This document provides information on configuring network multipathing (IPMP) in Oracle Solaris to provide network interface failover and increased throughput. It describes how IPMP uses multiple network interfaces connected to the same subnet and monitors them to detect failures and reroute traffic to functioning interfaces. The document provides details on IPMP requirements, interface failure detection, and provides steps for configuring IPMP using configuration files and commands like ifconfig to add interfaces to a multipath group and assign test addresses for failure monitoring.
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
This document provides an overview of establishing internet connectivity through exploring packet delivery processes, enabling static routing, managing traffic using access control lists (ACLs), and enabling internet connectivity. It discusses topics such as packet and frame formats, routing metrics, path determination, switching functions of routers, static route configuration and verification, ACL purposes and functions, and wildcard masking. The document is made up of multiple sections providing details on these various networking topics.
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
Cymphonix active-passive high availability v9encikkidal
This document describes new active-passive high availability features in Network Composer EX Series version 9. It allows a secondary Network Composer appliance to take over traffic filtering if the primary fails. Admins select an interface to sync configurations between appliances and assign primary/secondary roles. Failover is designed to maintain internet access by optionally bypassing filtering on the secondary until the primary is restored.
The document discusses the link layer and provides an overview of its services and functions. It describes multiple access protocols for shared mediums including ALOHA, slotted ALOHA, CSMA, CSMA/CD. CSMA/CD is used in Ethernet and detects collisions to reduce wasted bandwidth. The document outlines error detection methods like parity checking, cyclic redundancy checks, and discusses how the link layer is implemented in network interface cards.
Building Scalable Cisco Internetworks (Bsci)CCNAResources
This document provides a summary of key topics about the Building Scalable Cisco Internetworks (BSCI) 642-901 exam, including routing protocols like EIGRP, OSPF, and BGP. It outlines the contents, objectives, and recommends additional reading and hands-on practice to fully prepare for the exam. The summary is intended to help remember topics, but not replace learning the foundational knowledge required to pass.
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
This document provides an overview of establishing internet connectivity through exploring packet delivery processes, enabling static routing, managing traffic using access control lists (ACLs), and enabling internet connectivity. It discusses topics such as packet and frame formats, routing metrics, path determination, switching functions of routers, static route configuration and verification, ACL purposes and functions, and wildcard masking. The document is made up of multiple sections providing details on these various networking topics.
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
Cymphonix active-passive high availability v9encikkidal
This document describes new active-passive high availability features in Network Composer EX Series version 9. It allows a secondary Network Composer appliance to take over traffic filtering if the primary fails. Admins select an interface to sync configurations between appliances and assign primary/secondary roles. Failover is designed to maintain internet access by optionally bypassing filtering on the secondary until the primary is restored.
The document discusses the link layer and provides an overview of its services and functions. It describes multiple access protocols for shared mediums including ALOHA, slotted ALOHA, CSMA, CSMA/CD. CSMA/CD is used in Ethernet and detects collisions to reduce wasted bandwidth. The document outlines error detection methods like parity checking, cyclic redundancy checks, and discusses how the link layer is implemented in network interface cards.
Building Scalable Cisco Internetworks (Bsci)CCNAResources
This document provides a summary of key topics about the Building Scalable Cisco Internetworks (BSCI) 642-901 exam, including routing protocols like EIGRP, OSPF, and BGP. It outlines the contents, objectives, and recommends additional reading and hands-on practice to fully prepare for the exam. The summary is intended to help remember topics, but not replace learning the foundational knowledge required to pass.
EtherChannel aggregates multiple physical links between two devices into a single logical trunk to increase bandwidth and provide link redundancy. It uses either the Cisco proprietary PAgP protocol or the IEEE standard LACP protocol to automatically negotiate the creation of EtherChannel links. Key requirements for EtherChannel include all ports having the same speed, duplex, and VLAN configuration. The show commands can be used to verify and troubleshoot EtherChannel configurations.
Tutorial about MPLS Implementation with Cisco Router, this third of three chapter discuss about how to Optimize MPLS Networks, especially for L3VPN / VPRN, by using Route Reflector (RR) Technology
The document discusses implementing an OSPF routing protocol. It provides an overview of OSPF including how it establishes neighbor relationships, propagates link state advertisements, and uses the shortest path first algorithm to calculate routes. It then covers topics like configuring single-area and multi-area OSPF, setting the router ID, verifying the OSPF configuration, and different OSPF network types including broadcast and point-to-point.
This document provides an overview of EtherChannel concepts and configuration. EtherChannel allows linking multiple physical Ethernet ports together to form a single logical trunk with increased bandwidth. It uses protocols like PAgP and LACP to dynamically establish and maintain EtherChannel bundles. EtherChannel load balances traffic across physical ports and treats the bundle as a single logical port for functions like spanning tree. The document outlines terminology, configuration, verification commands, and considerations for optimizing EtherChannel deployment.
The document provides an overview of Internet Enhanced Service (IES) on Alcatel-Lucent platforms. IES allows customer IP interfaces to participate in the same routing instance as the service network core. Key points include:
- IES provides Internet connectivity through logical IP interfaces with SAP access points.
- Multiple IES services can be created to separate customer IP interfaces.
- Features like QoS policy propagation using BGP (QPPB) and VRRP are supported on IES interfaces.
This document discusses ArubaOS switch stacking, including:
- Backplane stacking allows connecting multiple switches together to simplify operations and optimize uplink usage.
- Topologies supported are chain, ring, and mesh, with ring and mesh recommended for redundancy.
- Key functions of stacking include topology discovery, electing a commander and standby, managing members, and handling splits.
- Specific switch models like the 3800 and 2900 series support backplane stacking of up to 10 units in ring topology with stacking throughput of up to 160Gbps.
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
The document discusses implementing an EIGRP-based solution for computer networking. It covers topics such as EIGRP configuration, metrics, neighbor discovery, route summarization, and troubleshooting. Specific configuration commands are provided for enabling EIGRP routing, verifying neighbor relationships, and modifying interface metrics. The routing protocol's use of DUAL, finite state machines, and automatic summarization are also explained.
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Đồng Quốc Vương
This document provides the final exam answers for CCNA 3 v5 Scaling Networks from 2014. It includes 40 multiple choice questions related to networking topics like VLANs, trunking, routing, DHCP, wireless networking, and security. The questions are taken from the CCNA 3 v5 final exam and provide the correct answer choices for each question.
This document provides information on various techniques for load balancing and redundancy, including:
- Load balancing over multiple gateways using policy routing based on client IP address, firewall mangle rules, and default routes.
- VRRP (Virtual Router Redundancy Protocol) for high availability using a virtual IP address, master and backup routers, and fast failover detection.
- Mikrotik PCC (Per Connection Classifier) load balancing which divides traffic into equal streams using a hashing algorithm on packet header fields and marks connections for policy routing out specific gateways.
The document discusses how the Link Aggregation Control Protocol (LACP) provides a standardized way for systems connected by aggregated links to negotiate the configuration of those links and enable communication. It describes how LACP works, its support on Juniper devices including SRX series firewalls and chassis clusters, and how to configure LACP modes and intervals on both standalone and clustered devices.
