SlideShare a Scribd company logo
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4
White Paper
Model Complex Routing with Cisco MATE Design
External Endpoints
What You Will Learn
Network planners, designers, and engineers increasingly need flexible, precise, and fast network modeling tools to
model complex routing policies. Sometimes these complex policies are related to peering agreements of inter-
autonomous systems AS1
traffic and failover rules. Accurately modeling specific intra- autonomous systems AS
routing failover policies is necessary to understand their impact. To model complex routing situations such as
traffic distribution and failover policies, Cisco
®
MATE Design simulates potential traffic with demands that have
user-defined external endpoints.
Modeling Complex Routing Policies
MATE Design enables you to simulate potential traffic in the network with demands. Each demand has a single
source (node or external autonomous system AS, an egress destination (node, external autonomous system AS,
or multicast destination) and all demands are treated the same by the network. Simulation in MATE Design
constantly examines traffic demands, network topology, element configuration, and state. It instantly updates the
property tables and the Simulated Traffic view in the network plot.
An external endpoint is a named endpoint for a demand with defined endpoint members. Each endpoint member
is defined by a priority and traffic balance option. The priority establishes a hierarchy for failover when a member
fails. A traffic balance option can also be set to model the shortest path or split the demand by a defined rate
among endpoint members of equal priority.
For complex networks, peering agreements and complex failover routing policies must be considered and
accurately modeled. Common modeling situations include:
● Complex inter-AS egress demands and failover routing policies
● Complex inter-AS ingress demands and failover routing policies
● Data center demands and failover routing policies
MATE Design can model all these situations with external endpoints.
Modeling Inter-AS Egress Demands and Failover Routing Policies
Planning suitable egress traffic failover procedures or modeling existing egress traffic policies is necessary for
planning and designing efficient and effective networks that meet customer requirements. For example, a cable
operator has a connection to a peer network and a connection to a transit network at a site in San Jose, California.
Demands are originating from the edge in Seattle, Washington with a destination beyond the external AS that the
network is connected to. Ideally, traffic is sent to the peer network. If a circuit from the San Jose site to the
external AS fails, or a failure occurs with an external endpoint member node, traffic is directed to the transit
network.
1
Inter-AS is a peer-to-peer type model that allows extension of VPNs through multiple provider or multi-domain networks.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4
MATE Design can address the failover between peers by modeling an external endpoint with two endpoint
member nodes. The endpoint member node of the peer network has first priority, and the endpoint member node
of the transit network has the second priority. When the first-priority endpoint member fails, MATE Design instantly
simulates and displays the network impact on the network plot and updates the property tables. If you select the
demand in the property tables, the network plot illustrates the demand’s old route with a solid blue arrow and the
new route with a dashed arrow, as shown in Figure 1.
Figure 1. External Endpoint Failure Between Peers
Modeling Inter-AS Ingress Demands and Failover Routing Policies
In this scenario, customer traffic is entering a cable provider network through a peer network and a transit provider
network. A manual policy for each destination site determines the entry point from either of the two transit
providers and which entry point is used for failover. For a site in Kansas City, Missouri, traffic enters Houston,
Texas through a peer. In the event of failure, traffic enters Atlanta, Georgia through a transit provider.
To capture this, MATE Design models an external endpoint with two endpoint member nodes. The peer network’s
endpoint member node has the first priority, and the endpoint member node of the transit network has the second
priority. When the first-priority endpoint member fails, MATE Design instantly simulates and displays the network
impact on the network plot and updates the property tables. If you select the demand in the property tables, the
network plot illustrates the demand’s old route with a solid blue arrow and the new route with a dashed arrow, as
shown in Figure 2.
Figure 2. External Endpoint Incoming Transit Routing Policies
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4
Modeling Data Center Demands and Failover Routing Policies
Accounting for redundancy is essential when modeling data centers. In this scenario, the outgoing traffic from a
data center server cluster is distributed evenly between two data center routers connected to the backbone of the
network. If one data center router fails, the server cluster behind the data center switches its traffic to the other
data center router.
MATE Design models this data center example using an external endpoint with endpoint member edge nodes of
the same priority and balancing traffic between them. When simulating the failure of one of the data center nodes
with the demand selected, the network plot illustrates the demand’s old route with a solid blue arrow and the new
route with a dashed arrow, as shown in Figure 3.
Note: This example is using the external endpoints to model a demand endpoint for the data center that is
internal to the network.
Figure 3. External Endpoint Data Center Routing Policy
Demands can also be modeled from external endpoint to external endpoint. For example, a demand from the data
center adheres to the routing policy on the left panel in Figure 4. A failure of each endpoint member is illustrated.
Figure 4. Failure of Source and Destination External Endpoints of a Demand
Conclusion
Cisco MATE Design models complex routing policies by creating demands with user-defined external endpoints.
These endpoints can be used as a source or destination of a demand. Failure of an endpoint member instantly
updates the simulation and the effects on the network are immediately apparent.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4
For More Information
For more information on Cisco MATE Design please visit http://www.cisco.com.
Printed in USA C11-728868-00 07/13

