Отказоустойчивость с использованием Cisco ASA ClusteringCisco Russia
Отказоустойчивость с использованием Cisco ASA Clustering - принципы работы, ограничения, диагностика.
Ссылка на запись вебинара: https://www.youtube.com/watch?v=h73ZVhSqd64
Cisco 900 Series Integrated Services Routers Datasheet美兰 曾
The Cisco 900 Series ISR is the latest Cisco ISR series, delivering integrated security and threat defense, protecting networks from both known and new Internet vulnerabilities and attacks. This datasheet includes features, port description, and specification of ISR 900.
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
"Implementing an IPv6 Enabled Environment for a Public Cloud Tenant" case study I delivered in OpenStack Vancouver Summit (May, 2015) jointly with Anik and Sharmin from Cisco System.
Развитие решений по коммутации в корпоративных сетях CiscoCisco Russia
The document discusses Cisco's portfolio of switching solutions for corporate networks. It provides an overview of Cisco's Catalyst switching platforms, including new models like the Catalyst 3850 and 3650 that support advanced technologies like PoE+. It also covers Cisco's Nexus portfolio including the Nexus 7700, and modular Catalyst 6800 switches with high-performance supervisors. The presentation aims to highlight the latest switching technologies and solutions from Cisco for powering and scaling corporate networks.
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PROIDEA
Modern CPUs have many cores and advanced instruction sets like AVX that allow performing multiple operations simultaneously. To handle 100 million packets per second, a platform needs network interfaces with speeds of at least 10 Gbps and a PCIe bus and memory fast enough to keep up. The Linux networking stack is not optimized for these speeds, so achieving line rate requires implementing the network processing in userspace using techniques like DPDK that avoid kernel overhead.
The document provides an agenda for the Juniper Day 2016 campus event in Prague. It discusses upcoming trends in campus LANs including 2.5 and 5 Gbps Ethernet standards, Juniper's new Fusion architecture approach, and new EX switching series products like the EX9200, EX4300, EX3400 and EX2300 that support these trends and Juniper's Fusion Enterprise solution. It also covers timelines for multi-gigabit adoption and Junos Fusion capabilities for unifying campus networks.
Learn the interesting explanation of the differences of the Cisco Operating Systems, including IOS, IOS-XE, IOS-XR, NX-OS and CatOS.
http://nhprice.com/difference-cisco-operating-systems.html
Отказоустойчивость с использованием Cisco ASA ClusteringCisco Russia
Отказоустойчивость с использованием Cisco ASA Clustering - принципы работы, ограничения, диагностика.
Ссылка на запись вебинара: https://www.youtube.com/watch?v=h73ZVhSqd64
Cisco 900 Series Integrated Services Routers Datasheet美兰 曾
The Cisco 900 Series ISR is the latest Cisco ISR series, delivering integrated security and threat defense, protecting networks from both known and new Internet vulnerabilities and attacks. This datasheet includes features, port description, and specification of ISR 900.
Implementing an IPv6 Enabled Environment for a Public Cloud TenantShixiong Shang
"Implementing an IPv6 Enabled Environment for a Public Cloud Tenant" case study I delivered in OpenStack Vancouver Summit (May, 2015) jointly with Anik and Sharmin from Cisco System.
Развитие решений по коммутации в корпоративных сетях CiscoCisco Russia
The document discusses Cisco's portfolio of switching solutions for corporate networks. It provides an overview of Cisco's Catalyst switching platforms, including new models like the Catalyst 3850 and 3650 that support advanced technologies like PoE+. It also covers Cisco's Nexus portfolio including the Nexus 7700, and modular Catalyst 6800 switches with high-performance supervisors. The presentation aims to highlight the latest switching technologies and solutions from Cisco for powering and scaling corporate networks.
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PROIDEA
Modern CPUs have many cores and advanced instruction sets like AVX that allow performing multiple operations simultaneously. To handle 100 million packets per second, a platform needs network interfaces with speeds of at least 10 Gbps and a PCIe bus and memory fast enough to keep up. The Linux networking stack is not optimized for these speeds, so achieving line rate requires implementing the network processing in userspace using techniques like DPDK that avoid kernel overhead.
The document provides an agenda for the Juniper Day 2016 campus event in Prague. It discusses upcoming trends in campus LANs including 2.5 and 5 Gbps Ethernet standards, Juniper's new Fusion architecture approach, and new EX switching series products like the EX9200, EX4300, EX3400 and EX2300 that support these trends and Juniper's Fusion Enterprise solution. It also covers timelines for multi-gigabit adoption and Junos Fusion capabilities for unifying campus networks.
Learn the interesting explanation of the differences of the Cisco Operating Systems, including IOS, IOS-XE, IOS-XR, NX-OS and CatOS.
http://nhprice.com/difference-cisco-operating-systems.html
VMware expert Motonori Shindo presented on L2 over L3 encapsulation protocols like VXLAN, NVGRE, STT, and Geneve. He explained how each protocol works including header formats and provided ecosystem updates. He believes Geneve has potential as it allows for extensibility through options fields while leveraging NIC offloading, but that VXLAN is already widely adopted. Critics argue its goals could be achieved through other means.
This document discusses cloud computing and the Cisco Nexus 5500 series switches. It defines cloud computing and lists its key characteristics as on-demand access, access over the internet/network, pooling of resources independent of location, elasticity, and measurable service. It also discusses different cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, virtual private). The document then focuses on the Cisco Nexus 5500 series switches, outlining their scalability, performance, versatility, and flexibility features like unified ports. It introduces new expansion modules and routing capabilities for the Nexus 5500 platform.
