ABC Co. Network Implementation High reliability is primary concern – near 100% uptime required –Customer SLA has stiff penalty clauses –Everything is designed.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Chapter 1: Introduction to Scaling Networks
COS 461 Fall 1997 Network Objects u first good implementation: DEC SRC Network Objects for Modula-3 u recent implementation: Java RMI (Remote Method Invocation)
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Dr. Zahid Anwar. Simplified Architecture of Linux Cluster Simplified Architecture of a Single Computer Simplified architecture of an enterprise cluster.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Reliability Week 11 - Lecture 2. What do we mean by reliability? Correctness – system/application does what it has to do correctly. Availability – Be.
1 CCNA 2 v3.1 Module 4. 2 CCNA 2 Module 4 Learning about Devices.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
CMPE 151 Routing Marc Mosko. 2 Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
ICONICS Worldwide Customer Summit – September 2006 Jim Desrosiers SNMP Data Mining for IT Connectivity.
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
Connecting LANs, Backbone Networks, and Virtual LANs
NMS Labs Mikko Suomi LAB1 Choose SNMP device managment software Features: –Gives Nice overview of network –Bandwith monitoring –Multible.
4 September 2015 RE Meyers, Ms.Ed., CCAI CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Starting the switch Configuring the Switch
Enforcing Concurrent Logon Policies with UserLock.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
High-Availability Linux.  Reliability  Availability  Serviceability.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Links and LANs Link between two computers via cross cable The most simple way to connect two hosts is to link the two hosts with a cross cable.
Chapter 6 – Connectivity Devices
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
FailSafe SGI’s High Availability Solution Mayank Vasa MTS, Linux FailSafe Gatekeeper
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
GATEWAY WITH PER-USER SPAM BLOCKING AND VIRUS SCANNING Greg Woods National Center for Atmospheric Research Scientific Computing Division Boulder,
Chapter2 Networking Fundamentals
 Load balancing is the process of distributing a workload evenly throughout a group or cluster of computers to maximize throughput.  This means that.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Identify basic switching concepts and the operation of Cisco switches.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
Cisco 3 - Switch Perrine. J Page 12/4/2016 Chapter 9 Which protocol is Cisco proprietary and designed to carry traffic from multiple VLANs? A Q.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
IP Addressing & Routing - Down Downlink addressing –Normal addressing to any ground destination with normal ground routing –Packets addressed to another.
IMS 4212: Constraints & Triggers 1 Dr. Lawrence West, Management Dept., University of Central Florida Stored Procedures in SQL Server.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Redundant Bricks Configuration Example Lucent Security Products Configuration Example Series.
Step-by-Step Guide to Asynchronous Data (File) Replication (File Based) over a WAN Supported by Open-E ® DSS™ Software Version: DSS ver up85 Presentation.
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
I/Watch™ Weekly Sales Conference Call Presentation (See next slide for dial-in details) Andrew May Technical Product Manager Dax French Product Specialist.
IP: Addressing, ARP, Routing
High Availability Linux (HA Linux)
Chapter 4 Data Link Layer Switching
Configuring EtherChannels and Switch Troubleshooting
Advanced Network Training
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

ABC Co. Network Implementation High reliability is primary concern – near 100% uptime required –Customer SLA has stiff penalty clauses –Everything is designed in a redundant fashion –Network redundancy not integrated with system design or application design. –Application and system design not integrated –Management added last (to fix problems)

The challenge is always politics Politics prevents different parts of the company from working together. –Networking, Systems, and Applications are three different groups. –Systems group own the management issues. –Some requirements get in the way: e.g. Management station must keep its data on the database server.

Network design “Dual Everything” is the design rule –Dual Routers/hubs (Cisco 5500’s) –Dual Ethernet –Dual attached systems

A simple picture Rtr/Hub Redundant net to customers Dual rail Ethernet Server aTNG DNS Wins Server n

More detail No actual “Ethernet bus” –Systems connect to 5500 via UTP –Each system connects to both 5500’s one connection is to “primary” LAN, other to secondary LAN Half have “left” 5500 as primary, other have “right” as primary. 5500s run OSPF and “router cluster” software

Problems... Server OS (NT and Unix) do not switch off the primary interface if it fails and will keep trying to use it. Applications hang and connections time out. DNS points only to one interface on each server. No automatic failover built into applications.

Management software must: Detect NIC failures Continue to monitor system agents in presence of network failures Correct server routing tables if primary interface fails (or the hub fails) Update DNS Notify operations as required.

Challenges Get each system to report all status via both NICs. Monitor system over both NICs. Prevent duplicate notifications. Fail over as fast as possible. Show connectivity of each system to both networks.

What needs to be done to do this? Modify auto discovery scripts to add each system twice as independent systems. –Requires private host file for name/address translation (cannot depend on access to DNS) Invent system to recognize which interface is “active” and block those from other Nic(s)

More work... Duplicate any information in Object Repository that is needed to manage failover onto local system (cannot trust access to SQL server) Store current connectivity state for all servers (added ILPs to class definitions).

Tricks used Each system name in messages has code added to end to indicate interface address: (-p or -s) Most of the work is done in event message processing. –Each “raw” message is suppressed and a script evoked to process it. –Ping success/failures used to switch state –Agent messages dropped base on state and p/s flag

Basic set of flows For each event, (other than pings) –If mode is P or S (kept in NT Registry), and message is from S or P, discard. –Else, reformat message with real server name, improve content (system class, etc.) and send back to event console as a new message

More Flow For each Ping Success/Fail reported: –Remember DSM has already done the retries –If failure, check to see if other port fails, too. If the other port is dead, too, then declare the node down, and reset state to primary. –If its primary, the do failover to secondary. If secondary, do a “failure” back to primary. –Update DNS in all cases.

Router / Hub failure If the router/hub fails, invoke the primary failover script for each node connected to the primary side, and the secondary failover script for each node connected to the secondary side. –This is effectively all the nodes, so we don’t have to wait for each to have a ping failure. The system will stabilize faster.

Does it work? You bet! It required: –Some special REXX scripts for failover –A few Basic programs –A hack to the auto discovery scripts. –Some magic with Trix and a few more basic programs.