Network technologies and trends


December 30, 2010  8:38 PM

What are key features and benefits NX-OS offers Series 2



Posted by: Yasir Irfan
128-bit Advanced Encryption Standard, Base Feature, BGP, Cisco Nexus 7000 Series Switches, Cisco Trustsec, Continuous system operation, CTS, data confidentiality, Data traffic, EIGRP, Enterprise Services Package, Etherchannel, GRE, IEEE 802.1AE link-layer cryptography, In-Service Software Upgrade, integrity, ISIS, key features and benefits NX-OS, Layer 2 protocols, Layer 3 protocols, MPLS, NX-OS, OTV, Policy based routing PIM, STP, Switches, VDC, Virtual Device Contexts, Virtual Port Channels (vPC)

In my previous post I did discussed about some of the key features of NX-OS lets see what else it offer

  • Base services: The default license that ships with NX-OS covers Layer 2 protocols including such features such as Spanning Tree, virtual LANs (VLAN), Private VLANS, and Unidirectional Link Detection (UDLD).
  • Enterprise Services Package: Provides Layer 3 protocols such as Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (ISIS), Enhanced Interior Gateway Routing Protocol (EIGRP), Policy-Based Routing (PBR), Protocol Independent Multicast (PIM), and Generic Routing Encapsulation (GRE).
  • Advanced Services Package: Provides Virtual Device Contexts (VDC), Cisco Trustsec (CTS), and Overlay Transport Virtualization (OTV).
  • Transport Services License: Provides Overlay Transport Virtualization (OTV) and Multiprotocol Label Switching (MPLS) (when available).

December 30, 2010  8:35 PM

What are key features and benefits NX-OS offers Series 1



Posted by: Yasir Irfan
128-bit Advanced Encryption Standard, Cisco Nexus 7000 Series Switches, Continuous system operation, CTS, data confidentiality, Data traffic, Etherchannel, IEEE 802.1AE link-layer cryptography, In-Service Software Upgrade, integrity, key features and benefits NX-OS, STP, Switches, VDC, Virtual Device Contexts, Virtual Port Channels (vPC)

Apparently the NX-OS includes some quite interesting kef features and benefit. In this post I will try to highlight few of those features. Some of them are as follows

  • Virtual device contexts (VDC): Cisco Nexus 7000 Series switches can be segmented into virtual devices based on customer requirements. VDCs offer several benefits such as fault isolation, administration plane, separation of data traffic, and enhanced security.
  • Virtual Port Channels (vPC): Enables a server or switch to use an EtherChannel across two upstream switches without an STP-blocked port to enable use of all available uplink bandwidth.
  • Continuous system operation: Maintenance, upgrades, and software certification can be performed without service interruptions due to the modular nature of NX-OS and features such as In-Service Software Upgrade (ISSU) and the capability for processes to restart dynamically.
  • Security: Cisco NX-OS provides outstanding data confidentiality and integrity, supporting standard IEEE 802.1AE link-layer cryptography with 128-bit Advanced Encryption Standard (AES) cryptography. In addition to CTS, there are many additional security features such as access control lists (ACL) and port-security, for example.


December 30, 2010  8:31 PM

A brief overview of Cisco NX-OS



Posted by: Yasir Irfan
A brief overview of Cisco NX-OS, availability, Cisco Nexus 7000 Series switch, Cisco NX-OS, Cisco Storage Area Network Operating System, Data Center, data center-class operating system, IPv4, IPv6, management features, NX-OS, routing multicast, SAN-OS, Security, serviceability, Virtualization

No doubt Cisco Nexus 7000 Series switch is a better choose for Data Center so does the NX-OS. Cisco Systems built the NX-OS data center-class operating system with modularity, resiliency and serviceability as it foundation. Cisco Systems designed NX-OS based on Cisco Storage Area Network Operating System (SAN-OS) software. Some of the advantages of Cisco NX-OS are as following

  • Unified data center operating system
  • Robust and rich feature set with a variety of Cisco innovations
  • Flexibility and scalability
  • Modularity
  • Virtualization
  • Resiliency
  • IPv4 and IPv6 IP routing and multicast features
  • Comprehensive security, availability, serviceability, and management features


December 30, 2010  1:21 PM

Skype outage was caused by a bug in its client



Posted by: Yasir Irfan
p2p network, Servers, SKYPE, skype outage, Windows client.

In his blog post Lars Rabbe , Skype’s chief Information officer revealed that the recent Skype outage was caused by the peer-to-peer (P2P) network becoming unstable and suffering a critical failure.

The failure lasted approximately 24 hours from December 22, 0800 PST/1600 GMT to December 23, 0800 PST/1600 GMT.