PLNOG16: IOS XR – 12 lat innowacji, Krzysztof MazepaPROIDEA
IOS XR is Cisco's modular, distributed network operating system. In 2004, Cisco introduced IOS XR and the CRS-1 router, the first router to run IOS XR. IOS XR offers innovations such as a distributed architecture, high scalability, and always-on operations. In subsequent years, Cisco continued expanding IOS XR's capabilities with features like 64-bit support and virtualization.
This document provides an overview and summary of Cisco's Data Center networking and storage solutions, with a focus on the new Cisco MDS 9710 Director. Some key points:
- Cisco offers a multi-protocol portfolio including Fibre Channel, FCoE, and IP networking solutions to address growing data and connectivity demands in modern data centers.
- The Cisco MDS 9710 is the newest storage director that provides the highest scalability, availability, and investment protection in the industry for large scale data centers.
- It supports up to 384 line-rate 16Gbps Fibre Channel ports or 48-port 10GbE FCoE modules in a single chassis. This provides 3 times the performance of competing
The document provides troubleshooting tips and techniques for Cisco Data center switches including the Cisco Nexus 7000, Catalyst 6500 VSS, and high CPU utilization issues. It discusses using commands like show processes cpu sorted, debug netdr capture, and show ip cef to troubleshoot traffic flow and switching paths. It also covers troubleshooting software upgrades on the Nexus 7000 and gathering core dumps and logs to debug process crashes.
Open Ethernet: an open-source approach to modern network designAlexander Petrovskiy
The era of closed proprietary hardware platforms is coming to an end. Today, in the world of Web-scale IT, the industry is starting to adopt new approach, based on the principles of openness, scalabilty and customizability. However, in more conservative networking industry, traditional equipment and proprietary technologies from a single vendor are often being used, which limits the flexibility, prevents innovation and narrows down the choice.
The "Open Ethernet" initiative from Mellanox brings open source principles into the world of modern networking and allows customers to select the best hardware and software to design network infrastructure, based on open and standard protocols and technologies, also opening the way for broad adoption of SDN.
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...kds850
The document provides an overview of Cisco Nexus 2000 Fabric Extender architectures, features, and topologies. It begins with introductions to Cisco's Nexus 5000/6000/7000/9000 parent platform switches that support Nexus 2000 FEX. It then discusses Nexus 2000 platform architectures, supported topologies and features. The agenda covers parent switch overviews, Nexus 2000 platform details, configuration and connectivity options. The goal is to discuss Nexus 2000 designs, topologies, and implementation in depth without covering more advanced topics like vPC, FCoE, QoS, etc.
The document provides information about the Cisco Nexus 7009 switch, including:
- It is a modular network switch with up to 9 slots that can support 336 10GbE or 1GbE ports.
- It uses up to 5 Crossbar Fabric Modules and 2 power supplies.
- The Nexus 7009 specifications section provides additional details about its hardware capabilities and supported interface speeds.
The document provides information about virtual machine extensions (VMX) on Juniper Networks routers. It discusses hardware virtualization concepts including guest virtual machines running on a host machine. It then describes the different types of virtualization including fully virtualized, para-virtualized, and hardware-assisted. The rest of the document goes into details about the VMX product, architecture, forwarding model, and performance considerations for different use cases.
Ronnie Scott
Consulting CSE
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "What's Next: Key Areas of Emerging Cyberinfrastructure."
This session explored some of the up-and-coming areas of cyberinfrastructure and why they are increasingly being considered as essential elements to innovative research and development.
Cisco IOS XRv Router Installation and Configuration GuideSalachudin Emir
This document provides guidance on installing and configuring the Cisco IOS XRv Router virtual machine. It describes the Cisco IOS XRv Router components including the virtual machine, hypervisor, router interfaces, and supported features. It also outlines the server requirements, packaging, and limitations for deploying the Cisco IOS XRv Router on various hypervisor platforms like VMware ESXi and KVM-QEMU.
This document provides instructions for configuring security on an appliance for remote access using Cisco Easy VPN. It discusses introducing Easy VPN, the connection process, supported clients and servers, modes of operation, and configuring the Easy VPN server for extended authentication. Key steps include creating ISAKMP and IPsec policies, defining a group policy with DNS/WINS settings, and configuring authentication methods like XAuth.
The document provides an overview of the Cisco Nexus 7000 and Nexus 7700 data center switches. It discusses the switches' architectures including supervisors, fabrics, I/O modules, forwarding engines, and physical designs. The session aims to provide a thorough understanding of the switches' architectures and complete packet flows.
400-101 CCIE Routing and Switching IT Certificationwrouthae
This document provides an overview and agenda for a session on QoS and queuing basics, as well as QoS implementation on Nexus platforms. The session objectives are to refresh knowledge of QoS and queuing fundamentals, understand Nexus hardware architecture, examine QoS configuration on Nexus, and review real-world examples. The agenda includes introductions, discussions of QoS/queuing basics, QoS on Nexus platforms, Nexus 7000/7700, 5600/6000 and 2000 QoS, and concludes with real-world configurations.
Slawomir Janukowicz, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Unlock Your Cloud Potential with Mirantis OpenStack & Cumulus LinuxCumulus Networks
Are you building a new private cloud or moving your workloads to a hybrid cloud in 2015? Or, are you just interested in exploring what OpenStack has to offer but don't have all the resources and toolsets to understand the gaps.
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASACisco Russia
Презентация с вебинара, организованного в рамках сообщества Cisco Support Community.
