 must be able to communicate with VM B1, because they are configured to be in the same VLAN. VM A1 should not be able to communicate with VM B2, because they are in different VLANs and should therefore be completely isolated from each other. VLAN interfaces VLAN 100: /24 VLAN 200: /24 VLAN interfaces VLAN 100: /24 VLAN 200: /24 Mellanox SN2100 Ethernet32 VLAN trunk Ethernet16 Arista 7050QX-32S Ethernet56 Ethernet60 Ethernet40 Ethernet44 VLAN 100 VLAN 200 VLAN 100 VLAN / / / /24 VM A1 VM A2 VM B1 VM B2 Phys. server A Phys. server B Figure 4.7: Topology to analyze VLAN (trunking) and inter-vlan routing. Two VLANs are configured with two virtual machines in each VLAN. A trunk link is present between Mellanox and Arista. Results We were able to communicate within VLANs, but not between VLANs, which is the correct and expected behaviour. As an example, listing 4.6 shows with ping that communication is possible from VM A1 to VM B1, which are in the same VLAN. vagrant@ vma1 :~ $ ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_ seq =1 ttl =64 time =0.602 ms 64 bytes from : icmp_ seq =2 ttl =64 time =0.580 ms 64 bytes from : icmp_ seq =3 ttl =64 time =0.591 ms Listing 4.6: ping from VM A1 to VM B1. In contrast, communication between devices configured in different VLANs is not possible. Listing 4.7 displays this behaviour. The example shows that we cannot communicate between VLAN 25

26 100 to VLAN 200. vma1 :~ $ ping PING ( ) 56(84) bytes of data. From icmp_ seq =1 Destination Host Unreachable From icmp_ seq =2 Destination Host Unreachable From icmp_ seq =3 Destination Host Unreachable Listing 4.7: ping from VM A1 to VM B2. This indicates that the VLAN trunk succeeded in tagging frames with the correct VLAN number, allowing for complete VLAN isolation shown in the above listings Layer 3 features Inter-VLAN routing Methods Besides VLAN trunking functionality, we also tested inter-vlan routing using the same topology as depicted in figure 4.7. Figure 4.7 shows the VLAN interface addresses we used for both Mellanox and Arista. For the relevant sections of the SONiC configuration, Appendix C4 can be consulted. If inter-vlan routing works correctly, the switches will route packets from one VLAN to another and thus we should be able to communicate between VLANs using the VLAN interfaces. For instance, VM A1 should be able to ping VM B2 and vice versa. Results Using inter-vlan routing we are able to communicate between different VLANs. Listing 4.8 shows an example of a traceroute from VM A1 to VM B2. It shows on line 3 that the VLAN interface of VLAN 100 on Mellanox ( ) is used to route the packet to VLAN 200, after which Arista delivers the packet to VM B2. 1 vagrant@ vma1 :~ $ traceroute traceroute to ( ), 30 hops max, 60 byte packets ( ) ms ms ms ( ) ms ms ms Listing 4.8: traceroute from VM A1 to VM B2. BGP Methods To verify whether BGP operates correctly on the switches, we set up the topology in figure 4.8. SONiCs BGP configuration can be found in Appendix C5. We have configured the switches to be in different autonomous systems, so as to create a BGP session between Mellanox and Arista. We expect this BGP session to exchange routes between Mellanox and Arista. Specifically, Mellanox has knowledge of subnets /24 and /24 and Arista does not. BGP must propagate the routes to these subnets to Arista. Similarly, BGP must propagate routes to the subnets /24 and /24 to Mellanox. In the end, we want to be able to communicate between the virtual machines in hosts A and B using these propagated routes. 26

27 AS Mellanox SN subnet /24 subnet /24 AS Arista 7050QX-32S subnet /24 subnet /24 subnet /24 subnet / VM A1 VM A2 VM B1 VM B2 Phys. server A Phys. server B Figure 4.8: Topology to analyze BGP. Mellanox and Arista are placed in two separate autonomous systems, each containing two subnets. Results SONiC succesfully set up the two BGP sessions we configured. For example, listing 4.9 shows the current BGP sessions Mellanox has with Arista on lines 8 and 9. 1 admin@sonic - mellanox :~$ show ip bgp summary 2 Command : sudo vtysh -c " show ip bgp summary " 3 BGP router identifier , local AS number RIB entries 21, using 2352 bytes of memory 5 Peers 2, using 9312 bytes of memory 6 7 Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/ Down State / PfxRcd :30: :30: Total number of neighbors 2 Listing 4.9: BGP neighbors on Mellanox, showing the two sessions with Arista. In addition, Mellanox and Arista successfully exchanged routing information regarding the subnets that were directly connected to them. Mellanox propagated the subnets /24 and /24 to Arista and Arista propagated the subnets /24 and /24 to Mellanox. For instance, listing 4.10 shows that subnets /24 (line 11) and /24 (line 13) are present in the routing table on Mellanox, and that these subnets can be reached through both (via interface Ethernet32) and (via interface Ethernet36) and that this reachability was sourced from BGP. Similarly, in the Arista routing table, subnets /24 and /24 are present and can be reached through (via interface Ethernet16) and (via interface Ethernet20). Again, these routes were learned through BGP. 27

