Learn about Deploying IBM Flex System into a Cisco Network. This IBM Redpaper publication provides information on how to integrate IBM Flex System into an existing customer network. It focuses on interoperability and seamless integration from the network perspective. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
This document provides a summary of Linux advanced routing and traffic control techniques. It covers topics like routing with iproute2, policy routing, GRE and other tunneling methods, IPv6 tunneling, IPsec, multicast routing, traffic shaping with different queueing disciplines, load balancing across interfaces, packet marking with Netfilter, advanced packet filtering, kernel network parameters, and other advanced queueing disciplines. The goal is to provide hands-on guidance for configuring and managing routing, traffic control, and related Linux networking functions.
A virtual local area network (VLAN) is defined in a switch that sets the boundary of a
broadcast domain for hosts to communicate with each other. A VLAN has the same attributes
as a physical local area network (LAN) and it can be extended between different switches
within or across different sites.
Today, VLANs are created in the switch to mimic the Ethernet segmentation services that are
traditionally provided by the routers in LAN configurations. Figure 1-1 gives a conceptual view
of a VLAN.
This document is the user's manual for Matpower 5.0, an open-source power system modeling and optimization package. It describes how to install and run Matpower simulations, model power system components, perform power flow and optimal power flow analyses, and extend Matpower's capabilities through callbacks. The manual also outlines various Matpower functions for input/output, modifying case data, and other utilities.
This document is a guide to the differences between AIX 5L Version 5.3 and previous versions. It covers new features in virtualization, including the POWER Hypervisor, micro-partitioning, virtual Ethernet and SCSI devices. It also discusses enhancements to application development in AIX 5L Version 5.3, such as improved POSIX real-time functions, block device mapping, and scalability improvements. The document is intended as a reference for experts migrating to the new version.
This document provides information about security features in IBM z/VSE, including the Basic Security Manager (BSM). It discusses how BSM uses System Authorization Facility to control access to resources through security files. It also covers LDAP sign-on support, which allows users to sign on with their LDAP credentials instead of a z/VSE user ID. The document provides guidance on installing, customizing, administering and backing up BSM, as well as configuring and activating LDAP sign-on support on z/VSE.
This document describes version 0.3.0 of the CircuiTikZ package. It provides components for drawing electrical and electronic circuits in LaTeX. The package uses TikZ to draw the circuits and supports both European and American circuit styles. It describes the components available, how to use them, customization options, and examples.
This document is the user manual for sqlmap, an open source tool for detecting and exploiting SQL injection vulnerabilities. It details sqlmap's requirements, typical usage scenario, and supported features for fingerprinting databases, enumerating data, reading/writing files, executing commands, and establishing connections. The tool can detect SQL injections, fingerprint database systems, retrieve user information, dump database tables, run custom SQL statements, access the file system and operating system, and more.
This document provides a summary of Linux advanced routing and traffic control techniques. It covers topics like routing with iproute2, policy routing, GRE and other tunneling methods, IPv6 tunneling, IPsec, multicast routing, traffic shaping with different queueing disciplines, load balancing across interfaces, packet marking with Netfilter, advanced packet filtering, kernel network parameters, and other advanced queueing disciplines. The goal is to provide hands-on guidance for configuring and managing routing, traffic control, and related Linux networking functions.
A virtual local area network (VLAN) is defined in a switch that sets the boundary of a
broadcast domain for hosts to communicate with each other. A VLAN has the same attributes
as a physical local area network (LAN) and it can be extended between different switches
within or across different sites.
Today, VLANs are created in the switch to mimic the Ethernet segmentation services that are
traditionally provided by the routers in LAN configurations. Figure 1-1 gives a conceptual view
of a VLAN.
This document is the user's manual for Matpower 5.0, an open-source power system modeling and optimization package. It describes how to install and run Matpower simulations, model power system components, perform power flow and optimal power flow analyses, and extend Matpower's capabilities through callbacks. The manual also outlines various Matpower functions for input/output, modifying case data, and other utilities.
This document is a guide to the differences between AIX 5L Version 5.3 and previous versions. It covers new features in virtualization, including the POWER Hypervisor, micro-partitioning, virtual Ethernet and SCSI devices. It also discusses enhancements to application development in AIX 5L Version 5.3, such as improved POSIX real-time functions, block device mapping, and scalability improvements. The document is intended as a reference for experts migrating to the new version.
This document provides information about security features in IBM z/VSE, including the Basic Security Manager (BSM). It discusses how BSM uses System Authorization Facility to control access to resources through security files. It also covers LDAP sign-on support, which allows users to sign on with their LDAP credentials instead of a z/VSE user ID. The document provides guidance on installing, customizing, administering and backing up BSM, as well as configuring and activating LDAP sign-on support on z/VSE.
This document describes version 0.3.0 of the CircuiTikZ package. It provides components for drawing electrical and electronic circuits in LaTeX. The package uses TikZ to draw the circuits and supports both European and American circuit styles. It describes the components available, how to use them, customization options, and examples.
This document is the user manual for sqlmap, an open source tool for detecting and exploiting SQL injection vulnerabilities. It details sqlmap's requirements, typical usage scenario, and supported features for fingerprinting databases, enumerating data, reading/writing files, executing commands, and establishing connections. The tool can detect SQL injections, fingerprint database systems, retrieve user information, dump database tables, run custom SQL statements, access the file system and operating system, and more.
The document describes version 0.6 of the CircuiTikZ package. CircuiTikZ is a TikZ package for drawing electronic circuits. It was created by Massimo Redaelli in 2007 and is now maintained by Redaelli along with Stefan Lindner and Stefan Erhardt. The package provides commands for drawing common circuit elements like resistors, diodes, transistors, and allows for customization of styles.
This document provides an overview and reference for machine learning algorithms. It includes sections on data preprocessing, regression, classification, clustering, association rule learning, and reinforcement learning. For each algorithm, it provides intuition, examples of implementation in Python and R, and references for further reading. The document serves as a question and answer guide for machine learning practitioners.
This document contains a problem archive related to modeling and analyzing dynamic systems. It is divided into multiple sections covering topics such as first order and second order systems, mechanical systems, electrical systems, fluid systems, thermal systems, circuits, operational amplifiers, differential equations, and frequency response. Each section contains numerous problems related to modeling and solving systems within that topic area.
MatConvNet is a MATLAB toolbox that implements convolutional neural networks (CNNs) for computer vision tasks. It aims to provide a simple and flexible environment for researchers to prototype and test new CNN architectures. Key features include exposing CNN building blocks as MATLAB functions, optimized CPU and GPU implementations for efficient training of large models on large datasets, and the ability to easily develop new blocks within MATLAB. Pre-trained versions of popular CNN models are also provided.
FATKID - A Finite Automata Toolkit - NF HuysamenNico Huysamen
This document is a thesis presented by Nicolaas Frederick Huysamen to the University of Stellenbosch for the degree of Master of Science in November 2012. The thesis presents FATKID, a Finite Automata Toolkit that was designed to efficiently generate, manipulate, and process large numbers of finite automata by distributing the workflow across multiple machines and running computations in parallel. The toolkit is shown to be user-friendly, extensible, and able to effectively distribute work to reduce computation time compared to other existing toolkits.
Getting Started with KVM for IBM z SystemsMark Ecker
This document provides an introduction to using KVM for virtualization on IBM z Systems mainframes. It discusses the advantages of KVM on z Systems, the hardware and software components involved, and how to plan, install, configure, manage and monitor a KVM environment on an IBM mainframe. It also describes how to build a cloud infrastructure using KVM and IBM Cloud Manager with OpenStack.
This document provides lecture notes on applied cryptography and data security. It covers topics such as symmetric and asymmetric cryptosystems, cryptanalysis techniques, stream and block ciphers like DES and AES, public key cryptography including RSA, and the discrete logarithm problem. The notes are intended for education on the fundamentals of cryptography and cybersecurity.
Challenges in VoIP Systems - Mostafa Ahmed Mostafa El Beheiry - First Draft F...Mostafa El-Beheiry
This document is a bachelor's thesis submitted by Mostafa Ahmed Mostafa El Beheiry to the German University in Cairo that examines challenges in VoIP (Voice over IP) systems. The thesis identifies four main categories of challenges - security, quality, dependency, and emergency services. It discusses specific issues within each category such as packet sniffing, bandwidth, power outages, and inability to call emergency services. It also includes a simulation of a SPIT (Spam over IP telephony) attack on a VoIP client/server setup. The thesis aims to comprehensively document challenges in VoIP systems and propose possible solutions to advance the field.
This document provides lecture notes for a C++ course. It notes that the document is a work in progress and needs polishing. It describes the tools used for the course, including GNU/Linux, GNU C++ compiler, emacs text editor, and UNIX commands. It also provides information on copyright and allows for free redistribution of the document without modification. The document then outlines the various chapters that will be covered in the course, including memory and CPU concepts, shell and C++ basics, expressions and functions, arrays and pointers, debugging, algorithms and sorting.
This document provides an overview of parallel programming concepts and MPI (Message Passing Interface). It discusses parallelization techniques like blocking communication, collective communication routines, point-to-point communication, and derived data types. It also covers how to parallelize programs by distributing work across processes, such as with block decomposition of arrays and parallelizing I/O and loops. Advanced topics include parallelizing finite difference methods, LU factorization, and molecular dynamics simulations. The document is intended to help programmers write practical MPI programs for parallel systems like IBM RS/6000 SP.
This document provides an overview and instructions for installing, configuring, securing and using Hudson, an open source continuous integration server. It covers downloading and installing Hudson on various operating systems like Ubuntu, Red Hat and OpenSUSE. It also describes configuring global settings, plugins, projects and jobs in Hudson as well as securing Hudson through authentication and authorization. The document is intended as a manual for getting started with and managing Hudson.
Modelling Time in Computation (Dynamic Systems)M Reza Rahmati
This document presents a dissertation on functional reactive programming (FRP) for real-time reactive systems. The dissertation introduces RT-FRP, a language for programming real-time reactive systems that can guarantee resource bounds while allowing a restricted form of recursion. It presents two variants of RT-FRP called H-FRP and E-FRP for modeling hybrid and event-driven systems respectively. A compiler is presented for compiling E-FRP to an imperative language for implementation. The dissertation contributes new programming languages and techniques for programming reactive and embedded systems with guarantees on resource usage.
This document is the user manual for XORP version 1.8-CT. It describes how to configure and operate a router running the XORP software. The manual contains information on XORP command structure and modes, how to configure network interfaces, firewall rules, routing protocols and other aspects of the XORP router. It is covered by an open source license and the community is encouraged to provide feedback and contributions to improve the manual.
This document provides an overview of the Python programming language across multiple sections. It covers fundamental Python concepts like data types, lists, strings, tuples, dictionaries, control flow, functions, modules and packages. It also discusses object-oriented programming concepts in Python including classes, inheritance and exceptions. Further sections explore using Python in integrated development environments like Emacs and debugging tools. Regular expressions and system commands in Python are also summarized. The document serves as a comprehensive reference to the Python language.
This thesis explores accelerating isosurface rendering of volume data using GPU ray casting with an octree. It analyzes octree traversal types suitable for GPU implementation and develops a hybrid traversal combining stackless octree traversal with direct grid ray marching. The method was integrated into the WisS anthropology data viewer. The implementation achieves up to 3.5x speedup over the original ray marching, improving interactivity on large datasets. Challenges for GPU octree traversal are discussed along with directions for future work.
This document provides guidance on configuring SSL security between WebSphere MQ components including queue managers and clients on different platforms. It discusses creating key repositories, obtaining certificates, and configuring channels for SSL authentication. Specific sections cover setting up SSL between Windows queue managers, WebSphere MQ clients on Windows, and cross-platform configurations between z/OS, AIX, and Windows systems. The document also addresses connecting WebSphere Message Broker to WebSphere MQ using SSL.
This document provides an introduction to using R for data mining. It discusses importing and exploring data, various data mining techniques including decision trees, regression, clustering, outlier detection, time series analysis, association rule mining and text mining. Case studies and online resources for further learning are also referenced. The document is intended as a guide to applying data mining methods in R and includes examples using common R packages.
This document provides guidelines for hardening the security of Citrix XenServer virtualization platforms. It outlines configuration settings for general system security like restricting root access, enabling encryption, and updating packages. It also includes recommendations for network, hypervisor, and virtual machine settings such as separating interfaces by task, restricting unencrypted connections, disabling promiscuous mode, and more. Implementing the settings in this guide helps reduce the attack surface and prevent unauthorized access to XenServer systems and VMs.
This document presents an abstract for a dissertation on open problems related to topological vector spaces and their applications to inverse problems in bioengineering. Specifically, it addresses Ricceri's Conjecture which proposes the existence of a non-complete normed space satisfying an anti-proximinal property. The dissertation approaches Ricceri's Conjecture positively by proving properties related to barreledness and quasi-absolute convexity. It also studies the intrinsic structure of totally anti-proximinal convex sets and provides characterizations of Hilbert spaces. Applications to the design of transcranial magnetic stimulation coils are also discussed.