Приглашаем Вас на другие мероприятия Cisco Support Community, а также к участию в жизни нашего сообщества технической поддержки Cisco:
http://cs.co/CSCRu
VMware expert Motonori Shindo presented on L2 over L3 encapsulation protocols like VXLAN, NVGRE, STT, and Geneve. He explained how each protocol works including header formats and provided ecosystem updates. He believes Geneve has potential as it allows for extensibility through options fields while leveraging NIC offloading, but that VXLAN is already widely adopted. Critics argue its goals could be achieved through other means.
This document discusses cloud computing and the Cisco Nexus 5500 series switches. It defines cloud computing and lists its key characteristics as on-demand access, access over the internet/network, pooling of resources independent of location, elasticity, and measurable service. It also discusses different cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, virtual private). The document then focuses on the Cisco Nexus 5500 series switches, outlining their scalability, performance, versatility, and flexibility features like unified ports. It introduces new expansion modules and routing capabilities for the Nexus 5500 platform.
PLNOG16: IOS XR – 12 lat innowacji, Krzysztof MazepaPROIDEA
IOS XR is Cisco's modular, distributed network operating system. In 2004, Cisco introduced IOS XR and the CRS-1 router, the first router to run IOS XR. IOS XR offers innovations such as a distributed architecture, high scalability, and always-on operations. In subsequent years, Cisco continued expanding IOS XR's capabilities with features like 64-bit support and virtualization.
This document provides an overview and summary of Cisco's Data Center networking and storage solutions, with a focus on the new Cisco MDS 9710 Director. Some key points:
- Cisco offers a multi-protocol portfolio including Fibre Channel, FCoE, and IP networking solutions to address growing data and connectivity demands in modern data centers.
- The Cisco MDS 9710 is the newest storage director that provides the highest scalability, availability, and investment protection in the industry for large scale data centers.
- It supports up to 384 line-rate 16Gbps Fibre Channel ports or 48-port 10GbE FCoE modules in a single chassis. This provides 3 times the performance of competing
The document provides troubleshooting tips and techniques for Cisco Data center switches including the Cisco Nexus 7000, Catalyst 6500 VSS, and high CPU utilization issues. It discusses using commands like show processes cpu sorted, debug netdr capture, and show ip cef to troubleshoot traffic flow and switching paths. It also covers troubleshooting software upgrades on the Nexus 7000 and gathering core dumps and logs to debug process crashes.
Open Ethernet: an open-source approach to modern network designAlexander Petrovskiy
The era of closed proprietary hardware platforms is coming to an end. Today, in the world of Web-scale IT, the industry is starting to adopt new approach, based on the principles of openness, scalabilty and customizability. However, in more conservative networking industry, traditional equipment and proprietary technologies from a single vendor are often being used, which limits the flexibility, prevents innovation and narrows down the choice.
The "Open Ethernet" initiative from Mellanox brings open source principles into the world of modern networking and allows customers to select the best hardware and software to design network infrastructure, based on open and standard protocols and technologies, also opening the way for broad adoption of SDN.
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...kds850
The document provides an overview of Cisco Nexus 2000 Fabric Extender architectures, features, and topologies. It begins with introductions to Cisco's Nexus 5000/6000/7000/9000 parent platform switches that support Nexus 2000 FEX. It then discusses Nexus 2000 platform architectures, supported topologies and features. The agenda covers parent switch overviews, Nexus 2000 platform details, configuration and connectivity options. The goal is to discuss Nexus 2000 designs, topologies, and implementation in depth without covering more advanced topics like vPC, FCoE, QoS, etc.
The document provides information about the Cisco Nexus 7009 switch, including:
- It is a modular network switch with up to 9 slots that can support 336 10GbE or 1GbE ports.
- It uses up to 5 Crossbar Fabric Modules and 2 power supplies.
- The Nexus 7009 specifications section provides additional details about its hardware capabilities and supported interface speeds.
The document provides information about virtual machine extensions (VMX) on Juniper Networks routers. It discusses hardware virtualization concepts including guest virtual machines running on a host machine. It then describes the different types of virtualization including fully virtualized, para-virtualized, and hardware-assisted. The rest of the document goes into details about the VMX product, architecture, forwarding model, and performance considerations for different use cases.
Ronnie Scott
Consulting CSE
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "What's Next: Key Areas of Emerging Cyberinfrastructure."
This session explored some of the up-and-coming areas of cyberinfrastructure and why they are increasingly being considered as essential elements to innovative research and development.
Cisco IOS XRv Router Installation and Configuration GuideSalachudin Emir
This document provides guidance on installing and configuring the Cisco IOS XRv Router virtual machine. It describes the Cisco IOS XRv Router components including the virtual machine, hypervisor, router interfaces, and supported features. It also outlines the server requirements, packaging, and limitations for deploying the Cisco IOS XRv Router on various hypervisor platforms like VMware ESXi and KVM-QEMU.
This document provides instructions for configuring security on an appliance for remote access using Cisco Easy VPN. It discusses introducing Easy VPN, the connection process, supported clients and servers, modes of operation, and configuring the Easy VPN server for extended authentication. Key steps include creating ISAKMP and IPsec policies, defining a group policy with DNS/WINS settings, and configuring authentication methods like XAuth.
The document provides an overview of the Cisco Nexus 7000 and Nexus 7700 data center switches. It discusses the switches' architectures including supervisors, fabrics, I/O modules, forwarding engines, and physical designs. The session aims to provide a thorough understanding of the switches' architectures and complete packet flows.
400-101 CCIE Routing and Switching IT Certificationwrouthae
This document provides an overview and agenda for a session on QoS and queuing basics, as well as QoS implementation on Nexus platforms. The session objectives are to refresh knowledge of QoS and queuing fundamentals, understand Nexus hardware architecture, examine QoS configuration on Nexus, and review real-world examples. The agenda includes introductions, discussions of QoS/queuing basics, QoS on Nexus platforms, Nexus 7000/7700, 5600/6000 and 2000 QoS, and concludes with real-world configurations.