More Related Content

Similar to Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)

Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Cisco Service Provider Mobility
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Cisco Service Provider Mobility
 
MATE Design (Data Sheet)
MATE Design (Data Sheet)MATE Design (Data Sheet)
MATE Design (Data Sheet)
Cisco Service Provider Mobility
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
CSCJournals
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlesSoundar Msr
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlestema_solution
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
ncct
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
IJECEIAES
 
An innovative approach to solve the network design problem concerning intelli...
An innovative approach to solve the network design problem concerning intelli...An innovative approach to solve the network design problem concerning intelli...
An innovative approach to solve the network design problem concerning intelli...
alienaimi
 

Similar to Model Complex Routing with Cisco MATE Design External Endpoints (White Paper) (20)

Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
 
MATE Design (Data Sheet)
MATE Design (Data Sheet)MATE Design (Data Sheet)
MATE Design (Data Sheet)
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Routing basic
Routing basicRouting basic
Routing basic
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
 
An innovative approach to solve the network design problem concerning intelli...
An innovative approach to solve the network design problem concerning intelli...An innovative approach to solve the network design problem concerning intelli...
An innovative approach to solve the network design problem concerning intelli...
 

More from Cisco Service Provider Mobility

Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Cisco Service Provider Mobility
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Cisco Service Provider Mobility
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
Cisco Service Provider Mobility
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Cisco Service Provider Mobility
 
Small Cells in the Enterprise
Small Cells in the EnterpriseSmall Cells in the Enterprise
Small Cells in the Enterprise
Cisco Service Provider Mobility
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
Cisco Service Provider Mobility
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Cisco Service Provider Mobility
 
5G: Your Questions Answered
5G: Your Questions Answered5G: Your Questions Answered
5G: Your Questions Answered
Cisco Service Provider Mobility
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica
Cisco Service Provider Mobility
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Cisco Service Provider Mobility
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – Transcript
Cisco Service Provider Mobility
 
Small-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market OverviewSmall-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market Overview
Cisco Service Provider Mobility
 
Evolving Mobile Data Application Services With SDN
Evolving Mobile Data Application Services With SDNEvolving Mobile Data Application Services With SDN
Evolving Mobile Data Application Services With SDN
Cisco Service Provider Mobility
 
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
Cisco Service Provider Mobility
 
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
Cisco Service Provider Mobility
 
The Mobile Paradox
The Mobile ParadoxThe Mobile Paradox
Cisco Activities at Small Cell Events, London: June 2013
Cisco Activities at Small Cell Events, London: June 2013Cisco Activities at Small Cell Events, London: June 2013
Cisco Activities at Small Cell Events, London: June 2013
Cisco Service Provider Mobility
 
Seguridad inalámbrica en contexto (also available in English)
Seguridad inalámbrica en contexto (also available in English)Seguridad inalámbrica en contexto (also available in English)
Seguridad inalámbrica en contexto (also available in English)
Cisco Service Provider Mobility
 

More from Cisco Service Provider Mobility (20)

Cisco quantum policy suite
Cisco quantum policy suiteCisco quantum policy suite
Cisco quantum policy suite
 
Cisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based AdvertisingCisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based Advertising
 
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
 
Small Cells in the Enterprise
Small Cells in the EnterpriseSmall Cells in the Enterprise
Small Cells in the Enterprise
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
 
5G: Your Questions Answered
5G: Your Questions Answered5G: Your Questions Answered
5G: Your Questions Answered
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – Transcript
 
Small-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market OverviewSmall-Cell Backhaul: Industry Trends and Market Overview
Small-Cell Backhaul: Industry Trends and Market Overview
 
Evolving Mobile Data Application Services With SDN
Evolving Mobile Data Application Services With SDNEvolving Mobile Data Application Services With SDN
Evolving Mobile Data Application Services With SDN
 
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
MTC: Cuando las máquinas hablan (Otra moda que define la industria) - also av...
 