FreeRangeRouting - A new Quagga fork with more open developmentAPNIC
FRR is an open source routing software stack that is a fork of Quagga with a more open development process. It implements various routing protocols like RIP, OSPF, ISIS, BGP, PIM, and LDP. FRR was created to have a more methodical review of code submissions, more automated testing of contributions, and development centered around GitHub. It is led by an elected steering committee and maintained by Linux Foundation. Current status includes upcoming release of first stable version with improvements like performance fixes, AddPath support, and new features like MPLS and LDP support.
Ether Channel High Speed Data TransmissionNetwax Lab
EtherChannel allows grouping of physical Ethernet links into a single logical link to provide increased bandwidth and redundancy. It bundles multiple ports together and aggregates their bandwidth, and if one port fails traffic is load balanced across the remaining links. EtherChannel configuration requires consistent settings across the linked interfaces, including VLANs, speed, duplex, and trunking mode.
The document discusses IPv6, the next generation internet protocol. It introduces IPv6, describing its benefits over IPv4 including vastly larger address space. It then covers key aspects of IPv6 such as address types, auto-configuration, routing protocols, and technology scope. IPv6 aims to meet growing internet demands through expanded addressing and more efficient headers.
mod_ftp is a module for Apache HTTP Server that implements the File Transfer Protocol (FTP) within the Apache architecture. It leverages Apache's flexibility to serve FTP alongside HTTP and HTTPS from the same server instance. mod_ftp supports key FTP features like SSL/TLS encryption, authentication, dynamic content, and logging while integrating with the Apache ecosystem. The document provides an overview of mod_ftp's capabilities and includes a sample configuration.
MPLS Traffic Engineering provides mechanisms to optimize network traffic flow and efficiently utilize bandwidth. It determines paths based on additional parameters like available resources and constraints. This allows load balancing across unequal paths and routing around failed links or nodes. MPLS TE uses extensions to IGPs to distribute link attributes and tunnel information. Constrained Shortest Path First (CSPF) is used for path computation to find paths meeting constraints like bandwidth and affinities. Tunnels are set up using RSVP-TE and traffic can be forwarded down tunnels using methods like static routes, auto-routing, or policy routing. Fast Re-Route provides local repair of TE tunnels if a link or node fails to minimize traffic loss.
The paper reports an implementation of Single System Image Server Cluster (SSISC). The Servers have been configured with same MAC and IP addresses and are connected through a two layer switch. Implementation has been done by modifying iptables and recompiling the linux kernel. This implementation has been tested for performance using WebStone. WebStone is a highly- configurable client-server benchmark for HTTP servers. This implementation removes a possibility of single point failure of web cluster. The implementation automatically detects newly added and failed server and hence reliable. The test indicates that requests are distributed to servers in the cluster, depends on the policy of distribution.
Web Server Technologies I: HTTP & Getting StartedPort80 Software
Introduction to HTTP: TCP/IP and application layer protocols, URLs, resources and MIME Types, HTTP request/response cycle and proxies. Setup and deployment: Planning Web server & site deployments, Site structure and basic server configuration, Managing users and hosts.
Point to point (PxP) applications are used to connect two locations over wireless. They act as a bridge to carry a signal from point A to point B, such as providing internet access to a remote area. To set up a PxP link using Tranzeo equipment, the first unit at the source location is configured as an access point, while the second unit at the remote location is configured as a client infrastructure connected in bridge mode. Both units must have their PxP mode enabled and configured with each other's MAC address to isolate the connection between just the two units.
EtherChannel aggregates multiple physical links between two devices into a single logical trunk to increase bandwidth and provide link redundancy. It uses either the Cisco proprietary PAgP protocol or the IEEE standard LACP protocol to automatically negotiate the creation of EtherChannel links. Key requirements for EtherChannel include all ports having the same speed, duplex, and VLAN configuration. The show commands can be used to verify and troubleshoot EtherChannel configurations.
Tutorial about MPLS Implementation with Cisco Router, this third of three chapter discuss about how to Optimize MPLS Networks, especially for L3VPN / VPRN, by using Route Reflector (RR) Technology
The document discusses implementing an OSPF routing protocol. It provides an overview of OSPF including how it establishes neighbor relationships, propagates link state advertisements, and uses the shortest path first algorithm to calculate routes. It then covers topics like configuring single-area and multi-area OSPF, setting the router ID, verifying the OSPF configuration, and different OSPF network types including broadcast and point-to-point.
This document provides an overview of EtherChannel concepts and configuration. EtherChannel allows linking multiple physical Ethernet ports together to form a single logical trunk with increased bandwidth. It uses protocols like PAgP and LACP to dynamically establish and maintain EtherChannel bundles. EtherChannel load balances traffic across physical ports and treats the bundle as a single logical port for functions like spanning tree. The document outlines terminology, configuration, verification commands, and considerations for optimizing EtherChannel deployment.
The document provides an overview of Internet Enhanced Service (IES) on Alcatel-Lucent platforms. IES allows customer IP interfaces to participate in the same routing instance as the service network core. Key points include:
- IES provides Internet connectivity through logical IP interfaces with SAP access points.
- Multiple IES services can be created to separate customer IP interfaces.
- Features like QoS policy propagation using BGP (QPPB) and VRRP are supported on IES interfaces.
This document discusses ArubaOS switch stacking, including:
- Backplane stacking allows connecting multiple switches together to simplify operations and optimize uplink usage.
- Topologies supported are chain, ring, and mesh, with ring and mesh recommended for redundancy.
- Key functions of stacking include topology discovery, electing a commander and standby, managing members, and handling splits.
- Specific switch models like the 3800 and 2900 series support backplane stacking of up to 10 units in ring topology with stacking throughput of up to 160Gbps.
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
The document discusses implementing an EIGRP-based solution for computer networking. It covers topics such as EIGRP configuration, metrics, neighbor discovery, route summarization, and troubleshooting. Specific configuration commands are provided for enabling EIGRP routing, verifying neighbor relationships, and modifying interface metrics. The routing protocol's use of DUAL, finite state machines, and automatic summarization are also explained.
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Đồng Quốc Vương
This document provides the final exam answers for CCNA 3 v5 Scaling Networks from 2014. It includes 40 multiple choice questions related to networking topics like VLANs, trunking, routing, DHCP, wireless networking, and security. The questions are taken from the CCNA 3 v5 final exam and provide the correct answer choices for each question.
This document provides information on various techniques for load balancing and redundancy, including:
- Load balancing over multiple gateways using policy routing based on client IP address, firewall mangle rules, and default routes.
- VRRP (Virtual Router Redundancy Protocol) for high availability using a virtual IP address, master and backup routers, and fast failover detection.
- Mikrotik PCC (Per Connection Classifier) load balancing which divides traffic into equal streams using a hashing algorithm on packet header fields and marks connections for policy routing out specific gateways.
The document discusses how the Link Aggregation Control Protocol (LACP) provides a standardized way for systems connected by aggregated links to negotiate the configuration of those links and enable communication. It describes how LACP works, its support on Juniper devices including SRX series firewalls and chassis clusters, and how to configure LACP modes and intervals on both standalone and clustered devices.
FreeRangeRouting - A new Quagga fork with more open developmentAPNIC
FRR is an open source routing software stack that is a fork of Quagga with a more open development process. It implements various routing protocols like RIP, OSPF, ISIS, BGP, PIM, and LDP. FRR was created to have a more methodical review of code submissions, more automated testing of contributions, and development centered around GitHub. It is led by an elected steering committee and maintained by Linux Foundation. Current status includes upcoming release of first stable version with improvements like performance fixes, AddPath support, and new features like MPLS and LDP support.