According to Lars their support servers responsible for offline instant messaging became overloaded. Which resulted in delayed responses to some of Skype clients. The Skype for Windows client (version 5.0.0152) crashed dye to delayed responses from overloaded severs.

His detailed explanation can be accessed from his blog post.


December 30, 2010  1:06 PM

According to Shaw Wu,BlackBerry PlayBook launch may delay due to battery issues



Posted by: Yasir Irfan
Andriod, App Store, Apple, Blackberry, Blackberry playbook, Flash 10.1, HTML5, iPad, Kaufman Brothers analyst, QNX's mobile operating system, RIM, Samsung Galaxy tab

According to Kaufman Brothers analyst Shaw Wu, BlackBerry’s answer to iPad and Samsung Galaxy Tab, BlackBerry Playbook needs a re-engineering to improve its battery life. The Playbook is due to be released in 2011.

“Wu claims he is hearing that the PlayBook “needs to improve its relatively poor battery life of a few hours compared to 6 hours for the Samsung Galaxy Tab and 10 hours for [Apple's] iPad.” As a result, Wu writes, the launch of the BlackBerry PlayBook may be delayed until May, 2011. Wu notes that the cause of the battery issues may stem from the fact that QNX, the PlayBook’s operating system, was designed for use in scenarios where battery life is not an issue — such as in automobiles.”

Wu has also raised concerns over app store monetization. Apple is the only store where developers can count on revenue, while Android “suffers from piracy and inconsistency”.

Wu has estimated that RIM will ship around 700,000 PlayBooks next year, while other analysts have predicted up to one million shipments.

RIM has announced that the PlayBook measures 5.1 inches by 7.6 inches by 0.4 inches and weighs 0.9 pounds. The PalyBook has a 1024-by-600 multitouch capacitive display, designed around a dual-core, 1-GHz Cortex A9 microprocessor with one gigabyte of RAM.

The tablet will run QNX’s mobile operating system, as well as HTML5 and Flash 10.1, with native hardware support to accelerate apps further.


December 29, 2010  5:27 AM

How to allocate physical interfaces to VDC in a Cisco Nexus 7000 Series switch?



Posted by: Yasir Irfan
32-port 10 Giga Ethernet Module (N7K-M132XP-12), 48-port 10/100/1000 I/O module (N7K-M148GT-11, allocate interface, Cisco Nexus 7010 Series Switch, Cisco NX-OS software, Cisco Systems, configuring Cisco Nexus 7000 Switch, Core Switches, Data Center, Data Center Switch, default VDC, Fabric Modules, Giga Ethernet, How to allocate physical interfaces to VDC in a Cisco Nexus 7000 Series switch, IP telephony, IPv4 router memory, IPv6 router memory, mission-critical, N7K-D132XP-15 module, Network, Nexus 7000 Configuration, Nexus 7000 Series Switches, port-channels, power supplies, show vdc, show vdc details, show vdc membership, SPAN sessions, Supervisor Modules, Ten Giga Ethernet interface, VDC, VDC1, Virtual Device Contexts

 

To allocate physical interfaces to VDC from the config terminal mode type the VDC name and then allocate the physical interfaces as shown below by using the command “allocate interface”

N7000-ITKE01#configure t

N7000-ITKE01 (config)#vdc VDC-CORE1

N7000-ITKE01-DC-CORE1 (config-vdc)#allocate interface  Ethernet1/1

N7000-ITKE01-DC-CORE1 (config-vdc)#allocate interface  Ethernet1/2

N7000-ITKE01 -DC-CORE1 (config-vdc)#allocate interface  Ethernet1/3

Now let’s verify the Interface allocation to the VDC by using following command ” show vdc membership”

N7000-ITKE01-DC-CORE1# show vdc membership

vdc_id:2 vdc_name: DC-CORE1 interfaces:
        Ethernet1/1           Ethernet1/2           Ethernet1/3          
        Ethernet1/4           Ethernet1/5           Ethernet1/6          
        Ethernet1/7           Ethernet1/8           Ethernet1/9          
        Ethernet1/10          Ethernet1/11          Ethernet1/12         
        Ethernet1/13          Ethernet1/14          Ethernet1/15         
        Ethernet1/16          Ethernet1/17          Ethernet1/18         
        Ethernet1/19          Ethernet1/20          Ethernet1/21         
        Ethernet1/22          Ethernet1/23          Ethernet1/24         
        Ethernet1/25          Ethernet1/27          Ethernet1/29         
        Ethernet1/31         

N7000-ITKE01-DC-CORE1#

In addition to interfaces other physical resources such as IPv4 router memory, IPv6 router memory, port-channels, SPAN sessions can be allocated to individual VDC.


