Corona Stacking – new features

Slides:



Advertisements
Similar presentations
What Would Happen if Your Customers Never Purchased Another Network? Brocade Network Subscription – Partner Enablement.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Chapter 3: Link Aggregation
BROCADE ACCREDITED CAMPUS NETWORKING SPECIALIST STUDY NOTES March 2012 © 2012 Brocade Communications Systems, Inc. 1.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
© 2014 Microsoft Corporation. All rights reserved.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—4-1 Implementing Inter-VLAN Routing Deploying Multilayer Switching with Cisco Express Forwarding.
CERN TIER PARTNER PROGRAM Pierre Hardoin Brocade Account Manager Cambridge, 9 February © 2014 Brocade Communications Systems, Inc. CONFIDENTIAL—For.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
1© Hitachi Data Systems Corporation All Rights Reserved.1 BROCADE FABRIC VISION TECHNOLOGY.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
STP Spanning tree protocol. Trunk port : A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a specific.
Lesson 1: Configuring Network Load Balancing
STACKING Nadia Shaw Technical Marketing Engineer Campus Product Management.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
VLANs- Chapter 3 CCNA Exploration Semester 3 Modified by Profs. Ward
BROCADE FASTIRON WS SALES PROMOTION BRC0029 © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL— Company Proprietary Information. 1.
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Mohammad Hanif June 2015 Optimal Flow Placement in SDN Networks.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The ProCurve 3500yl/5400zl/6200yl.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Feature: Assign an Item to Multiple Sites © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
Conditions and Terms of Use
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Session objectives Discuss whether or not virtualization makes sense for Exchange 2013 Describe supportability of virtualization features Explain sizing.
Data Center Bridging
Lecture 3 Process Concepts. What is a Process? A process is the dynamic execution context of an executing program. Several processes may run concurrently,
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
LiveDist: Real-Time Distribution of Databases, with High-Volume of Updates Dynamic and selective distribution of a central or distributed database, to.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
Link Aggregation V1.1. Objectives Understand the features and benefits of link aggregation Grasp the basic link aggregation configuration steps of G series.
Switching Topic 2 VLANs.
Oracle Fusion Applications 11gR1 ( ) Functional Overview (L2) Manage Inbound Logistics (L3) Put Away Loads.
Virtual Local Area Networks (VLANs) Part II
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Introduction to Voyager 9 Primo OPAC
Click to add text © 2012 IBM Corporation 1 Streams Console Application Graph Michael Pfeifer Streams Admin Console.
1 Certification Program User Management 01 - Roles.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Cisco Implementing Cisco IP Switched Networks (SWITCH )
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Instructor Materials Chapter 6: VLANs
Some aspects to be determined in PIRC July
Deploy Plugins Developer 29 October 2013
Chapter 5: Inter-VLAN Routing
Introduction to Networking
Many-core Software Development Platforms
Understanding Wi-Fi Direct in Windows 8
Automation in an XML Authoring Environment
Lecture 2: Processes Part 1
Office Mac /30/2018 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
BROCADE Overview UKNOF PRESENTATION
Chapter 3 VLANs Chaffee County Academy
Chapter 2: Scaling VLANs
Chapter 2: Operating-System Structures
Chapter 2: Operating-System Structures
Microsoft Virtual Academy
Presentation transcript:

Corona Stacking – new features [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Corona Stacking – new features Bipin Agarwal August 2014 © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Dagobah TOI May 2014 Legal Disclaimer All or some of the products detailed in this presentation may still be under development and certain specifications, including but not limited to, release dates, prices, and product features, may change. The products may not function as intended and a production version of the products may never be released. Even if a production version is released, it may be materially different from the pre-release version discussed in this presentation. Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied, statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement of third-party rights with respect to any products and services referenced herein. ADX, Brocade, Brocade Assurance, Brocade One, the B-wing symbol, DCX, Fabric OS, ICX, MLX, SAN Health, VCS, and VDX are registered trademarks, and AnyIO, HyperEdge, MyBrocade, NET Health, OpenScript, and The Effortless Network are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of their respective owners. *** NOTE: Backdoor and hidden commands are for INTERNAL USE ONLY*** *** Debug commands are for use under direction of Technical Support only*** © 2014 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2014 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Acronyms Acronym Description IPC Inter Process Communication PP Packet Processor CPU Central Processing Unit DLB Dynamic Load Balancing © 2014 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Agenda Corona Stacking – Homogeneous Stacking ICX 7750 Stacking Links ICX 7750 Core Auto Trunking HG2 links Stacking Communication: Mailbox / IPC Secure-setup/ UR / Unit ID Change DLB Stacking Trunk Port Fast Failover IEEE-HG2 NEGOTIATION © 2014 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Introduction ICX 7750 stacking is a Homogenous Stack [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Introduction ICX 7750 stacking is a Homogenous Stack Two Stacking Links per Unit Each link can be a trunk with max of 3 ports Each of these ports is a 40g port Possible Trunks: 1/2/1 to 1/2/3, 1/2/4 to 1/2/6 1/3/1 to 1/3/3, 1/3/4 to 1/3/6 © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Introduction – cont. Two port trunks also possible: 1/2/1 & 1/2/2 [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Introduction – cont. Two port trunks also possible: 1/2/1 & 1/2/2 1/2/4 & 1/2/5 1/3/1 & 1/3/2 1/3/4 & 1/3/5 Each Unit has only one PP © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Core Auto Trunking HyperEdge supported peripheral auto trunks [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Core Auto Trunking HyperEdge supported peripheral auto trunks ICX 7750 supports core unit auto trunks Any stacking link between two ICX 7750 can Consist of multiple ports Secure-setup topology discovery can discover it Allows user to select one or more ports in trunk © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

[Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 HiGig2 Stacking Links All stacking communication based on Broadcom HiGig2 Header 16 byte Header Main fields: Mod Id to identify the destination unit Port Id to identify the port on destination Port Id to identify CPU port Frame size increases by only 4 bytes © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Stacking Communication [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Stacking Communication Mailbox Communication Peer to Peer Mod Id not needed Stacking IPC One unit to any other unit in the stack Topology Discovery uses Mailbox Communication Data Sync uses IPC © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Multiple IPC Priorities [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Multiple IPC Priorities IPC Infra now supports 3 IPC Queues Hi Priority Medium Low Priority Hi Priority used for Stacking Control messages Low Priority used for bulk messages Medium Priority for rest of messages © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Stacking Communication [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Stacking Communication Mailbox Communication Peer to Peer Mod Id not needed Stacking IPC One unit to any other unit in the stack Topology Discovery uses Mailbox Communication Data Sync uses IPC © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Secure-setup Major part of UI unchanged [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Secure-setup Major part of UI unchanged Possible Core trunk connections are discovered Connections have to be consecutive Even if trunk connections are detected, user can optionally not include them in topology Linear and Ring topologies supported Control on topology as before Supports 12 Units in Stack © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Helping User in finding Incorrect Connections [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Helping User in finding Incorrect Connections 12 Unit stacks with stack trunk cables may involve a lot of cables Finding incorrect connection may be nightmare Helps user in finding invalid connections in the topology Displays the MAC address of unit that may have bad connection Invalid Port on the unit is also displayed © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Unit Replacement User can replace old unit by a new clean unit [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Unit Replacement User can replace old unit by a new clean unit User just connects the cables Unit automatically joins the stack with no other configuration required No visible change for the User Supports core trunks and 12 units © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Unit ID change UI remains same except for 12 unit support [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Unit ID change UI remains same except for 12 unit support More protection has been added If ID change involves LAG, it is blocked ID change possible even if Unit has core Trunks © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

DLB – Dynamic Load Balancing [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 DLB – Dynamic Load Balancing New in ICX7750 Provides a more balanced load distribution across members of stacking trunk group Static hash-based mechanisms don't consider state of the port In DLB, the port is selected based on dynamic parameters New flow assigned to a port based on its state: loading etc © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

Backup Ports for Stacking Trunks [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Backup Ports for Stacking Trunks New for ICX7750 Recommended configuration for the user is to use stacking trunks Hardware reacts to trunk port failure Traffic switched to remaining ports Provides fast port hardware failover times Traffic loss is hardly noticeable Without this feature, traffic loss will be there until software reprograms the trunk © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

ICX7450 IEEE – HiGH2 Link Handling [Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 ICX7450 IEEE – HiGH2 Link Handling Non-stacking link is referred to as IEEE Stacking link is referred to as HiGig2 Port remains down if IEEE link is connected to HiGig2 By Default, link comes as IEEE Link can be changed to HiGig2 if negotiation determines that it is possible © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only

[Add Presentation Title: Insert tab > Header & Footer > Notes and Handouts] 4/17/2017 Thank You © 2013 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only © 2012 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal Use Only