Ether Channel High Speed Data TransmissionNetwax Lab
EtherChannel allows grouping of physical Ethernet links into a single logical link to provide increased bandwidth and redundancy. It bundles multiple ports together and aggregates their bandwidth, and if one port fails traffic is load balanced across the remaining links. EtherChannel configuration requires consistent settings across the linked interfaces, including VLANs, speed, duplex, and trunking mode.
The document discusses IPv6, the next generation internet protocol. It introduces IPv6, describing its benefits over IPv4 including vastly larger address space. It then covers key aspects of IPv6 such as address types, auto-configuration, routing protocols, and technology scope. IPv6 aims to meet growing internet demands through expanded addressing and more efficient headers.
mod_ftp is a module for Apache HTTP Server that implements the File Transfer Protocol (FTP) within the Apache architecture. It leverages Apache's flexibility to serve FTP alongside HTTP and HTTPS from the same server instance. mod_ftp supports key FTP features like SSL/TLS encryption, authentication, dynamic content, and logging while integrating with the Apache ecosystem. The document provides an overview of mod_ftp's capabilities and includes a sample configuration.
MPLS Traffic Engineering provides mechanisms to optimize network traffic flow and efficiently utilize bandwidth. It determines paths based on additional parameters like available resources and constraints. This allows load balancing across unequal paths and routing around failed links or nodes. MPLS TE uses extensions to IGPs to distribute link attributes and tunnel information. Constrained Shortest Path First (CSPF) is used for path computation to find paths meeting constraints like bandwidth and affinities. Tunnels are set up using RSVP-TE and traffic can be forwarded down tunnels using methods like static routes, auto-routing, or policy routing. Fast Re-Route provides local repair of TE tunnels if a link or node fails to minimize traffic loss.
The paper reports an implementation of Single System Image Server Cluster (SSISC). The Servers have been configured with same MAC and IP addresses and are connected through a two layer switch. Implementation has been done by modifying iptables and recompiling the linux kernel. This implementation has been tested for performance using WebStone. WebStone is a highly- configurable client-server benchmark for HTTP servers. This implementation removes a possibility of single point failure of web cluster. The implementation automatically detects newly added and failed server and hence reliable. The test indicates that requests are distributed to servers in the cluster, depends on the policy of distribution.
Web Server Technologies I: HTTP & Getting StartedPort80 Software
Introduction to HTTP: TCP/IP and application layer protocols, URLs, resources and MIME Types, HTTP request/response cycle and proxies. Setup and deployment: Planning Web server & site deployments, Site structure and basic server configuration, Managing users and hosts.
Point to point (PxP) applications are used to connect two locations over wireless. They act as a bridge to carry a signal from point A to point B, such as providing internet access to a remote area. To set up a PxP link using Tranzeo equipment, the first unit at the source location is configured as an access point, while the second unit at the remote location is configured as a client infrastructure connected in bridge mode. Both units must have their PxP mode enabled and configured with each other's MAC address to isolate the connection between just the two units.
Johannes Gutenberg invented the printing press in the 15th century, revolutionizing the spread of information. Heidelberg, a German printing press manufacturer founded in 1850, has since become a global leader in printing technology and solutions. It introduced high-speed presses in the 1930s and expanded globally. In the late 20th century, Heidelberg acquired other companies and developed digital presses, transforming from a press manufacturer into an integrated printing solutions provider. However, the printing industry now faces challenges from electronic formats and the internet.
WISEngineering is an online learning environment that uses engineering design pedagogy to improve STEM learning. It builds upon prior work from UC Berkeley and is being developed at the University of Virginia. Engineering design pedagogy involves presenting students with design challenges that have specifications and constraints to solve open-ended problems. WISEngineering embeds knowledge and skill builders, assessments, and a cyber interface to deliver hybrid instruction combining online and hands-on learning through an engineering design cycle process.
There are two main ways to mount a CDROM on Solaris:
1) Using the vold daemon, which automatically mounts CDROMs similarly to how Windows manages them.
2) Direct mounting using the mount command by determining the device name and specifying it along with the mount point in the command.
Some key steps include verifying that vold is running, restarting it if needed, and using commands like fuser to check for any processes preventing unmounting if issues occur.
Cd rom how solaris manages cd-rom and diskette devicesBui Van Cuong
This document discusses how Solaris manages CD-ROM and diskette devices. It describes how Volume Management automatically mounts and tracks these removable media. Volume Management uses the /etc/vold.conf file to determine which devices to manage. Administrators can update this file to add new CD-ROM or diskette drives. Mounted removable media is accessible in directories like /cdrom and /floppy.
Cd rom mounting and unmounting the cd-rom driver on solaris-linuxBui Van Cuong
This document provides instructions for mounting and unmounting a CD-ROM drive on Solaris or Linux systems when installing Cisco Signaling Gateway Manager (SGM) software. It describes how to mount both local and remote CD-ROM drives, including drives exported over the network via NFS. The steps include mounting the drive, installing SGM, and then unmounting the drive when finished.
Solaris 10 workshop solaris 10 user commandsBui Van Cuong
This document provides a list of Solaris 10 user commands organized alphabetically from A to Z. It includes brief descriptions of each command, such as what they are used for and common arguments. Some examples provided are acctcom to search and print process accounting files, alias to create command aliases, and cp to copy files. Over 250 commands are listed in total.
This document summarizes an offset printing senior project. It discusses different jobs in offset printing like press operator and plate designer, and their typical salaries ranging from $30,000 to $350,000. It describes how the author wanted to learn about the physical process of creating printed products. It then details the author's project, working with a facilitator at Sull Graphic's to design a brochure comparing three offset printing presses and learning how to operate a press.
Solaris 10 workshop solaris 10 user commandsBui Van Cuong
This document provides a list of Solaris 10 user commands organized alphabetically from A to Z. It includes brief descriptions of common commands like acctcom, adb, addbib, admin, alias, apropos, ar, as, at, awk, bc, cal, cat, cc, cd, chgrp, chmod, chown, cmp, cp, cpio, csh, date, df, diff, du, echo, ed, env, ex, expand, expr, factor, false, fg, file, find, grep, ls, more, nice, nohup, od, paste, pr, printenv, printf, ps, pwd, rm, sed, sleep, sort, split
The document discusses IBM's digital strategy and marketing approach, including examples of how IBM uses social media for internal and external communications, brand building, corporate social responsibility initiatives, and demand generation. It also covers how IBM measures the impact of its digital efforts and lessons learned around developing an integrated digital strategy.
Solaris 10 workshop service management facilityBui Van Cuong
This document provides an overview and agenda for a Solaris 10 workshop on Service Management Facility (SMF). It introduces core SMF concepts like services, dependencies, and states. It explains how SMF provides a standardized way to define and manage services compared to previous Solaris methods. The document also outlines administrative SMF commands and how to migrate legacy services to SMF.
Basic solaris 10 system administration commandsBui Van Cuong
This document provides a list of Solaris 10 system administration commands organized alphabetically from A to Z. It includes brief one-line descriptions of each command's purpose, such as configuring network interfaces (ifconfig), checking and repairing file systems (fsck), and starting and stopping network services (inetd).
IPv6 is an updated version of IPv4 that provides more IP addresses and improved network management. An IPv6 firewall can be configured using commands to view and set port and adapter settings for IPv6 protection. IPv6 addresses are 128-bit and can be unicast, multicast, or anycast. Unicast sends data to one device, multicast to groups, and anycast to the closest matching device. IPv6 firewalls provide benefits like more address space but challenges include more complex addresses and transition time from IPv4.