Perl <b>5 Tutorial</b>, First Editiontutorialsruby
This document is a 241-page tutorial on the Perl 5 programming language. It was written by Chan Bernard Ki Hong and published in 2003. The document covers topics such as what Perl is, getting started with Perl, manipulating data structures, operators, conditionals, loops, and subroutines. It includes over 20 chapters to guide readers through learning Perl programming.
Ibm flex system and pure flex system network implementation with cisco systemsEdgar Jara
This document provides an overview and technical details about implementing a network connecting IBM PureFlex and Flex System servers to Cisco switches. It covers networking concepts from layers 1 through 3, including cabling, switches, routing protocols, and redundancy protocols. Specific IBM and Cisco networking components are discussed, such as Ethernet adapters, switches, and routing protocols like OSPF. The goal is to help users understand and troubleshoot networks combining IBM and Cisco systems.
The document provides tutorials and documentation on advanced stateful features in TRex, an open source traffic generation and emulation tool. It describes how TRex can generate stateful traffic at scale, emulate layers 3-7 protocols, and provide capabilities like GTP tunneling. The tutorials cover topics like configuring stateful profiles, running simulations, automation with Python, and clustering multiple TRex clients to generate high volumes of stateful traffic.
The document describes version 0.6 of the CircuiTikZ package. CircuiTikZ is a TikZ package for drawing electronic circuits. It was created by Massimo Redaelli in 2007 and is now maintained by Redaelli along with Stefan Lindner and Stefan Erhardt. The package provides commands for drawing common circuit elements like resistors, diodes, transistors, and allows for customization of styles.
This document provides an overview and reference for machine learning algorithms. It includes sections on data preprocessing, regression, classification, clustering, association rule learning, and reinforcement learning. For each algorithm, it provides intuition, examples of implementation in Python and R, and references for further reading. The document serves as a question and answer guide for machine learning practitioners.
This document contains a problem archive related to modeling and analyzing dynamic systems. It is divided into multiple sections covering topics such as first order and second order systems, mechanical systems, electrical systems, fluid systems, thermal systems, circuits, operational amplifiers, differential equations, and frequency response. Each section contains numerous problems related to modeling and solving systems within that topic area.
MatConvNet is a MATLAB toolbox that implements convolutional neural networks (CNNs) for computer vision tasks. It aims to provide a simple and flexible environment for researchers to prototype and test new CNN architectures. Key features include exposing CNN building blocks as MATLAB functions, optimized CPU and GPU implementations for efficient training of large models on large datasets, and the ability to easily develop new blocks within MATLAB. Pre-trained versions of popular CNN models are also provided.
FATKID - A Finite Automata Toolkit - NF HuysamenNico Huysamen
This document is a thesis presented by Nicolaas Frederick Huysamen to the University of Stellenbosch for the degree of Master of Science in November 2012. The thesis presents FATKID, a Finite Automata Toolkit that was designed to efficiently generate, manipulate, and process large numbers of finite automata by distributing the workflow across multiple machines and running computations in parallel. The toolkit is shown to be user-friendly, extensible, and able to effectively distribute work to reduce computation time compared to other existing toolkits.
Getting Started with KVM for IBM z SystemsMark Ecker
This document provides an introduction to using KVM for virtualization on IBM z Systems mainframes. It discusses the advantages of KVM on z Systems, the hardware and software components involved, and how to plan, install, configure, manage and monitor a KVM environment on an IBM mainframe. It also describes how to build a cloud infrastructure using KVM and IBM Cloud Manager with OpenStack.
This document provides lecture notes on applied cryptography and data security. It covers topics such as symmetric and asymmetric cryptosystems, cryptanalysis techniques, stream and block ciphers like DES and AES, public key cryptography including RSA, and the discrete logarithm problem. The notes are intended for education on the fundamentals of cryptography and cybersecurity.
Challenges in VoIP Systems - Mostafa Ahmed Mostafa El Beheiry - First Draft F...Mostafa El-Beheiry
This document is a bachelor's thesis submitted by Mostafa Ahmed Mostafa El Beheiry to the German University in Cairo that examines challenges in VoIP (Voice over IP) systems. The thesis identifies four main categories of challenges - security, quality, dependency, and emergency services. It discusses specific issues within each category such as packet sniffing, bandwidth, power outages, and inability to call emergency services. It also includes a simulation of a SPIT (Spam over IP telephony) attack on a VoIP client/server setup. The thesis aims to comprehensively document challenges in VoIP systems and propose possible solutions to advance the field.
This document provides lecture notes for a C++ course. It notes that the document is a work in progress and needs polishing. It describes the tools used for the course, including GNU/Linux, GNU C++ compiler, emacs text editor, and UNIX commands. It also provides information on copyright and allows for free redistribution of the document without modification. The document then outlines the various chapters that will be covered in the course, including memory and CPU concepts, shell and C++ basics, expressions and functions, arrays and pointers, debugging, algorithms and sorting.
This document provides an overview of parallel programming concepts and MPI (Message Passing Interface). It discusses parallelization techniques like blocking communication, collective communication routines, point-to-point communication, and derived data types. It also covers how to parallelize programs by distributing work across processes, such as with block decomposition of arrays and parallelizing I/O and loops. Advanced topics include parallelizing finite difference methods, LU factorization, and molecular dynamics simulations. The document is intended to help programmers write practical MPI programs for parallel systems like IBM RS/6000 SP.
This document provides an overview and instructions for installing, configuring, securing and using Hudson, an open source continuous integration server. It covers downloading and installing Hudson on various operating systems like Ubuntu, Red Hat and OpenSUSE. It also describes configuring global settings, plugins, projects and jobs in Hudson as well as securing Hudson through authentication and authorization. The document is intended as a manual for getting started with and managing Hudson.
Modelling Time in Computation (Dynamic Systems)M Reza Rahmati
This document presents a dissertation on functional reactive programming (FRP) for real-time reactive systems. The dissertation introduces RT-FRP, a language for programming real-time reactive systems that can guarantee resource bounds while allowing a restricted form of recursion. It presents two variants of RT-FRP called H-FRP and E-FRP for modeling hybrid and event-driven systems respectively. A compiler is presented for compiling E-FRP to an imperative language for implementation. The dissertation contributes new programming languages and techniques for programming reactive and embedded systems with guarantees on resource usage.
This document is the user manual for XORP version 1.8-CT. It describes how to configure and operate a router running the XORP software. The manual contains information on XORP command structure and modes, how to configure network interfaces, firewall rules, routing protocols and other aspects of the XORP router. It is covered by an open source license and the community is encouraged to provide feedback and contributions to improve the manual.
This document provides an overview of the Python programming language across multiple sections. It covers fundamental Python concepts like data types, lists, strings, tuples, dictionaries, control flow, functions, modules and packages. It also discusses object-oriented programming concepts in Python including classes, inheritance and exceptions. Further sections explore using Python in integrated development environments like Emacs and debugging tools. Regular expressions and system commands in Python are also summarized. The document serves as a comprehensive reference to the Python language.
This thesis explores accelerating isosurface rendering of volume data using GPU ray casting with an octree. It analyzes octree traversal types suitable for GPU implementation and develops a hybrid traversal combining stackless octree traversal with direct grid ray marching. The method was integrated into the WisS anthropology data viewer. The implementation achieves up to 3.5x speedup over the original ray marching, improving interactivity on large datasets. Challenges for GPU octree traversal are discussed along with directions for future work.
This document provides guidance on configuring SSL security between WebSphere MQ components including queue managers and clients on different platforms. It discusses creating key repositories, obtaining certificates, and configuring channels for SSL authentication. Specific sections cover setting up SSL between Windows queue managers, WebSphere MQ clients on Windows, and cross-platform configurations between z/OS, AIX, and Windows systems. The document also addresses connecting WebSphere Message Broker to WebSphere MQ using SSL.
This document provides an introduction to using R for data mining. It discusses importing and exploring data, various data mining techniques including decision trees, regression, clustering, outlier detection, time series analysis, association rule mining and text mining. Case studies and online resources for further learning are also referenced. The document is intended as a guide to applying data mining methods in R and includes examples using common R packages.
This document provides guidelines for hardening the security of Citrix XenServer virtualization platforms. It outlines configuration settings for general system security like restricting root access, enabling encryption, and updating packages. It also includes recommendations for network, hypervisor, and virtual machine settings such as separating interfaces by task, restricting unencrypted connections, disabling promiscuous mode, and more. Implementing the settings in this guide helps reduce the attack surface and prevent unauthorized access to XenServer systems and VMs.
This document presents an abstract for a dissertation on open problems related to topological vector spaces and their applications to inverse problems in bioengineering. Specifically, it addresses Ricceri's Conjecture which proposes the existence of a non-complete normed space satisfying an anti-proximinal property. The dissertation approaches Ricceri's Conjecture positively by proving properties related to barreledness and quasi-absolute convexity. It also studies the intrinsic structure of totally anti-proximinal convex sets and provides characterizations of Hilbert spaces. Applications to the design of transcranial magnetic stimulation coils are also discussed.
Perl <b>5 Tutorial</b>, First Editiontutorialsruby
This document is a 241-page tutorial on the Perl 5 programming language. It was written by Chan Bernard Ki Hong and published in 2003. The document covers topics such as what Perl is, getting started with Perl, manipulating data structures, operators, conditionals, loops, and subroutines. It includes over 20 chapters to guide readers through learning Perl programming.
Ibm flex system and pure flex system network implementation with cisco systemsEdgar Jara
This document provides an overview and technical details about implementing a network connecting IBM PureFlex and Flex System servers to Cisco switches. It covers networking concepts from layers 1 through 3, including cabling, switches, routing protocols, and redundancy protocols. Specific IBM and Cisco networking components are discussed, such as Ethernet adapters, switches, and routing protocols like OSPF. The goal is to help users understand and troubleshoot networks combining IBM and Cisco systems.
The document provides tutorials and documentation on advanced stateful features in TRex, an open source traffic generation and emulation tool. It describes how TRex can generate stateful traffic at scale, emulate layers 3-7 protocols, and provide capabilities like GTP tunneling. The tutorials cover topics like configuring stateful profiles, running simulations, automation with Python, and clustering multiple TRex clients to generate high volumes of stateful traffic.
This document provides an overview and summary of the ns Manual, which documents the Network Simulator ns. It describes ns as being written in C++ and using OTcl as a command and configuration interface. The manual contains documentation on topics like the simulator basics, nodes and packet forwarding, links, queue management, delays, and the differentiated services module. It is intended to help users understand and utilize the various components and capabilities of the ns network simulator.
This document provides guidance on operational scenarios for managing a Parallel Sysplex environment. It covers topics such as Parallel Sysplex commands, IPLing systems into a sysplex, shutting down systems in a sysplex, and handling common problems that can occur. The document is intended as a handbook for sysplex operations teams and includes best practices for sysplex management.
Quagga is a routing software package for TCP/IP networks that supports protocols like RIP, OSPF, and BGP. The document provides instructions on configuring, building, and installing Quagga on supported platforms like Linux. It also gives overviews of Quagga's components like Zebra (the routing daemon) and the command-line tools for interacting with routing protocols.
This document is a user's guide for WIEN2k, an augmented plane wave plus local orbitals program for calculating crystal properties. It describes WIEN2k, a computational software package that uses density functional theory to calculate the electronic structure of crystals and molecules. The guide provides an overview of the basic concepts behind the program, including the augmented plane wave method and density functional theory. It also gives instructions for getting started with the program, running calculations, and calculating various material properties.
This document provides an overview and summary of the book "Modern Fortran in Practice".
The book shows how modern features in Fortran 2008 such as object orientation, array operations, user-defined types, and parallel computing can be applied to write concise, modular, and efficient Fortran code. It provides practical examples of interfacing Fortran with C, memory management, graphics/GUIs, and parallel programming. It also analyzes numerical algorithms and illustrates open source library usage. The full code examples are available online.
This document provides an overview and introduction to using Biopython, an open source Python library for biological sequence analysis. It covers topics such as installing Biopython, working with sequence objects, parsing sequence files, connecting to biological databases, multiple sequence alignments, and BLAST searches. The goal is to explain the key capabilities and functionalities available in Biopython through examples and tutorials.
This document specifies the devicetree format. It defines the structure and conventions for representing hardware resources and connections in a device tree. This includes node names, properties, memory map representation, interrupt mapping, and the flattened device tree binary format. The goal is to provide a standardized representation of platform hardware across embedded and mobile systems.
This document provides instructions for setting up and using Wireless M-Bus devices with the Wireless M-Bus Suite software. It describes the hardware and firmware setup, including supported radio modules, required resources, and how to install firmware. It also provides a quick start guide for using the Wireless M-Bus Suite to test devices, including how to set the COM port, load a demo project, use the collector and meter modes, and perform tests like pinging. Additional chapters cover the Wireless M-Bus protocol monitor for analyzing network packets and a demonstration application.
