TPF TCP/IP Load Balancing
|
|
- Patricia Pierce
- 6 years ago
- Views:
Transcription
1 6XEFRPPLWWHH TPF TCP/IP Load Balancing Mark Gambino Any references to future plans are for planning purposes only. IBM reserves the right to change those plans at its discretion. Any reliance on such a disclosure is solely at your own risk. IBM makes no commitment to provide additional information in the future.
2 Single TPF Systems (not loosely coupled)
3 Single Server Host Server application resides in only one host Client application starts a connection: If client does not know the IP address of the server Issues gethostbyname() API If local DNS does not have the information, it communicates with remote DNS servers Client sends request to the server
4 Local DNS Has Information about Host A GGUHVV $ GGUHVV $
5 1. Client X Requests IP Address of Host A from Local DNS GGUHVV $ GGUHVV $
6 2. Local DNS Returns IP Address of Host A to Client X GGUHVV $ GGUHVV $
7 3. Client X Sends Data to Host A GGUHVV $ GGUHVV $
8 Local DNS Has No Information about Host A GGUHVV $ GGUHVV
9 1. Client X Requests IP Address of Host A from Local DNS GGUHVV $ GGUHVV
10 2. Local DNS Requests IP Address of Host A from Remote DNS GGUHVV $ GGUHVV
11 3. Remote DNS Returns IP Address of Host A to Local DNS GGUHVV $ GGUHVV $
12 4. Local DNS Returns IP Address of Host A to Client X GGUHVV $ GGUHVV $
13 5. Client X Sends Data to Host A GGUHVV $ GGUHVV $
14 Single TPF Host Conclusions If a TPF host has only one IP address (or only one IP address per application): Remote clients always connect to the same one IP address in TPF Standard DNS queries work fine No load balancing software needed in the remote client, IP routers, or TPF system TCP/IP native stack allows you to have a single IP address in TPF mapped to multiple CDLC IP routers or to one OSA-Express card
15 One TPF IP Address Using Multiple CDLC IP Routers TPF x 374x 374x IP Cloud Remote Clients
16 One VIPA Using OSA-Express TPF VIPA OSA-Express OSA-Express GbE Switch GbE Switch IP Cloud Remote Clients
17 Loosely Coupled TPF Systems
18 Types of TPF IP Addresses CDLC IP address IP address of TPF for one or more CDLC IP routers Real IP address for OSA-Express Real IP address of TPF across one OSA-Express connection Static VIPA VIPA that is permanently assigned to one TPF processor in the loosely coupled complex Movable VIPA VIPA that can be moved from one TPF processor to another in the complex
19 TPF Loosely Coupled IP Address Restrictions Each TPF host needs different IP addresses to connect to standard IP routers Two TPF hosts FDQQRW have: Same CDLC IP address defined Same real IP address defined for OSA-Express Same static VIPA defined for OSA-Express A movable VIPA for OSA-Express can be defined on all TPF hosts in the complex The VIPA is active on RQHDQGRQO\RQH TPF host at any time
20 TPF Loosely Coupled with CDLC IP Routers TPFA TPFB x 374x 374x IP Cloud TPFC TPFD Remote Clients
21 TPF Loosely Coupled Using OSA-Express TPFA VIPA TPFB VIPA OSA-Express OSA-Express OSA-Express OSA-Express GbE Switch GbE Switch IP Cloud Remote Clients
22 Multiple Hosts, Standard DNS Load Balancing Server application resides in multiple hosts within a complex (cluster) One host name ("ANY" in this example) entry in DNS has multiple IP addresses (one for each host) DNS passes the list of server IP addresses back to the client in response to gethostbyname() API DNS shuffle algorithm can change the order of IP addresses in the list passed back Client node (not( the client application) selects an IP address from the list passed from DNS Most platforms select the first IP address in the list passed back from DNS
23 Server Application Resides in Hosts A, B, and C +RVW% +RVW& GGUHVV $ % & $1<
24 1. Client X Asks DNS for IP Address for Host "ANY" +RVW% +RVW& GGUHVV $ % & $1<
25 2. DNS Returns List of IP Addresses for Host "ANY" +RVW% +RVW& GGUHVV $ % & $1<