Routers forward data packets between networks while switches operate at the data link layer and forward packets within a local area network. Hubs simply broadcast all incoming data to all ports. The document provides answers to common CCNA interview questions about networking fundamentals like IP addressing, routing, switching, protocols and Cisco router components.
The document contains a practice exam for CCNA 1 with multiple choice questions about networking concepts. It covers topics like the OSI model, TCP/IP, IPv4 and IPv6 addressing, routing, switching, and troubleshooting. An example question asks which layer of the OSI model would format data as shown in an exhibit. The correct answer is the data link layer.
This document discusses network management and its key components of fault management, configuration management, accounting management, performance management, and security management. It provides details on fault management, configuration management, and performance management. Fault management detects, isolates, and resolves problems to minimize downtime. Configuration management maintains information about network components. Performance management measures network utilization to regulate users and ensure service level agreements are met. It also discusses the TCP/IP protocol model and its layers including physical network, data link, internet, transport, and application layers.
Apache Spark has rocked the big data landscape, becoming the largest open source big data community with over 750 contributors from more than 200 organizations. Spark's core tenants of speed, ease of use, and its unified programming model fit neatly with the high performance, scalable, and manageable characteristics of modern Java runtimes. In this talk Tim Ellison, a JVM developer at IBM, shows some of the unique Java 8 capabilities in the JIT compiler, fast networking, serialization techniques, and GPU off-loading that deliver the ultimate big data platform for solving business problems. Tim will demonstrate how solutions, previously infeasible with regular Java programming, become possible with this high performance Spark core runtime, enabling you to solve problems smarter and faster.
This document contains a test for a Systems Administrator position with 21 multiple choice and short answer questions covering topics like NTFS permissions, Active Directory, networking, Outlook, and more. The test is meant to assess the candidate's knowledge but does not expect they will know all the answers.
Sockets identify endpoints in a network and allow a single computer to serve multiple clients simultaneously through the use of ports. Servers listen on ports until clients connect, and must be multithreaded to manage multiple connections. Networking uses protocols like IP, TCP, UDP, and HTTP. IP routes packets across networks, TCP reliably strings packets together, and UDP supports fast but unreliable transport. Internet addresses uniquely identify computers and have transitioned from IPv4 to IPv6. Domain names map to IP addresses through DNS for human-friendly access.
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
1)Please explain the commands ifconfig, ping, traceroute, netstat, dig, nslookup, route, host,
hostname.
2). Explain briefly about TCP/IP and its Protocol Architecture.
3) Explain the difference between TCP/IP Protocol stack and OSI model.
Solution
Answer:
1) Ipconfig
Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display
the network settings currently assigned and given by a network. This command can be utilized to
verify a network connection as well as to verify your network settings.
Ping
Ping is one of the most commonly used network commands that allows you to ping another
network IP address. Pinging another address helps determine if the network card can
communicate within the local network or outside network.
Netstat
The netstat command is used to display the TCP/IP network protocol statistics and information.
Nslookup
The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a
domain or host on a network.
Route
The route MS-DOS utility enables computers to view and modify the computer\'s route table.
traceroute
The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating
systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a
network packet travels through the network and where it may fail or slow down. Using this
information you can determine the computer, router, switch or other network device possibly
causing your network issues.
host
solves a host name into an Internet Protocol (IP) address or an IP address into a host name.
the hostname command is used to show or set a computer\'s host name and domain name. It is
one of the most basic of the network administrative utilities.
A host name is a name that is assigned to a host (i.e., a computer connected to the network) that
uniquely identifies it on a network and thus allows it to be addressed without using its full IP
address. Domain names are user-friendly substitutes for numeric IP addresses.
The basic syntax for the hostname command is
hostname [options] [new_host_name]
2)TCP/IP protocols map to a four-layer conceptual model known as the DARPA model , named
after the U.S. government agency that initially developed TCP/IP. The four layers of the DARPA
model are: Application, Transport, Internet, and Network Interface. Each layer in the DARPA
model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI)
model.
Network Interface Layer
The Network Interface layer (also called the Network Access layer) is responsible for placing
TCP/IP packets on the network medium and receiving TCP/IP packets off the network medium.
TCP/IP was designed to be independent of the network access method, frame format, and
medium. In this way, TCP/IP can be used to connect differing network types. These include
LAN technologies such as Ethernet and Token Ring and WAN technologies such as X.25 and
Frame Relay. Independence from any specific ne.
The document discusses pipeline architecture and describes:
1. The difference between run-to-completion and pipeline software models, where pipeline models disperse packets to other cores for processing.
2. How the Intel DPDK Packet Framework can be used to rapidly develop packet processing applications using standard pipeline blocks like ports, tables, and a pipeline configuration API.
3. How the DPDK Packet Demonstrators (DPPD) provide sample applications and configurations to analyze performance and find bottlenecks in multi-core packet processing applications.
This document provides an overview of networking and security concepts including the OSI model, functions of common network devices like routers, switches, firewalls and IDS/IPS systems. It describes technologies like NAT, VPNs, encryption, file integrity monitoring and SIEM. It also includes brief introductions to Linux, the CCNA and a case study on site-to-site VPN deployment considerations.
The document discusses various tools and interfaces available in the Metasploit framework. It describes the purpose of tools like msfconsole, msfcli, msfrpcd, msfd, msfencode and msfpayload which can be used for tasks like exploitation, payload generation, encoding and interacting with the framework remotely. It also provides usage examples and basic syntax for many of these tools.
The document discusses the functions of the transport layer in the OSI model. It explains that the transport layer accepts data from the session layer, breaks it into packets and delivers them to the network layer. It is responsible for guaranteeing successful arrival of data at the destination and provides end-to-end communication between source and destination transport layers. The transport layer separates upper layers from low-level data transmission details and handles any data loss or damage. It can transmit packets in the same order or as isolated messages depending on the network and protocol.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer and their functions. It also explains the four layers of the TCP/IP model and some of the common protocols used in each layer such as IP, TCP, UDP, HTTP, FTP etc. Additionally, it summarizes the Address Resolution Protocol (ARP), which maps IP addresses to MAC addresses when a host needs to deliver a packet on a local network.
The document provides an overview of the OSI model and TCP/IP protocols. It describes the seven layers of the OSI model from the physical layer to the application layer. It then explains the five layers of the TCP/IP model and how encapsulation works. The document also covers topics such as addressing, fragmentation, segmentation, and IP addressing and subnetting.
Basic Introduction to Technology (networking).pdftthind
The document provides an overview of networking concepts and components. It begins with basic definitions of networks and networking. It then describes common networking devices like hubs, switches, routers, and network cards. It covers networking cables, IPv4 addressing, routing protocols like RIP and EIGRP, redistribution between protocols, ACLs, NAT, VPN tunnels, and Frame Relay. It concludes with an example implementation of a VPN tunnel between two routers.
Network management involves operating, managing, and monitoring voice and data networks. It consists of five key areas: fault management, configuration management, accounting, performance management, and security management. Fault management detects, isolates, and resolves problems to minimize downtime. Configuration management involves organizing and maintaining information about all network components in a database. This helps with maintenance, repair, expansion, and upgrades. Performance management measures network utilization for accounting and regulating user access appropriately.