Slawomir Janukowicz, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Unlock Your Cloud Potential with Mirantis OpenStack & Cumulus LinuxCumulus Networks
Are you building a new private cloud or moving your workloads to a hybrid cloud in 2015? Or, are you just interested in exploring what OpenStack has to offer but don't have all the resources and toolsets to understand the gaps.
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASACisco Russia
Презентация с вебинара, организованного в рамках сообщества Cisco Support Community.
Приглашаем Вас на другие мероприятия Cisco Support Community, а также к участию в жизни нашего сообщества технической поддержки Cisco:
http://cs.co/CSCRu
IP Base WS-C3750X-24T-S Yes Yes - 24-port 10/100/1000, 715W AC, IP Base
Available
WS-C3750X-48T-S Yes - - 48-port 10/100/1000, 715W AC, IP Base
with
WS-C3750X-24P-S Yes Yes Yes 24-port PoE+ 10/100/1000, 715W AC, IP Base
upgrade
WS-C3750X-48P-S Yes - Yes 48-port PoE+ 10/100/1000, 715W AC,
This document discusses encryption in data center and fiber optic networks. It notes that Edward Snowden revealed that unencrypted communications are no longer safe. It then discusses how data centers secure physical access, hardware, software and fiber connections. It explains that encryption on the lowest network layer provides the highest security. The document presents ADVA's encryption solutions for 10G and 100G networks, including key lengths and management systems. It notes over 1,600 encrypted links are currently in operation across finance, government, healthcare and other industries.
The document discusses traditional data center network architectures and secure designs. It notes that 59% of organizations lack resources to validate vendor claims, and organizations need methods to validate network resiliency using real traffic loads and security attacks. It then provides an overview of a traditional secure data center design with two main components: 1) the physical network fabric and 2) the virtual fabric and compute environment. It shows how this design establishes internal secure zones without crossing the core network, and incorporates virtual security services. Finally, it gives examples of traditional secure use cases such as separating internal and external zones, and securing application tiers.
Linux Performance Analysis: New Tools and Old SecretsBrendan Gregg
Talk for USENIX/LISA2014 by Brendan Gregg, Netflix. At Netflix performance is crucial, and we use many high to low level tools to analyze our stack in different ways. In this talk, I will introduce new system observability tools we are using at Netflix, which I've ported from my DTraceToolkit, and are intended for our Linux 3.2 cloud instances. These show that Linux can do more than you may think, by using creative hacks and workarounds with existing kernel features (ftrace, perf_events). While these are solving issues on current versions of Linux, I'll also briefly summarize the future in this space: eBPF, ktap, SystemTap, sysdig, etc.
The document provides information about CCNA certification options and the OSI model. It discusses two options for obtaining the CCNA certification, recommends taking a single exam, and includes a table listing common network device icons. It then covers the seven layers of the OSI model in detail, providing descriptions, examples, and review questions for each layer. Finally, it discusses the TCP/IP protocol suite and compares it to the OSI model, listing several example protocols like FTP, TFTP, and HTTP.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
The document discusses the hierarchical network model and modular approach to network design. It describes the key characteristics and functions of the access, distribution, and core layers. The access layer provides user access and aggregation, the distribution layer controls access and provides policy-based connectivity, and the core layer focuses on fast and efficient data transport. The document also discusses how to design networks using functional modules based on the Cisco SONA framework.
The document provides an overview of traditional campus network designs and introduces some concepts for campus network design. It discusses traditional router and hub campus designs and moves to newer designs using virtual LAN (VLAN) technologies and multilayer switching. The key concepts covered include the access, distribution and core layers, switch blocks, core blocks, and considerations around sizing and redundancy in campus network designs.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
The document discusses a computer networking course on wide-area networks (WANs) and virtual private networks (VPNs). It covers several topics:
- WAN technologies including physical and data link layer protocols for transmitting data to remote locations.
- Configuring serial interfaces and encapsulation methods like HDLC and PPP.
- Connectivity options for WANs like leased lines, PSTN, and packet switching.
- VPN solutions that provide secure connectivity over shared infrastructures at lower costs than private networks. VPNs offer flexibility, scalability, and cost savings.
The document contains the answers to chapter 1 questions from the CCNA 3 v4.0 final exam. It discusses topics related to the hierarchical network model including the core, distribution, and access layers. It also addresses features such as link aggregation, security policies, quality of service (QoS), and redundancy which are key concepts at different layers of the hierarchical model.
The document discusses network structures, standards, and protocols. It describes Local Area Networks (LANs) that serve a home or building, and Wide Area Networks (WANs) that connect separated LANs over long distances, such as the Internet. The OSI model breaks communication down into seven layers, from the physical layer dealing with wiring to the application layer providing services to software. Similarly, the TCP/IP model organizes networking functions into layers, providing a framework but not strictly implementing the OSI model. Standards organizations develop agreed protocols to specify product and service designs for interoperable networking.
Advances in computer networks, computer architecturesandhyagowdah
The document discusses computer network architectures and applications. It introduces key concepts like network layers, protocols, sockets and the client-server model. It describes common network architectures like OSI and TCP/IP and how they establish connections between applications using protocols and sockets. The goal is to explore requirements for building scalable networks to support different applications.
The document provides information about the CCNA certification options and Cisco networking concepts including the OSI model. It can be used to study for the CCNA exam. There are two options to obtain the CCNA: pass a single exam or two exams. The document then explains the OSI model in detail including mnemonics to remember the layer names and summaries of what occurs at each layer of the OSI model to help understand how data flows through a network.