28 1 - mellanox :~$ show ip route 2 Command : sudo vtysh -c " show ip route " 3 Codes : K - kernel route, C - connected, S - static, R - RIP, 4 O - OSPF, I - IS - IS, B - BGP, P - PIM, A - Babel, 5 > - selected route, * - FIB route 6 7 C >* /24 is directly connected, Ethernet56 8 C >* /24 is directly connected, Ethernet60 9 C >* /24 is directly connected, Ethernet32 10 C >* /24 is directly connected, Ethernet36 11 B >* /24 [20/0] via , Ethernet32, src , 00:30:05 12 * via , Ethernet36, src , 00:30:05 13 B >* /24 [20/0] via , Ethernet32, src , 00:30:05 14 * via , Ethernet36, src , 00:30:05 15 C >* /32 is directly connected, lo 16 B >* /32 [20/0] via , Ethernet32, src , 00:30:05 17 * via , Ethernet36, src , 00:30:05 18 # (...) Listing 4.10: Routing table on Mellanox, showing the routes to the subnets we configured before (some output was omitted for brevity). Ultimately, to complete the verification of BGP, we used traceroute between the virtual machines to determine whether communication is possible and if yes, what routes are taken. Listing 4.11 shows that VM A1 and VM B2 are able to communicate through Mellanox and Arista. First, a packet goes through the connected interface on the Mellanox device ( ) (line 3). Then, it is routed to the Arista device ( ) (line 4), which routes it via its interface in subnet /24. SONiC uses the loopback address configured in config db.json as Router ID in the BGP sessions, which for Mellanox is /32 and for Arista /32. 1 vagrant@ vma1 :~ $ sudo traceroute traceroute to ( ), 30 hops max, 60 byte packets ( ) ms ms ms ( ) ms ms ms ( ) ms ms ms Listing 4.11: traceroute from VM A1 to VM B Result overview Table 4.1 presents an overview of the obtained results, including several remarks. Feature Results Comments LLDP Pass - LACP Pass L2 link aggregation not working STP Fail Not supported by SONiC; packets dropped VLAN (trunk) Pass - Inter-VLAN routing Pass - BGP Pass - Table 4.1: An overview of the obtained results. 28

29 CHAPTER 5 Discussion The performed experiments provided insights into the shortcomings of several fundamental networking features when deployed on open switches with SONiC. Aside from commenting on some of the obtained results, this chapter will provide general insights into the ease of use of open switches with SONiC. LACP The first notable observation in our LACP experiments was that none of our port channels were showing up when issuing the command show interfaces portchannel. This command should show all configured port channels in SONiC. It turns out SONiC takes the configuration of minigraph.xml, which is a deprecated configuration method of SONiC, for the command show interfaces portchannel 1 instead of the main configuration file config db.json. The Layer 3 port channel we set up in the experiments has shown that it is possible to deploy a Layer 3 port channel that provides redundant communication between the devices running SONiC. In order to get this working, aside from configuring the port channel in SONiCs configuration file, we had to edit SONiCs teamd template 2. By default, SONiC sets the field min ports, which is the minimum amount of active ports in a port channel for the port channel to be operational, to ceil(0.75 number of port channel members), which was 2 in our topology. In order to test the redundancy of our port channel, we set min ports to 1. BGP Similarly, successful BGP functionality was implied by the experiments we performed. Configuring BGP neighbors and AS numbers was done in config db.json. Nonetheless, we had to edit the BGP configuration template 3 of SONiC to specify that BGP should be configured such that it also advertises directly connected networks (which was the case in our topology) and not only networks obtained from other BGP neighbors. 5.1 Ease of use SONiC allowed for straightforward configuration in the config db.json configuration file. Several examples of configuration have been shown in this thesis already. Moreover, SONiC provided some CLI configuration commands but not for all features we tested. For instance, configuration commands could be used to shut down interfaces and BGP sessions, but not to set interface addresses or configure BGP peers. Command-line configuration also allowed the user to set up VLANs and add or remove interfaces. In general, the command-line configuration provided a small subset of configuration possibilities compared to configuration in config db.json. For