26 3. Client X Selects and Sends Data to Host A +RVW% +RVW& GGUHVV $ % & $1<
27 1. Client Y Asks DNS for IP Address for Host "ANY" +RVW% +RVW& GGUHVV $ % & $1<
28 2. DNS Returns the List of IP Addresses for Host "ANY" +RVW% +RVW& GGUHVV $ % & $1<
29 3. Client Y Selects and Sends Data to Host B +RVW% +RVW& GGUHVV $ % & $1<
30 Standard DNS Load Balancing Summary Advantages: Simple, standard DNS code No special code in client, server hosts, or IP routers Limitations: DNS entries are static DNS can return IP addresses of server hosts that are not active Hosts are not involved in the host selection: Client node and its DNS server select the host Assumes all hosts are equal capacity Does not take into account how busy the hosts are at this point in time
31 Load Balancing with DNS Server Function in the Hosts DNS server function is implemented in the host complex (where the server application resides) Make primary DNS one of the hosts that is always active Allows the server complex to select the host: Based on which hosts are active Based on how busy the hosts are right now gethostbyname() responses have a small time to life (TTL) value so that remote DNS servers do not cache the information for long (or at all if TTL is 0)
32 Local DNS Has No Information about Server Hosts +RVW% +RVW& GGUHVV
33 1. Client X Requests IP Address of Host "ANY" from Local DNS +RVW% +RVW& GGUHVV
34 2. Local DNS Asks Remote DNS for IP Address of Host "ANY" +RVW% +RVW& GGUHVV
35 3. Remote DNS Selects Host C and Returns IP address RVW% +RVW& GGUHVV
36 4. Local DNS Returns IP address to Client X +RVW% +RVW& GGUHVV
37 5.Client X Sends Data to the Selected Host +RVW% +RVW& GGUHVV
38 Host (Server) DNS Load Balancing Advantages Allows hosts to participate in the host selection process Standard DNS server is still used DNS server user exit allows the host complex to select the host for a given client request based on whatever criteria the server platform wants to use IP addresses for inactive hosts are never returned No special code is required for the client nodes, client-side DNS servers, or IP routers
39 Host (Server) DNS Load Balancing Limitations Limitations: Client information (like its IP address) is not available to the server during the host selection process Client DNS server s (or intermediate DNS server s) IP address is what gets passed to the host s DNS server Most remote DNS servers honor TTL values and do not cache information when told not to; however, some client platforms cache IP address information even though the gethostbyname() response indicated not to cache the information: These platforms use the IP address that DNS returns until that IP address no longer works Makes it difficult to rebalance the load when a new host is added to the complex
40 Front-End Box Load Balancing IP router with special software is directly connected (one hop) to the server hosts Original offering was IBM s Network Dispatcher Uses "cluster IP address" concept To the remainder of the network, the cluster IP address resides in the IP router The cluster IP address is also a loopback address in each of the hosts All input messages from remote clients are sent to the cluster IP address (and, therefore, to the IP router): Software in the IP router routes the message to the host If the packet is a connection request The IP router software selects a host Optionally, the hosts can exchange information with the IP router to customize the load balancing algorithms
41 Front-End Box Load Balancing Evolution Newer implementations allow multiple IP routers to process input messages Better scalability and availability Tables need to be kept in sync across these boxes Output messages must also be sent to these IP routers to fix some of the socket termination problems
42 Cluster IP Address Is RVW% +RVW& 5RXWHU= GGUHVV $1<
43 1. Client X Asks Its Local DNS for IP Address of Host "ANY" +RVW% +RVW& 5RXWHU= GGUHVV $1<
44 2. DNS Returns IP Address of for Host "ANY" +RVW% +RVW& 5RXWHU= GGUHVV $1<
45 3. Client X Sends a TCP SYN Message to RVW% 6<1 +RVW& 5RXWHU= GGUHVV $1<
46 4. IP Router Z Assigns This Session to Host A 6<1 +RVW% +RVW& 5RXWHU= &OLHQW6HUYHU GGUHVV $1<
47 5. Host A Responds Directly to Client X 6<1$&. +RVW% +RVW& 5RXWHU= &OLHQW6HUYHU GGUHVV $1<
48 6. Client X Sends Data, Goes Through IP Router Z +RVW% GDWD +RVW& 5RXWHU= &OLHQW6HUYHU GGUHVV $1<
49 7. IP Router Z Forwards Data to Host A GDWD +RVW% +RVW& 5RXWHU= &OLHQW6HUYHU GGUHVV $1<
50 8. Host A Sends Data Directly to Client X GDWD +RVW% +RVW& 5RXWHU= &OLHQW6HUYHU GGUHVV $1<
51 Front-End Box Load Balancing Advantages All remote clients use one IP address for the host complex Some vendors offer high-availability option Backup router takes over if primary router fails Without this, all sockets fail if IP router fails
52 Front-End Box Load Balancing Disadvantages IP routers have knowledge of sockets Every packet must go through special software in IP routers Maximum number of sessions is gated by IP routers Session information can get out of sync: Between IP routers themselves Between host and the IP routers Older implementations did not handle cases where the host unconditionally ended the socket (host sends TCP reset) If TPF takes a long dump, IP routers could clean up all sockets thinking TPF is gone TPF could IPL (which cleans up all socket knowledge in TPF), and come back before the IP routers realize TPF is gone. The IP routers still think the sockets are active.
53 Front-End Box Load Balancing Disadvantages... Information exchanged between the hosts and load balancing software in the router is not standard Different for each vendor s product Only works when the host is the server Does not work when host is the client and starts a connection using the cluster IP address Only works for TCP connections Problems with UDP because it is connectionless Problems with trace tools that use RAW sockets Remote PING and TRACEROUTE requests never make it to the host
54 Movable VIPAs VIPAs were originally designed to allow sockets to survive network failures A given VIPA always resided on the same host Static VIPA Movable VIPAs allows a VIPA to be moved from one host to another host When a host fails When a new host is added to the complex When the workload is not distributed correctly among the active hosts Sockets using a movable VIPA will fail when the VIPA is moved to another host Remote clients will reconnect using same VIPA and connect to one of the remaining hosts
55 Load Balancing Using Movable VIPAs A given client always connects to the same VIPA Assume there are 12 VIPAs in the complex Goal is to have an equal amount of the traffic for each of the 12 VIPAs (8.3% of the workload for each VIPA) Assign the appropriate amount of clients to each VIPA so that the workload is distributed equally For example, distribute by application or by partner Moving a VIPA from one host to another is infrequent Only needed when the workload is not balanced Define enough VIPAs so that you can move the desired amount of traffic Too few VIPAs prevents equal load balancing Too many VIPAs complicates network management
56 4-Way Complex, 3 Active Hosts, 12 VIPAs Defined +RVW% +RVW& 5RXWHU 5RXWHU 5RXWHU 1HWZRUN +RVW'
57 1. Client X Connects to IP 4 and Client Y Connects to IP 6 +RVW% +RVW& 5RXWHU 5RXWHU 5RXWHU 1HWZRUN +RVW'
58 2. Host D Is Activated IPs 4, 7, and 9 Are Moved to Host D +RVW% +RVW& 5RXWHU 5RXWHU 5RXWHU 1HWZRUN +RVW'
59 3. Client X Reconnects to IP 4 +RVW% +RVW& 5RXWHU 5RXWHU 5RXWHU 1HWZRUN +RVW'
60 4. Host B Fails, Its VIPAs Are Moved to Other Hosts +RVW% +RVW& 5RXWHU 5RXWHU 5RXWHU 1HWZRUN +RVW'
61 5. Client Y Reconnects to IP 6 +RVW% +RVW& 5RXWHU 5RXWHU 5RXWHU 1HWZRUN +RVW'
62 Movable VIPAs Load Balancing Advantages Each client needs to know only one IP address Client side DNS can resolve IP address of TPF Client nodes that cache IP address information are not a problem anymore Host (TPF) operators control the load balancing Granularity of how much traffic is moved can be changed by adding more VIPAs When expanding the complex, VIPAs can be moved one at a time to avoid flooding the network with reconnect requests No special code is needed for the IP routers or remote client nodes No extra overhead for any flows, even the startup flows Allows all connections to a specific host application to one host if desired (or to all hosts) For applications that are not loosely coupled capable
63 Movable VIPA Load Balancing Considerations Sockets using a VIPA are broken when that VIPA is moved from one host to another; however: Moving of VIPAs should be infrequent Remote clients can reconnect right away Sockets fail when a host fails anyway Assigning which clients to which VIPAs may take some fine tuning
64 TPF TCP/IP Load Balancing Strategies TPF plans to implement: DNS server and movable VIPAs These methods work best for long-life connections TPF does QRW plan to implement or support: Any front-end box load balancing method
65 DNS Server in TPF TPF will be a DNS server for its domain Can assign multiple host names to TPF For example, a different host name per application User exit in TPF will be invoked by the DNS server code to allow the customer to assign the IP address (and therefore the host) when a remote client starts a connection Solution is network and vendor independent Will work with CDLC connections, OSA-Express (GbE) connections, and future network technology TPF will also cache information learned from other DNS servers Improves performance when TPF is the client
66 Movable VIPAs on TPF Implement movable VIPAs across OSA-Express connections Static VIPAs (permanently assigned to one host) will still exist for connections that must go to a specific TPF host TPF operator will be able to move a VIPA from one host to another via functional message Program interface will also exist User exit will be invoked when a processor is taken out of the complex, enabling VIPAs to move from the failed host to another host
67 Rationale for Not Doing Front-End Box Balancing Requires different solution for CDLC and OSA-Express Overhead for every input message Applicable only for pure TCP server nodes: Does not work when TPF is the client Does not work well for UDP or RAW sockets Socket state information can get out of sync Host to router interface is vendor-specific Does not work in all configurations, for example: Test system with two TPF LPARs in the same CEC sharing an OSA-Express card cannot both register the same cluster IP address
68 Summary TPF s TCP/IP load balancing strategies take advantage of standard protocols (like DNS and RIP) Load balancing is centralized and controlled by the TPF system Provide maximum performance and minimum overhead Questions?
OSA-Express Support for TPF
6XEFRPPLWWHH OSA-Express Support for TPF Mark Gambino Any references to future plans are for planning purposes only. IBM reserves the right to change those plans at its discretion. Any reliance on such
More informationz/tpf Communications Enhancements
TPF Users Group Fall 2007 z/tpf Communications Enhancements Name: Mark Gambino Venue: Communications Subcommittee Overview This presentation covers recent z/tpf communications enhancements All APARs listed
More informationTCP/IP Native Stack Roadmap for TPF 4.1
TCP/IP Native Stack Roadmap for TPF 4.1 Mark Gambino It Came from the 80's TCP/IP has become the most prevalent networking protocol The IP and TCP architectures were developed many years ago: Request for
More informationTPF 4.1 Communications - TCP/IP Enhancements
TPF Users Group Grapevine, Texas IBM Software Group TPF 4.1 Communications - TCP/IP Enhancements Jamie Farmer October 2004 AIM Core and Enterprise Solutions IBM z/transaction Processing Facility Enterprise
More informationName : Mark Gambino Venue : Communications Subcommittee
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 TCP/IP Enhancements Name : Mark Gambino Venue : Communications Subcommittee
More informationNetworking TCP/IP troubleshooting
System i Networking TCP/IP troubleshooting Version 6 Release 1 System i Networking TCP/IP troubleshooting Version 6 Release 1 Note Before using this information and the product it supports, read the information
More informationName: Mark Gambino Venue: SOA Subcommittee
z/tpf V1.1-2011 Title: z/tpf HTTP Server Preview Name: Mark Gambino Venue: SOA Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationHardware Cryptography and z/tpf
z/tpf V1.1 2013 TPF Users Group Hardware Cryptography and z/tpf Mark Gambino Communications Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1 Any
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationTPF Communications - TCP/IP Enhancements
TPF Communications - TCP/IP Enhancements Jamie Farmer TPF TCP/IP Enhancements 7 New TCP/IP Enhancements All native stack enhancements 4 of the enhancements are TPF Users Group Requirements 3 enhancements
More informationLoad Balancing Technology White Paper
Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing
More informationIntelligent Server Load Balancing in IBM 390 Environments: A Cisco/IBM Alliance Case Study
1 Intelligent Server Load Balancing in IBM 390 Environments: A Cisco/IBM Alliance Case Study Session 2 Agenda What Is Server Load Balancing? MultiNode Load Balancing Overview, Components, and Protocols
More informationRequest for Comments: 2583 Category: Informational ANL May Guidelines for Next Hop Client (NHC) Developers. Status of this Memo
Network Working Group Request for Comments: 2583 Category: Informational R. Carlson ANL L. Winkler ANL May 1999 Status of this Memo Guidelines for Next Hop Client (NHC) Developers This memo provides information
More informationHow IBM Can Identify z/os Networking Issues without tracing
How IBM Can Identify z/os Networking Issues without tracing Wed, August 12, 1:45-2:45 Session 17536 Speakers: Ernie Gilman, IBM (egilman@us.ibm.com) Dean Butler, IBM (butlerde@us.ibm.com) Abstract Running
More informationIBM i Version 7.3. Networking TCP/IP troubleshooting IBM
IBM i Version 7.3 Networking TCP/IP troubleshooting IBM IBM i Version 7.3 Networking TCP/IP troubleshooting IBM Note Before using this information and the product it supports, read the information in
More informationNetworking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION
Networking Revision TCP/IP Protocol Stack & OSI reference model Basic Protocols TCP/IP Model 1 OSI (Open Systems Interconnection) Model main purpose to aid in clearer understanding of the functions and
More informationOffice and Express Print Release High Availability Setup Guide
Office and Express Print Release High Availability Setup Guide Version 1.0 2017 EQ-HA-DCE-20170512 Print Release High Availability Setup Guide Document Revision History Revision Date May 12, 2017 September
More informationUnit 3: Dynamic Routing
Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about
More informationAIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0
z/tpf V1.1 2011 SCP Updates Lisa Banks SCP Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference to future plans are for planning purposes
More informationIBM i Version 7.2. Networking TCP/IP troubleshooting IBM
IBM i Version 7.2 Networking TCP/IP troubleshooting IBM IBM i Version 7.2 Networking TCP/IP troubleshooting IBM Note Before using this information and the product it supports, read the information in
More informationDynamic Routing: Exploiting HiperSockets and Real Network Devices
Dynamic Routing: Exploiting s and Real Network Devices Session 8447 Jay Brenneman rjbrenn@us.ibm.com Exploiting s and Real Network Devices Session 8447 Trademarks The following are trademarks of the International
More informationICS 351: Networking Protocols
ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol
More informationChapter 5: Trouble shooting of a network
5 Troubleshooting TCP/IP Fig 5 show trouble shooting a TCP/IP Chapter 5: Trouble shooting of a network Steps 1 First, determines whether your local host is properly configured. Step 2 Next, uses the ping
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationFirewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
More informationz/tpf Enhanced HTTP Client and High Speed Connector Enhancements
z/tpf Enhanced and High Speed Connector Enhancements Jamie Farmer Communications Subcommittee Disclaimer Any reference to future plans are for planning purposes only IBM reserves the right to change those
More informationset active-probe (PfR)
set active-probe (PfR) set active-probe (PfR) To configure a Performance Routing (PfR) active probe with a forced target assignment within a PfR map, use the set active-probe command in PfR map configuration
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationHistory Page. Barracuda NextGen Firewall F
The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationLinksys Stackable Switches
TECHNICAL BULLETIN Linksys Stackable Switches How to Build Stacks and Understand Their Operation This document describes how to stack Linksys switches and covers advanced stacking information, as well
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationGuide to TCP/IP, Third Edition. Chapter 12: TCP/IP, NetBIOS, and WINS
Guide to TCP/IP, Third Edition Chapter 12: TCP/IP, NetBIOS, and WINS Objectives Discuss the history of NetBIOS Understand what NetBIOS is and its limitations Understand the role of NetBIOS in Windows 2000
More information6. Correspondence relationship between Educational goals and Course goals
1. Course Title (Course Code) Fundamentals of Information Networks (2201) 2. Instructor Teruaki YOKOYAMA 3. Term Fall 2 4. Outline and Objectives In this course the students study the technologies for
More informationWhat every DBA needs to know about JDBC connection pools Bridging the language barrier between DBA and Middleware Administrators
Presented at What every DBA needs to know about JDBC connection pools Bridging the language barrier between DBA and Middleware Administrators Jacco H. Landlust Platform Architect Director Oracle Consulting
More informationEquitrac Office and Express DCE High Availability White Paper
Office and Express DCE High Availability White Paper 2 Summary............................................................... 3 Introduction............................................................
More informationChapter 2 Layer Architecture of Network Protocols. School of Info. Sci. & Eng. Shandong Univ.
Chapter 2 Architecture of Network Protocols School of Info. Sci. & Eng. Shandong Univ. Outline 2.1 Examples of ing 2.2 OSI Reference Model (Continued from last time) 2.3. TCP/IP Architecture 2.4 Berkeley
More informationTutorial 2 : Networking
Lund University ETSN01 Advanced Telecommunication Tutorial 2 : Networking Author: Emma Fitzgerald Tutor: Farnaz Moradi November 26, 2015 Contents I Before you start 3 II Whole Class Exercise: Networking
More informationOperation Manual IP Addressing and IP Performance H3C S5500-SI Series Ethernet Switches. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 IP Addressing Overview... 1-1 1.1.1 IP Address Classes... 1-1 1.1.2 Special Case IP Addresses... 1-2 1.1.3 Subnetting and Masking... 1-2 1.2 Configuring IP
More informationUnit 28 Website Production ASSIGNMENT 1
Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web
More informationRunning z/os as a Second Level System on z/vm to Clone and Scale 13075
Running z/os as a Second Level System on z/vm to Clone and Scale 13075 Steve McGarril mcgarril@us.ibm.com STG WW Mainframe Client Center February 6 th, 2013 Scenario New hardware introduction z10 to z196
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationTPF Debugger / Toolkit update PUT 12 contributions!
TPF Debugger / Toolkit update PUT 12 contributions! Matt Gritter TPF Toolkit Technical Lead! IBM z/tpf April 12, 2016! Copyright IBM Corporation 2016. U.S. Government Users Restricted Rights - Use, duplication
More informationTroubleshooting High CPU Utilization Due to the IP Input Process
Troubleshooting High CPU Utilization Due to the IP Input Process Document ID: 41160 Contents Introduction Prerequisites Requirements Components Used Conventions IP Input Sample IP Packet Debugging Session
More informationLab 6.4.2: Challenge Inter-VLAN Routing
Lab 6.4.2: Challenge Inter-VLAN Routing Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN
More informationPaper solution Subject: Computer Networks (TE Computer pattern) Marks : 30 Date: 5/2/2015
Paper solution Subject: Computer Networks (TE Computer- 2012 pattern) Marks : 30 Date: 5/2/2015 Q1 a) What is difference between persistent and non persistent HTTP? Also Explain HTTP message format. [6]
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationUnit 5 - IPv4/ IPv6 Transition Mechanism(8hr) BCT IV/ II Elective - Networking with IPv6
5.1 Tunneling 5.1.1 Automatic Tunneling 5.1.2 Configured Tunneling 5.2 Dual Stack 5.3 Translation 5.4 Migration Strategies for Telcos and ISPs Introduction - Transition - the process or a period of changing
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationSECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON
White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationChapter 7: Routing Dynamically. Routing & Switching
Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based
More informationOrganization of Product Documentation... xi
Contents Organization of Product Documentation... xi Chapter 1 Getting Started... 1-1 Introduction...1-1 Software Versions Covered...1-1 Audience...1-1 Conventions...1-1 Terminology...1-2 Support and Warranty
More informationTest - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version
Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your
More informationHands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network
Hands-on Networking Fundamentals Chapter 12 Maintaining and Troubleshooting Your Network Objectives Use hardware and software methods to monitor a network Perform backups over a network Solve a broad range
More informationFirewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.
Firews and NAT 1 Firews By conventional definition, a firew is a partition made of fireproof material designed to prevent the spread of fire from one part of a building to another. firew isolates organization
More informationConfiguring NAT for IP Address Conservation
This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationData Management in Application Servers. Dean Jacobs BEA Systems
Data Management in Application Servers Dean Jacobs BEA Systems Outline Clustered Application Servers Adding Web Services Java 2 Enterprise Edition (J2EE) The Application Server platform for Java Java Servlets
More informationFinding Feature Information
This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about
More informationMeasurement: Techniques, Strategies, and Pitfalls. David Andersen CMU
Measurement: Techniques, Strategies, and Pitfalls David Andersen CMU 15-744 Many (most) slides in this lecture from Nick Feamster's measurement lecture Internet Measurement Process of collecting data that
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationIBM. Networking TCP/IP troubleshooting. IBM i 7.1
IBM IBM i Networking TCP/IP troubleshooting 7.1 IBM IBM i Networking TCP/IP troubleshooting 7.1 Note Before using this information and the product it supports, read the information in Notices, on page
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationAccess Rules. Controlling Network Access
This chapter describes how to control network access through or to the ASA using access rules. You use access rules to control network access in both routed and transparent firewall modes. In transparent
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More informationThe Data Link Layer. 32 PART I Networking Basics
32 PART I Networking Basics weather station. More realistic devices use duplex mode, where all systems can send or receive with equal facility. This is often further distinguished as half-duplex (the system
More informationMulticast Source Discovery Protocol (MSDP)
Multicast Source Discovery Protocol (MSDP) Module 6 2000, Cisco Systems, Inc. 1 Copyright 1998-2000, Cisco Systems, Inc. Module6.ppt 1 Module Objectives Understand the issues relating to Interdomain IP
More informationCisco IOS for S/390 Architecture
CHAPTER 1 Cisco IOS for S/390 Architecture This chapter describes the architecture of Cisco IOS for S/390. It includes the following sections: Overview An overview of the architecture of Cisco IOS for
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationHow to Configure Route 53 for F-Series Firewalls in AWS
How to Configure Route 53 for F-Series Firewalls in AWS If you are running multiple stacks in different AWS regions, or multiple deployments in a single region, you must configure AWS Route 53 to access
More informationAIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0
z/tpf V1.1 Title: z/tpf File System Review Subtitle: Our Greatest Hits Name: Stephen Record Venue: DBDF Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition
More informationCSc Outline. Basics. What is DHCP? Why DHCP? How does DHCP work? DHCP
CSc72010 DHCP Outline Basics Comer: Chapter 22 (Chapter 23 in the the 4 th edition) Peterson: Section 4.1.6 RFC 2131 What is DHCP? Dynamic Host Configuration Protocol: provides for configuring hosts that
More informationCisco CCIE Security Written.
Cisco 400-251 CCIE Security Written http://killexams.com/pass4sure/exam-detail/400-251 QUESTION: 193 Which two of the following ICMP types and code should be allowed in a firewall to enable traceroute?
More informationScribe Notes -- October 31st, 2017
Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission
More informationUsing Diagnostic Tools
Using Diagnostic Tools The Tools System Diagnostics page on the INVESTIGATE view provides several diagnostic tools that help troubleshoot various kinds of network problems and process monitors. Tech Support
More informationSecuring Enterprise Extender
Securing Enterprise Extender Sam Reynolds IBM z/os Communications Server Design samr@us.ibm.com Ray Romney Cisco Systems romney@cisco.com Tony Amies William Data Systems Product Architect tony.amies@willdata.com
More informationch02 True/False Indicate whether the statement is true or false.
ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Citrix NetScaler 10.5 Essentials and Networking. Question Question 160
Vendor: Citrix Exam Code: 1Y0-351 Exam Name: Citrix NetScaler 10.5 Essentials and Networking Question 121 -- Question 160 Visit PassLeader and Download Full Version 1Y0-351 Exam Dumps QUESTION 121 Scenario:
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationNetworking TCP/IP routing and workload balancing
System i Networking TCP/IP routing and workload balancing Version 6 Release 1 System i Networking TCP/IP routing and workload balancing Version 6 Release 1 Note Before using this information and the product
More informationENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM
JOINT SOLUTION BRIEF ENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM DIAMANTI PLATFORM AT A GLANCE Modern load balancers which deploy as
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationDistributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More informationCS November 2018
Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance
More information1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking
Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation
More informationChapter 6: Network Layer. Introduction to Networks v5.1
Chapter 6: Network Layer Introduction to Networks v5.1 6.0 Introduction 6.1 Network Layer Protocols 6.2 Routing 6.3 Routers 6.4 Configure a Cisco Router 6.5 Summary 2013 Cisco and/or its affiliates. All
More informationHow to Manage TCP/IP with NetView for z/os V5R4. Ernie Gilman IBM August 5 th 2010 Session 7618
How to Manage TCP/IP with NetView for z/os V5R4 Ernie Gilman IBM August 5 th 2010 Session 7618 AGENDA Addressing Networking Challenges with IBM NetView for z/os V5.4 z/os Communication Server Network Management
More informationChapter 6: Network Layer
Chapter 6: Network Layer Introduction to Networks v5.1 6.0 Introduction 6.1 Network Layer Protocols 6.2 Routing 6.3 Routers 6.4 Configure a Cisco Router 6.5 Summary 2 Upon completion of this section, you
More informationThe Nature of Sysplex Distributor
The Nature of Sysplex Distributor Sysplex Distributor works by maintaining one or more Distributed Virtual IP Addresses ("Distributed VIPA") within a Sysplex. Such addresses are known internally throughout
More informationLECTURE 8. Mobile IP
1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet
More informationDesign and implementation of an MPLS based load balancing architecture for Web switching
School of Electronic Engineering - DCU Switching and Systems Laboratory Design and implementation of an MPLS based load balancing architecture for Web switching Radu Dragos, Sanda Dragos and Martin Collier
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationFundamentals of Computer Networking AE6382
Computer networks are an integral part of the modern computing infrastructure The local network (LAN) is usually Ethernet LAN s are inter-connected with other LAN s in a hierarchical fashion eventually
More informationConfiguring IP SLAs TCP Connect Operations
This module describes how to configure an IP Service Level Agreements (SLAs) TCP Connect operation to measure the response time taken to perform a TCP Connect operation between a Cisco router and devices
More informationTroubleshooting. Testing Your Configuration CHAPTER
82 CHAPTER This chapter describes how to troubleshoot the ASA and includes the following sections: Testing Your Configuration, page 82-1 Reloading the ASA, page 82-8 Performing Password Recovery, page
More informationCS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013
CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements
More informationNetworking and Internetworking 1
Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote
More information