The document discusses network reference models and the OSI and TCP/IP models. It provides details on each layer of the OSI model and its functions. The key points are that reference models divide network communication into simpler components, provide standardization, and prevent changes in one layer from affecting others. The OSI model has 7 layers and separates network functions into upper layers for applications and lower layers for data transmission. The TCP/IP model is based on widely used TCP and IP protocols.
Multicast routing configuration and lab example in MikroTik
video multicast routing 1 router
https://www.youtube.com/watch?v=nqUlUIB93Mg
video multicast routing 2 router over wireless
https://www.youtube.com/watch?v=eYEocGYsGZ4
Konfig VLC sebagai stream server multicast
https://www.youtube.com/watch?v=Z1lthcBSSrM
Konfig VLC sebagai player
https://www.youtube.com/watch?v=s2uTs8NRQpY
Learnings from Successful Jobs SearchersBruce Bennett
Are you interested to know what actions help in a job search? This webinar is the summary of several individuals who discussed their job search journey for others to follow. You will learn there are common actions that helped them succeed in their quest for gainful employment.
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...dsnow9802
Jill Pizzola's tenure as Senior Talent Acquisition Partner at THOMSON REUTERS in Marlton, New Jersey, from 2018 to 2023, was marked by innovation and excellence.
A Guide to a Winning Interview June 2024Bruce Bennett
This webinar is an in-depth review of the interview process. Preparation is a key element to acing an interview. Learn the best approaches from the initial phone screen to the face-to-face meeting with the hiring manager. You will hear great answers to several standard questions, including the dreaded “Tell Me About Yourself”.
IT Career Hacks Navigate the Tech Jungle with a RoadmapBase Camp
Feeling overwhelmed by IT options? This presentation unlocks your personalized roadmap! Learn key skills, explore career paths & build your IT dream job strategy. Visit now & navigate the tech world with confidence! Visit https://www.basecamp.com.sg for more details.
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?NWEXAM
Begin Your Preparation Here: https://bit.ly/3VfYStG — Access comprehensive details on the FCP_FAC_AD-6.5 exam guide and excel in the Fortinet Certified Professional - Network Security certification. Gather all essential information including tutorials, practice tests, books, study materials, exam questions, and the syllabus. Solidify your knowledge of Fortinet FCP_FAC_AD-6.5 certification. Discover everything about the FCP_FAC_AD-6.5 exam, including the number of questions, passing percentage, and the time allotted to complete the test.
Leadership Ambassador club Adventist modulekakomaeric00
Aims to equip people who aspire to become leaders with good qualities,and with Christian values and morals as per Biblical teachings.The you who aspire to be leaders should first read and understand what the ambassador module for leadership says about leadership and marry that to what the bible says.Christians sh
Joyce M Sullivan, Founder & CEO of SocMediaFin, Inc. shares her "Five Questions - The Story of You", "Reflections - What Matters to You?" and "The Three Circle Exercise" to guide those evaluating what their next move may be in their careers.
In the intricate tapestry of life, connections serve as the vibrant threads that weave together opportunities, experiences, and growth. Whether in personal or professional spheres, the ability to forge meaningful connections opens doors to a multitude of possibilities, propelling individuals toward success and fulfillment.
Eirini is an HR professional with strong passion for technology and semiconductors industry in particular. She started her career as a software recruiter in 2012, and developed an interest for business development, talent enablement and innovation which later got her setting up the concept of Software Community Management in ASML, and to Developer Relations today. She holds a bachelor degree in Lifelong Learning and an MBA specialised in Strategic Human Resources Management. She is a world citizen, having grown up in Greece, she studied and kickstarted her career in The Netherlands and can currently be found in Santa Clara, CA.
1. Softpanorama
May the source be with you, but remember the KISS
principle ;-)
Search
Contents Bulletin Scripting in shell and
Perl
Network
troubleshooting History Humor
Free Solaris Resource Kit
oracle.com/Solaris
Learn How to Take Advantage of the Advanced Features of Oracle Solaris
Solaris Multipathing
News See Also Recommended Links Humor Quiz
Summary
Multipathing is controlled by the in.mpathd daemon which
detects failures.
The configuration file is /etc/default/mpathd
You can configure interfaces by direct editing of
hostname.interface configuration files or by using command
line utilities.
To configure IPMP, complete the following nine steps:
1. Verify the Solaris OE release.
2. Configure unique MAC addresses.
3. Configure IP addresses.
4. Configure the first interface as part of a multipath group.
5. Configure a test address for the first interface.
6. Configure the second interface as part of the the same
Enterprise Web
Hardware
solutions.radware.com
Create Loyalty By Beating
Customer Web Performance
Demands. See How!
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
2. interface multipath group as in step 2
7. Configure a test IP address for the second interface.
8. Start the in.mpathd IPMP process to monitor the interfaces.
9. Check the interface configuration.
Grouping Physical Interfaces. In configuration of multipath interfaces you need to use the ifconfig
command to configure groups. This command uses a new group parameter that requires a group name.
The ifconfig command places both the IPv4 and IPv6 instances of the interface in that group. The group
parameter has the following syntax:
ifconfig interface-name group group-name
Create IPv4 Test Addresses. The in.mpathd multipathing daemon requires a test IP address for detecting
failures and repairs. You must use a routeable address for this IP address. The subnet prefix of the address
must be known to any routers present on the link. You use the ifconfig command's new -failover option to
configure a test address. Use the following syntax to configure a test address:
# ifconfig interface-name addif ip-address <other-parameters> -failover up
Example:
# cat /etc/hostname.qfe0
myhost netmask + broadcast + group mpgrp-one up
addif myhost-test0 deprecated netmask + broadcast + -failover up
Note - You must mark an IPv4 test address as deprecated to prevent applications from using the test address. See How to
Configure a Multipathing Interface Group With Two Interfaces. Use failover without the dash to turn on the failover attribute of the
address.
To verify the system’s failover configuration, or to change the operational status of IPMP interfaces, use the if_mpadm
Introduction
Network interfaces are exposed to failure because they connect to network cables and
hardware components in the form of switches or hubs. Failure of any of these interfaces results
in network failure, even if the network interface card (NIC) that is in place does not fail. Sun
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
3. offers two features that address customer network bandwidth demands: IPMP and Sun
Trunking software.
IPMP enables multiple interfaces with different IP addresses on the same subnet to be
connected to the same network segment. If any one of these interfaces fail, current network
connections through that interface will be migrated to another interface automatically: physical
interface on failed adapter will became logical on another (working) LAN adapter. This is a
pretty neat idea.
In general, multipathing is a method of using redundancy and automatic fail-over that provides
at least two physical paths to a target resource. It allow recovery from a single network path
failure by re-routing data traffic. That is important for network storage. Varian of multipathing
called trunking also allows for the parallel transmission of data, which can result in faster throughput and increased scalability.
Solaris 10 supports Solaris network multipathing via:
IPMP load spreading—outgoing network traffic is able to utilize several network interfaces
network trunking — multiple physical network interfaces are treated as one; combining these interfaces, which is accomplished in
the TCP/IP stack, allows link aggregation and availability
IPMP in Solaris has the following features/capabilities:
Eliminates a single network adapter as a single point-of-failure in
these cases:
Network adapter failure detection (failover)
Network adapter repair detection (failback)
Provides outbound load spreading when traffic is flowing to multiple destinations.