30 users that prefer command-line configuration this might make SONiC less straightforward to use. SONiC did provide a wide variety of commands to view current configuration or device status. Several examples have been provided in this research. For all supported (thus not STP) features we tested there existed one or more corresponding show commands to view configuration or state information. One exception, as mentioned before, was that show interfaces portchannel takes its information from a deprecated configuration method to show the configured port channels. In short, the ease of use of SONiC depends on the preferences of the user. Users that prefer working in a configuration file will probably experience SONiC as a user-friendly NOS, while users that prefer CLI configuration might be less comfortable with SONiCs configuration. 30

31 CHAPTER 6 Use case scenarios for open switches The use of open switches with SONiC can be beneficial in various use cases. For example, SONiC allows the user to look into the source code and then use or extend it for a certain objective. In this chapter, we briefly examine a current use case that exploits the properties of open switches with SONiC, and we provide two example use cases ourselves. 6.1 Current use cases Microsoft Global Cloud Microsoft developed SONiC for use in their Microsoft Global Cloud. Since Microsoft runs one of the largest networks in the world, Microsoft sets out strict requirements for the technology that it deploys. One of these requirements is that new features can be implemented without having an impact on the end users. Since SONiC consists of several containers, each containing the resources to deploy a certain networking feature (e.g. BGP, LAG), only one container needs to be updated when there is an update or a bug fix for a certain feature, instead of replacing the whole switch image (which will result in data plane downtime). This makes SONiC suitable for use cases in which no downtime is permitted while deploying updates [13]. Another requirement is that SONiC can be used on the newest and most innovated hardware platforms. Because SONiC uses SAI, a data center can constantly innovate with newer switch hardware without having to change the software stack. Regardless of what switch hardware is used, as long as SAI is supported, all switches can be configured the same way, for their software stacks can be identical. Operators are thus able to preserve their software investments while keeping up with hardware-wise innovation. Thus, SONiC is suitable for use cases in which there may be regular changes in hardware [13]. In addition, Microsoft states the requirement that cloud-scale deep telemetry and fully automated failure mitigation has to be utilized in their cloud. Since SONiC has innovations such as NetBouncer and Everflow available, SONiC meets these requirements. NetBouncer can be deployed to automatically detect faulty devices or links within a large data center accurately [27]. Everflow debugs several network faults such as packet drops or loops. Furthermore, it can quickly identify devices that cause high latency in a network [28]. In short, SONiC is suitable for use cases in which large networks have to be monitored constantly to automatically respond to potential problems. 6.2 Example use cases In addition to the above use case of SONiC in the Microsoft Global Cloud, we provide two example use cases in which the open nature of SONiC can be deployed for useful applications. 31

32 Plug-and-play VLAN The first use case relates to companies that want to provide flexible working spots to their employees, who in turn own a laptop provided by the company. On different days the same employee might want to work on different physical locations within the company office. To gain access to the company s network, the employees can use Ethernet cables to connect their laptops with the network. Since generally a company consists of several departments with partitioned and isolated computer networks (VLANs) and an employee from any department can sit and connect anywhere, how does the network decide to which VLAN the newly connected laptop should be added? Employees want to start working right away after connecting to the network, so it is preferred their laptops are added to the correct VLAN without intervention by the network administrator. If the company network consists of open switches running SONiC, the network administrator could decide to develop an application that automatically places newly connected hosts in a particular VLAN, depending on the MAC address of the host, so that the VLAN functionality on the switch is essentially plug-and-play. That is, no manual configuration is needed every time a new host connects. This can be implemented as follows. Via SONiCs logs or LLDP entries, newly connected hosts (including their MAC address) can be discovered by the application. The network administrator can define a policy that states the relation between the host MAC address and the VLAN that host will be placed in, if at all. This is illustrated in the right side of figure 6.1. For instance, the application can decide to block hosts with unknown MAC addresses, or place hosts manufactured by the same vendor in the same VLAN (MAC addresses are vendor-specific). Next, the application can simply edit SONiCs config db.json configuration file to change the VLAN settings. We suppose that the network administrator has a list of all company laptops in use by the employees, including their MAC addresses. The network administrator can easily define a policy that maps each laptop to a certain department (VLAN). This way, no matter where an employee connects its laptop to the network, the SONiC switch will detect the MAC address of this laptop and determine in which VLAN the switch interface this new host is connected to should be placed. Similarly, if a laptop not belonging to one of the employees uses one of the Ethernet cables, its MAC address is not recognized and can be blocked by the switch. Office Other laptops Laptop with MAC x Switch SONiC Policy table Host detection on interface y y, MAC x Add interface y to VLAN z y, VLAN z Block Block Figure 6.1: An overview of the plug-and-play VLAN application. The switch detects a new host with MAC address x on switch interface y. The policy table maps from MAC address x to VLAN number z, after which the application places interface y in VLAN z. 32