This document provides an overview and specifications for OpenFlow Switch Version 1.5.0, including:
- Descriptions of OpenFlow ports, tables, matching, and processing pipeline
- Details of the OpenFlow channel and control messages for modifying flow tables, groups and meters
- Formats and structures for common OpenFlow objects like ports, matches, actions
This document provides an overview and specifications for OpenFlow Switch Version 1.5.0, including:
- Descriptions of OpenFlow ports, tables, matching, and processing pipeline
- Details of the OpenFlow channel and control messages for modifying flow tables, groups and meters
- Formats and structures for common OpenFlow objects like ports, matches, actions
This document provides an overview and specifications for OpenFlow Switch Version 1.5.0, including:
- Descriptions of OpenFlow ports, tables, matching, and processing pipeline
- Details of the OpenFlow channel and control messages for modifying flow tables, groups and meters
- Formats and structures for common OpenFlow objects like ports, matches, actions
The paperback version is available on lulu.com there http://goo.gl/fraa8o
This is the first volume of the postgresql database administration book. The book covers the steps for installing, configuring and administering a PostgreSQL 9.3 on Linux debian. The book covers the logical and physical aspect of PostgreSQL. Two chapters are dedicated to the backup/restore topic.
This document provides an overview of Linux performance and tuning guidelines. It discusses Linux processes, memory, file systems, I/O subsystems, networking, and performance monitoring tools. The document is intended to help readers understand how Linux works and how to optimize system performance.
The IBM Flex System platform provides a unique set of features that enable the integration of leading-edge technologies and transformation approaches into the data centers. These IBM Flex System features ensure that the availability, performance, scalability, security, and manageability goals of the data center networking design are met as efficiently as possible. For more information on Pure Systems, visit http://ibm.co/18vDnp6.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
This document outlines an internal Barco training on embedded Linux for engineering. It covers topics like cross-compilation toolchains, the Linux boot process, bootloaders, and the Linux kernel, including building a kernel, device trees, device drivers, and a real-life Barco example. Hands-on sections provide examples for exploring U-Boot, replacing a bootloader, building a kernel, and more.
Despite its striking ability to avoid congestive losses in the absence of competition, TCP Vegas encounters
a potentially serious fairness problem when competing with TCP Reno, at least for the case when queue
capacity exceeds or is close to the transit capacity (19.7 TCP and Bottleneck Link Utilization). TCP Vegas
will try to minimize its queue use, while TCP Reno happily fills the queue. And whoever has more packets
in the queue has a proportionally greater share of bandwidth.
To make this precise, suppose we have two TCP connections sharing a bottleneck router R, the first using
TCP Vegas and the second using TCP Reno. Suppose further that both connections have a path transit
capacity of 10 packets, and R’s queue capacity is 40 packets. If 𝛼=3 and 𝛽=5, TCP Vegas might keep an
average of four packets in the queue. Unfortunately, TCP Reno then gobbles up most of the rest of the
queue space, as follows. There are 40-4 = 36 spaces left in the queue after TCP Vegas takes its quota, and
10 in the TCP Reno connection’s path, for a total of 46. This represents the TCP Reno connection’s network
ceiling, and is the point at which TCP Reno halves cwnd; therefore cwnd will vary from 23 to 46 with an
average of about 34. Of these 34 packets, if 10 are in transit then 24 are in R’s queue. If on average R has 24
packets from the Reno connection and 4 from the Vegas connection, then the bandwidth available to these
connections will also be in this same 6:1 proportion. The TCP Vegas connection will get 1/7 the bandwidth,
because it occupies 1/7 the queue, and the TCP Reno connection will take the other 6/7.
To put it another way, TCP Vegas is potentially too “civil” to compete with TCP Reno.
Even worse, Reno’s aggressive queue filling will eventually force the TCP Vegas cwnd to decrease; see
Exercise 4.0 below.
This Vegas-Reno fairness problem is most significant when the queue size is an appreciable fraction of the
path transit capacity. During periods when the queue is empty, TCPs Vegas and Reno increase cwnd at the
same rate, so when the queue size is small compared to the path capacity, TCP Vegas and TCP Reno are
much closer to being fair.
In 31.5 TCP Reno versus TCP Vegas we compare TCP Vegas with TCP Reno in simulation. With a transit
capacity of 220 packets and a queue capacity of 10 packets, TCPs Vegas and Reno receive almost exactly
the same bandwidth.
TCP Reno’s advantage here assumes a router with a single FIFO queue. That advantage can disappear
if a different queuing discipline is in effect. For example, if the bottleneck router used fair queuing (to
be introduced in 23.5 Fair Queuing) on a per-connection basis, then the TCP Reno connection’s queue
greediness would not be of any benefit, and both connections would get similar shares of bandwidth with
the TCP Vegas connection experiencing lower delay. See 23.6.1 Fair Queuing and Bufferbloat.
Let us next consider how TCP Vegas behaves when there is an increase in RTT due to the kind of cross
traff
This document provides an overview of the book "Static Timing Analysis for Nanometer Designs" by J. Bhasker and Rakesh Chadha. The book covers static timing analysis (STA) concepts and methodologies for digital integrated circuit designs in modern nanometer technologies. It describes CMOS logic design principles, standard cell library modeling, interconnect parasitics representation, and delay calculation techniques used in STA. The goal of the book is to provide a practical guide to performing STA for nanometer designs.
This document is the Akka Java documentation for release 2.3.9 from Typesafe Inc. It provides an introduction to Akka, which is a toolkit for building scalable, resilient applications using the actor model. Akka aims to make writing concurrent, fault-tolerant and scalable applications easier by providing higher-level abstractions and tools based on the actor model. The documentation covers concepts like actors, actor systems, fault tolerance, and provides examples of using Akka for common patterns like scheduling periodic messages.
Similar to Deploying IBM Flex System into a Cisco Network (20)
This IBM Redpaper provides a brief overview of OpenStack and a basic familiarity of its usage with the IBM XIV Storage System Gen3. The illustration scenario that is presented uses the OpenStack Folsom release implementation IaaS with Ubuntu Linux servers and the IBM Storage Driver for OpenStack. For more information on IBM Storage Systems, visit http://ibm.co/LIg7gk.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
Learn how all flash needs end to end Storage efficiency. For more information on IBM FlashSystem, visit http://ibm.co/10KodHl.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
Learn about vSphere Storage API for Array Integration on the IBM Storwize family. IBM Storwize V7000 Unified combines the block storage capabilities of Storwize V7000 with file storage capabilities into a single system for greater ease of management and efficiency. For more information on IBM Storage Systems, visit http://ibm.co/LIg7gk.
Visit http://bit.ly/KWh5Dx to 'Follow' the official Twitter handle of IBM India Smarter Computing.
Learn about IBM FlashSystem 840 and its complete product specification in this Redbook. FlashSystem 840 provides scalable performance for the most demanding enterprise class applications. IBM FlashSystem 840 accelerates response times with IBM MicroLatency to enable faster decision making. For more information on IBM FlashSystem, visit http://ibm.co/10KodHl.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Learn about the IBM System x3250 M5,.The x3250 M5 offers the following energy-efficiency features to save energy, reduce operational costs, increase energy availability, and contribute to a green environment, energy-efficient planar components help lower operational costs. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210746104/IBM-System-x3250-M5
This Redbook talks about the product specification of IBM NeXtScale nx360 M4. The NeXtScale nx360 M4 server provides a dense, flexible solution with a low total cost of ownership (TCO). The half-wide, dual-socket NeXtScale nx360 M4 server is designed for data centers that require high performance but are constrained by floor space. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210745680/IBM-NeXtScale-nx360-M4
The IBM System x3650 M4 HD is a (1) 2-socket 2U rack-optimized server that supports up to 32 internal drives and features an innovative design for optimal performance, uptime, and dense storage. It offers (2) excellent reliability, availability, and serviceability for improved business environments. The server is (3) designed for easy deployment, integration, service, and management.
Here are the product specification for IBM System x3300 M4. This product can be managed remotely.The x3300 M4 server contains IBM IMM2, which provides advanced service-processor control, monitoring, and an alerting function. The IMM2 lights LEDs to help you diagnose the problem, records the error in the event log, and alerts you to the problem. For more information on System x, visit http://ibm.co/Q7m3iQ.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Learn about IBM System x iDataPlex dx360 M4. IBM System x iDataPlex is an innovative data center solution that maximizes performance and optimizes energy and space efficiency. The iDataPlex solution provides customers with outstanding energy and cooling efficiency, multi-rack level manageability, complete flexibility in configuration, and minimal deployment effort. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210744055/IBM-System-x-iDataPlex-dx360-M4
The IBM System x3500 M4 server provides powerful and scalable performance for business applications in an energy efficient tower or rack design. It features the latest Intel Xeon E5-2600 v2 or E5-2600 processors with up to 24 cores, 768GB RAM, 32 hard drives, and 8 PCIe slots. Comprehensive systems management tools and redundant components help ensure high availability, while its small footprint and 80 Plus Platinum power supplies reduce data center costs.
Learn about system specification for IBM System x3550 M4. The x3550 M4 offers numerous features to boost performance, improve scalability, and reduce costs. Improves productivity by offering superior system performance with up to 12-core processors, up to 30 MB of L3 cache, and up to two 8 GT/s QPI interconnect links. For more information on System x, visit http://ibm.co/Q7m3iQ.
Learn about IBM System x3650 M4. The x3650 M4 is an outstanding 2U two-socket business-critical server, offering improved performance and pay-as-you grow flexibility along with new features that improve server management capability. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210741926/IBM-System-x3650-M4
Learn about the product specification of IBM System x3500 M3. System x3500 M3 has an energy-efficient design which works in conjunction with the IMM to govern fan rotation based on the readings that it delivers. This saves money under normal conditions because the fans do not have to spin at high speed. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210741626/IBM-System-x3500-M3
Learn about IBM System x3400 M3. The x3400 M3 offers numerous features to boost performance and reduce costs, x3400 M3 has the ability to grow with your application requirements with these features. Powerful systems management features simplify local and remote management of the x3400 M3. For more information on System x, visit http://ibm.co/Q7m3iQ.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Learn about IBM System 3250 M3 which is a single-socket server that offers new levels of performance and flexibility
to help you respond quickly to changing business demands. Cost-effective and compact, it is well suited to small to mid-sized businesses, as well as large enterprises. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210740347/IBM-System-x3250-M3
Learn about IBM System x3200 M3 and its specifications. The System x3200 M3 features easy installation and management with a rich set of options for hard disk drives and memory. The efficient design helps to save energy and provide a better work environment with less heat and noise. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210739508/IBM-System-x3200-M3
Learn about the configuration of IBM PowerVC. IBM PowerVC is built on OpenStack that controls large pools of server, storage, and networking resources throughout a data center. IBM Power Virtualization Center provides security services that support a secure environment. Installation requires just 20 minutes to get a virtual machine up and running. For more information on Power Systems, visit http://ibm.co/Lx6hfc.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
Learn about Ibm POWER7 Virtualization Performance. PowerVM Lx86 is a cross-platform virtualization solution that enables the running of a wide range of x86 Linux applications on Power Systems platforms within a Linux on Power partition without modifications or recompilation of the workloads. For more information on Power Systems, visit http://ibm.co/Lx6hfc.
http://www.scribd.com/doc/210734237/A-Comparison-of-PowerVM-and-Vmware-Virtualization-Performance
This reference architecture document describes deploying the VMware vCloud Enterprise Suite on the IBM PureFlex System hardware platform. Key points:
- The vCloud Suite software provides components for managing and delivering cloud services, while the IBM PureFlex System provides an integrated hardware platform in a single chassis.
- The reference architecture focuses on installing the vCloud Suite management components as virtual machines on an ESXi host to manage consumer resources.
- The IBM PureFlex System provides servers, networking, and storage in a single chassis that can then be easily scaled out. This standardized deployment accelerates provisioning of cloud infrastructure.
- Deployment considerations cover systems management using IBM Flex System Manager, server, networking, storage configurations
Learn how x6: The sixth generation of EXA Technology is fast, agile and Resilient for Emerging Workloads from Alex Yost. Vice President, IBM PureSystems and System x
IBM Systems and Technology Group. x6 drives cloud and big data for enterprises by achieving insight faster thereby outperforming competitors. For more information on System x, visit http://ibm.co/Q7m3iQ.
http://www.scribd.com/doc/210715795/X6-The-sixth-generation-of-EXA-Technology
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Deploying IBM Flex System into a Cisco Network
1. ibm.com/redbooks Redpaper
Front cover
Deploying IBM Flex System
into a Cisco Network
Christoph Raisch
Bernd Albrecht
Peter Demharter
Stephan Fleck
Joachim Gross
Ruediger Rissmann
Werner Sponer
Arwed Tschoeke
Pietro Volante
Learn how to integrate IBM Flex
System into your network
See real life Layer 2 configurations
with Flex System switches
Find out how easy it is to
connect network devices
10. viii Deploying IBM Flex System into a Cisco Network
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation in the United States, other countries, or both. These and other IBM trademarked terms are
marked on their first occurrence in this information with the appropriate symbol (® or ™), indicating US
registered or common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A current list of IBM
trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
IBM Flex System™
IBM®
PureApplication™
PureFlex™
PureSystems™
RackSwitch™
Redbooks®
Redpaper™
Redbooks (logo) ®
System x®
zEnterprise®
The following terms are trademarks of other companies:
Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Other company, product, or service names may be trademarks or service marks of others.