The document discusses the OSI model and TCP/IP protocol stack. It describes the seven layers of the OSI model and the functions of each layer, including the physical, data link, network, transport, session, presentation, and application layers. It then maps the layers of the TCP/IP protocol stack to the OSI model, describing the functions of the physical network, data link, internet, transport, and application layers. It provides examples of protocols that operate at each layer, such as IP, TCP, UDP, ARP, and ICMP.
This document provides an overview of wide area networks (WANs) including what they are, how they have evolved, common connection technologies and options. A WAN connects devices over a broader geographic area than a local area network (LAN) using carriers. As networks grow, hierarchical designs must also grow to aggregate WAN traffic and provide scalability, availability and user access. Common WAN connection technologies include dedicated leased lines, circuit-switched options like ISDN, and packet-switched options like Frame Relay, ATM, DSL, cable broadband and wireless. Virtual private networks (VPNs) provide secure, encrypted connections between private networks over public networks like the Internet.
OSI (open systems interconnection) ModelNetwax Lab
The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and
standardizes the internal functions of a communication system by partitioning it into abstraction layers.
The OSI Model is a conceptual, seven-layered model of how networks work. It tells us that how data is
going through one computer to another computer, and also it simplifies to troubleshoot the network
issues.
This document is the first chapter of a Cisco training course on campus network design. It introduces common campus network architectures and best practices for design. The chapter discusses the access, distribution and core layers, and considers designs for small, medium and large networks. It also outlines the PPDIOO methodology for the network lifecycle and emphasizes the importance of careful planning based on a hierarchical design to support business needs during network evolution. The chapter concludes with two sample lab exercises.
multilayer-campus-architectures-and-design-principlesChris S Chen
This document discusses principles for designing multilayer campus networks. It recommends a hierarchical design with access, distribution, and core layers for modularity, scalability, and redundancy. The core layer connects distribution blocks and provides high availability. Distribution aggregates access closets and load balances traffic. Access switches provide features like QoS, security and IP telephony support. Spanning tree, routing protocols, and link aggregation protocols provide redundancy while hierarchical routing and summarization improve convergence.
The document discusses the OSI reference model and TCP/IP reference model.
The OSI model has 7 layers - physical, data link, network, transport, session, presentation and application layer. Each layer performs a well-defined function with minimal information flow across layer boundaries.
The TCP/IP model has 4 layers - link, internet, transport and application. The internet layer uses IP to allow packets to independently travel across networks. Transport layer uses TCP for reliable connections and UDP for fast delivery. Application layer contains protocols like HTTP, FTP, SMTP.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Cisco Russia
Обзор Сервисных Услуг в России и странах СНГ.
Сервисные Услуги в России и странах СНГ делятсяна Базовую и Расширенную техническую поддержку.
БАЗОВАЯ ТЕХНИЧЕСКАЯ ПОДДЕРЖКА 1. Центр Технической Поддержки (ТАС) Центр технической поддержки Cisco TAC предоставляет Заказчикам быстрый доступ к технологическим экспертам с опытом диагностики и решения самых сложных проблем.
Cisco TAC обладает развитой системой управления запросами, которая позволяет оперативно направить проблему в соответствующую технологическую команду или перевести на следующий уровень поддержки, если проблема не решена в заданный период.
Cisco TAC предоставляет круглосуточную поддержку по всему миру.
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareCisco Russia
Клиентские контракты на услуги технической поддержки Cisco Smart Net Total Care
Cisco Smart Net Total Care (SNTC) — это контракт на услуги технической поддержки Cisco.
Cервис сочетает в себе ведущие в отрасли и получившие множество наград технические сервисы с дополнительно встроенными инструментами бизнес-аналитики, которые получает Заказчик через встроенные интеллектуальные возможности на портале Smart Net Total Care.
Запись вебинара "Решения компании Cisco для операторов связи по защите от взлома и вредоносного программного обеспечения": https://ciscoclub.ru/resheniya-kompanii-cisco-dlya-operatorov-svyazi-po-zashchite-ot-vzloma-i-vredonosnogo-programmnogo-o
Запись вебинара "Решения компании Cisco для операторов связи по защите от взлома и вредоносного программного обеспечения": https://ciscoclub.ru/resheniya-kompanii-cisco-dlya-operatorov-svyazi-po-zashchite-ot-vzloma-i-vredonosnogo-programmnogo-o
Запись вебинара "Решения компании Cisco для операторов связи по защите от взлома и вредоносного программного обеспечения": https://ciscoclub.ru/resheniya-kompanii-cisco-dlya-operatorov-svyazi-po-zashchite-ot-vzloma-i-vredonosnogo-programmnogo-o
Профессиональные услуги Cisco для Software-Defined AccessCisco Russia
Как реализовать SDA, создать стратегию, которая будет сопоставлена с бизнес задачами, оценить готовность к трансформации, успешно и максимально надежно реализовать намеченные планы.
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Cisco Russia
О работе группы исследователей компании Cisco, в которой доказана применимость традиционных методов статистического и поведенческого анализа для обнаружения и атрибуции известного вредоносного ПО, использующего TLS в качестве метода шифрования каналов взаимодействия, без дешифровки или компрометации TLS-сессии. Также рассказано о решении Cisco Encrypted Traffic Analytics, реализующем принципы, заложенные в данном исследовании, его архитектуре и преимуществах.
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиCisco Russia
Как компания Cisco способствует цифровой трансформации предприятий нефтегазовой отрасли. Описание внедренных проектов, полученных результатов, обзор примененных архитектур.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
1. Дмитрий Леонтьев
Инженер центра технической поддержки Cisco TAC (Russia)
Август 24, 2016
Дизайн отказоустойчивых локальных сетей
Cisco Support Community
Expert Series Webcast
2. Как стать активным участником? Легко!
