SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
IP Network Multi-Chassis Trunking for
Resilient and High-Performance
Network Architectures
WHITE PAPER
Multi-Chassis Trunking is a key Brocade technology in the
Brocade One architecture that helps organizations build
scalable and resilient network infrastructures to support
business needs today and scale to meet future needs.
www.brocade.com
2
Evolving Network Demands
We are living in an information age where the interaction among organizations, their
employees, and their customers is continuously evolving. Organizations are communicating
with their customers using tools such as eCommerce, e-mail, YouTube, and video
conferencing-- making a reliable network and high-performance infrastructure key business
enablers. Disruption to this key infrastructure leads to lost productivity and in turn, loss
of customer confidence and revenue. Furthermore, today’s organizations demand flexible
network infrastructures capable of handling ever-increasing data traffic and optimized for
virtualization technologies to deliver a wide range of on-demand services.
The Brocade®
One™
architecture is designed to help these organizations transition smoothly
to a world in which information and applications can reside anywhere. Multi-Chassis Trunking
(MCT) is a key Brocade technology enabling this network architecture. It helps organizations
build scalable and resilient network infrastructures for tomorrow, so that they can continue
to leverage their existing assets and still establish new standards for uptime with the
introduction of future-proof technologies.
Layer 2 networks are ubiquitous in Metropolitan Area Networks (MANs), in the data center,
and in enterprise network infrastructures. These networks are dependent on loop prevention
protocols such as Spanning Tree Protocol (STP) and variations. However STP protocols
suffer from many drawbacks, the most significant being slow convergence and lack of load
balancing on redundant paths. They operate by blocking ports and create unused capacity in
the network.
Network architects have overcome slow convergence using technolog.ies such as Virtual
Switch Redundancy Protocol (VSRP), Metro Ring Protocol (MRP), and Ethernet Ring Protection
(ITU G.8032), all of which offer sub-second convergence. However, they works on the
same link-blocking technology and do not provide the desired active-active load balancing.
The onus of efficient network operation lies with the network architect and advance
planning using load balancing on a per-VLAN basis. Further, the network operator needs to
continuously monitor the network to rebalance.
IEEE 802.1AX Link Aggregation (LAG) technology has solved this using multipathing at Layer
2 and flow-based load balancing. However, the protocol constrains the network to a node-to-
node topology. Organizations require a Layer 2 multipath solution that can provide dynamic
flow-based load balancing to multiple network nodes. Brocade MCT is designed to address
these requirements for today’s resilient and high-performance networks.
3
MCT Overview
Multi-Chassis Trunking is technology that allows multiple switches to appear as single
logical switch connecting to another switch using a standard LAG. Since the technology is an
enhancement to the standard LAG protocol, a single MCT-unaware server or switch using a
standard LAG trunk can connect to two MCT-aware switches--and the traffic is dynamically
load balanced.
MCT inherits the all benefits of LAG by providing multiple physical links to act as a single
logical link; the new bandwidth available is an aggregate of all the links in the group. The
traffic is shared across the links in the group using dynamic flow-based load balancing and
traffic is moved to a remaining link group in tens of milliseconds in the event of a failure in
one of the links. While standard LAG provides link- and module-level protection, MCT adds
node-level protection, while maintaining failover times better than sub-200 milliseconds for
uplink failure. Further, it works with existing switches and servers that connect to MCT and
does not require any rip-and-replace of existing infrastructure.
MCT is available on all Brocade NetIron®
XMR, CER, and CES and Brocade MLX and MLXe
Series platforms.
MCT Operation
MCT is designed to achieve the desired active-active topology and efficient Layer 2
multipathing, while ensuring that the network scales effectively. Hence the load on the Inter-
Chassis Link (ICL), the link connecting the MCT peers, is kept to a minimum and the protocol
relies on direct forwarding of traffic to the client wherever possible. To understand how MCT
functions, the following sections explain the key elements of MCT.
MCT Elements
MCT peers.•	 A pair of MCT nodes that appear as a single logical node. A LAG from a
server or a switch can be spread across the MCT peers and they will appear as a single
logical endpoint.