14. xii Deploying IBM Flex System into a Cisco Network
Peter Demharter is an IBM certified Senior Architect IT Infrastructure and Cisco Certified
Internetwork Expert in Germany. He has over 20 years of experience in the data center and
networking area and has worked for large companies, such as Daimler-Benz and Vodafone.
He holds a degree in Administration and Information Science from the University of
Constance. He has worked for IBM GTS for 10 years and has served as lead Architect in IBM
projects such as ABB worldwide WAN migration from Equant to AT&T, and Deutschland
Online Infrastructure, one of the first corporate IPv4/IPv6 dual stack wide area networks in
Germany. He works for the IBM Research and Development Global Design Center in
Boeblingen and focuses on IPv6, DC Networking, and Cloud Computing.
Stephan Fleck is a System Network Architect for IBM Systems & Technology Group, Europe.
He has 19 years experience in the IT industry. His areas of expertise include network
architecture assessments and network designs for data centers, and implementation
proposals for network virtualization and network convergence solutions. Stephan also
conducts training sessions for technical and sales personnel and he speaks regularly at
technical conferences. He has worked as Network Security Lead Architect for the IBM Global
Account and as support specialist for the European Network Support Back Office. Stephan is
a Cisco Certified Internetwork Expert and holds a degree in electrical engineering from the
Technical University Darmstadt, Germany.
Joachim Gross is an IT Architect and expert for network infrastructure in Germany. He has
20 years of experience in the networking area field as a Cisco Certified Internetwork Expert
since 1995. He holds a degree in Information Technology from the FH in Esslingen, Germany.
Working for IBM GTS for over 10 years, he has participated in worldwide networking and
Voice over IP projects. His areas of expertise include data center networking and Voice over
IP.
Ruediger Rissmann holds a Diploma Degree in Physics from the University of Heidelberg,
Germany, and joined the IBM Zurich Research Laboratory in 1999. In his position as a
network specialist, he has been involved in several pilot projects that explore new and
emerging network technologies and has filed a number of patents. He leads the worldwide
IPv6 deployment within the IBM Research Division. In March 2011, Ruediger became a
research staff member and senior architect in the Services Innovation Lab. He holds the
following certifications: IBM Certified IT Architect, Open Group Master Certified IT Architect,
CCNP, CISSP, and GCFA.
Werner Sponer is a Senior IT Architect and expert for network infrastructure and security. He
is responsible for network infrastructure and System Networking products in the System and
Technology Group of IBM. He spent most of his 20-plus years at IBM growing the Global
Services business through technical advancements. His assignments ranged from
infrastructure to consulting and audit services, including projects and managed services. He
brings over 18 years of IT experience in networking, data center, network architecture, local
and wide area network, operation and support of IT infrastructure, in different customer
industries and technologies. He evolves his leadership skills and customer orientation in
different project scenarios in several countries, from consulting and planning, architecture,
and design to operation and support. He is an engineer for electronic and biomedical
technologies and IBM and Open Group Certified IT Architect.
Arwed Tschoeke is a Client Technical Architect in Hamburg, Germany. His focus areas are
zEnterprise, virtualization solutions across IBM platforms, and Linux. He holds a degree in
Physics from the University of Kaiserslautern, Germany.
15. Preface xiii
Pietro Volante is a Certified IT Specialist for Networking Services. He has 20 years of
experience in designing and implementing networks in many large client situations. He is
certified as a Cisco Network and Design Professional (CCNP/CCDP) and has experience in
designing data center networks and network performance analysis. In 2010, he worked on an
assignment at STG to provide technical network support for the new BladeCenter network
switches across north east Europe. He is responsible for projects in data center network
integration and end-to-end network application performance analysis at key accounts.
Thanks to the following people for their contributions to this project:
Erich Amrehn
Bernhard Dierberger
Oliver Raff
Thomas Schwaller
David Watts
Portions of this paper were based on the IBM Redbooks® publication, Implementation of IBM
j-type Ethernet Switches and Routers, SG24-7882. Thanks to the authors of that paper.
Now you can become a published author, too!
Here’s an opportunity to spotlight your skills, grow your career, and become a published
author—all at the same time! Join an ITSO residency project and help write a book in your
area of expertise, while honing your experience using leading-edge technologies. Your efforts
will help to increase product acceptance and customer satisfaction, as you expand your
network of technical contacts and relationships. Residencies run from two to six weeks in
length, and you can participate either in person or as a remote resident working from your
home base.
Find out more about the residency program, browse the residency index, and apply online at
this website:
http://www.ibm.com/redbooks/residencies.html
16. xiv Deploying IBM Flex System into a Cisco Network
Comments welcome
Your comments are important to us!
We want our papers to be as helpful as possible. Send us your comments about this paper or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
http://www.ibm.com/redbooks
Send your comments in an email to:
redbooks@us.ibm.com
Mail your comments to:
IBM Corporation, International Technical Support Organization
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Stay connected to IBM Redbooks
Find us on Facebook:
http://www.facebook.com/IBMRedbooks
Follow us on Twitter:
http://twitter.com/ibmredbooks
Look for us on LinkedIn:
http://www.linkedin.com/groups?home=&gid=2130806
Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks
weekly newsletter:
https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm
Stay current on recent Redbooks publications with RSS Feeds:
http://www.redbooks.ibm.com/rss.html
18. 2 Deploying IBM Flex System into a Cisco Network
1.1 Networking
Many customers are currently migrating their networking infrastructure from 1 Gb Ethernet to
10 Gb Ethernet. This transformation exceeds the simple change of technology and
requirements increased significantly. The complexity of modern application infrastructures
requires networks of low latency at high bandwidth. Additionally, growing security awareness
affects the design of a network and increases the complexity (for example, router, firewalls,
filters). Because of virtualization and the adoption of cloud concepts, the physical network
infrastructure merges with a logical and virtual networking environment that is represented by
software components that are running on server systems.
As a result, there is no average network or general blueprint. Each network is unique because
it depends on the customer’s demands. Often, customers choose individual components from
vendors that meet their requirements. From this decision, the following challenges arise:
The administration of such mixed infrastructures is rather complex and often requires
more management concepts.
Testing and maintaining interoperability is elaborate and time-consuming.
To overcome these challenges, customers’ adopt a single-vendor strategy. This strategy
offers a simplification in the daily routine but can restrict the adoption of new solutions if they
are not supported by the infrastructure vendor.
To support their customers, the industry defines standards. Based on those standards,
interoperability between vendors can be achieved. This interoperability offers the opportunity
to adapt the latest technology and limit the risk to the administration.
However, new standards are adopted by vendors at different times and not all choose to
follow standards rigorously. Instead, they might provide their own extensions. One example of
this issue is the integration of virtualized environments into the networking infrastructure. The
networking branch of IBM is investing with other vendors a significant amount of energy to
define global standards that support the mobility of virtual systems and infrastructures, such
as vswitches. This effort delivers the availability of functions that allow a guest relocation
between different systems that are independent of the hypervisor or the networking
components within the physical infrastructure.
1.2 IBM PureSystems
The PureSystems platform is a new approach to deliver scalable hybrid systems for the
adoption of modern cloud concepts. Its design delivers value to the customer by fulfilling the
following requirements:
Simplification to ease the implementation of complex solutions and operation
Built in expertise to ease deployment and capacity planning
Integration within the existing architectures and infrastructure
These advantages are achieved by a new hardware and system management concept. To
reflect this concept, the systems are labeled Expert Integrated Systems. The following
PureSystems offerings are available:
PureFlex™ System: An infrastructure system that monitors capacity and performance to
optimize the infrastructure (Infrastructure-as-a-Service within the cloud terminology).
19. Chapter 1. Introduction 3
PureApplication System: A platform system that is based on a flexible infrastructure that
provides the means of deploying and maintaining an application infrastructure that is
based on patterns (Platform-as-a-Service within the cloud terminology).
PureData System: Based on the PureApplication concept, this solution is focused on
delivering data services by providing a fully managed, flexible, and highly available
database platform that meets all demands.
The foundation of these Expert Integrated Systems is the PureSystems hardware, which
consists out-of-server hardware (Power and x86), storage, and network, such as storage area
network (SAN) and local area network (LAN). The design principle inherits the BladeCenter
philosophy of IBM to open standards, manageability, serviceability, and an existing roadmap
for investment protection.
To provide full flexibility, many active infrastructure components are available. The LAN
components are derived from the networking technology of IBM, which ensures that an
in-depth integration into virtual environments is possible. Because of the broad support of
networking standards, this ability applies to physical networks as well.
For more information about IBM PureSystems, see Overview of IBM PureSystems,
TIPS0892, which is available at this website:
http://www.redbooks.ibm.com/abstracts/tips0892.html
1.3 Switch configuration
IBM System Networking switches can be configured through multiple configuration interfaces.
For this paper, the iSCLI method was chosen. Its syntax should be familiar to network
administrators with experience in switches from other vendors.
Important: This Redpaper uses the show running-config configuration dumps to
demonstrate how the switches were configured. These dumps include all of the command
sequences that are required to configure the switch manually.
For more information, see the Configuration Dump section of the Configuration Commands
chapter in ISCLI–Industry Standard CLI Command Reference for the IBM Flex System
Fabric EN4093 10Gb Scalable Switch, which is available at this website:
http://publib.boulder.ibm.com/infocenter/flexsys/information/index.jsp?topic=%2
Fcom.ibm.acc.networkdevices.doc%2FIo_module_compass.html
20. 4 Deploying IBM Flex System into a Cisco Network
1.4 How to use this paper
We recommend that you read Chapter 2, “Layer 2 Network protocols and technologies” on
page 5 first to clarify the use of technical terms. Then, based on the networking hardware you
have, select the following appropriate chapter to read next:
Chapter 3, “IBM RackSwitch G8264 connectivity” on page 15
Chapter 4, “Cisco Nexus 5000 connectivity” on page 95
Chapter 5, “Cisco Catalyst 6500 switch connectivity” on page 171
Within each of these chapters, you can review subsections that relate to the choice of
Spanning Tree Protocol that you use.
Finally, Appendix A, “Troubleshooting” on page 177, describes different aspects of problem
analysis and identifies information that is required for efficient troubleshooting.
22. 6 Deploying IBM Flex System into a Cisco Network
2.1 Basic frame forwarding concepts
Each frame contains a source and a destination MAC address. A network bridge or switch,
also called Layer 2 device, is responsible to transport the Ethernet frame that is based on the
destination MAC address.
Figure 2-1 shows the simplified principle of frame forwarding.
Figure 2-1 Simplified principle of frame forwarding
The forwarding of an incoming frame (on port 1 in this case) is divided into the following
phases:
Learning
Ethernet Frame arrives on port1. Switch learns source MAC Address (SA) and stores this
fact it in its MAC Address Table.
Lookup
Based on the destination MAC address (DA), the switch looks up the correct routing in its
MAC address table and selects the outgoing port (port 6).
Forwarding
The switch forwards the Ethernet frame to the destination MAC address via port 6.
If the switch does not know the destination address, it forwards the packet on all ports except
the port from which it was received.
During this forwarding process, the frame header persists unmodified.
Switch (Layer-2)
1 2 3 4 5 6
MAC Address Table
MAC Address Port
ABAB.1122.4455 1
ABAB.1122.4466 2
...
ABCC.4231.3303 5
ABCC.2331.4213 6
DA
SA
Data
CRC
SA: ABAB.1122.4455
DA: ABCC.2331.4213
SA: ABAB.1122.4455
DA: ABCC.2331.4213
1. Learning:
Frame arrives on port1.
Switch learns source
MAC Address (SA) and
stores it in its MAC
Address Table.
2. Lookup:
Based on the destination
MAC address (DA), the
switch selects the
outgoing port.
2
3. Forwarding:
Switch forwards the
incoming frame to the
destination.
3
1
1
23. Chapter 2. Layer 2 Network protocols and technologies 7
2.2 Virtual local area network
A virtual local area network (VLAN) is a networking concept in which a network is logically
divided into smaller virtual LANs. The Layer 2 traffic in one VLAN is logically isolated from
other VLANs, as shown in Figure 2-2.
Figure 2-2 Isolation at Layer 2
The simplest way to keep the isolated VLANs separately on an inter-switch link is to use one
physical link for each VLAN, as shown in Figure 2-3.
However, this method does not scale well because it uses many ports in networks with
multiple VLANs and multiple switches. Also, this method does not use link capacity efficiently
when traffic in the LANs is not uniform.
Figure 2-3 Inter-switch link: one link for each VLAN
The second method is VLAN tagging over a single link in which each frame in tagged with its
VLAN ID (see Figure 2-4 on page 8). This method is highly scalable because only a single
link is required to provide connectivity to many VLANs. This configuration provides for better
utilization of the link capacity when VLAN traffic is not uniform.