• Создавайте документы, пишите блоги, загружайте
видео, отвечайте на вопросы пользователей.
• Вклад оценивается на основе таблицы лидеров
• Также оценивается количество документов, блогов
и видео, созданных пользователем.
• Вклад оценивается только по русскоязычному
сообществу, не включая рейтинг, набранный в
глобальном Cisco Support Community.
Премия "Самый активный участник
Сообщества Поддержки Cisco"
3. Оцени контент
Ваши оценки контента дают
возможность атворам получать баллы.
Хотите чтобы поиск был удобным и
простым? Помогите нам распознать
качественный контент в Сообществе.
Оценивайте документы, видео и
блоги.
Пожалуйста, не забывайте оценивать
ответы пользователей, которые щедро
делятся своим временем и опытом
https://supportforums.cisco.com/ru/community/4926/pomoshch-help
4. 24 августа 2016 – 06 сентября 2016
Сессия «Спросить Эксперта»
с Дмитрием Леонтьевым, Ларисой Свирдюк и
Александром Чевердой
Получить дополнительную информацию, а
также задать вопросы эксперту в рамках данной
темы Вы можете на странице, доступной по
ссылке:
https://supportforums.cisco.com/community/russian/ex
pert-corner
Вы можете получить видеозапись данного
семинара и текст сессии Q&A в течении
ближайших 5 дней по следующей ссылке
https://supportforums.cisco.com/community/russian/ex
pert-corner/webcast
5. Конкурс “Дизайн отказоустойчивых локальных
сетей”
24 августа в 14:00 мск
Мы предлагаем Вам принять участие в конкурсе
после проведения вебкаста, который так и будет
называться «Дизайн отказоустойчивых
локальных сетей»
• Первые три победителя получат фирменный куб Cisco-TAC
• Ответы присылайте на csc-russian@external.cisco.com
• Задание конкурса будет размещено сегодня после проведения
вебкаста
6. Скачать презентацию Вы можете по ссылке:
https://supportforums.cisco.com/ru/document/13102711
Спасибо, что присоединились к нам сегодня!
7. Присылайте Ваши вопросы!
Используйте панель Q&A, чтобы задать вопрос.
Наши эксперты Лариса и Александр ответят на них.
Сегодняшняя
презентация включает
опросы аудитории
Пожалуйста, примите
участие в опросах!
8. Дмитрий Леонтьев
Инженер центра технической поддержки Cisco TAC (Russia)
Август 24, 2016
Cisco Support Community Expert Series Webcast
Дизайн отказоустойчивых локальных сетей
9. Вопрос 1
По вашему мнению, реализована ли
отказоустойчивость в вашей
Локальной Сети?
1. Да
2. Нет
3. Я не знаю, что это такое
10. Cодержание
• Отказоустойчивый дизайн ЛВС на физическом уровне
• Отказоустойчивый дизайн ЛВС на канальном уровне
• Отказоустойчивый дизайн ЛВС на сетевом уровне
• Коммутаторы с поддержкой VSS (Virtual Switching
System)
11. Уровни модели OSI (Media Layer)
Уровень (layer) Единица
передаваемых
данных (PDU)
Функция Пример
Сетевой
(network layer)
Пакет (packet) Логическая адресация,
маршрутизация
IPv4, IPX, AppleTalk
Канальный
(data link layer)
Кадр (frame) Физическая адресация PPP, HDLC, Ethernet
Физический
(physical layer)
Биты (bits) Доступ к среде передачи
данных, кодирование на
уровне передачи
сигналов
Витая пара,
коаксиальный
кабель, оптический
кабель
12. Уровни модели OSI (Host Layer)
Уровень (layer) Единица
передаваемых
данных (PDU)
Функция Пример
Приложения
(application layer)
Доступ к приложениям HTTP, FTP, Telnet
Представления
(presentation layer)
Представление данных ASCII, JPEG
Сессии (session layer) Управление сессией RPC
Транспортный
(transport layer)
Датаграмма
(datagram)
Логическое соединение
типа точка-точка между
конечными устройствами,
надежность передачи
TCP, UDP, SCTP
15. The access layer represents the network edge, where traffic enters or exits the
campus network. Traditionally, the primary function of an access layer switch is
to provide network access to the user. Access layer switches connect to
distribution layer switches to perform network foundation functions such as
routing, quality of service (QoS), and security.
To meet network application and end user demands, next-generation Cisco
Catalyst switching platforms no longer simply switch packets, but now provide
more integrated and intelligent services to various types of endpoints at the
access layer. Building intelligence into access layer switches allows them to
operate more efficiently, optimally, and securely.
Access layer
16. The distribution layer interfaces between the access layer and the core layer to
provide many key functions, including:
–Aggregating access layer wiring closet swithces
–Aggregating Layer 2 broadcast domains and Layer 3 routing boundaries
–Providing intelligent switching, routing, and network access policy functions to
access the rest of the network
–Providing high availability through redundant distribution layer switches to the
end user and equal cost paths to the core, as well as providing differentiated
services to various classes of service applications at the access layer
Distribution layer
17. The core layer is the network backbone that hierarchically connects
several layers of the campus design, providing for connectivity between
end devices, computing, and data storage services located within the
service block and other areas within the network. The core layer serves
as the aggregator for all the other campus blocks and ties the campus
together with the rest of the network.
Core layer
26. Spanning-Tree Protocol (STP) prevents loops from being formed when
switches or bridges are interconnected via multiple paths. Spanning-
Tree Protocol implements the 802.1D IEEE algorithm by exchanging
BPDU messages with other switches to detect loops, and then
removes the loop by shutting down selected bridge interfaces. This
algorithm guarantees that there is one and only one active path
between two network devices.