33 Automatic port channel Our second use case focuses on data centers that need to provide a redundant network, because they handle important data that must reach its destination. The network administrator can decide to aggregate all connections between each switch in the data center, to provide redundancy. Such a data center may have a large number of switches, and configuring link aggregation for the connections between these switches can by time-consuming. LACP provides a way to do this, because it is able to automatically negotiate between two devices to set up a port channel. However, before this can happen, the network administrator needs to specify which switch interfaces belong to which port channel, if at all. The application in the next paragraph proposes a more flexible alternative for this LACP feature by allowing the network administrator to connect neighbors to any interface on a switch without the need of specifying that these interfaces will be used to create a port channel. The application will dynamically determine whether a port channel should be set up, and if so, with which interfaces. If the data center contains open switches with SONiC, the network administrator can develop an application that automatically sets up a port channel if it discovers that the switch has multiple physical links with the same neighbor (for instance by comparing MAC addresses or Chassis IDs of all connected devices). This way, when the network administrator connects two switches with multiple physical links, no further configuration is necessary to set up the port channel. Datacenter Other switches Switch with ID x Switch SONiC Policy table Neighbor detection on interface y y, ID x Create new port channel z y, PC z Add to existing port channel z No port channel modifications Figure 6.2: An overview of the automatic port channel application. The switch detects a new neighbor with Chassis ID x on switch interface y. Using neighbor and port channel information, the application decides whether 1) there should be no port channel modifications because the new link is the only link with the neighbor device, or 2) a new port channel z should be created with interface y and the other interface already connected to the same neighbor, or 3) the new interface y should be added to port channel z because there already is a port channel with the neighbor. When the switch detects a newly connected neighbor, the application uses neighbor and port channel information to determine whether there is already a port channel with this neighbor and if not, whether there is already a single link with this neighbor, for instance by comparing the Chassis ID of all connected neighbors. Figure 6.2 shows how this determination process. There are three possible cases: 1. There is no other link with the neighbor device. 2. There is one other link with the neighbor device. 33

Cumulus VX for a POC in pre-sales. Using Cumulus VX to create a virtual POC environment.

Cumulus VX for a POC in pre-sales. Using Cumulus VX to create a virtual POC environment. Cumulus VX for a POC in pre-sales Using Cumulus VX to create a virtual POC environment. Contents Contents Cumulus VX in pre-sales engagement Introduction Cumulus VX in a POC Intended Audience Installation

More information

GuideTorrent. The best excellent exam certification guide torrent and dumps torrent provider

GuideTorrent.   The best excellent exam certification guide torrent and dumps torrent provider GuideTorrent http://www.guidetorrent.com The best excellent exam certification guide torrent and dumps torrent provider Exam : JN0-343 Title : Juniper Networks Certified Internet Specialist (JNCIS-ENT)

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

MikroTik RouterOS Training. Routing. Schedule. Instructors. Housekeeping. Introduce Yourself. Course Objective 7/4/ :00 10:30 Morning Session I

MikroTik RouterOS Training. Routing. Schedule. Instructors. Housekeeping. Introduce Yourself. Course Objective 7/4/ :00 10:30 Morning Session I MikroTik RouterOS Training Routing Schedule 09:00 10:30 Morning Session I 10:30 11:00 Morning Break 11:00 12:30 Morning Session II 12:30 13:30 Lunch Break 13:30 15:00 Afternoon Session I 15:00 15:30 Afternoon

More information

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets? Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

netkit lab bgp: transit as Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab bgp: transit as Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: transit as Version Author(s) E-mail Web Description 1.7.1 (compact) Luca Cittadini,

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Configuring MPLS and EoMPLS

Configuring MPLS and EoMPLS 37 CHAPTER This chapter describes how to configure multiprotocol label switching (MPLS) and Ethernet over MPLS (EoMPLS) on the Catalyst 3750 Metro switch. MPLS is a packet-switching technology that integrates