The protocol for VLAN tagging of frames in a LAN environment is defined by the IEEE 802.1
P/Q standard.
VLAN20
VLAN20
VLAN30
VLAN10
VLAN10
VLAN30
Inter Switch Link
using VLAN Tagging
VLAN30
VLAN20
VLAN10
24. 8 Deploying IBM Flex System into a Cisco Network
Figure 2-4 Inter-switch link that uses VLAN tagging
2.3 Spanning tree
Because of the history of LANs and Ethernet, there are some shortcomings in the protocol. In
particular, Ethernet was not designed to use frame forwarding. Therefore, the frame format
does not include a hop count field, or time-to-live (TTL), which would allow for a looping
packet to be detected and discarded. Packets that are sent in a loop between multiple
switches are forwarded without reaching their destination, which can cause significant load.
The simplest approach to prevent looping packets is to create a network topology in which
frames with a certain target can take only one path on each individual switch element. For
Ethernet, the tree topology was chosen, which is the simplest topology that guarantees this
requirement. Bridges and switches were enhanced to support a topology configuration
protocol called Spanning Tree Protocol (STP).
STP provides Layer 2 loop prevention by deactivating redundant routes between network
elements. This configuration has been further enhanced and is now used in the following
forms:
STP
Rapid STP (RSTP)
Multiple STP (MSTP)
Per VLAN STP or Per VLAN Rapid STP (PVRST)
STP was the initial implementation of Spanning-Tree Protocol, which was invented 1985 and
published 1990 in the IEEE as 802.1D.
Rapid Spanning Tree (RSTP) became standard in IEEE in 2001 as 802.1w. It provides faster
convergence times than STP.
Multiple Spanning Tree (MSTP) was first defined in IEEE as 802.1s and later merged into
802.1Q-2005 as an extension to RSTP. It uses more than one Spanning Tree process to
distribute the VLANs into different STP topologies.
Cisco provides a proprietary version of VLAN-based STP. For each VLAN, it uses a separate
Spanning Tree. Even if it is not an IEEE standard, many network vendors allow compatible
setup to interoperate with Cisco’s STP.
VLAN20
VLAN20
VLAN20
VLAN20
Tagged Link
25. Chapter 2. Layer 2 Network protocols and technologies 9
2.3.1 Spanning Tree Protocol: IEEE 802.1D
STP uses Bridge Protocol Data Unit (BPDU) packets to exchange information with other
switches. BPDUs send out hello packets at regular intervals to exchange information across
bridges and detect loops in a network topology.
The following types of BPDUs are available:
Configuration BPDU
These BPDUs contain configuration information about the transmitting switch and its
ports, including switch and port MAC addresses, switch priority, port priority, and port cost.
Topology Change Notification (TCN) BPDU
When a bridge must signal a topology change, it starts to send TCNs on its root port. The
designated bridge receives the TCN, acknowledges it, and generates another TCN for its
own root port. The process continues until the TCN reaches the root bridge.
Topology Change Notification Acknowledgement (TCA) BPDU
These frames are sent by the root bridge to acknowledge the receipt of a TCN BPDU.
STP uses the information that is provided by the BPDUs to elect a root bridge, identify root
ports for each switch, identify designated ports for each physical LAN segment, and prune
specific redundant links to create a loop-free tree topology. All leaf devices calculate the best
path to the root device and place their ports in blocking or forwarding states that are based on
the best path to the root. The resulting tree topology provides a single active Layer 2 data
path between any two end stations.
Figure 2-5 shows a switch topology with five interconnected switches. To avoid
Layer 2-looped frames, Spanning Tree blocks all ports that include an indirect, redundant path
to the root bridge. As shown in Figure 2-5, the resulting logical switch topology is based on
the STP calculation.
Figure 2-5 Switch topology with five interconnected switches
Root Bridge
Desg.Port Desg.Port
Root.Port
Blkd.Port
Root Bridge
Desg.Port Desg.Port
Desg.Port
Desg.Port
Root.Port
Blkd.Port
Root.Port Root.Port Root.Port
Root.Port Root.Port
Desg.Port
Desg.Port
Root.Port
Desg.Port
X
X
All redundant ports to root bridges blocked Resulting loop free topology
26. 10 Deploying IBM Flex System into a Cisco Network
The root bridge election is an important point in a network design. To avoid suboptimal
Layer 2 paths, it is always necessary to manually adjust the bridge priority on each switch in a
Layer 2 network.
2.3.2 Rapid Spanning Tree Protocol: IEEE 802.1w
Rapid Spanning Tree Protocol (RSTP) provides better reconvergence time than the original
STP. RSTP identifies certain links as point-to-point. When a point-to-point link fails, the
alternative link can make the transition to the forwarding state.
An RSTP domain includes the following components:
Root port: The “best path” to the root device.
Designated port: Indicates that the switch is the designated bridge for the other switch that
connects to this port.
Alternative port: Provides an alternative root port.
Backup port: Provides a designated alternative port. This configuration is used if there is
more than one link that is connected to the same switch without link aggregation.
RSTP uses the following port states by using the show spanning tree command:
Discarding: Like the blocking-state in STP, this port does not forward traffic to avoid loops.
Learning: The port builds its MAC address table but does not forward traffic.
Forwarding: The port forwards traffic.
The RSTP reconvergence time often is less than 1 second. The standard STP (802.1d)
requires 30 seconds or more.
RSTP was originally defined in the IEEE 802.1w draft specification and later incorporated into
the IEEE 802.1D-2004 specification.
2.3.3 Multi-instance Spanning Tree Protocol: IEEE 802.1s
Although RSTP provides faster convergence time than STP, it does not solve a problem
inherent in STP. All VLANs within a LAN must share the same spanning tree while many links
in the network could be unused. To solve this problem, the existing STP concepts are no
longer applied to physical ports. The concepts are applied to the connectivity of multiple
individual groups of VLANs, called spanning tree regions, instead.
In a Multi-instance Spanning Tree Protocol (MSTP) region, a group of bridges can be
modeled as a single bridge. An MSTP region contains multiple spanning tree instances
(MSTIs). MSTIs provide different paths for different VLANs. This functionality facilitates better
load sharing across redundant links.
An MSTP region can support up to 64 MSTIs, and each instance can support 1 - 4094
VLANs.
MSTP was originally defined in the IEEE 802.1s draft specification and later incorporated into
the IEEE 802.1Q-2003 specification.
27. Chapter 2. Layer 2 Network protocols and technologies 11
2.3.4 Per VLAN Rapid Spanning Tree
Per VLAN Rapid Spanning Tree (PVRST) is a nonstandard spanning tree extension that is
based on RSTP that was introduced by Cisco Systems. In PVRST mode, each VLAN is
assigned to its own spanning-tree group. A maximum of 127 spanning tree groups are
allowed in IBM System Networking switches.
PVRST use 802.1Q tagged frames to differentiate STP BPDUs for each VLAN. The IIBM
System Networking implementation of PVRST is fully compatible with Cisco RSTP/PVRST+
protocol.
2.4 Link aggregation
A link aggregation group (LAG) combines physical links to operate as a single, larger logical
link. The member links no longer function as independent physical connections, but as
members of the larger logical link, as shown in Figure 2-6.
Figure 2-6 Link aggregation
Link aggregation provides greater bandwidth between the devices at each end of the
aggregated link. Another advantage of link aggregation is increased availability because the
aggregated link is composed of multiple member links. If one member link fails, the
aggregated link continues to carry traffic over the remaining member links.
Each of the devices that are interconnected by the aggregated link uses a hashing algorithm
to determine on which of the member links frames will be transmitted. The hashing algorithm
might use varying information in the frame to decide. This algorithm might include a source
MAC, destination MAC, source IP, destination IP, and more. It might also include a
combination of these values.
Link aggregation can be defined as static or by using a dynamic negotiation protocol, such as
Link Aggregation Control Protocol (LACP). Aggregated links often are referred to as
Ether-Channels or Trunk-Links.
Aggregated links appear to the STP as single logical links. Therefore, STP does not enable or
disable individual physical links of an aggregated link.
Aggregate
Links
28. 12 Deploying IBM Flex System into a Cisco Network
2.4.1 Link Aggregation Control Protocol
LACP (also known as 802.3ad and, more recently, 802.1AX-2008) is a vendor-independent
standard for dynamically building aggregated links between switches. On an LACP-defined
link, the switches are sending LACP Data Units (LACPDU) to share information about the
current state of the aggregated link. Compared to static LAG, LACP provides better failure
detection and, therefore, a higher redundancy.
2.4.2 Virtual Link Aggregation Groups
Virtual Link Aggregation Groups (VLAGs) is an extension to link aggregation to allow more
redundancy. For a standard LAG (static or dynamic), all ports that build an aggregated link
must be on the same switch. VLAG allows two switches to pair as a single virtual entity to
build an aggregated link that is distributed to both switches. From the perspective of the target
device, the ports that are connected to the VLAG peers appear to be a single trunk that is
connected to a single logical device.
The VLAG-capable switches synchronize their logical view of the access layer port structure
and internally prevent implicit loops. The VLAG topology also responds more quickly to link
failure and does not result in unnecessary MAC flooding.
As shown in Figure 2-7, VLAG helps to avoid blocked ports by STP and allows higher
performance and full redundancy.
Figure 2-7 Comparing STP with blocked ports versus VLAG loop-free topology
vLAG domain
CORE
SWITCH 1
CORE
SWITCH 2
ACCESS
SWITCH
vLAG peer link
vLAG
LACP
LACP LACP
Spanning Tree domain
CORE
SWITCH 1
CORE
SWITCH 2
ACCESS
SWITCH
LACP
LACP LACP
LACP
LACP
Blocked Port
Using STP: blocked ports Using VLAG: loop-free – no blocked port
Important: The protocol for VLAG peer links is not standardized, so the switches in a pair
of switches must belong to the same product family.
29. Chapter 2. Layer 2 Network protocols and technologies 13
2.4.3 Cisco Virtual Port Channel
On the Nexus platform, Cisco implemented the VLAG concept as a version of a Multichassis
EtherChannel (MEC), called the Virtual Port Channel (vPC), as shown in Figure 2-8. The
vPC combines the advantages of hardware redundancy and the loop management of an
aggregated link. The pair of switches that is building the vPC appear to any
Portchannel-attached device as a single switch from Layer 2 perspective, while they are still
operating as two independent devices with independent switch control and management.
If a vPC is used, the STP is not needed to manage the loops. Therefore, it could be disabled
on these links and all disadvantages of the STP could be eliminated. The biggest advantage
of this configuration is the usability of all bandwidth of the installed links and the fast handling
of link failures within the vPC.
Figure 2-8 Schematic drawing of vPC
The pair of switches that is building the vPC is seen as a single switch from the device that is
connected to the Port channel. This device can be a server, a switch, or any other network
device.
2.4.4 Link Layer Discovery Protocol: 802.1AB
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link-layer protocol that is used
by network devices to enable standardized discovery of network nodes.
LLDP performs functions similar to several proprietary protocols, such as the Cisco Discovery
Protocol (CDP).
vPC domain
CORE
SWITCH 1
CORE
SWITCH 2
ACCESS
SWITCH
vPC peer link
vPC
LACP
Spanning Tree domain
CORE
SWITCH 1
CORE
SWITCH 2
ACCESS
SWITCH
LACP
LACP LACP
LACP
LACP
Blocked Port
Using STP: blocked ports Using vPC: no blocked port
vPC peer link
32. 16 Deploying IBM Flex System into a Cisco Network
3.1 Prerequisites
We started by physically connecting a triangle with two IBM RackSwitch™ G8264 switches
and one IBM Flex System™ EN2092 1 Gb switch. We configured four VLANs and set up Per
VLAN Rapid Spanning Tree (PVSTP). To test connectivity, we used a test PC.
We used the following switches and one PC to test connectivity:
Two IBM RackSwitch G8264 switches
One IBM Flex System EN2092 1 Gb Ethernet Scalable Switch
One test PC
The links between the switches always are 10 Gigabit Ethernet.
3.2 Use Case 1: PVRST
In Use Case 1, we have a pair of IBM RackSwitch G8264 switches connected to Flex System
EN2092 1-Gb Ethernet Scalable Switch with PVRST.