Enables interfaces to failover within approximately 10 seconds when using the default configuration. Can be configured by adjusting
the parameters in the /etc/default/mpathd file.
Can be configured for both IPv4 and IPv6.
Allows interfaces to be configured as Standby Interfaces. These types of interfaces are only used for failover and are not used for
outbound load spreading, unless they are explicitly chosen by an application.
The Sun multipathing software (MPxIO) allows the merging of multiple SCSI layer paths, such as an iSCSI device exposing the same LUN
via two different iSCSI target names (or the same name with different target portal group tags). In addition, one FC path and one iSCSI path
can be merged by MPxIO if the target device supports these options. Additional functionality, such as iSCSI Multiple Connections / Session
(MC/S), might be supported in future Solaris releases.
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
4. Multiple physical connections between a host and a target provides two major benefits: availability and link aggregation.
When multiple physical connections exist between host and storage, if one connection is lost, then I/O can be rerouted through other paths.
To maximize availability and eliminate single points of failure, the following components in a storage architecture must be made redundant:
portals on the initiator and target switches
IP network (various components)
array controllers
For more information about configuring a high availability network, see Enterprise Network Design Patterns: High Availability (Sun
BluePrints Online—December, 2003) at http://www.sun.com/blueprints/1203/817-4683.pdf
Link Aggregation
Multipathing drivers can route data through multiple paths in parallel, resulting in increased throughput between host and storage. Current
commodity Ethernet implementations support 1Gb/S full duplex, for an aggregate throughput of 2Gb/S (if transmit and receive traffic is
balanced (if, for example, the network supports 1Gb incoming and 1Gb outgoing traffic). Combining multiple links can scale performance.
Implementing Multipathing
IPMP is a product that was first included with the Solaris 8. IPMP provides enhanced network availability. IPMP enables the Solaris to
recover from network path failures. IPMP also provides increased throughput by spreading the outbound load across interfaces when
multiple network adapters are connected to the same IP link; for example, to the same Ethernet switch.
If a failure occurs in the network link and an alternate adapter is configured, the IP address fails over. The network access changes
automatically from the failed adapter to the alternate adapter, allowing uninterrupted access to the network. When there are multiple network
adapters that are connected to the same IP link, increased throughput can be achieved by spreading the outbound load across multiple
network interfaces.
IPMP has the following features:
Eliminates a single network adapter as a single point-of-failure in
these cases:
Network adapter failure detection (failover)
Network adapter repair detection (failback)
Provides outbound load spreading when traffic is flowing to multiple destinations.
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
5. Enables interfaces to failover within approximately 10 seconds when
using the default configuration.
Can be configured by adjusting the parameters in the /etc/default/mpathd file.
Can be configured for both IPv4 and IPv6.
Allows interfaces to be configured as Standby Interfaces. These types
of interfaces are only used for failover and are not used for outbound
load spreading, unless they are explicitly chosen by an application.
IPMP Requirements
Unique media access control (MAC) addresses must be configured on each network interface (the default configuration for
old Sun network adapters has all network interfaces on a specific server using the same MAC address). IPMP requires that all LAN
adapters have unique MAC addresses. Switched configurations use MAC addresses when making network decisions. Therefore for
old Sun hardware, you must change the system’s default configuration to ensure that each LAN adapter has a unique MAC address to
avoid a MAC address conflict.
Multiple network adapter interfaces must be connected on each subnet. You can configure IPMP with a single network interface
to take advantage of network failure detection. To use the full benefit of IPMP, make sure that two or more network interfaces are
connected to the same subnet.
A network adapter group name must be assigned to IPMP interfaces. Interfaces that are to be deployed as multipath interfaces
must belong to a multipath group. The in.mpathd multipath process uses the multipath group. Use a meaningful name that does not
include spaces when you choose a group name. The multipath name is local to the system and is not used across the network.
A test address is assigned to an interface. The multipath process uses test addresses, which must be routable addresses, to
monitor the status of each individual interface. Use the test addresses to detect failure and recovery of an interface. These addresses
are deprecated at configuration time to make sure that they cannot be used to pass network traffic from other applications.
Additional hosts must exist on the same subnet. The test interfaces use ICMP echo request, reply, or both to hosts that they reach
by addressing the 224.0.0.1 multicast group or the default router, as listed in the /etc/defaultrouter file.
Interface Failure Detection and Repair
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
6. The in.mpathd process can detect both the failure and the repair of an interface by:
Sending ICMP echo requests to the special host (for example default router) and monitoring responses through the interface test
address.
Monitoring the internal IFF_RUNNING flag on the interface
An interface has failed if either of these two detection methods indicates a failure. An interface is considered repaired only if both methods
report that the interface is operational and can send and receive packets through the interface.
To detect the failure or repair of interfaces that belong to the multipath group, the in.mpathd process sends ICMP echo requests from the
logical IPMP interfaces to targets connected to the local network. The in.mpathd process determines which targets to probe dynamically. If
five consecutive probes do not receive replies, the interface is considered failed.
Adjust the failure detection time by editing the FAILURE_DETECTION_TIME variable from the default value of 10,000 milliseconds (10
seconds) in the /etc/default/mpathd file.
When responses to the ICMP echo requests are not received and a specific time period has elapsed, the physical interface is considered
failed. The IP address that is associated with the failed address is moved to a new
logical interface associated with another physical interface in the same IPMP group. Communications that were taking place continue to
function as though the original interface is still working properly.
ICMP echo requests are still attempted through the failed NIC to detect if a physical interface is repaired.
If all the NICs or targets appear to fail at the same time, this is a group failure, and no failover is performed. The in.mpathd process flushes
all of the current targets and attempts to discover new targets. Because in.mpathd process dynamically determines what targets to probe,
you cannot configure the targets. Routers connected to the link are chosen as targets for probing. If no routers exist on the link, arbitrary hosts
on the link are chosen by sending a multicast packet to the “all hosts” multicast address. When you configure IPMP, be sure to have at least
one additional system on the network.
You can configure multipathing by changing configuration files and rebooting, or you can work at the command line to avoid rebooting the
system.
Configuring Multipathing Using Configuration Files
This example shows IPMP configuration on an existing configured qfe0 interface and on an existing but unconfigured qfe1 interface on the
myhost (192.168.1.1) system. The multipath group is called mpgrp-one. The test addresses are:
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
7. 192.168.1.50 for the qfe0 interface
192.168.1.51 for the qfe1 interface
The data address for the qfe0 interface remains 192.168.1.1, and the data address for the qfe1 interface is 192.168.1.45.
To configure IPMP, complete the following steps, which are described in greater detail in the next sections.
1. Verify the Solaris OE release. The /etc/release file contains information about the installed version of the Solaris. It should be 9 or
higher.
2. Configure unique MAC addresses. To determine if unique MAC addresses are allowed, use the eeprom utility to view the contents
of the flash code electrically erasable programmable read-only memory (EEPROM):
# eeprom local-mac-address?
local-mac-address?=false
The preceding output indicates that the system is still in its default mode and uses the same MAC address for each interface. This is
indicated by the setting of the local-mac-address? variable to false. You now use
the eeprom utility to change the local-mac-address? variable to true:
# eeprom local-mac-address?=true
Verify that the local-mac-address? variable is set to true:
# eeprom local-mac-address?
Note – Depending on the combination of your system’s firmware and hardware architecture, you must either plumb the interface or reboot
the system to enable unique MAC address assignment after changing the eeprom variable.
3. Define data and test IP addresses. You can add the data and test IP addresses to the /etc/inet/hosts file for the sake of clarity. After
editing the /etc/inet/hosts file, use the tail utility to view the new information:
# tail -5 /etc/inet/hosts
# Modifications made for IPMP
192.168.1.1 myhost # Data address for qfe0
192.168.1.45 myhost-dat-qfe1 # Data address for qfe1
192.168.1.50 myhost-test0 # qfe0:1 Test address for qfe0
192.168.1.51 myhost-test1 # qfe1:1 Test address for qfe1
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
8. 4. Configure the interfaces. Multipath information is placed in the /etc/hostname.qfe0 and /etc/hostname.qfe1 files. Modify the
/etc/hostname.qfe0 file to contain contents similar to the following:
# cat /etc/hostname.qfe0
myhost netmask + broadcast + group mpgrp-one up
addif myhost-test0 deprecated netmask + broadcast + -failover up
addif myhost-test0 Creates the next unused logical interface, and assigns it the IP address associated with the myhost-test0 name in
/etc/hosts. deprecated Marks the address as a deprecated address. Addresses that are marked as deprecated are not used as source
addresses for outbound packets unless either there are no other addresses available on this interface or the application is bound to this
address explicitly.
The output from the ifconfig -a command shows DEPRECATED as one of the flags associated with this interface.
-failover Marks the address as a non-failover address. Addresses that are marked in this way do not fail
over when the interface fails. The output from the ifconfig -a command shows NOFAILOVERas
one of the flags associated with this interface.
Create the /etc/hostname.qfe1 file to contain contents similar to the following:
# cat /etc/hostname.qfe1
myhost-dat-qfe1 netmask + broadcast + group mpgrp-one up
addif myhost-test1 deprecated netmask + broadcast + -failover up
5. Reboot the system, for example using init 6.
6. View the interface configuration. Use ifconfig -a command. You should get something like
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.30.31 netmask ffffff00 broadcast 192.168.30.255
ether 8:0:20:b9:72:23
qfe0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 3
inet 192.168.1.1 netmask ffffff00 broadcast 192.168.1.255
groupname mpgrp-one
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
9. ether 8:0:20:ac:9b:20
qfe0:1: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> mtu 1500 index 3
inet 192.168.1.50 netmask ffffff00 broadcast 192.168.1.255
qfe1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4
inet 192.168.1.45 netmask ffffff00 broadcast 192.168.1.255
groupname mpgrp-one
ether 8:0:20:ac:9b:21
qfe1:1: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> mtu 1500 index 4
inet 192.168.1.51 netmask ffffff00 broadcast 192.168.1.255
This information above includes the following:
The interface’s index number is 3, the same as the physical interface that supports this logical interface.
The qfe0:1 interface MAC address is not shown because logical interfaces use the same MAC address as the physical interface that
supports the logical interface.
The DEPRECATED and NOFAILOVER flags indicate that the interface is not to be used by any application (other than the in.mpathd
process), and the interface must not be failed if a communication failure occurs.
The RUNNING flag is also monitored by the in.mpathd process to ensure that communications are functioning as expected. The
system remains available to users if either of the multipath network interfaces fail or become unusable for any reason.
You must know the state of the system if you need to restore it. Before making any changes to the system, view the system’s interface
configuration by performing the command:
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.30.31 netmask ffffff00 broadcast 192.168.30.255
ether 8:0:20:b9:72:23
qfe0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 3
inet 192.168.1.1 netmask ffffff00 broadcast 192.168.1.255
ether 8:0:20:ac:9b:20
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
10. The system remains available to users if either of the multipath network interfaces fail or become unusable for any reason. As a precaution,
reboot the system when it is convenient to verify that multipathing is properly configured during system boot.
Command Line Utilities-based Configuration
Configure the qfe0 Interface as Part of a Multipath Group.
To configure the qfe0 interface as part of a multipath group, specify the name of the group, mpgrp-one, of which the qfe0 interface will be a part:
# ifconfig qfe0 group mpgrp-one
View the changes to the interface using ifconfig -a
Configure a Test Address for the qfe0 Interface
# ifconfig qfe0 addif 192.168.1.50 deprecated netmask + broadcast + -failover up
Configure the qfe1 Interface as Part of the qfe0 Interface Multipath Group
Now, you configure the qfe1interface and make it part of the same IPMP group as the qfe0 interface. Perform the command:
# ifconfig qfe1 plumb myhost-dat-qfe1 netmask + broadcast + group mpgrp-one up
Now, you configure a test address for the qfe1interface.
# ifconfig qfe1 addif 192.168.1.51 deprecated netmask + broadcast + -failover up
Viewing Multipath Operation
To verify the system’s failover configuration, or to change the operational status of IPMP interfaces, use the if_mpadm utility. You can use
this utility to take an interface offline (detach), by forcing a failover, and verifying that an alternate interface takes over as expected. If
configuration errors occur, they appear at this stage. Also, use the if_mpadm utility to reattach a detached interface.
For example, to detach the qfe0 interface, perform the command:
# if_mpadm -d qfe0
Nov 17 12:40:46 myhost in.mpathd[541]: Successfully failed over from NIC
qfe0 to NIC qfe1
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
11. The message indicates that the failover was successful.
Note – This message appears in the console window and is not seen if you are using an xterm or dtterm window.
To view the status of the interfaces, use the ifconfig command:
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.30.31 netmask ffffff00 broadcast 192.168.30.255
ether 8:0:20:b9:72:23
qfe0: flags=89000842<BROADCAST,RUNNING,MULTICAST,IPv4,NOFAILOVER,OFFLINE> mtu 0 index 3
inet 0.0.0.0 netmask 0
groupname mpgrp-one
ether 8:0:20:ac:9b:20
qfe0:1: flags=89040842<BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER,OFFLINE> mtu 1500 index 3
inet 192.168.1.50 netmask ffffff00 broadcast 192.168.1.255
qfe1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4
inet 192.168.1.45 netmask ffffff00 broadcast 192.168.1.255
groupname mpgrp-one
ether 8:0:20:ac:9b:21
qfe1:1: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> mtu 1500 index 4
inet 192.168.1.51 netmask ffffff00 broadcast 192.168.1.255
qfe1:2: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4
inet 192.168.1.1 netmask ffffff00 broadcast 192.168.1.255
The detached interface is assigned an IP address of 0.0.0.0, and a new logical interface, qfe1:2, is automatically created over the functional
qfe1 physical interface. The new logical interface has the IP address that was assigned to the physical qfe0 interface while it was working.
To reattach an offline interface, perform the command:
# if_mpadm -r qfe0
Nov 17 12:52:03 myhost in.mpathd[541]: Successfully failed back to NIC qfe0
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
12. Note – This message appears in the console window and is not seen if you are using an xterm or dtterm window.
The message indicates that the failback was successful. To view the status of the interfaces, use the ifconfig utility:
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.30.31 netmask ffffff00 broadcast 192.168.30.255
ether 8:0:20:b9:72:23
qfe0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 3
inet 192.168.1.1 netmask ffffff00 broadcast 192.168.1.255
groupname mpgrp-one
ether 8:0:20:ac:9b:20
qfe0:1: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> mtu 1500 index 3
inet 192.168.1.50 netmask ffffff00 broadcast 192.168.1.255
qfe1: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4
inet 192.168.1.45 netmask ffffff00 broadcast 192.168.1.255
groupname mpgrp-one
ether 8:0:20:ac:9b:21
qfe1:1: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> mtu 1500 index 4
inet 192.168.1.51 netmask ffffff00 broadcast 192.168.1.255
#
The qfe0 interface is reassigned its original IP address, and the qfe1:2 logical interface is automatically removed.