Spanning-tree protocol
27. • One root bridge per broadcast domain
• One root port per nonroot bridge
• One designated port per segment
• Nondesignated ports are blocked
• BPDU sent every 2 seconds
• Root bridge = bridge with lowest bridge ID
• Bridge ID = bridge priority + MAC address
Spanning-tree operations
34. Cisco EtherChannel® technology builds upon standards-based 802.3
full-duplex Fast Ethernet to provide network managers with a reliable,
high-speed solution for the campus network backbone. EtherChannel
technology provides bandwidth scalability within the campus by
providing up to 800 Mbps, 8 Gbps, or 80 Gbps of aggregate bandwidth
for a Fast EtherChannel, Gigabit EtherChannel, or 10 Gigabit
EtherChannel connection, respectively. Each of these connection
speeds can vary in amounts equal to the speed of the links used (100
Mbps, 1 Gbps, or 10 Gbps). Even in the most bandwidth-demanding
situations, EtherChannel technology helps aggregate traffic and keep
oversubscription to a minimum, while providing effective link-resiliency
mechanisms.
EtherChannel
35. • Автоматически
o LACP (IEEE 802.3ad)
o PAGP (Cisco proprietary)
• Вручную
Методы создания EtherChannel
39. Flex Links are a pair of a Layer 2 interfaces (switch ports or port
channels) where one interface is configured to act as a backup to the
other. The feature provides an alternative solution to the Spanning Tree
Protocol (STP). Users can disable STP and still retain basic link
redundancy. Flex Links are typically configured in service provider or
enterprise networks where customers do not want to run STP on the
switch. If the switch is running STP, Flex Links is not necessary
because STP already provides link-level redundancy or backup
FlexLink by Cisco
40. Ports 1 and 2 on switch A are connected to uplink switches B and C.
Because they are configured as Flex Links, only one of the interfaces is
forwarding traffic; the other is in standby mode. If port 1 is the active
link, it begins forwarding traffic between port 1 and switch B; the link
between port 2 (the backup link) and switch C is not forwarding traffic.
If port 1 goes down, port 2 comes up and starts forwarding traffic to
switch C. When port 1 comes back up, it goes into standby mode and
does not forward traffic; port 2 continues forwarding traffic.
FlexLink example
41. Optionally, you can configure a preemption mechanism, specifying the
preferred port for forwarding traffic. For example, you can configure the
above flexlink pair with preemption mode so that once port 1 comes
back up in the above scenario, if it has greater bandwidth than port 2,
port 1 will go forwarding after 60 seconds and port 2 will become
standby. This is done by entering the preemption mode bandwidth and
delay commands.
FlexLink options
42. Вопрос 2
Какие у вас используются
коммутаторы с функцией
стекирования или VSS?
1. Коммутаторы серии 2960
2. Коммутаторы серии 3750
3. Коммутаторы серии 3850
4. Коммутаторы серии 4500
5. Коммутаторы серии 6500
6. Коммутаторы серии 6800
7. Не используются
44. • IP routing redundancy is designed to allow for transparent fail-over at the
first-hop IP router.
• Both HSRP and VRRP enable two or more devices to work together in a
group, sharing a single IP address, the virtual IP address. The virtual IP
address is configured in each end user's workstation as a default gateway
address and is cached in the host's Address Resolution Protocol (ARP)
cache.
• In an HSRP or VRRP group, one router is elected to handle all requests sent
to the virtual IP address. With HSRP, this is the active router. An HSRP group
has one active router, at least one standby router, and perhaps many
listening routers. A VRRP group has one master router and one or more
backup routers.
First Hop Redundancy Protocol
45. • HSRP is Cisco proprietary which
allows several routers or
multilayer switches to appear as a
single gateway IP address.
• HSRP allows multiple routers to
share a virtual IP and MAC
address so that the end-user
hosts do not realize when a
failure occurs
HSRP
47. VRRP specifies an election protocol that dynamically assigns
responsibility for a virtual router to one of the VRRP routers on a LAN.
The VRRP router controlling the IP address(es) associated with a
virtual router is called the Master, and forwards packets sent to these IP
addresses. The election process provides dynamic fail over in the
forwarding responsibility should the Master become unavailable. This
allows any of the virtual router IP addresses on the LAN to be used as
the default first hop router by end-hosts. The advantage gained from
using VRRP is a higher availability default path without requiring
configuration of dynamic routing or router discovery protocols on every
end-host.
VRRP (RFC 3768)
48. The Gateway Load Balancing Protocol feature provides automatic
router backup for IP hosts configured with a single default gateway on
an IEEE 802.3 LAN. Multiple first hop routers on the LAN combine to
offer a single virtual first hop IP router while sharing the IP packet
forwarding load. Other routers on the LAN may act as redundant GLBP
routers that will become active if any of the existing forwarding routers
fail.
GLBP
49. GLBP performs a similar, but not identical, function for the user as the HSRP and the
VRRP. HSRP and VRRP protocols allow multiple routers to participate in a virtual router
group configured with a virtual IP address. One member is elected to be the active router
to forward packets sent to the virtual IP address for the group. The other routers in the
group are redundant until the active router fails. These standby routers have unused
bandwidth that the protocol is not using. Although multiple virtual router groups can be
configured for the same set of routers, the hosts must be configured for different default
gateways, which results in an extra administrative burden. GLBP provides load balancing
over multiple routers (gateways) using a single virtual IP address and multiple virtual
MAC addresses. Each host is configured with the same virtual IP address, and all routers
in the virtual router group participate in forwarding packets. GLBP members
communicate between each other through hello messages sent every 3 seconds to the
multicast address 224.0.0.102, User Datagram Protocol (UDP) port 3222 (source and
destination).