More information

White-label open-source networking

White-label open-source networking University of Amsterdam White-label open-source networking Authors Łukasz Makowski makowski@uva.nl Paola Grosso p.grosso@uva.nl January 22, 2018 Table of Contents 1 Motivation for open-networking 4 2 Architecture

More information

Configuring StackWise Virtual

Configuring StackWise Virtual Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 2 Information About Cisco Stackwise Virtual, page 2 Cisco StackWise

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

BIG-IP TMOS : Routing Administration. Version

BIG-IP TMOS : Routing Administration. Version BIG-IP TMOS : Routing Administration Version 12.1.1 Table of Contents Table of Contents Overview of TMOS Routing...9 Overview of routing administration in TMOS...9 About BIG-IP system routing tables...10

More information

Overview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER

Overview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER CHAPTER 1 This chapter introduces the basic concepts for Layer 3 unicast routing protocols in Cisco NX-OS. This chapter includes the following sections: Information About Layer 3 Unicast Routing, page

More information

Lecture 5. Switching

Lecture 5. Switching TEL3214 Computer Communication Networks Lecture 5 Switching 10.10.10.30/24 (eth0.10) Trunk SW_B VLAN 10 (eth0.20) VLAN 20 CEng, FIEI, FIET, CISSP 20.20.20.30/24 diarmuid@obriain.com Bridging Device used

More information

Getting Started with Linux on Cumulus Networks

Getting Started with Linux on Cumulus Networks White Paper by David Davis, ActualTech Media Getting Started with Linux on Cumulus Networks In this Paper Linux at the Core... 2 Latest and Greatest Networking Protocols... 2 Network Command Line Utility

More information

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.

More information

OCP Networking Workshop. SAI-Switch Abstraction Interface SONiC Software for Open Networking in the Cloud

OCP Networking Workshop. SAI-Switch Abstraction Interface SONiC Software for Open Networking in the Cloud OCP Networking Workshop SAI-Switch Abstraction Interface SONiC Software for Open Networking in the Cloud One Investment to Unblock Hardware Innovation Monitoring, Management, Deployment Tools, Cutting

More information

MPLS VPN Multipath Support for Inter-AS VPNs

MPLS VPN Multipath Support for Inter-AS VPNs The feature supports Virtual Private Network (VPN)v4 multipath for Autonomous System Boundary Routers (ASBRs) in the interautonomous system (Inter-AS) Multiprotocol Label Switching (MPLS) VPN environment.

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Introduction to OSPF

Introduction to OSPF Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

BGP-4 Border Gateway Protocol 4 (BGP-4) Primer

BGP-4 Border Gateway Protocol 4 (BGP-4) Primer BGP-4 Border Gateway Protocol 4 (BGP-4) Primer Diarmuid Ó Briain Last updated: 18 April 2017 2 Routing primer 2017 by C²S Consulting Policies made available under the Creative Commons Attribution-NonCommercial

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

Chapter 5: Maintaining and Troubleshooting Routing Solutions

Chapter 5: Maintaining and Troubleshooting Routing Solutions Chapter 5: Maintaining and Troubleshooting Routing Solutions CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Course v6 1 Troubleshooting Network Layer Connectivity 2 Routing and Routing Data Structures

More information

Introduction to Switched Networks Routing And Switching

Introduction to Switched Networks Routing And Switching Introduction to Switched Networks Routing And Switching 1 Converged Networks Growing Complexity of Networks Our digital world is changing Information must be accessed from anywhere in the world Networks

More information

SONiC Software Subsystems SONiCSoftware Subsystems Overview Overview

SONiC Software Subsystems SONiCSoftware Subsystems Overview Overview SONiC Software Subsystems SONiCSoftware Subsystems Overview Overview OCP workshop Aug 2018 OCP workshop Aug 2018 Rodny Molina Linkedin rmolina@linkedin.com SONiC Software Subsystems. SONiC Subsystems Interactions.

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 About MPLS L2VPN 1 Comparison with traditional VPN 2 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration

More information

Cisco Certified Network Associate ( )

Cisco Certified Network Associate ( ) Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that

More information

Pass4sures. Latest Exam Guide & Learning Materials

Pass4sures.   Latest Exam Guide & Learning Materials Pass4sures http://www.pass4sures.top/ Latest Exam Guide & Learning Materials Exam : 200-125 Title : CCNA Cisco Certified Network Associate CCNA (v3.0) Vendor : Cisco Version : DEMO Get Latest & Valid 200-125

More information

S O N i C - P r o g r a m m a b i l i t y, E x t e n s i b i l i t y a n d B e y o n d

S O N i C - P r o g r a m m a b i l i t y, E x t e n s i b i l i t y a n d B e y o n d S O N i C - P r o g r a m m a b i l i t y, E x t e n s i b i l i t y a n d B e y o n d David A. Maltz Distinguished Engineer Microsoft Azure Networking Application & Management tools SONiC [Software For

More information

lab rip experiences with RIPv2 distance vector protocol

lab rip experiences with RIPv2 distance vector protocol lab rip experiences with RIPv2 distance vector protocol hosts need routing each host with a network stack performs some elementary routing ip layer nic eth0? lo the network stack may be used to access

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

FiberstoreOS IPv6 Service Configuration Guide

FiberstoreOS IPv6 Service Configuration Guide FiberstoreOS IPv6 Service Configuration Guide Contents 1 Configuring IPv6 over IPv4 Tunnel...5 1.1 Overview...5 1.1.2 Manual Tunnel...6 1.1.3 6to4 Tunnel...6 1.1.4 ISATAP Tunnel...7 1.2 Configure Manual

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 Basic concepts of MPLS L2VPN 2 Implementation of MPLS L2VPN 2 MPLS L2VPN configuration task list 4 Configuring MPLS L2VPN 5 Configuring CCC MPLS

More information

Configuring Port Channels

Configuring Port Channels CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels in Cisco DCNM. For more information

More information

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Building the Routing Table Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Introducing the Routing Table R1# show ip route Codes: C - connected,

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vpcs) on Cisco Nexus 5000 Series switches. It contains the following sections: Information About vpcs, page

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Dell EMC Switch Configuration Guide for iscsi and Software-Defined Storage

Dell EMC Switch Configuration Guide for iscsi and Software-Defined Storage Dell EMC Switch Configuration Guide for iscsi and Software-Defined Storage Dell EMC Networking Infrastructure Solutions November 2017 A Dell EMC Technical White Paper Revisions Date Description Authors

More information

FiberstoreOS IP Routing Configuration Guide

FiberstoreOS IP Routing Configuration Guide FiberstoreOS IP Routing Configuration Guide Contents 1 Configuring IP Unicast-Routing... 1 1.1 Overview... 1 1.2 Topology...1 1.3 Configuration... 2 1.4 Validation... 3 2 Configuring RIP...5 2.1 Overview...

More information

Lenovo ThinkSystem NE Release Notes. For Lenovo Cloud Network Operating System 10.6

Lenovo ThinkSystem NE Release Notes. For Lenovo Cloud Network Operating System 10.6 Lenovo ThinkSystem NE10032 Release Notes For Lenovo Cloud Network Operating System 10.6 Note: Before using this information and the product it supports, read the general information in the Safety information

More information

1 Training Description H3C Certification Training Building Networks for Small- and Medium-Sized Businesses (v6.0)...

1 Training Description H3C Certification Training Building Networks for Small- and Medium-Sized Businesses (v6.0)... Training Description 1 Training Description... 2 1.1 H3C Certification Training... 2 1.1.1 Building Networks for Small- and Medium-Sized Businesses (v6.0)... 2 2... 4 HL-101 Computer Network Fundamentals...

More information

PASS4TEST IT 인증시험덤프전문사이트

PASS4TEST IT 인증시험덤프전문사이트 PASS4TEST IT 인증시험덤프전문사이트 http://www.pass4test.net 일년동안무료업데이트 Exam : 640-802 Title : Cisco Certified Network Associate(CCNA) Vendors : Cisco Version : DEMO 1 / 10 Get Latest & Valid 640-802 Exam's Question

More information

Chapter 13 Configuring BGP4

Chapter 13 Configuring BGP4 Chapter 13 Configuring BGP4 This chapter provides details on how to configure Border Gateway Protocol version 4 (BGP4) on HP products using the CLI and the Web management interface. BGP4 is supported on

More information

Routing Overview. Information About Routing CHAPTER

Routing Overview. Information About Routing CHAPTER 21 CHAPTER This chapter describes underlying concepts of how routing behaves within the ASA, and the routing protocols that are supported. This chapter includes the following sections: Information About

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 Overview 1 Comparison with traditional VPN 1 Comparison with MPLS L3VPN 2 Basic concepts 2 MPLS L2VPN implementation 3 MPLS L2VPN configuration task list 4 Configuring

More information

FSOS IP Routing Configuration Guide

FSOS IP Routing Configuration Guide FSOS IP Routing Configuration Guide Contents 1 Configuring IP Unicast-Routing... 6 1.1 Overview... 6 1.2 Topology...6 1.3 Configuration... 7 1.4 Validation... 8 2 Configuring RIP...10 2.1 Overview... 10

More information

References: tates-roles.html

References:  tates-roles.html Volume: 65 Questions Question No: 1 What are three RSTP port states? (Choose three.) A. learning B. forwarding C. listening D. blocking E. discarding Answer: A,B,E Explanation: Port States in STP and RSTP

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Deploying Secure Multicast Market Data Services for Financial Services Environments Modified: 2016-07-29 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

Contents. EVPN overview 1

Contents. EVPN overview 1 Contents EVPN overview 1 EVPN network model 1 MP-BGP extension for EVPN 2 Configuration automation 3 Assignment of traffic to VXLANs 3 Traffic from the local site to a remote site 3 Traffic from a remote

More information

Traditional network management methods have typically

Traditional network management methods have typically Advanced Configuration for the Dell PowerConnect 5316M Blade Server Chassis Switch By Surendra Bhat Saurabh Mallik Enterprises can take advantage of advanced configuration options for the Dell PowerConnect

More information

HP0-Y49. Applying HP FlexNetwork Fundamentals.

HP0-Y49. Applying HP FlexNetwork Fundamentals. HP HP0-Y49 Applying HP FlexNetwork Fundamentals http://killexams.com/exam-detail/hp0-y49 QUESTION: 54 Refer to the Exhibit. Exhibit: HP Comware switch configuration. [Comware] vlan 100 [Comware-vlan100]

More information

FiberstoreOS IP Routing Configuration Guide

FiberstoreOS IP Routing Configuration Guide FiberstoreOS IP Routing Configuration Guide Contents 1 Configuring IP Unicast-Routing... 6 1.1 Overview...6 1.2 Topology... 6 1.3 Configuration... 6 1.4 Validation... 8 2 Configuring RIP... 10 2.1 Overview...10

More information

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee

JN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee JN0-343 Q&As Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee

More information

MPLS VPN--Inter-AS Option AB

MPLS VPN--Inter-AS Option AB The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider

More information

Table of Contents 1 MSDP Configuration 1-1

Table of Contents 1 MSDP Configuration 1-1 Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring Basic Functions of MSDP

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution This feature lets you configure your carrier supporting carrier network to enable Border Gateway Protocol (BGP) to transport routes and Multiprotocol

More information

BIG-IP TMOS : Routing Administration. Version 13.0

BIG-IP TMOS : Routing Administration. Version 13.0 BIG-IP TMOS : Routing Administration Version 13.0 Table of Contents Table of Contents Overview of TMOS Routing...9 Overview of routing administration in TMOS...9 About BIG-IP system routing tables...

More information

DNS Anycast with Cisco Prime Network Registrar

DNS Anycast with Cisco Prime Network Registrar DNS Anycast with Cisco Prime Network Registrar This chapter provides the knowledge and tools to configure Cisco Prime Network Registrar DNS services using with Anycast. Anycast is a network and routing

More information

HP0-Y36: DEPLOYING HP ENTERPRISE NETWORKS

HP0-Y36: DEPLOYING HP ENTERPRISE NETWORKS HP0-Y36: DEPLOYING HP ENTERPRISE NETWORKS HP Networking Exam preparation guide HP0-Y36: DEPLOYING HP ENTERPRISE NETWORKS HP Networking Exam preparation guide Overview Requirements for successful completion

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

Easy Virtual Network Configuration Example

Easy Virtual Network Configuration Example Easy Virtual Network Configuration Example Document ID: 117974 Contributed by Fabrice Ducomble, Cisco TAC Engineer. Aug 04, 2014 Contents Introduction Prerequisites Requirements Components Used Background

More information

Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process

Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Troubleshooting High CPU Caused by the BGP Scanner or BGP Router Process Document ID: 107615 Contents Introduction Before You Begin Conventions Prerequisites Components Used Understanding BGP Processes

More information

CCNA Routing and Switching (NI )

CCNA Routing and Switching (NI ) CCNA Routing and Switching (NI400+401) 150 Hours ` Outline The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that is

More information

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax. The Network Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW The Internet Protocol IP addresses, address resolution

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, , CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment

More information

IX: Detailed Infomation

IX: Detailed Infomation IX: Detailed Infomation 1 IX: Detailed Infomation Megaport owns and operates a series of Internet peering exchanges in the majority of our networks globally. IXs provide greater efficiency between networks

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-101 Title : CCIE Routing and Switching Written Exam v5.1 Vendor : Cisco Version : DEMO Get Latest & Valid