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
 
The Mobile Paradox
The Mobile ParadoxThe Mobile Paradox
The Mobile Paradox
 
Cisco Activities at Small Cell Events, London: June 2013
Cisco Activities at Small Cell Events, London: June 2013Cisco Activities at Small Cell Events, London: June 2013
Cisco Activities at Small Cell Events, London: June 2013
 
Seguridad inalámbrica en contexto (also available in English)
Seguridad inalámbrica en contexto (also available in English)Seguridad inalámbrica en contexto (also available in English)
Seguridad inalámbrica en contexto (also available in English)
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)

  • 1. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4 White Paper Model Complex Routing with Cisco MATE Design External Endpoints What You Will Learn Network planners, designers, and engineers increasingly need flexible, precise, and fast network modeling tools to model complex routing policies. Sometimes these complex policies are related to peering agreements of inter- autonomous systems AS1 traffic and failover rules. Accurately modeling specific intra- autonomous systems AS routing failover policies is necessary to understand their impact. To model complex routing situations such as traffic distribution and failover policies, Cisco ® MATE Design simulates potential traffic with demands that have user-defined external endpoints. Modeling Complex Routing Policies MATE Design enables you to simulate potential traffic in the network with demands. Each demand has a single source (node or external autonomous system AS, an egress destination (node, external autonomous system AS, or multicast destination) and all demands are treated the same by the network. Simulation in MATE Design constantly examines traffic demands, network topology, element configuration, and state. It instantly updates the property tables and the Simulated Traffic view in the network plot. An external endpoint is a named endpoint for a demand with defined endpoint members. Each endpoint member is defined by a priority and traffic balance option. The priority establishes a hierarchy for failover when a member fails. A traffic balance option can also be set to model the shortest path or split the demand by a defined rate among endpoint members of equal priority. For complex networks, peering agreements and complex failover routing policies must be considered and accurately modeled. Common modeling situations include: ● Complex inter-AS egress demands and failover routing policies ● Complex inter-AS ingress demands and failover routing policies ● Data center demands and failover routing policies MATE Design can model all these situations with external endpoints. Modeling Inter-AS Egress Demands and Failover Routing Policies Planning suitable egress traffic failover procedures or modeling existing egress traffic policies is necessary for planning and designing efficient and effective networks that meet customer requirements. For example, a cable operator has a connection to a peer network and a connection to a transit network at a site in San Jose, California. Demands are originating from the edge in Seattle, Washington with a destination beyond the external AS that the network is connected to. Ideally, traffic is sent to the peer network. If a circuit from the San Jose site to the external AS fails, or a failure occurs with an external endpoint member node, traffic is directed to the transit network. 1 Inter-AS is a peer-to-peer type model that allows extension of VPNs through multiple provider or multi-domain networks.
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4 MATE Design can address the failover between peers by modeling an external endpoint with two endpoint member nodes. The endpoint member node of the peer network has first priority, and the endpoint member node of the transit network has the second priority. When the first-priority endpoint member fails, MATE Design instantly simulates and displays the network impact on the network plot and updates the property tables. If you select the demand in the property tables, the network plot illustrates the demand’s old route with a solid blue arrow and the new route with a dashed arrow, as shown in Figure 1. Figure 1. External Endpoint Failure Between Peers Modeling Inter-AS Ingress Demands and Failover Routing Policies In this scenario, customer traffic is entering a cable provider network through a peer network and a transit provider network. A manual policy for each destination site determines the entry point from either of the two transit providers and which entry point is used for failover. For a site in Kansas City, Missouri, traffic enters Houston, Texas through a peer. In the event of failure, traffic enters Atlanta, Georgia through a transit provider. To capture this, MATE Design models an external endpoint with two endpoint member nodes. The peer network’s endpoint member node has the first priority, and the endpoint member node of the transit network has the second priority. When the first-priority endpoint member fails, MATE Design instantly simulates and displays the network impact on the network plot and updates the property tables. If you select the demand in the property tables, the network plot illustrates the demand’s old route with a solid blue arrow and the new route with a dashed arrow, as shown in Figure 2. Figure 2. External Endpoint Incoming Transit Routing Policies
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4 Modeling Data Center Demands and Failover Routing Policies Accounting for redundancy is essential when modeling data centers. In this scenario, the outgoing traffic from a data center server cluster is distributed evenly between two data center routers connected to the backbone of the network. If one data center router fails, the server cluster behind the data center switches its traffic to the other data center router. MATE Design models this data center example using an external endpoint with endpoint member edge nodes of the same priority and balancing traffic between them. When simulating the failure of one of the data center nodes with the demand selected, the network plot illustrates the demand’s old route with a solid blue arrow and the new route with a dashed arrow, as shown in Figure 3. Note: This example is using the external endpoints to model a demand endpoint for the data center that is internal to the network. Figure 3. External Endpoint Data Center Routing Policy Demands can also be modeled from external endpoint to external endpoint. For example, a demand from the data center adheres to the routing policy on the left panel in Figure 4. A failure of each endpoint member is illustrated. Figure 4. Failure of Source and Destination External Endpoints of a Demand Conclusion Cisco MATE Design models complex routing policies by creating demands with user-defined external endpoints. These endpoints can be used as a source or destination of a demand. Failure of an endpoint member instantly updates the simulation and the effects on the network are immediately apparent.
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4 For More Information For more information on Cisco MATE Design please visit http://www.cisco.com. Printed in USA C11-728868-00 07/13