December 28, 2010  5:44 AM

How to configure VDC in Cisco Nexus 7000 Series switch?



Posted by: Yasir Irfan
Cisco Nexus 7010 Series Switch, Cisco NX-OS software, Cisco Systems, Core Switches, Data Center, default VDC, Fabric Modules, Giga Ethernet, How to configure VDC in Cisco Nexus 7000 Series switch?, IP telephony, mission-critical, Network, Nexus 7000 Series Switches, power supplies, show vdc, show vdc details, Supervisor Modules, Ten Giga Ethernet interface, VDC, VDC1, Virtual Device Contexts, What is Virtual Device Contexts (VDC) in Nexus 7000 Series Switches

In my previous post we came to know briefly about Virtual Device Contexts (VDC) and what are the advantages of Virtual Device Contexts (VDC) as well.

Configuring Virtual Device Contexts (VDC)   Cisco Nexus 7000 Series switch is as simple as just entering the VDC name, by following below mentioned steps we can create VDC named VDC-Admin

Step 1

Connect to Cisco Nexus 7000 Series switch using a console port.

Step 2

Create a VDC named DC-CORE1

N7000-ITKE01#configure t

N7000-ITKE01 (config)#vdc  DC-CORE1

Step 3

Verify the created VDC by using following commands “Show vdc” and “show vdc VDC-CORE1 detail” as demonstrated below.

N7000-ITKE01# sho vdc

vdc_id  vdc_name                          state               mac            
——  ——–                          —–               ———-     
1       VDC-Admin                         active              00:26:98:07:1c:c1
2       DC-CORE1                          active              00:26:98:07:1c:c2
3       DC-AGG1                           active              00:26:98:07:1c:c3

 

The show VDC command shows VDC id based on which VDC created first.BY default VDC id is assigned to the default VDC. In this case it is VDC-Admin.

VDC-Admin# sho vdc DC-CORE1 ?
  <CR>       
  >           Redirect it to a file
  >>          Redirect it to a file in append mode
  detail      Show detailed vdc information
  membership  Show vdc interface membership information
  resource    Show resource configuration for VDC
  |           Pipe command output to filter

N7000-ITKE01# sho vdc DC-CORE1 detail

vdc id: 2

vdc name: DC-CORE1
vdc state: active
vdc mac address: 00:26:98:07:1c:c2
vdc ha policy: RESTART
vdc dual-sup ha policy: SWITCHOVER
vdc boot Order: 1
vdc create time: Wed Dec 28 08:44:51 2010
vdc reload count: 0
vdc restart count: 0

N7000-ITKE01#

 

 

 

 

In upcoming post I will show how to allocate physical interfaces to the newly created VDC.


December 27, 2010  6:22 AM

What is Virtual Device Contexts (VDC) in Nexus 7000 Series Switches?



Posted by: Yasir Irfan
Cisco Nexus 7010 Series Switch, Cisco NX-OS software, Cisco Systems, Core Switches, Data Center, default VDC, Fabric Modules, Giga Ethernet, IP telephony, mission-critical, Network, Nexus 7000 Series Switches, power supplies, Supervisor Modules, Ten Giga Ethernet interface, VDC, VDC1, Virtual Device Contexts, What is Virtual Device Contexts (VDC) in Nexus 7000 Series Switches

 

The Virtual Device Contexts (VDC) is a new feature introduced in Cisco Nexus 7000 NX-OS, so does it happens to be the first Data Center Switch to provide Virtual Device Contexts (VDC) capabilities. The Virtual Device Contexts (VDC) allows a Cisco Nexus 7000 Series switch to be logically segmented into four different virtual switches (device contexts). The logical separation of single Nexus 7000 into multiple logical devices provides the following benefits:

  • Administration and management separation
  • Change and failure domain isolation from other VDSs
  • Address, VLAN, VRP and vPC isolation.

When the Cisco Nexus 7000 Series switch is first booted, all interfaces of all line cards in the modular switch platform are placed in the default VDC (VDC 1).  Up to four VDCs can be created including the default VDC, but an interface can only belong to one VDC.  Interfaces from different line cards can be placed in different VDCs.  Once an interface is placed into a VDC, the interface can no longer be managed in the default VDC context.

The Cisco Nexus 7000 Series switch shares some components between VDC(s), which include the following:

  • A single instance of the kernel which support all of the processes and VDCs.
  • Supervisor Modules
  • Fabric Modules
  • Power Supplies
  • Fan trays
  • System fan trays
  • CMP
  • CoPP
  • Hardware SPAN resources.