In this use case, we used three 10 GE links to connect the switches. We also configured
802.1q trunks and PVRST. For load balancing, odd VLANs 10 and 30 and even VLANs 20
and 40 are used, as shown in Figure 3-1 (odd VLANs) and Figure 3-2 on page 17 (even
VLANs)
Figure 3-1 Use Case 1: PVRST: Odd-numbered VLANs
Use Case 1: PVRSTP : G6284 to EN2092 1 Gb Ethernet Scalable
Switch, STP State for odd VLANs 10, 30
Port 17
Vlan 10,30
Port State: FWD
Port Role: DESG
hostname:G8264_1
G8264
hostname:G8264_2
G8264
hostname:Flex
EN2092 1 Gb Ethernet Switch
Pure Flex System
STP Root
Vlan 10,30
Port 63
Vlan 10,30
Port State: FWD
Port Role: DESG
Port 63
Vlan 20,40
Port State: FWD
Port Role: DESG
Port 17
Vlan 10,30
Port State: FWD
Port Role: ROOT
Ext22
Vlan 10,30
Port State: FWD
Port Role: ROOT
Ext21
Vlan 10,30
Port State: DISC
Port Role: ALTN
Test-PC
Ext4
33. Chapter 3. IBM RackSwitch G8264 connectivity 17
Figure 3-2 Use Case 1: PVRST: Even-numbered VLANs
Use Case 1: PVRSTP : G6284 to EN2092 1 Gb Ethernet Scalable
Switch, STP State for even VLANs 20, 40
Port 17
Vlan 20,40
Port State: FWD
Port Role: ROOT
hostname:G8264_1
G8264
hostname:G8264_2
G8264
hostname:Flex
EN2092 1 Gb Ethernet Switch
Pure Flex System
Port 63
Vlan 20,40
Port State: FWD
Port Role: DESG
Port 63
Vlan 20,40
Port State: FWD
Port Role: DESG
Port 17
Vlan 20,40
Port State: FWD
Port Role: DESG
Ext22
Vlan 20,40
Port State: DISC
Port Role: ALTN
Ext21
Vlan 20,40
Port State: FWD
Port Role: ROOT
Test-PC
Ext4
STP Root
Vlan 20,40
34. 18 Deploying IBM Flex System into a Cisco Network
3.2.1 Verifying the topology by using lldp
To verify the topology, we used the lldp remote-device command on the three switches, as
shown in Example 3-1. Important parameters and details are highlighted in red.
Example 3-1 Checking the topology use show lldp remote-device
Flex#sh lldp remote-device
LLDP Remote Devices Information
LocalPort | Index | Remote Chassis ID | Remote Port | Remote System Name
----------|-------|---------------------------|----------------------|-------------------
EXT22 | 1 | 08 17 f4 32 bb 00 | 63 | G8264_1
EXT21 | 2 | fc cf 62 9d 67 00 | 63 | G8264_2
INTA1 | 3 | 5c f3 fc 5f 43 9d | 5c-f3-fc-5f-43-9d |
EXT5 | 6 | 00 0d ec a3 8f 81 | mgmt0 | vie
EXT7 | 7 | 00 05 9b 7b 84 01 | mgmt0 | str
!--- Display the LLDP remote devices.
!--- The local Port Numbers of the Pure Flex System Ethernet Switch
!--- distinguish between internal and external Ethernet ports.
!--- The EXT4 port connecting to the Test PC is not shown as this device does not support
LLDP .
G8264_1#show lldp remote-device
LLDP Remote Devices Information
LocalPort | Index | Remote Chassis ID | Remote Port | Remote System Name
----------|-------|---------------------------|----------------------|-------------------
17 | 1 | fc cf 62 9d 67 00 | 17 | G8264_2
63 | 2 | 08 17 f4 76 78 00 | 50 | Flex
!--- The port EXT22 of the Flex switch is mapped to remote port number 50.
G8264_2#show lldp remote-device
LLDP Remote Devices Information
LocalPort | Index | Remote Chassis ID | Remote Port | Remote System Name
----------|-------|---------------------------|----------------------|-------------------
17 | 1 | 08 17 f4 32 bb 00 | 17 | G8264_1
63 | 2 | 08 17 f4 76 78 00 | 49 | Flex
!--- The port EXT21 of the Flex switch is mapped to remote port number 49.
35. Chapter 3. IBM RackSwitch G8264 connectivity 19
3.2.2 Verifying trunks
To verify which VLANs are active on which trunk, we used the show interface trunk
command on the switches, as shown in Example 3-2. Important parameters and details are
highlighted in red.
Example 3-2 Output from the show interface trunk command
Flex#show interface trunk
Alias Port Tag RMON Lrn Fld PVID NAME VLAN(s)
------- ---- --- ---- --- --- ----- -------------- -------------------------------
...
EXT4 32 y d e e 1 TEST_PC 1 10 20 30 40
...
EXT21 49 y d e e 10 TO_G8264_2_Port63 10 20 30 40
EXT22 50 y d e e 10 TO_G8264_1_Port63 10 20 30 40
EXT23 51 y d e e 10 TO_G8264_1_Port64 10 20 30 40
EXT24 52 y d e e 10 TO_G8264_2_Port64 10 20 30 40
* = PVID is tagged.
G8264_2#sh int trunk
Alias Port Tag RMON Lrn Fld PVID NAME VLAN(s)
------- ---- --- ---- --- --- ----- -------------- -------------------------------
17 17 y d e e 10 CrossLink 10 20 30 40
18 18 y d e e 10 CrossLink 10 20 30 40
63 63 y d e e 10 UPLINK_TO_FLEX 10 20 30 40
64 64 y d e e 10 UPLINK_TO_FLEX 10 20 30 40
* = PVID is tagged.
3.2.3 Verifying PVRST spanning tree configurations
We verified the PVRST spanning tree configuration of the switches by executing the
show spanning-tree command, which produced the following outputs. Important parameters
and details are highlighted in red:
EN2029: Example 3-3 on page 20
G8264 switch 1: Example 3-4 on page 22
G8264 switch 2: Example 3-5 on page 24
As shown in Figure 3-1 on page 16, we have two spanning trees, one for even-numbered
VLANs and one for odd-numbered VLANs. By using the show spanning-tree command, you
can verify the status of the respective Ethernet interface’s VLAN, port state, and port role.
36. 20 Deploying IBM Flex System into a Cisco Network
Example 3-3 Verifying the PVRST spanning tree configuration: EN2092 switch
Flex#sh spanning-tree
------------------------------------------------------------------
Pvst+ compatibility mode enabled
------------------------------------------------------------------
Spanning Tree Group 1: On (PVRST)
VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel
8000 00:16:ca:a1:c1:00 20000 EXT3 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61441 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
INTA1 0 0 FWD *
INTA2 0 0 FWD *
INTA4 0 0 FWD *
EXT1 128 20000! FWD DESG f001-08:17:f4:76:78:00 801d P2P
EXT2 128 20000! FWD DESG f001-08:17:f4:76:78:00 801e P2P
EXT3 128 20000! FWD ROOT 8000-00:16:ca:a1:c1:00 8011 P2P
EXT4 128 20000! FWD DESG f001-08:17:f4:76:78:00 8020 P2P
EXT5 128 20000! FWD DESG f001-08:17:f4:76:78:00 8021 P2P
EXT7 128 20000! FWD DESG f001-08:17:f4:76:78:00 8023 P2P
* = STP turned off for this port.
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 10: On (PVRST)
VLANs: 10
Current Root: Path-Cost Port Hello MaxAge FwdDel
600a 08:17:f4:32:bb:00 2000 EXT22 2 20 15
!--- Compare the ID of the Root with the LLDP output to identify the root switch.
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61450 2 20 15 300 4
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f00a-08:17:f4:76:78:00 8020 P2P
EXT21 128 2000! DISC ALTN 700a-fc:cf:62:9d:67:00 803f Shared
EXT22 128 2000! FWD ROOT 600a-08:17:f4:32:bb:00 803f Shared
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 20: On (PVRST)
VLANs: 20
Current Root: Path-Cost Port Hello MaxAge FwdDel
6014 fc:cf:62:9d:67:00 2000 EXT21 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61460 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
37. Chapter 3. IBM RackSwitch G8264 connectivity 21
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f014-08:17:f4:76:78:00 8020 P2P
EXT21 128 2000! FWD ROOT 6014-fc:cf:62:9d:67:00 803f Shared
EXT22 128 2000! DISC ALTN 7014-08:17:f4:32:bb:00 803f Shared
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 30: On (PVRST)
VLANs: 30
Current Root: Path-Cost Port Hello MaxAge FwdDel
601e 08:17:f4:32:bb:00 2000 EXT22 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61470 2 20 15 300 4
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f01e-08:17:f4:76:78:00 8020 P2P
EXT21 128 2000! DISC ALTN 701e-fc:cf:62:9d:67:00 803f Shared
EXT22 128 2000! FWD ROOT 601e-08:17:f4:32:bb:00 803f Shared
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 40: On (PVRST)
VLANs: 40
Current Root: Path-Cost Port Hello MaxAge FwdDel
6028 fc:cf:62:9d:67:00 2000 EXT21 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61480 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f028-08:17:f4:76:78:00 8020 P2P
EXT21 128 2000! FWD ROOT 6028-fc:cf:62:9d:67:00 803f Shared
EXT22 128 2000! DISC ALTN 7028-08:17:f4:32:bb:00 803f Shared
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 128: Off (PVRST), FDB aging timer 300
VLANs: 4095
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
MGT1 0 0 FWD *
* = STP turned off for this port.
38. 22 Deploying IBM Flex System into a Cisco Network
Example 3-4 Verifying the PVRST spanning tree configuration: G8264 switch 1
G8264_1#sh spanning-tree
------------------------------------------------------------------
Pvst+ compatibility mode enabled
------------------------------------------------------------------
Spanning Tree Group 1: On (PVRST)
VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel
8001 08:17:f4:32:bb:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
32769 2 20 15 300 7
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
Note: There is no active STP port in Spanning Tree Group 1.
------------------------------------------------------------------
Spanning Tree Group 10: On (PVRST)
VLANs: 10
Current Root: Path-Cost Port Hello MaxAge FwdDel
600a 08:17:f4:32:bb:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24586 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD DESG 600a-08:17:f4:32:bb:00 8011 P2P
63 128 2000! FWD DESG 600a-08:17:f4:32:bb:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 20: On (PVRST)
VLANs: 20
Current Root: Path-Cost Port Hello MaxAge FwdDel
6014 fc:cf:62:9d:67:00 2000 17 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28692 2 20 15 300 2
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD ROOT 6014-fc:cf:62:9d:67:00 8011 P2P
63 128 2000! FWD DESG 7014-08:17:f4:32:bb:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 30: On (PVRST)
VLANs: 30
Current Root: Path-Cost Port Hello MaxAge FwdDel
601e 08:17:f4:32:bb:00 0 0 2 20 15
39. Chapter 3. IBM RackSwitch G8264 connectivity 23
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24606 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD DESG 601e-08:17:f4:32:bb:00 8011 P2P
63 128 2000! FWD DESG 601e-08:17:f4:32:bb:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 40: On (PVRST)
VLANs: 40
Current Root: Path-Cost Port Hello MaxAge FwdDel
6028 fc:cf:62:9d:67:00 2000 17 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28712 2 20 15 300 2
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD ROOT 6028-fc:cf:62:9d:67:00 8011 P2P
63 128 2000! FWD DESG 7028-08:17:f4:32:bb:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 128: Off (PVRST), FDB aging timer 300
VLANs: 4095
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
MGT 0 0 FWD *
* = STP turned off for this port.
40. 24 Deploying IBM Flex System into a Cisco Network
Example 3-5 Verifying the PVRST spanning tree configuration: G8264 switch 2
G8264_2#sh spanning-tree
------------------------------------------------------------------
Pvst+ compatibility mode enabled
------------------------------------------------------------------
Spanning Tree Group 1: On (PVRST)
VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel
8001 fc:cf:62:9d:67:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
32769 2 20 15 300 0
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
Note: There is no active STP port in Spanning Tree Group 1.
------------------------------------------------------------------
Spanning Tree Group 10: On (PVRST)
VLANs: 10
Current Root: Path-Cost Port Hello MaxAge FwdDel
600a 08:17:f4:32:bb:00 2000 17 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28682 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD ROOT 600a-08:17:f4:32:bb:00 8011 P2P
63 128 2000! FWD DESG 700a-fc:cf:62:9d:67:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 20: On (PVRST)
VLANs: 20
Current Root: Path-Cost Port Hello MaxAge FwdDel
6014 fc:cf:62:9d:67:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24596 2 20 15 300 2
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD DESG 6014-fc:cf:62:9d:67:00 8011 P2P
63 128 2000! FWD DESG 6014-fc:cf:62:9d:67:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 30: On (PVRST)
VLANs: 30
Current Root: Path-Cost Port Hello MaxAge FwdDel
601e 08:17:f4:32:bb:00 2000 17 2 20 15
41. Chapter 3. IBM RackSwitch G8264 connectivity 25
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28702 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD ROOT 601e-08:17:f4:32:bb:00 8011 P2P
63 128 2000! FWD DESG 701e-fc:cf:62:9d:67:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 40: On (PVRST)
VLANs: 40
Current Root: Path-Cost Port Hello MaxAge FwdDel
6028 fc:cf:62:9d:67:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24616 2 20 15 300 2
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 128 2000! FWD DESG 6028-fc:cf:62:9d:67:00 8011 P2P
63 128 2000! FWD DESG 6028-fc:cf:62:9d:67:00 803f P2P
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 128: Off (PVRST), FDB aging timer 300
VLANs: 4095
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
MGT 0 0 FWD *
* = STP turned off for this port.
3.2.4 Show running-config of all switches in Use Case 1
In the configuration output of the IBM Flex Switch and the IBM rack switches that are shown in
the following examples, you can see the necessary configuration steps we did during our test.