GLBP (cont)
50. • Members of a GLBP group elect one gateway to be the active virtual
gateway (AVG) for that group. Other group members provide backup for the
AVG in the event that the AVG becomes unavailable. The AVG assigns a
virtual MAC address to each member of the GLBP group. Each gateway
assumes responsibility for forwarding packets sent to the virtual MAC
address assigned to it by the AVG. These gateways are known as active
virtual forwarders (AVFs) for their virtual MAC address.
• The AVG is responsible for answering Address Resolution Protocol (ARP)
requests for the virtual IP address. Load sharing is achieved by the AVG
replying to the ARP requests with different virtual MAC addresses.
Example of GLBP
54. • StackWise и StackWise Plus
– Cisco Catalyst 3750
• StackWise-480 -
Cisco Catalyst 3850
• FlexStack и FlexStack Plus –
Cisco Catalyst 2960
Стекируемые коммутаторы
55. • A VSS combines a pair of switches into a single network element. For
example, a VSS in the distribution layer of the network interacts with
the access and core networks as if it were a single switch.
• An access switch connects to both chassis of the VSS using one
logical port channel. The VSS manages redundancy and load
balancing on the port channel. This capability enables a loop-free
Layer 2 network topology. The VSS also simplifies the Layer 3
network topology because the VSS reduces the number of routing
peers in the network.
Virtual Switching System
57. • Коммутаторы Cisco Catalyst серии 4500 с Supervisor Engine 7-E,
Supervisor Engine 7L-E, Supervisor Engine 8-E
• Коммутаторы Cisco Catalyst серии 6500 c супервизорами VS-
S720-10G-3C, VS-S720-10G-3CXL, VS-SUP2T-10G, VS-SUP2T-
10G-XL, C6800-SUP6T, C6800-SUP6T-XL
• Коммутаторы Cisco Catalyst серии 6800 с супервизорами VS-S2T-
10G, VS-S2T-10G-XL, C6800-SUP6T, C6800-SUP6T-XL
Серии коммутаторов с поддержкой VSS
58. • When you create or restart a VSS, the peer chassis negotiate their roles.
One chassis becomes the VSS active chassis, and the other chassis
becomes the VSS standby.
• The VSS active chassis controls the VSS. It runs the Layer 2 and Layer 3
control protocols for the switching modules on both chassis. The VSS active
chassis also provides management functions for the VSS, such as module
online insertion and removal (OIR) and the console interface.
• The VSS active and VSS standby chassis perform packet forwarding for
ingress data traffic on their locally hosted interfaces. However, the VSS
standby chassis sends all control traffic to the VSS active chassis for
processing.
VSS Active and VSS Standby Chassis
59. • For the two chassis of the VSS to act as one network element, they need to share
control information and data traffic.
• The virtual switch link (VSL) is a special link that carries control and data traffic
between the two chassis of a VSS. The VSL is implemented as an EtherChannel with
up to eight links. The VSL gives control traffic higher priority than data traffic so that
control messages are never discarded. Data traffic is load balanced among the VSL
links by the EtherChannel load-balancing algorithm.
Virtual Switch Link
60. • An EtherChannel (also known as a port channel) is a collection of two or
more physical links that combine to form one logical link. Layer 2 protocols
operate on the EtherChannel as a single logical entity.
• A multichassis EtherChannel (MEC) is a port channel that spans the two
chassis of a VSS. The access switch views the MEC as a standard port
channel.
• The VSS supports a maximum of 512 EtherChannels. This limit applies to
the combined total of regular EtherChannels and MECs. Because VSL
requires two EtherChannel numbers (one for each chassis), there are 510
user-configurable EtherChannels. If an installed service module uses an
internal EtherChannel, that EtherChannel will be included in the total.
Multichassis EtherChannel
62. Вопрос 3
Какие темы вам бы было интересно
послушать на наших вебинарах:
1. Подробнее про коммутаторы с
поддержкой стекирования и VSS
2. Вопросы траблшутинга 6500 и
7600
3. Подробнее про Spanning-Tree
4. Подробнее про настройку VLAN,
trunk
5. Дизайн сети Data Center
63. Отправьте свой вопрос сейчас!
Используйте панель Q&A, чтобы задать вопрос.
Эксперты ответят на Ваши вопросы.
64. Приглашаем
Вас активно
участвовать в
Сообществе и
социальных
сетях
Vkontakte http://vk.com/cisco
Facebook http://www.facebook.com/CiscoSupportCommunity
Twitter https://twitter.com/CiscoRussia
You Tube http://www.youtube.com/user/CiscoRussiaMedia
Google+ https://plus.google.com/106603907471961036146
LinkedIn http://www.linkedin.com/groups/Cisco-Russia-CIS-37
Instgram https://instagram.com/ciscoru
Newsletter Subscription
csc-russian@external.cisco.com
65. Мы также
предоставляем
Вашему вниманию
Сообщества на
других языках!
Если Вы говорите на Испанском, Португальском или
Японском, мы приглашаем Вас принять участие в
Сообществах:
Русское
http://russiansupportforum.cisco.com
Испанское
https://supportforums.cisco.com/community/spanish
Португальское
https://supportforums.cisco.com/community/portuguese
Японское
https://supportforums.cisco.com/community/csc-japan
Китайское
http://www.csc-china.com.cn
Если Вы говорите на Испанском,
Португальском или Японском, мы
приглашаем Вас принять участие на
Вашем родном языке