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers

More information

Understanding Linux Internetworking

Understanding Linux Internetworking White Paper by David Davis, ActualTech Media Understanding Linux Internetworking In this Paper Layer 2 vs. Layer 3 Internetworking... 2 Layer 2 Internetworking on Linux Systems... 3 Bridging... 3 Spanning

More information

scope scope {global vrf vrf-name} no scope {global vrf vrf-name} Syntax Description

scope scope {global vrf vrf-name} no scope {global vrf vrf-name} Syntax Description Multi-Toplogy Routing Commands scope scope To define the scope for a Border Gateway Protocol (BGP) routing session and to enter router scope configuration mode, use the scope command in router configuration

More information

Configuring Routes on the ACE

Configuring Routes on the ACE CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information

More information

Qus1:-What is cat stands for in networking?

Qus1:-What is cat stands for in networking? Qus1:-What is cat stands for in networking? Ans :- Cat stands for "CATEGORY". Which started from Cat1 (Category1) and now extend up to Cat7 (Category 7). Improved version/category of cable improve the

More information

This is a sample Lab report from ECE 461 from previous years. L A B 6

This is a sample Lab report from ECE 461 from previous years. L A B 6 This is a sample Lab report from ECE 461 from previous years. L A B 6 Part 1 1. o the source and destination M A C/IP addresses change when a packet traverses a bridge? Provide an explanation and include

More information

Exam Topics Cross Reference

Exam Topics Cross Reference Appendix R Exam Topics Cross Reference This appendix lists the exam topics associated with the ICND1 100-105 exam and the CCNA 200-125 exam. Cisco lists the exam topics on its website. Even though changes

More information

To contain/reduce broadcast traffic, we need to reduce the size of the network (i.e., LAN).

To contain/reduce broadcast traffic, we need to reduce the size of the network (i.e., LAN). 2.3.3 Routers 2.3.3.1 Motivation Bridges do not stop broadcast traffic. This can lead to broadcast storms (e.g., more than 100 nonunicast frames/sec) which can be catastrophic. This can bring the network

More information

HP Routing Switch Series

HP Routing Switch Series HP 12500 Routing Switch Series EVI Configuration Guide Part number: 5998-3419 Software version: 12500-CMW710-R7128 Document version: 6W710-20121130 Legal and notice information Copyright 2012 Hewlett-Packard

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information

More information

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts

Configuring VPLS. VPLS overview. Operation of VPLS. Basic VPLS concepts Contents Configuring VPLS 1 VPLS overview 1 Operation of VPLS 1 VPLS packet encapsulation 4 H-VPLS implementation 5 Hub-spoke VPLS implementation 7 Multi-hop PW 8 VPLS configuration task list 9 Enabling

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

CCNA Cisco Certified Network Associate CCNA (v3.0)

CCNA Cisco Certified Network Associate CCNA (v3.0) CCNA Cisco Certified Network Associate CCNA (v3.0) Cisco 200-125 Dumps Available Here at: /cisco-exam/200-125-dumps.html Enrolling now you will get access to 455 questions in a unique set of 200-125 dumps

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

FiberstoreOS IP Routing Command Line Reference

FiberstoreOS IP Routing Command Line Reference FiberstoreOS IP Routing Command Line Reference Contents 1 IP Unicast-Routing Commands...6 1.1 ip address...6 1.2 ip icmp error-interval...7 1.3 ip redirects... 8 1.4 ip unreachables...9 1.5 ip verify unicast

More information

BIG-IP TMOS : Routing Administration. Version 13.1

BIG-IP TMOS : Routing Administration. Version 13.1 BIG-IP TMOS : Routing Administration Version 13.1 Table of Contents Table of Contents Overview of TMOS Routing...9 Overview of routing administration in TMOS...9 About BIG-IP system routing tables...

More information

CCNA. Course Catalog

CCNA. Course Catalog CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)

More information

Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941

Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941 29 CHAPTER Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941 Cisco MWR 2941 Release 3.5.1 and later supports IEEE 802.3ad Link Aggregation Control Protocol (LACP) EtherChannels. Note The

More information

Lecture 07c Routing Border Gateway Protocol

Lecture 07c Routing Border Gateway Protocol BSc in Telecommunications Engineering TEL3214 Computer Communication Networks Lecture 07c Routing Border Gateway Protocol Eng Diarmuid O'Briain, CEng, CISSP 7c-2 TEL3214 - Computer Communication Networks

More information

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution

MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution MPLS VPN Carrier Supporting Carrier IPv4 BGP Label Distribution This feature enables you to configure your carrier supporting carrier network to enable Border Gateway Protocol (BGP) to transport routes

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information