Important parameters and details are highlighted in red:
EN2029: Example 3-6 on page 26
G8264 switch 1: Example 3-7 on page 27
G8264 switch 2: Example 3-8 on page 29
42. 26 Deploying IBM Flex System into a Cisco Network
Example 3-6 Output from show running: EN2092 switch
Flex#sh run
Current configuration:
!
version "7.2.2.2"
switch-type "IBM Flex System EN2092 1Gb Ethernet Scalable Switch"
!
…
!
hostname "Flex"
…
!
interface port INTA2
tagging
exit
!
interface port INTA7
shutdown
exit
!
interface port EXT4
name "TEST_PC"
tagging
exit
!
interface port EXT21
name "TO_G8264_2_Port63"
tagging
pvid 10
exit
!
interface port EXT22
name "TO_G8264_1_Port63"
tagging
pvid 10
exit
!
interface port EXT23
name "TO_G8264_1_Port64"
shutdown
tagging
pvid 10
exit
!
interface port EXT24
name "TO_G8264_2_Port64"
shutdown
tagging
pvid 10
exit
!
vlan 1
member INTA1-EXT20
no member EXT21-EXT24
!
!
vlan 10
enable
name "Server"
member EXT4,EXT21-EXT24
43. Chapter 3. IBM RackSwitch G8264 connectivity 27
!
!
vlan 20
enable
name "Data20"
member EXT4,EXT21-EXT24
!
!
vlan 30
enable
name "Data30"
member EXT4,EXT21-EXT24
!
!
vlan 40
enable
name "Data40"
member EXT4,EXT21-EXT24
!
!
!
spanning-tree stp 10 vlan 10
spanning-tree stp 20 vlan 20
spanning-tree stp 30 vlan 30
spanning-tree stp 40 vlan 40
!
lldp enable
!
…
!
end
Example 3-7 Output from show running command: 8264 switch 1
G8264_1#sh run
Current configuration:
!
version "7.2.2"
switch-type "IBM Networking Operating System RackSwitch G8264"
!
!
!
!
no system dhcp
hostname "G8264_1"
system idle 60
!
!
interface port 17
name "CrossLink"
tagging
pvid 10
exit
!
44. 28 Deploying IBM Flex System into a Cisco Network
interface port 18
shutdown
tagging
pvid 10
exit
!
interface port 63
tagging
pvid 10
exit
!
interface port 64
shutdown
tagging
pvid 10
exit
!
vlan 1
member 1-16,19-62
no member 17-18,63-64
!
!
vlan 10
enable
name "none"
member 17-18,63-64
!
!
vlan 20
enable
name "none"
member 17-18,63-64
!
!
vlan 30
enable
name "none"
member 17-18,63-64
!
!
vlan 40
enable
name "VLAN 40"
member 17-18,63-64
!
!
!
spanning-tree stp 10 bridge priority 24576
spanning-tree stp 10 vlan 10
spanning-tree stp 20 bridge priority 28672
spanning-tree stp 20 vlan 20
spanning-tree stp 30 bridge priority 24576
spanning-tree stp 30 vlan 30
spanning-tree stp 40 bridge priority 28672
spanning-tree stp 40 vlan 40
!
45. Chapter 3. IBM RackSwitch G8264 connectivity 29
!
lldp enable
!
…
!
end
Example 3-8 Output from show running command: G8264 switch 2
G8264_2#sh run
Current configuration:
!
version "7.2.2"
switch-type "IBM Networking Operating System RackSwitch G8264"
!
!
!
!
no system dhcp
hostname "G8264_2"
system idle 60
!
!
interface port 17
name "CrossLink"
tagging
pvid 10
exit
!
interface port 18
shutdown
tagging
pvid 10
exit
!
interface port 63
tagging
pvid 10
exit
!
interface port 64
shutdown
tagging
pvid 10
exit
!
vlan 1
member 1-16,19-62
no member 17-18,63-64
!
!
vlan 10
enable
name "none"
member 17-18,63-64
!
!
46. 30 Deploying IBM Flex System into a Cisco Network
vlan 20
enable
name "none"
member 17-18,63-64
!
!
vlan 30
enable
name "none"
member 17-18,63-64
!
!
vlan 40
enable
name "VLAN 40"
member 17-18,63-64
!
!
!
spanning-tree stp 10 bridge priority 28672
spanning-tree stp 10 vlan 10
spanning-tree stp 20 bridge priority 24576
spanning-tree stp 20 vlan 20
spanning-tree stp 30 bridge priority 28672
spanning-tree stp 30 vlan 30
spanning-tree stp 40 bridge priority 24576
spanning-tree stp 40 vlan 40
!
!
lldp enable
!
…
!
!
end
3.3 Use Case 2: Link aggregation and PVRST
In our second use case, we added aggregation links and used three pairs of 10 GE links to
connect the switches. We also configured 802.1q trunks with LACP and PVRST. For load
balancing, odd VLANS 10 and 30 and even VLANS 20 and 40 were used (see Figure 3-3 on
page 31 and Figure 3-4 on page 31).
47. Chapter 3. IBM RackSwitch G8264 connectivity 31
Figure 3-3 Use Case 2: Even-numbered VLANs
Figure 3-4 Use Case 2: Odd-numbered VLANs
Use Case 2: PVRSTP : G6284 to EN2092 1 Gb Ethernet Scalable
Switch with LACP, STP State for even VLANs 20, 40
Port 17,18
Vlan 20,40
Port State: FWD
Port Role: ROOT
hostname:Flex
EN2092 1 Gb Ethernet Switch
Pure Flex System
Port 63,64
Vlan 20,40
Port State: FWD
Port Role: DESG
Port 63,64
Vlan 20,40
Port State: FWD
Port Role: DESG
Ext22,23
Vlan 20,40
Port State: DISC
Port Role: ALTN
Ext21,24
Vlan 20,40
Port State: FWD
Port Role: ROOT
Test-PC
Ext4
STP Root
Vlan 20,40
hostname:G8264_1
G8264
hostname:G8264_2
G8264
Port 17,18
Vlan 20,40
Port State: FWD
Port Role: DESG
Use Case 2: PVRSTP : G6284 to EN2092 1 Gb Ethernet Scalable
Switch with LACP, STP State for odd VLANs 10, 30
Port 17,18
Vlan 10,30
Port State: FWD
Port Role: DESG
hostname:Flex
EN2092 1 Gb Ethernet Switch
Pure Flex System
Port 63,64
Vlan 10,30
Port State: FWD
Port Role: DESG
Port 63,64
Vlan 10,30
Port State: FWD
Port Role: DESG
Ext22,23
Vlan 10,30
Port State: FWD
Port Role: ROOT
Ext21,24
Vlan 10,30
Port State: DISC
Port Role: ALTN
Test-PC
Ext4
STP Root
Vlan 10,30
hostname:G8264_1
G8264
hostname:G8264_2
G8264
Port 17,18
Vlan 10,30
Port State: FWD
Port Role: ROOT
48. 32 Deploying IBM Flex System into a Cisco Network
3.3.1 Verifying the topology that is used by using lldp
To verify the topology, we used the show lldp remote-device command on the three
switches, as shown in Example 3-9.
Example 3-9 Checking the topology use show lldp remote-device command
Flex#show lldp remote-device
LLDP Remote Devices Information
LocalPort | Index | Remote Chassis ID | Remote Port | Remote System Name
----------|-------|---------------------------|----------------------|-------------------
EXT22 | 1 | 08 17 f4 32 bb 00 | 63 | G8264_1
EXT21 | 2 | fc cf 62 9d 67 00 | 63 | G8264_2
EXT23 | 5 | 08 17 f4 32 bb 00 | 64 | G8264_1
EXT24 | 8 | fc cf 62 9d 67 00 | 64 | G8264_2
G8264_1#sh lldp remote-device
LLDP Remote Devices Information
LocalPort | Index | Remote Chassis ID | Remote Port | Remote System Name
----------|-------|---------------------------|----------------------|-------------------
17 | 1 | fc cf 62 9d 67 00 | 17 | G8264_2
63 | 2 | 08 17 f4 76 78 00 | 50 | Flex
18 | 3 | fc cf 62 9d 67 00 | 18 | G8264_2
64 | 4 | 08 17 f4 76 78 00 | 51 | Flex
G8264_2#show lldp remote-device
LLDP Remote Devices Information
LocalPort | Index | Remote Chassis ID | Remote Port | Remote System Name
----------|-------|---------------------------|----------------------|-------------------
17 | 1 | 08 17 f4 32 bb 00 | 17 | G8264_1
63 | 2 | 08 17 f4 76 78 00 | 49 | Flex
18 | 3 | 08 17 f4 32 bb 00 | 18 | G8264_1
64 | 4 | 08 17 f4 76 78 00 | 52 | Flex
49. Chapter 3. IBM RackSwitch G8264 connectivity 33
3.3.2 Verifying trunks
To verify which VLANs are active on which trunk, we used the show interface trunk
command on the three switches, as shown in Example 3-10.
Example 3-10 Show interface trunk command
Flex#show interface trunk
Alias Port Tag RMON Lrn Fld PVID NAME VLAN(s)
------- ---- --- ---- --- --- ----- -------------- -------------------------------
EXT21 49 y d e e 10 TO_G8264_2_Port63 10 20 30 40
EXT22 50 y d e e 10 TO_G8264_1_Port63 10 20 30 40
EXT23 51 y d e e 10 TO_G8264_1_Port64 10 20 30 40
EXT24 52 y d e e 10 TO_G8264_2_Port64 10 20 30 40
* = PVID is tagged.
G8264_1#sh int trunk
Alias Port Tag RMON Lrn Fld PVID NAME VLAN(s)
------- ---- --- ---- --- --- ----- -------------- -------------------------------
17 17 y d e e 10 CrossLink 10 20 30 40
18 18 y d e e 10 CrossLink 10 20 30 40
63 63 y d e e 10 UPLINK_TO_FLEX 10 20 30 40
64 64 y d e e 10 UPLINK_TO_FLEX 10 20 30 40
...
* = PVID is tagged.
G8264_2#sh int trunk
Alias Port Tag RMON Lrn Fld PVID NAME VLAN(s)
------- ---- --- ---- --- --- ----- -------------- -------------------------------
17 17 y d e e 10 CrossLink 10 20 30 40
18 18 y d e e 10 CrossLink 10 20 30 40
63 63 y d e e 10 UPLINK_TO_FLEX 10 20 30 40
64 64 y d e e 10 UPLINK_TO_FLEX 10 20 30 40
* = PVID is tagged.
50. 34 Deploying IBM Flex System into a Cisco Network
3.3.3 Verifying link aggregation by using lacp
We verified the link aggregation configuration of the three switches by executing the
show lacp information command, as shown in Example 3-11.
Example 3-11 Show lacp information command
Flex#sh lacp information
port mode adminkey operkey selected prio aggr trunk status minlinks
---------------------------------------------------------------------------------
EXT21 active 121 121 yes 32768 49 53 up 1
EXT22 active 122 122 yes 32768 50 54 up 1
EXT23 active 122 122 yes 32768 50 54 up 1
EXT24 active 121 121 yes 32768 49 53 up 1
!--- The “aggr” and “trunk” column identifies the ports which are configured together as
link aggregation, i.e.trunk 53 is made of EXT21 and EXT24 .
G8264_1(config)#sh lacp information
port mode adminkey operkey selected prio aggr trunk status minlinks
---------------------------------------------------------------------------------
17 active 117 117 yes 32768 17 65 up 1
18 active 117 117 yes 32768 17 65 up 1
63 active 163 163 yes 32768 63 66 up 1
64 active 163 163 yes 32768 63 66 up 1
G8264_2#sh lacp information
port mode adminkey operkey selected prio aggr trunk status minlinks
---------------------------------------------------------------------------------
17 active 117 117 yes 32768 17 65 up 1
18 active 117 117 yes 32768 17 65 up 1
63 active 163 163 yes 32768 63 66 up 1
64 active 163 163 yes 32768 63 66 up 1
3.3.4 Verifying PVRST spanning tree configuration
In the next step, we verified the PVRST spanning tree configuration of the switches by
executing the show spanning-tree command. As shown in Figure 3-3 on page 31 and
Figure 3-4 on page 31, we have two spanning trees, one for even VLANs and one for odd
VLANs. By using the show spanning tree command, you can verify the status of the
respective Ethernet interface’s VLAN, port state, and port role.
The commands that were run on the three switches produced the following outputs:
EN2029: Example 3-12 on page 35
G8264 switch 1: Example 3-13 on page 37
G8264 switch 2: Example 3-14 on page 39
51. Chapter 3. IBM RackSwitch G8264 connectivity 35
Example 3-12 Output from show spanning tree command: Flex System switch
Flex#show spanning-tree
------------------------------------------------------------------
Pvst+ compatibility mode enabled
------------------------------------------------------------------
Spanning Tree Group 1: On (PVRST)
VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel
8000 00:16:ca:a1:c1:00 20000 EXT3 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61441 2 20 15 300 3
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
INTA1 0 0 FWD *
INTA2 0 0 FWD *
INTA4 0 0 FWD *
EXT1 128 20000! FWD DESG f001-08:17:f4:76:78:00 801d P2P
EXT2 128 20000! FWD DESG f001-08:17:f4:76:78:00 801e P2P
EXT3 128 20000! FWD ROOT 8000-00:16:ca:a1:c1:00 8011 P2P
EXT4 128 20000! FWD DESG f001-08:17:f4:76:78:00 8020 P2P
EXT5 128 20000! FWD DESG f001-08:17:f4:76:78:00 8021 P2P
EXT7 128 20000! FWD DESG f001-08:17:f4:76:78:00 8023 P2P
* = STP turned off for this port.
! = Automatic path cost.
------------------------------------------------------------------
Spanning Tree Group 10: On (PVRST)
VLANs: 10
Current Root: Path-Cost Port Hello MaxAge FwdDel
600a 08:17:f4:32:bb:00 990 EXT22 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61450 2 20 15 300 8
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f00a-08:17:f4:76:78:00 8020 P2P
EXT21 (pc53) 128 990!+ DISC ALTN 700a-fc:cf:62:9d:67:00 8083 P2P
EXT22 (pc54) 128 990!+ FWD ROOT 600a-08:17:f4:32:bb:00 8083 P2P
EXT23 (pc54) 128 990!+ FWD ROOT 600a-08:17:f4:32:bb:00 8083 P2P
EXT24 (pc53) 128 990!+ DISC ALTN 700a-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
!--- Please note the portchannel identifier after the port number, i.e. pc53, pc54
------------------------------------------------------------------
Spanning Tree Group 20: On (PVRST)
VLANs: 20
Current Root: Path-Cost Port Hello MaxAge FwdDel
6014 fc:cf:62:9d:67:00 990 EXT21 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61460 2 20 15 300 10
52. 36 Deploying IBM Flex System into a Cisco Network
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f014-08:17:f4:76:78:00 8020 P2P
EXT21 (pc53) 128 990!+ FWD ROOT 6014-fc:cf:62:9d:67:00 8083 P2P
EXT22 (pc54) 128 990!+ DISC ALTN 7014-08:17:f4:32:bb:00 8083 P2P
EXT23 (pc54) 128 990!+ DISC ALTN 7014-08:17:f4:32:bb:00 8083 P2P
EXT24 (pc53) 128 990!+ FWD ROOT 6014-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 30: On (PVRST)
VLANs: 30
Current Root: Path-Cost Port Hello MaxAge FwdDel
601e 08:17:f4:32:bb:00 990 EXT22 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61470 2 20 15 300 8
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f01e-08:17:f4:76:78:00 8020 P2P
EXT21 (pc53) 128 990!+ DISC ALTN 701e-fc:cf:62:9d:67:00 8083 P2P
EXT22 (pc54) 128 990!+ FWD ROOT 601e-08:17:f4:32:bb:00 8083 P2P
EXT23 (pc54) 128 990!+ FWD ROOT 601e-08:17:f4:32:bb:00 8083 P2P
EXT24 (pc53) 128 990!+ DISC ALTN 701e-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 40: On (PVRST)
VLANs: 40
Current Root: Path-Cost Port Hello MaxAge FwdDel
6028 fc:cf:62:9d:67:00 990 EXT21 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
61480 2 20 15 300 10
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
EXT4 128 20000! FWD DESG f028-08:17:f4:76:78:00 8020 P2P
EXT21 (pc53) 128 990!+ FWD ROOT 6028-fc:cf:62:9d:67:00 8083 P2P
EXT22 (pc54) 128 990!+ DISC ALTN 7028-08:17:f4:32:bb:00 8083 P2P
EXT23 (pc54) 128 990!+ DISC ALTN 7028-08:17:f4:32:bb:00 8083 P2P
EXT24 (pc53) 128 990!+ FWD ROOT 6028-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 128: Off (PVRST), FDB aging timer 300
VLANs: 4095
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
MGT1 0 0 FWD *
* = STP turned off for this port.
53. Chapter 3. IBM RackSwitch G8264 connectivity 37
Example 3-13 Output from show spanning tree command: G8264 switch 1
G8264_1(config)#sh spanning-tree
------------------------------------------------------------------
Pvst+ compatibility mode enabled
------------------------------------------------------------------
Spanning Tree Group 1: On (PVRST)
VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel
8001 08:17:f4:32:bb:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
32769 2 20 15 300 7
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
!--- Note: There is no active STP port in Spanning Tree Group 1.
------------------------------------------------------------------
Spanning Tree Group 10: On (PVRST)
VLANs: 10
Current Root: Path-Cost Port Hello MaxAge FwdDel
600a 08:17:f4:32:bb:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24586 2 20 15 300 7
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD DESG 600a-08:17:f4:32:bb:00 8082 P2P
18 (pc65) 128 990!+ FWD DESG 600a-08:17:f4:32:bb:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 600a-08:17:f4:32:bb:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 600a-08:17:f4:32:bb:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 20: On (PVRST)
VLANs: 20
Current Root: Path-Cost Port Hello MaxAge FwdDel
6014 fc:cf:62:9d:67:00 990 17 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28692 2 20 15 300 9
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD ROOT 6014-fc:cf:62:9d:67:00 8082 P2P
18 (pc65) 128 990!+ FWD ROOT 6014-fc:cf:62:9d:67:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 7014-08:17:f4:32:bb:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 7014-08:17:f4:32:bb:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
54. 38 Deploying IBM Flex System into a Cisco Network
------------------------------------------------------------------
Spanning Tree Group 30: On (PVRST)
VLANs: 30
Current Root: Path-Cost Port Hello MaxAge FwdDel
601e 08:17:f4:32:bb:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24606 2 20 15 300 7
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD DESG 601e-08:17:f4:32:bb:00 8082 P2P
18 (pc65) 128 990!+ FWD DESG 601e-08:17:f4:32:bb:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 601e-08:17:f4:32:bb:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 601e-08:17:f4:32:bb:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 40: On (PVRST)
VLANs: 40
Current Root: Path-Cost Port Hello MaxAge FwdDel
6028 fc:cf:62:9d:67:00 990 17 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28712 2 20 15 300 9
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD ROOT 6028-fc:cf:62:9d:67:00 8082 P2P
18 (pc65) 128 990!+ FWD ROOT 6028-fc:cf:62:9d:67:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 7028-08:17:f4:32:bb:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 7028-08:17:f4:32:bb:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 128: Off (PVRST), FDB aging timer 300
55. Chapter 3. IBM RackSwitch G8264 connectivity 39
Example 3-14 Output from show spanning tree command: G8264 switch 2
G8264_2#sh spanning-tree
------------------------------------------------------------------
Pvst+ compatibility mode enabled
------------------------------------------------------------------
Spanning Tree Group 1: On (PVRST)
VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel
8001 fc:cf:62:9d:67:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
32769 2 20 15 300 0
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
Note: There is no active STP port in Spanning Tree Group 1.
------------------------------------------------------------------
Spanning Tree Group 10: On (PVRST)
VLANs: 10
Current Root: Path-Cost Port Hello MaxAge FwdDel
600a 08:17:f4:32:bb:00 990 17 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28682 2 20 15 300 6
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD ROOT 600a-08:17:f4:32:bb:00 8082 P2P
18 (pc65) 128 990!+ FWD ROOT 600a-08:17:f4:32:bb:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 700a-fc:cf:62:9d:67:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 700a-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 20: On (PVRST)
VLANs: 20
Current Root: Path-Cost Port Hello MaxAge FwdDel
6014 fc:cf:62:9d:67:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24596 2 20 15 300 9
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD DESG 6014-fc:cf:62:9d:67:00 8082 P2P
18 (pc65) 128 990!+ FWD DESG 6014-fc:cf:62:9d:67:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 6014-fc:cf:62:9d:67:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 6014-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 30: On (PVRST)
56. 40 Deploying IBM Flex System into a Cisco Network
VLANs: 30
Current Root: Path-Cost Port Hello MaxAge FwdDel
601e 08:17:f4:32:bb:00 990 17 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
28702 2 20 15 300 6
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD ROOT 601e-08:17:f4:32:bb:00 8082 P2P
18 (pc65) 128 990!+ FWD ROOT 601e-08:17:f4:32:bb:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 701e-fc:cf:62:9d:67:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 701e-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 40: On (PVRST)
VLANs: 40
Current Root: Path-Cost Port Hello MaxAge FwdDel
6028 fc:cf:62:9d:67:00 0 0 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging Topology Change Counts
24616 2 20 15 300 9
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
17 (pc65) 128 990!+ FWD DESG 6028-fc:cf:62:9d:67:00 8082 P2P
18 (pc65) 128 990!+ FWD DESG 6028-fc:cf:62:9d:67:00 8082 P2P
63 (pc66) 128 990!+ FWD DESG 6028-fc:cf:62:9d:67:00 8083 P2P
64 (pc66) 128 990!+ FWD DESG 6028-fc:cf:62:9d:67:00 8083 P2P
! = Automatic path cost.
+ = Portchannel cost, not the individual port cost.
------------------------------------------------------------------
Spanning Tree Group 128: Off (PVRST), FDB aging timer 300
VLANs: 4095
Port Prio Cost State Role Designated Bridge Des Port Type
------------- ---- ---------- ----- ---- ---------------------- -------- ----------
MGT 0 0 FWD *
* = STP turned off for this port.
57. Chapter 3. IBM RackSwitch G8264 connectivity 41
3.3.5 Show running-config of all switches in Use Case 2
In the configuration output of the switches that is shown in Example 3-15, Example 3-16 on
page 43, and Example 3-17 on page 45, you can see the configuration steps that we
performed during our test. Important parameters and detail are highlighted in red.
Example 3-15 Output of the show running command: EN2092 switch
Flex#sh run
Current configuration:
!
version "7.2.2.2"
switch-type "IBM Flex System EN2092 1Gb Ethernet Scalable Switch"
!
hostname "Flex"
!
interface port INTA2
tagging
exit
!
interface port INTA7
shutdown
exit
!
interface port EXT4
name "TEST_PC"
tagging
exit
!
interface port EXT21
name "TO_G8264_2_Port63"
tagging
pvid 10
exit
!
interface port EXT22
name "TO_G8264_1_Port63"
tagging
pvid 10
exit
!
interface port EXT23
name "TO_G8264_1_Port64"
tagging
pvid 10
exit
!
interface port EXT24
name "TO_G8264_2_Port64"
tagging
pvid 10
exit
!
vlan 1
member INTA1-EXT20
no member EXT21-EXT24
!
vlan 10
enable
name "Server"
58. 42 Deploying IBM Flex System into a Cisco Network
member EXT4,EXT21-EXT24
!
vlan 20
enable
name "Data20"
member EXT4,EXT21-EXT24
!
vlan 30
enable
name "Data30"
member EXT4,EXT21-EXT24
!
vlan 40
enable
name "Data40"
member EXT4,EXT21-EXT24
!
spanning-tree stp 10 vlan 10
spanning-tree stp 20 vlan 20
spanning-tree stp 30 vlan 30
spanning-tree stp 40 vlan 40
!
interface port EXT21
lacp mode active
lacp key 121
!
interface port EXT22
lacp mode active
lacp key 122
!
interface port EXT23
lacp mode active
lacp key 122
!
interface port EXT24
lacp mode active
lacp key 121
!
lldp enable
!
end
59. Chapter 3. IBM RackSwitch G8264 connectivity 43
Example 3-16 Output of the show running command: G8264 switch 1
G8264_1#sh run
Current configuration:
!
version "7.2.2"
switch-type "IBM Networking Operating System RackSwitch G8264"
!
hostname "G8264_1"
!
interface port 17
name "CrossLink"
tagging
pvid 10
exit
!
interface port 18
name "CrossLink"
tagging
pvid 10
exit
!
interface port 63
name "UPLINK_TO_FLEX"
tagging
pvid 10
exit
!
interface port 64
name "UPLINK_TO_FLEX"
tagging
pvid 10
exit
!
vlan 1
member 1-16,19-62
no member 17-18,63-64
!
vlan 10
enable
name "none"
member 17-18,63-64
!
vlan 20
enable
name "none"
member 17-18,63-64
!
vlan 30
enable
name "none"
member 17-18,63-64
!
vlan 40
enable
name "VLAN 40"
member 17-18,63-64
!
spanning-tree stp 10 bridge priority 24576
spanning-tree stp 10 vlan 10
60. 44 Deploying IBM Flex System into a Cisco Network
spanning-tree stp 20 bridge priority 28672
spanning-tree stp 20 vlan 20
spanning-tree stp 30 bridge priority 24576
spanning-tree stp 30 vlan 30
spanning-tree stp 40 bridge priority 28672
spanning-tree stp 40 vlan 40
!
interface port 17
lacp mode active
lacp key 117
!
interface port 18
lacp mode active
lacp key 117
!
interface port 63
lacp mode active
lacp key 163
!
interface port 64
lacp mode active
lacp key 163
!
lldp enable
!
end