December 26, 2010  5:46 AM

What happened to Ten Giga Ethernet interface in Nexus 7000 Series Switch?



Posted by: Yasir Irfan
Cisco Catalyst 6500 Series, Cisco Nexus 7010 Series Switch, Cisco NX-OS software, Cisco Systems, Core Switches, Data Center, Giga Ethernet, IP telephony, Juniper, mission-critical, Network, Network Technologies and Trends, Nexus 7000 Series Switches, Nortel, Ten Giga Ethernet interface, What happened to Ten Giga Ethernet interface in Nexus 7000 Series Switch

 Our Network Infrastructure is currently being under major revamp. We are expanding our Data Center as well our enhancing our services to our customers with the introduction of IP telephony, better internet speed and of course better systems.

When we started planning for this project lot of solutions were presented, starting from Nortel, Juniper and Cisco. We opted for the Cisco recommended solution. In the new solution we are having Cisco Nexus 7010 as our Core Switches.

Since still we are staging our Cisco Nexus 7010 switches, while doing so I figure out there are no more Giga Ethernet or Ten Giga Ethernet interfaces in the Cisco Nexus 7010 Series Switch. All interfaces are known as Ethernet ports.

VDC-Admin-DC-ITKE1(config)# interface ?

  ethernet      Ethernet IEEE 802.3z

  loopback      Loopback interface

  mgmt          Management interface

  port-channel  Port Channel interface

  vlan          Vlan interface

VDC-Admin-DC-ITKE1 (config)# interface ethernet 1/26

VDC-Admin-DC-ITKE1 (config-if)# speed ?

  10     10Mb/s

  100    100Mb/s

  1000   1Gb/s

  10000  10Gb/s

  auto   Auto negotiate speed

 

VDC-Admin-DC-ITKE1 (config-if)#

 But nothing to worry they will not just support 10Mb/s but even they can support 10 GB/s. This is one of key difference I found between Cisco Catalyst 6500 Series and Nexus 7000 Series Switches. As we proceed further I let you all know the major differences between Cisco Catalyst 6500 Series and Nexus 7000 Series Switches. One fact to known about Nexus 7000 Series Switches run by Cisco NX-OS software. It was specifically designed for the most mission-critical place in the network, the data center.


December 21, 2010  5:29 AM

What is GLBP and how it can be configured in Cisco Devices? – Series 2



Posted by: Yasir Irfan
active virtual forwarder, active virtual gateway, and how to configure Gateway Load Balancing Protocol (GBLP) in Cisco Routers and Cisco Catalyst Switches, and Supervisor 720 with IOS Release 12.2(17a) SX4, AVF, AVG, backup or secondary virtual forwarders, Catalyst 6500 Supervisor 2, CCNP 642-813 Exam, CCNP tips, Cisco Catalyst Switches, Cisco proprietary protocol, Cisco Routers, Gateway Load Balancing Protocol, GBLP, Host-Dependent, Hot Standby Routing Protocol, how Gateway Load Balancing Protocol (GLBP) does load balancing, HSRP, IOS Release 12.2(14) SY4, Load balancing algorithms, load balancing techniques, Round Robin, Routers, Switches, Virtual MAC address, virtual MAC addresses, Virtual Router Redundancy Protocol, VRRP, Weighted, What is GLBP and how it can be configured in Cisco Devices? - Series 1

 

In my previous post I was discussing about Gateway Load Balancing Protocol (GLBP), now let’s see how Gateway Load Balancing Protocol (GLBP) does load balancing?  Basically there are three different types of Load balancing algorithms applied

Round Robin:

  • This method is the default method used by Gateway Load Balancing Protocol (GLBP).
  • In this method the when the client sends ARP requests to resolve the MAC- address of the default gateway , the reply contains the MAC address of the next possible router in round-robin fashion

 Weighted:

  •  Gateway Load Balancing Protocol (GLBP) places a weight on each device to calculate the amount of load sharing that will occur through MAC assignment
  • The routers participating in GLBP will advertise its weight and AVG will act based on that value
  • For example if we have two routers named ITKE-Router A and ITKE-Router B. If the ITKE-Router A has double the bandwidth capacity then the ITKE-Router B. ITKE-Router A will be configured with the double weighting value of ITKE-Router B

Host-Dependent

  • Each Client will always get the same Virtual MAC address.
  • The Mac-address of the host is used to determine which AVF’s mac the host is directed towards.
  • This method is used when the client needs a consistent gateway MAC -address.
  • Host dependent GLBP is not recommended in situation where there are small number of hosts, for example, less than 20

In upcoming posts let’s see how to configure Gateway Load Balancing Protocol (GLBP) in Cisco devices.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: