Advanced Computer Networks Data Center Architecture. Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015
|
|
- Dennis Parsons
- 6 years ago
- Views:
Transcription
1 Advanced Computer Networks Data Center Architecture Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester
2 MORE ABOUT TOPOLOGIES 2
3 Bisection Bandwidth Bisection bandwidth: Sum of the bandwidths of the minimum set of channels which, if removed, partition the network into two equal sets of nodes Bandwidth across narrowest part of the network Bisection bandwidth is important for algorithms in which all processors need to communicate with all others bisection cut not a bisection cut bisection bw= link bw bisection bw = sqrt(n) * link bw 3
4 Trees Diameter and average distance logarithmic k-ary tree, height d = log k N address specified d-vector of radix k coordinates describing path down from root Route up to common ancestor and down R = B xor A let i be position of most significant 1 in R, route up i+1 levels down in direction given by low i+1 bits of B H-tree space is O(N) with O( N) long wires Bisection BW? 4
5 Fat-Trees Fatter links (really more of them) as you go up, so bisection BW scales with N 5
6 Butterflies 16 node butterfly building block Tree with lots of roots! Switch nodes: N/2 x logn (logn levels) R = A xor B, at level i use straight edge if r i =0, otherwise cross edge Exactly one route from any source to any dest - no fault tolerance Diameter logn Bisection N/2 vs tree 1 vs mesh k (d-1) 6
7 k-ary d-cubes vs d-ary k-flies degree d N switches vs N log N switches diminishing BW per node vs constant requires locality vs little benefit to locality Can you route all permutations? 7
8 Benes network and Fat Tree 16-node Benes Network (Unidirectional) 16-node 2-ary Fat-Tree (Bidirectional) Back-to-back butterfly can route all permutations A choice of intermediate positions allowing a conflict-free routing of the permutation What if you just pick a random mid point? Any permutation can be routed with very few conflicts with high probability 8
9 k-ary n-tree (n,k) 9
10 Hypercubes Also called binary n-cubes. # of nodes = N = 2 n. O(logN) hops / diameter Good bisection BW N/2 Complexity Out degree is n = logn 0-D 1-D 2-D 3-D 4-D 5-D! 10
11 Relationship Butterflies to Hypercubes Wiring is isomorphic Except that Butterfly always takes log n steps 3/19/99 11
12 Topology Summary Topology Degree Diameter Ave Dist Bisection (D P=1024 1D Array 2 N-1 N/3 1 huge 1D Ring 2 2 N/2 N/4 2 2D Mesh (N 1/2-1) 2/3 N 1/2 N 1/2 63 (21) 2D Torus 4 N 1/2 1/2 N 1/2 2N 1/2 32 (16) k-ary n-cube 2n nk/2 nk/4 nk/4 15 Hypercube n =log N n n/2 N/2 10 (5) All have some bad permutations many popular permutations are very bad for meshes (transpose) randomness in wiring or routing makes it hard to find a bad one! 12
13 LAYERED DATA CENTER ARCHITECTURE 13
14 Network Design Transition 14
15 Data Center Networks servers per rack Each server connected to 2 access switches with 1 Gbps (10 Gbps becoming common) Access switches connect to 2 aggregation switches Aggregation switches connect to 2 core routers Core routers connect to edge routers Aggregation layer is the transition point between L2- switched access layer and l3-routed core layer Low Latency: In high-frequency trading market, a few microseconds make a big difference. Cut-through switching and low-latency specifications. 15
16 Data Center Networks Core routers manage traffic between aggregation routers and in/out of data center All switches below each pair of aggregation switches form a single layer-2 domain Each Layer 2 domain typically limited to a few hundred servers to limit broadcast Most traffic is internal to the data center. Network is the bottleneck. Uplinks utilization of 80% is common. Most of the flows are small. Mode = 100 MB. DFS uses 100 MB chunks. 16
17 Layered Data Center Architecture Core-aggregation-access layered data center architecture improves Network modularity Flexibility Resilience 17
18 Data Center Network Layers Hierarchical network design 1+1 redundancy Equipment higher in the hierarchy handles more traffic, is more expensive (scale-up design) 18
19 Core Layer Provides the high-speed packet switching backplane for all flows going in and out of the data center Provides connectivity to multiple aggregation modules provides a resilient Layer 3 routed fabric with no single point of failure. Runs an interior routing protocol, such as OSPF or EIGRP Load balances traffic between the campus core and aggregation layers 19
20 Aggregation Layer Meeting point for server IP subnets Default gateway Forwarding server-to-server traffic between multiple pairs of access switches Aggregation layer modules provide important functions: Layer 2 domain definitions Spanning tree processing Service module integration stateful network services Content switching load balancing Firewall SSL offload Intrusion detection Network analysis, and more. 20
21 Aggregation Layer All servers require application delivery services for security (VPN, Intrusion detection, firewall), performance (load balancer), networking (DNS, DHCP, NTP, FTP, RADIUS), Database services (SQL) Application Delivery controllers are located between the aggregation and core routers and are shared by all servers Stateful devices (firewalls) on Aggregation layer 21
22 Access Layer Where the servers physically attach to the network Posses highest number of ports Configured for simplicity to improve management Focusing on the communication between servers that are on the same IP subnet Facilitating exchange of unicast, multicast or broadcast between servers 22
23 Design Factors of Data Center Networks Application bandwidth demand Oversubscription: how much bandwidth switches at each layer can effectively offer to downstream devices Failure domain sizing The number of servers per IP subnet, access switch, or aggregation switches Application resilience Server-redundant Ethernet interfaces should be connected to different access switches The network must be able to react faster to a connection failure when compared to the application server. All the factors should be prioritized 23
24 Access-aggregation Connection Options: Looped Triangle Topology Most widely deployed in data centers Deterministic characteristics and flexibility Access-to-aggregation oversubscription remains constant in the case of Uplink failure Aggregation switch failure STP does not allow all deployed uplinks to be used 24
25 Access-aggregation Connection Options: Looped Square Topology Increases the access layer switch density Each access switch demands only one connection to the aggregation layer Traffic oversubscription to the aggregation layer doubles if An aggregation switch fails Uplink fails 25
26 Access-aggregation Connection Options: Loop-free U Topology No blocked paths because A loop cannot be formed STP is still recommended Like looped square Allows a higher number of access switches per aggregation pair Optimized use of uplinks But Allow one pair of access switches per L2 domain Any switch connection failure will stop all L2 communication 26
27 Access-aggregation Connection Options: Loop-Free Inverted U Shares all advantages from U topologies Allows more than one pair of access switches on a single L2 domain Uplink or aggregation failures are tricky "black-hole" the server traffic: an active server is connected to an isolated network device. 27
28 Switch Locations - TOR Intra-rack cabling between Servers Small switches Smaller cable between servers and switches Network team has to manage switches on all racks 28
29 Switch Locations - EOR Inter-rack cabling between Servers High-density switches All network switches in one rack 29
30 ToR vs EoR ToR: Easier cabling If rack is not fully populated -> unused ToR ports If rack traffic demand is high, difficult to add more ports Upgrading (1G to 10G) requires complete Rack upgrade EoR: Longer cables Severs can be place in any rack Ports can easily added, upgraded 30
31 Network Logical Partition Consolidation is a definitive trend Network partitioning to address Traffic isolation for groups of hosts Distinct security areas Different path behavior Shared failure domains Virtualization 31
32 Defining VLANs A VLAN can be defined as a broadcast domain in a single Ethernet switch or shared among connected switches. Within each VLAN A switch emulates an Ethernet bridge Forward Ethernet frames based on their destination MAC address Each port of a VLAN defines a collision domain 32
33 VLAN trunks Use access ports to connect VLANs Need as many connections as the number of VLANs VLAN trunks Transport multiple VLANs over a single Ethernet interface Each frame has a tag that contains a VLAN identifier 33
34 IEEE 802.1Q VLAN Tagging 34
35 Two IP Subnets Sharing a VLAN Direct IP communication occurs among hosts that belong to each IP subnet Every host receives all broadcast and flooded frames from both subnets 35
36 Two VLANs Sharing a Subnet Layer-2 device Used to bridge both VLANs in a single broadcast domain Traffic analysis Acceleration Content security Load balancing Advantage Traffic manipulation without additional switch deployment or recabling 36
37 Inter-VLAN communication Router Delicate one interface (0/0) connected to a switch trunk port Two sub-interfaces 0/ /0.201 Each sub-interface has an IP configured as the default gateway on the servers Router-on-a-Stick: VLAN-aware router can route IP packets between host located in different VLANs through a single Ethernet connection 37
38 Layer-3 Switches Switch Virtual Interface (SVI) Logical virtual interface Used to route IP packets from its associated VLAN Assign IP address to an SVI Use it as the default gateway for the servers belonging to the VLAN No need for an external router Misconception: Layer-3 VLAN Layer-3 switches: Network equipment that can implement hardware-based L2 switching and L3 forwarding 38
39 Spanning Tree Protocol Recap STP algoryhme poem: I think that I shall never see A graph more lovely than a tree. A tree whose crucial property Is a loop-free connectivity. A tree that must be sure to span So packets can reach every LAN. First, the root must be selected. By ID, it is selected. Least-cost paths from root are traced. In the tree, these paths are placed. A mesh is made by folks like me, Then bridges find a spanning tree. Problem: loops Reason: Always forward a broadcast frame to every Ethernet interface except the one that received it Solution: spanning tree protocol Benefits: loopless topologies & path availability 39
40 Spanning Tree Protocol and VLANs Two solutions A single STP instance for all VLANs (CST) Different STP instances per VLAN (or group of VLANs) Benefits multiple instances Traffic from and to C can be statically load balanced A failure in segment A-C A failure in switch A With ST instances, VLANs can achieve virtualization in the control plan All STP instances share the same software processes 40
41 Private VLAN Three types of interfaces with a VLAN Promiscuous ports Isolated ports Community ports Two types of VLANs Primary VLAN Secondary VLAN Benefits Broadcast subdomains within a VLAN Additional security at Layer 2 Improve partitioning scalability 41
42 VLAN Summary VLANS are Ethernet broadcast domains Connecting VLANs Access ports: interfaces whose transmitted and received frames belong to a single VLAN VLAN trunks: transport multiple VLANs over a single Ethernet interface (VLAN tag) Inter-VLAN communication Router-on-a-Stick design Layer-3 switches Spanning tree protocol and VLANs Private VLAN 42
43 Case study Internet Data Center Layer 3 Internet CR CR AR AR AR AR Layer 2 LB S S LB S S S S Key: CR = L3 Core Router AR = L3 Aggregate Router S = L2 Switch LB = Load Balancer A = Rack of 20 servers with Top of Rack switch 43
44 Internal Fragmentation VIP: the IP to which requests are sent DIP: the IP of the server over which the request is spread Popular load balancing techniques (destination NAT) require all DIPs in a VIP s pool be in the same L2 domain Fragmentation and under-utilization of resources 44
45 No Performance Isolation VLANs used for: security, service isolation, traffic management, etc. One service sending/receiving too much traffic hurts all services sharing its subtree Reconfiguration of VLAN trunks painful, error-prone, slow, often manual 45
46 Limited Server-to-Server Capacity Data center run two kinds of application: Outward facing (serving web pages to users) Internal computation (computing search index like HPC) Comm. between servers in different L2 domains must go through L3 network bandwidth bottleneck 46
47 Data Center Networking Issues Higher layers oversubscribed: Other servers in the same rack 1:1 Uplinks from ToR: 1:2 to 1:20 (e.g., 32x10Gb down, 8X10Gb up -> 4:1) Core Routers: 1:240 Generally keep services in one tree Can't arbitrarily move servers Moving across Subnets is painful Requires reconfiguration of IP addresses and VLAN trunks 47
48 Data Center Networking Issues (Cont.) Service trample on each-other. Overuse by one service affects others Poor reliability. One access switch failure doubles the load on the other. Under-utilization: Even when multiple paths exist only one is used. ECMP (Equal Cost Multipath) is used by routers to spread traffic to next hops using a hash function. However, only 2 paths exist. 48
49 Reference G.A.A. Santana, "Data Center Virtualization Fundamentals," Cisco Press, 2013, ISBN: Albert Greenberg, James Hamilton, David A. Maltz, and Parveen Patel The cost of a cloud: research problems in data center networks. SIGCOMM Comput. Commun. Rev. 39, 1 (December 2008),
50 BACKUP 50
51 Virtual LAN 51
52 DCN Requirements Needs to be Scalable, Secure, Shared, Standardized, and Simplified (5 S's) Converged Infrastructure: Servers, storage, and network have to work together Workload Mobility: Large L2 domains required for VM mobility East-West Traffic: Significant server-to-server traffic as compared to server to user. One Facebook request required 88 cache looks, 35 database lookups, 392 backend RPC calls. Internet traffic 935X the http request/response [Farrington] Storage traffic on Ethernet: Congestion management on Ethernet 52
53 How Many Dimensions? n = 2 or n = 3 Short wires, easy to build Many hops, low bisection bandwidth Requires traffic locality n >= 4 Harder to build, more wires, longer average length Fewer hops, better bisection bandwidth Can handle non-local traffic k-ary d-cubes provide a consistent framework for comparison N = k d scale dimension (d) or nodes per dimension (k) assume cut-through 3/19/99 CS258 S99 53
54 Hierarchical Network Design All servers require application delivery services for security (VPN, Intrusion detection, firewall), performance (load balancer), networking (DNS, DHCP, NTP, FTP, RADIUS), Database services (SQL) Application Delivery controllers are located between the aggregation and core routers and are shared by all servers Stateful devices (firewalls) on Aggregation layer 54
CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley Wide links, smaller routing delay Tremendous variation 3/19/99 CS258 S99 2
Real Machines Interconnection Network Topology Design Trade-offs CS 258, Spring 99 David E. Culler Computer Science Division U.C. Berkeley Wide links, smaller routing delay Tremendous variation 3/19/99
More informationAdvanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013
Advanced Computer Networks 263-3501-00 Exercise Session 7 Qin Yin Spring Semester 2013 1 LAYER 7 SWITCHING 2 Challenge: accessing services Datacenters are designed to be scalable Datacenters are replicated
More informationInterconnection Network
Interconnection Network Recap: Generic Parallel Architecture A generic modern multiprocessor Network Mem Communication assist (CA) $ P Node: processor(s), memory system, plus communication assist Network
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationRecall: The Routing problem: Local decisions. Recall: Multidimensional Meshes and Tori. Properties of Routing Algorithms
CS252 Graduate Computer Architecture Lecture 16 Multiprocessor Networks (con t) March 14 th, 212 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~kubitron/cs252
More informationGUIDE. Optimal Network Designs with Cohesity
Optimal Network Designs with Cohesity TABLE OF CONTENTS Introduction...3 Key Concepts...4 Five Common Configurations...5 3.1 Simple Topology...5 3.2 Standard Topology...6 3.3 Layered Topology...7 3.4 Cisco
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationIntroduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era
Massimiliano Sbaraglia Network Engineer Introduction In the cloud computing era, distributed architecture is used to handle operations of mass data, such as the storage, mining, querying, and searching
More informationData Center Network Topologies
Data Center Network Topologies. Overview 1. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at:
More informationCisco Certified Network Associate ( )
Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that
More informationCCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,
CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment
More informationMigrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches
Migration Guide Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide November 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is
More informationCCNA Routing and Switching (NI )
CCNA Routing and Switching (NI400+401) 150 Hours ` Outline The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that is
More informationTEXTBOOK MAPPING CISCO COMPANION GUIDES
TestOut Routing and Switching Pro - English 6.0.x TEXTBOOK MAPPING CISCO COMPANION GUIDES Modified 2018-08-20 Objective Mapping: Cisco 100-105 ICND1 Objective to LabSim Section # Exam Objective TestOut
More informationCS252 Graduate Computer Architecture Lecture 14. Multiprocessor Networks March 9 th, 2011
CS252 Graduate Computer Architecture Lecture 14 Multiprocessor Networks March 9 th, 2011 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~kubitron/cs252
More informationLecture 26: Interconnects. James C. Hoe Department of ECE Carnegie Mellon University
18 447 Lecture 26: Interconnects James C. Hoe Department of ECE Carnegie Mellon University 18 447 S18 L26 S1, James C. Hoe, CMU/ECE/CALCM, 2018 Housekeeping Your goal today get an overview of parallel
More informationData Center Network Topologies II
Data Center Network Topologies II Hakim Weatherspoon Associate Professor, Dept of Computer cience C 5413: High Performance ystems and Networking April 10, 2017 March 31, 2017 Agenda for semester Project
More informationPLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT
Mestrado em Engenharia Informática e de Computadores PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT 2010-2011 Metodologia de Projecto 4 - Project Methodology 4 1 Hierarchical
More informationLAN design. Chapter 1
LAN design Chapter 1 1 Topics Networks and business needs The 3-level hierarchical network design model Including voice and video over IP in the design Devices at each layer of the hierarchy Cisco switches
More informationJuniper Virtual Chassis Technology: A Short Tutorial
Juniper Virtual Chassis Technology: A Short Tutorial Victor Lama Fabric Specialist LE Northeast Region August 2010 What if? What if your company could drastically minimize the complexity of managing your
More informationCampus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs
Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more
More informationPass-Through Technology
CHAPTER 3 This chapter provides best design practices for deploying blade servers using pass-through technology within the Cisco Data Center Networking Architecture, describes blade server architecture,
More informationExam Topics Cross Reference
Appendix R Exam Topics Cross Reference This appendix lists the exam topics associated with the ICND1 100-105 exam and the CCNA 200-125 exam. Cisco lists the exam topics on its website. Even though changes
More informationComputer Networking. December 2004 CEN CN
Computer Networking CEN CN 1 Layer 2 - Bridge Frame Header Data Bridge Trailer Data Link Layer Physical Layer More complex than repeat, it requires hardware and software Bridges have diminished because
More informationLecture 7: Data Center Networks
Lecture 7: Data Center Networks CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Nick Feamster Lecture 7 Overview Project discussion Data Centers overview Fat Tree paper discussion CSE
More informationTransparent Bridging and VLAN
Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More information- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
More informationInterconnection networks
Interconnection networks When more than one processor needs to access a memory structure, interconnection networks are needed to route data from processors to memories (concurrent access to a shared memory
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationPrepKing. PrepKing
PrepKing Number: 642-961 Passing Score: 800 Time Limit: 120 min File Version: 6.8 http://www.gratisexam.com/ PrepKing 642-961 Exam A QUESTION 1 Which statement best describes the data center core layer?
More informationIntroducing Campus Networks
Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching
More informationInternetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview
Internetwork Expert s CCNP Bootcamp Hierarchical Campus Network Design Overview http:// Hierarchical Campus Network Design Overview Per Cisco, a three layer hierarchical model to design a modular topology
More informationIntroduction to OSPF
Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license
More informationChapter 5. Enterprise Data Center Design
Chapter 5 Enterprise Data Center Design 1 Enterprise Data Center The data center is home to the computational power, storage, and applications necessary to support an enterprise business. Performance Resiliency
More informationTestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified
TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:
More informationNOW Handout Page 1. Outline. Networks: Routing and Design. Routing. Routing Mechanism. Routing Mechanism (cont) Properties of Routing Algorithms
Outline Networks: Routing and Design Routing Switch Design Case Studies CS 5, Spring 99 David E. Culler Computer Science Division U.C. Berkeley 3/3/99 CS5 S99 Routing Recall: routing algorithm determines
More informationECE 669 Parallel Computer Architecture
ECE 669 Parallel Computer Architecture Lecture 21 Routing Outline Routing Switch Design Flow Control Case Studies Routing Routing algorithm determines which of the possible paths are used as routes how
More informationPassTorrent. Pass your actual test with our latest and valid practice torrent at once
PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version
More informationData Center Interconnect Solution Overview
CHAPTER 2 The term DCI (Data Center Interconnect) is relevant in all scenarios where different levels of connectivity are required between two or more data center locations in order to provide flexibility
More informationLecture 16: Data Center Network Architectures
MIT 6.829: Computer Networks Fall 2017 Lecture 16: Data Center Network Architectures Scribe: Alex Lombardi, Danielle Olson, Nicholas Selby 1 Background on Data Centers Computing, storage, and networking
More informationLecture 28: Networks & Interconnect Architectural Issues Professor Randy H. Katz Computer Science 252 Spring 1996
Lecture 28: Networks & Interconnect Architectural Issues Professor Randy H. Katz Computer Science 252 Spring 1996 RHK.S96 1 Review: ABCs of Networks Starting Point: Send bits between 2 computers Queue
More informationNetwork Configuration Example
Network Configuration Example Configuring Private VLANs on a QFX Switch Using Extended Functionality Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000
More informationL19 Data Center Network Architectures
L19 Data Center Network Architectures by T.S.R.K. Prasad EA C451 Internetworking Technologies 27/09/2012 References / Acknowledgements [Feamster-DC] Prof. Nick Feamster, Data Center Networking, CS6250:
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationData Center Networking
Data Center Networking Cloud Computing Data Centers Prof. Andrzej Duda 1 2 What s a Cloud ervice Data Center? Cloud Computing Electrical power and economies of scale determine total data center size: 50,000
More informationQuestion No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.
Volume: 162 Questions Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.) A. easy management B. infrastructure
More informationTaking MPLS to the Edge. Irit Gillath
Taking MPLS to the Edge Irit Gillath Agenda Market status MPLS, VPLS, HVPLS and other nasty words Case study: Silver server Recap Moving Ethernet from the enterprise to the carrier Ethernet was used originally
More informationCloud networking (VITMMA02) DC network topology, Ethernet extensions
Cloud networking (VITMMA02) DC network topology, Ethernet extensions Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering and Informatics Budapest
More informationCisco Nexus 9200 Switch Datasheet
Cisco Nexus 9200 Switch Datasheet CONTENT Content... 1 Overview... 2 Appearance... 2 Key Features and Benefits... 3 NX-OS Software... 4 Nexus 9200 Compare models... 6 Specification of nexus 9200 series
More informationExam Questions
Exam Questions 200-310 DESGN Designing for Cisco Internetwork Solutions https://www.2passeasy.com/dumps/200-310/ 1. What is the recommended spanning tree protocol to use for all Layer 2 deployments in
More informationCERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA
CERTIFICATE CCENT + CCNA ROUTING AND SWITCHING INSTRUCTOR: FRANK D WOUTERS JR. CETSR, CSM, MIT, CA CCENT - Cisco Certified Entry Networking Technician (ICND1) CCNA Routing and Switching (ICND2) Prerequisites:
More informationChapter 16: Switched Ethernet in Automation. Wenbo Qiao
Chapter 16: Switched Ethernet in Automation Wenbo Qiao Ethernet Basics What is Ethernet? Why Ethernet? ( not FieldBus?) Flexibility, Scalability and Performance Key Strength: many protocols running simultaneously
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationSome portions courtesy Srini Seshan or David Wetherall
CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample
More informationConfiguring Private VLANs Using NX-OS
This chapter describes how to configure private VLANs on Cisco NX-OS devices. Private VLANs provide additional protection at the Layer 2 level. This chapter includes the following sections: Finding Feature
More informationInterconnection topologies (cont.) [ ] In meshes and hypercubes, the average distance increases with the dth root of N.
Interconnection topologies (cont.) [ 10.4.4] In meshes and hypercubes, the average distance increases with the dth root of N. In a tree, the average distance grows only logarithmically. A simple tree structure,
More informationIntroduction to Switched Networks Routing And Switching
Introduction to Switched Networks Routing And Switching 1 Converged Networks Growing Complexity of Networks Our digital world is changing Information must be accessed from anywhere in the world Networks
More informationConfiguring Private VLANs
Finding Feature Information, on page 1 Prerequisites for Private VLANs, on page 1 Restrictions for Private VLANs, on page 1 Information About Private VLANs, on page 2 How to Configure Private VLANs, on
More information3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?
Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level
More informationCampus Network Design
Modular Network Design Campus Network Design Modules are analogous to building blocks of different shapes and sizes; when creating a building, each block has different functions Designing one of these
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationCatalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide
INDEX A allowed list, VLAN 2-28 to 2-29 ATM 2-5 firmware upgrade B-5 to B-7 LANE trunk connections 1-4 module 2-9, 2-13, 2-23 networks 2-5 trunk 2-4, 2-14 B bridge groups 3-15 bridge number 2-10 Bridge
More informationConfiguring Private VLANs
CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationTDT Appendix E Interconnection Networks
TDT 4260 Appendix E Interconnection Networks Review Advantages of a snooping coherency protocol? Disadvantages of a snooping coherency protocol? Advantages of a directory coherency protocol? Disadvantages
More informationHUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date
HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
More information"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary
Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part
More informationInterconnection Networks: Topology. Prof. Natalie Enright Jerger
Interconnection Networks: Topology Prof. Natalie Enright Jerger Topology Overview Definition: determines arrangement of channels and nodes in network Analogous to road map Often first step in network design
More informationVMware vsan Network Design-OLD November 03, 2017
VMware vsan Network Design-OLD November 03, 2017 1 Table of Contents 1. Introduction 1.1.Overview 2. Network 2.1.vSAN Network 3. Physical Network Infrastructure 3.1.Data Center Network 3.2.Oversubscription
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationMassimiliano Sbaraglia
Massimiliano Sbaraglia Printer Layer 2 access connections to End-Point Layer 2 connections trunk or layer 3 p2p to pair distribution switch PC CSA PVST+ or MST (Spanning Tree Protocol) VLANs LapTop VoIP
More informationFundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,
Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure
More informationCampus Networking Workshop CIS 399. Core Network Design
Campus Networking Workshop CIS 399 Core Network Design Routing Architectures Where do we route? At the point where we want to limit our layer-2 broadcast domain At your IP subnet boundary We can create
More informationPolitecnico di Torino Network architecture and management. Outline 11/01/2016. Marcello Maggiora, Antonio Lantieri, Marco Ricca
Politecnico di Torino Network architecture and management Marcello Maggiora, Antonio Lantieri, Marco Ricca Outline Politecnico di Torino network: Overview Building blocks: Edge, Core, Distribution, Access
More informationIT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview
IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate
More informationTo contain/reduce broadcast traffic, we need to reduce the size of the network (i.e., LAN).
2.3.3 Routers 2.3.3.1 Motivation Bridges do not stop broadcast traffic. This can lead to broadcast storms (e.g., more than 100 nonunicast frames/sec) which can be catastrophic. This can bring the network
More informationData Centers. Tom Anderson
Data Centers Tom Anderson Transport Clarification RPC messages can be arbitrary size Ex: ok to send a tree or a hash table Can require more than one packet sent/received We assume messages can be dropped,
More informationCampus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1
Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 Design Objective Business Requirement Why do you want to build a network? Too often people build networks based on technological,
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More informationVXLAN Design with Cisco Nexus 9300 Platform Switches
Guide VXLAN Design with Cisco Nexus 9300 Platform Switches Guide October 2014 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 39 Contents What
More informationSYSTEMS ADMINISTRATION USING CISCO (315)
Page 1 of 11 Contestant Number: Time: Rank: SYSTEMS ADMINISTRATION USING CISCO (315) REGIONAL 2016 Multiple Choice: Multiple Choice (50 @ 10 points each) TOTAL POINTS (500 points) (500 points) Failure
More informationLecture 3: Topology - II
ECE 8823 A / CS 8803 - ICN Interconnection Networks Spring 2017 http://tusharkrishna.ece.gatech.edu/teaching/icn_s17/ Lecture 3: Topology - II Tushar Krishna Assistant Professor School of Electrical and
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)
More informationLecture 2: Topology - I
ECE 8823 A / CS 8803 - ICN Interconnection Networks Spring 2017 http://tusharkrishna.ece.gatech.edu/teaching/icn_s17/ Lecture 2: Topology - I Tushar Krishna Assistant Professor School of Electrical and
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationChapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1
Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationDesigning Cisco Data Center Unified Computing
Designing Cisco Data Center Unified Computing Number: 642-998 Passing Score: 800 Time Limit: 120 min File Version: 1.1 http://www.gratisexam.com/ Sections 1. Drag and Drop 2. Questions 3. Hot Spot CISCO
More informationSwitched Ethernet Virtual LANs
Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware
More informationHomework Assignment #1: Topology Kelly Shaw
EE482 Advanced Computer Organization Spring 2001 Professor W. J. Dally Homework Assignment #1: Topology Kelly Shaw As we have not discussed routing or flow control yet, throughout this problem set assume
More informationCS 498 Hot Topics in High Performance Computing. Networks and Fault Tolerance. 9. Routing and Flow Control
CS 498 Hot Topics in High Performance Computing Networks and Fault Tolerance 9. Routing and Flow Control Intro What did we learn in the last lecture Topology metrics Including minimum diameter of directed
More informationVLANs Level 3 Unit 9 Computer Networks
VLANs Some Requirements of LANs Need to split up broadcast domains to make good use of bandwidth People in different departments may need to be grouped together for access to servers Security: restrict
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer
More informationMore on LANS. LAN Wiring, Interface
More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network
More informationEN2910A: Advanced Computer Architecture Topic 06: Supercomputers & Data Centers Prof. Sherief Reda School of Engineering Brown University
EN2910A: Advanced Computer Architecture Topic 06: Supercomputers & Data Centers Prof. Sherief Reda School of Engineering Brown University Material from: The Datacenter as a Computer: An Introduction to
More informationUtilizing Datacenter Networks: Centralized or Distributed Solutions?
Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such
More informationData Center Network Infrastructure
Data Center Network Infrastructure Data Center Definition A data center is a facility used for housing a large amount of electronic equipment, typically computers and communications equipment. is usually
More informationCloud Networking (VITMMA02) Server Virtualization Data Center Gear
Cloud Networking (VITMMA02) Server Virtualization Data Center Gear Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering and Informatics Budapest
More information