Troubleshooting a Multipath Network Configuration
Incorrectly configured network interfaces might not properly fail over when connectivity to an interface fails for any reason. It is important to
thoroughly test your network interface after you configure IPMP.
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
13. Carefully read messages in the /var/adm/messages file or in the console window to take the proper troubleshooting steps when you
configure and test the IPMP. For example:
# Nov 17 23:19:51 myhost in.mpathd[475]: Failures cannot be detected
on qfe0 as no IFF_NOFAILOVER address is available
The message indicates that the in.mpathd process with a process number of 475 senses that IPMP is not properly configured. To
investigate further, use the ifconfig command:
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.30.31 netmask ffffff00 broadcast 192.168.30.255
ether 8:0:20:b9:72:23
qfe0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 3
inet 192.168.1.1 netmask ffffff00 broadcast 192.168.1.255
groupname mpgrp-one
ether 8:0:20:ac:9b:20
The output indicates that the configuration process is not complete. Recall that IPMP requires a test address on a logical interface for each
physical interface. After defining a test interface with the ifconfig command, the following message appears:
# Nov 17 23:17:41 myhost in.mpathd[475]: Failure detection restored
on qfe0 as an IFF_NOFAILOVER address is available
To configure a test interface, use the ifconfig utility:
# ifconfig qfe0 addif 192.168.1.50 deprecated netmask +
broadcast + -failover up
Created new logical interface qfe0:1
Setting netmask of qfe0:1 to 255.255.255.0
# Nov 17 23:17:41 myhost in.mpathd[475]: Failure detection restored
on qfe0 as an IFF_NOFAILOVER address is available
The in.mpathd process reports that it can now perform failure detection. Be aware that more than one interface is required to provide
effective failover. To view the interface configuration, use the ifconfig command:
# ifconfig -a
lo0: flags=1000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4> mtu 8232 index 1
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
14. inet 127.0.0.1 netmask ff000000
hme0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 2
inet 192.168.30.31 netmask ffffff00 broadcast 192.168.30.255
ether 8:0:20:b9:72:23
qfe0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 3
inet 192.168.1.1 netmask ffffff00 broadcast 192.168.1.255
groupname mpgrp-one
ether 8:0:20:ac:9b:20
qfe0:1: flags=9040843<UP,BROADCAST,RUNNING,MULTICAST,DEPRECATED,IPv4,NOFAILOVER> mtu 1500 index 3
inet 192.168.1.50 netmask ffffff00 broadcast 192.168.1.255
Both the physical and logical interface are properly configured.
Recommended Links
Softpanorama Top Visited
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
15. Softpanorama Bulletin, Vol 25, No.12 (December, 2013) Rational Fools vs.
Efficient Crooks: The efficient markets hypothesis : Corruption of Regulators
: Slightly Skeptical View on University Education : Programmable
Keyboards : Perl Wiki as System Administrator Tool : Requests for non-existing
web pages : eMail Security : Female Sociopaths : Cloud providers
as intelligence collection hubs
Invisible Hand Hypothesys: The Theory of Self-regulation of the Markets : if
statements in shell : Corruption of Regulators : Cron and Crontab commands
: Groupthink : Fifty glorious years (1950-2000): the triumph of the US
computer engineering : Borderline Psychopaths : PHP probes : iLO 3 -- HP
engineering fiasco : The Most Comprehensive Collection of Editor-related
Humor : Unemployment Bulletin, 2010 : Measurement Threshold Policies :
Teraterm : String Operations in Shell : Troubleshooting HPOM agents :
Solaris Mount Tutorial : TeraTerm Macros : Greenspan humor : Education
Humor : Real Insights into Architecture Come Only From Actual
Programming : VIM Humor
OTC Houston 2014
Report
bluecieloecm.com/OTC2014report
The future of offshore engineering &
asset management - special report
Softpanorama Recommended
docs.sun.com: IP Network Multipathing Administration Guide
Sun documentation. See also PDF version 816-5249
System Administration
Chapter 27IP Network Multipathing (Overview)
IP Network Multipathing provides both load spreading and failover when you have multiple network interface cards that are connected to the same IP link
(for example, Ethernet).
This chapter contains the following information:
"Introduction"
"IP Network Multipathing Features"
"Communication Failures"
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
16. "IP Network Multipathing Components"
"Solaris Network Multipathing"
"Administering Multipathing Groups With Multiple Physical Interfaces"
"Administering Multipathing Groups With a Single Physical Interface"
"Removing Network Adapters From Multipathing Groups"
"Detached Network Adapters"
"Multipathing Daemon"
"Multipathing Configuration File"
Guide IP Services
Solaris IP Multipathing made easy
This is very practical discussion that adds a lot to Sun provided information.
[PDF] Internet Protocol Network Multipathing (Updated)
Old Sun Blueprint on the topic (dated 2002)
Internet Protocol Network Multipathing (Update) Functional Overview Updated summary of the blueprint.
1. Functional Overview
2. Design Considerations
3. Configuration
4. Basic Management
5. Summary
6. Addendum - snoop of Failover
7. Addendum – The Problem With ping
Network failover using Solaris multipathing
[PDF] Using iSCSI Multipathing in the Solaris(tm) 10 Operating System
Sys Admin > Reliable Network with SolarisTM
Internet Protocol Network Multipathing (Update) > Functional
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
17. IP Multipathing Configuration Script
[PDF] Solaris Fibre Channel and Storage Multipathing Administration Guide
C H A P T E R 1 - Product Overview
Quiz
Q1: Which command will define an IPMP test address?
a. ifconfig hme1:1 plumb 192.11.16.2 netmask + broadcast + up
b. ifconfig hme0 addif deprecated group one up
c. ifconfig hme0 addif 192.11.16.2 deprecated netmask + broadcast + -failover up
d. eeprom local-mac-address?=true
A: c
Oracle Solaris 11
oracle.com/Solaris
Download Solaris 11 Resource Kit. How To Guide, Best Practices & More
Etc
Society
Groupthink : Understanding Micromanagers and Control Freaks : Toxic Managers : Bureaucracies : Harvard Mafia : Diplomatic
Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime :
PseudoScience : Who Rules America : Two Party System as Polyarchy : Neoliberalism : The Iron Law of Oligarchy : Libertarian
Philosophy
Quotes
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
18. Quotes
Skeptical Finance : John Kenneth Galbraith : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and
Programming Quotes : Random IT-related quotes : Oscar Wilde : Talleyrand : Somerset Maugham : War and Peace : Marcus Aurelius : Eric
Hoffer : Kurt Vonnegut : Otto Von Bismarck : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Oscar Wilde : Bernard Shaw :
Mark Twain Quotes
Bulletin:
Vol 26, No.1 (January, 2013) Object-Oriented Cult : Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks: The efficient markets
hypothesis : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Vol 23, No.10 (October, 2011) An observation
about corporate security departments : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25,
No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol
25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science
: Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor :
History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development :
Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander :
Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer
Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming
Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo
Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all
nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related
Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real
Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor :
Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor :
Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor :
Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering
Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor :
Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com