MCT client.•	 A switch or server connected to the MCT peers using a LAG. The client
device is only required to support IEEE 802.1AX LAG; it could be static or dynamic using
Link Aggregation Control Protocol (LACP). In a multi-tier topology, the client could be a
pair of MCT devices.
Inter-Chassis Link (ICL).•	 A physical link or a LAG group connecting the two MCT peers.
ICL is an important link and it is recommended as a LAG group for protection against link
or module failure.
Keep-alive VLAN.•	 An optional VLAN for continuity check messages and failure handling
in the event of ICL failure.
Figure 1.
Typical MCT topology.
MCT peers
acting as a single
logical switch
Standard
link aggregation
IEEE 802.3ad
Layer 3
Access
layer
Brocade
CES
Keep-alive
VLAN
Glossary of MCT Terms
Cluster Communication Protocol (CCP):•	
A reliable protocol that maintains
state and MAC table synchronization
between the MCT peers
Inter Chassis Link (ICL): Physical link or•	
LAG group connecting the MCT peers
MCT client: A switch or server•	
connected to MCT peers using a LAG
MCT peers: Pair of MCT nodes that•	
appear as a single logical node
Port Loop Detection (PLD): A protocol•	
to detect and repair loops in a Layer 2
networks
RBridge ID: A unique ID associated with•	
each bridge that includes MCT peers
or clients
4
MCT functionality can be divided into to two main parts: LAG operation and Cluster
Communication Protocol (CCP). MCT clients perform only the LAG operations defined in IEEE
802.1AX. The LAG can be a static or a dynamic LACP trunk. Cluster Communication Protocol
is a reliable protocol that runs between the MCT peers over the ICL, and it maintains state
and MAC table synchronization between the two peer nodes.
The network design and configuration is fairly simple. Each MCT peer and client is assigned
a unique ID, known as the RBridge ID. The MCT peer nodes are connected using an ICL and
configured as a cluster. Once the peering relationship is established between the two nodes,
CCP runs over them to make them appear as a single logical node for LAG purposes. Adding
a client is Justas straightforward as associating client RBridge ID with the connected port on
the MCT peers. The CCP protocol manages the rest and keeps the network operation simple.
Traffic from the client is load balanced using a hashing algorithm over the LAG ports. The
MCT nodes forward the traffic to the destination directly. The CCP ensures that the MAC table
between the two nodes is always synchronized, hence in steady state, and ICL use is kept to
a minimum to limit overhead. Downstream traffic on MCT nodes is also directly sent to the
client.
Layer 3 Resiliency
A simple MCT topology addresses resiliency and efficient multipathing in Layer 2 network
topologies. To interface with a Layer 3 network, MCT is configured with Virtual Router
Redundancy Protocol (VRRP) to add redundancy in Layer 3. The standard VRRP mode is
active-standby and all traffic is forwarded through the master. The Brocade NetIron platforms
also support VRRP-E server virtualization (see Figure 2), in which multiple VRRP standby
nodes are supported and each node is capable of forwarding to an upstream Layer 3
network. This provides efficient deployment for both Layer 2 and Layer 3 networks.
Metro Ring Protocol (MRP) was designed to create a scalable, Layer 2, loop-free ring topology
and is a faster alternative to spanning tree protocols. When used with MCT, the MCT peers
act as a logical MCT pair and participate in the MRP ring. The client nodes can then use
standard LAG and achieve active-active dual-homing to the MRP ring. This provides greater
flexibility in network design and helps connect MCT clusters. Typical use cases are dual-
homing in metro networks, as shown in Figure 3, and joining MCT clusters in medium to large
data centers, shown in Figure 4.
Failure Handling
A link or node failure in the MCT network is handled in the same way as a failure in a
standard LAG. In the event of a failure in any of the client links, the client instantly rebalances
the upstream traffic over the rest of the links in a LAG group. Most clients use a hashing
mechanism based on the packet header to ensure that each flow is maintained on a single
link and load balancing occurs on a flow basis.
5
An MCT node with a failed link communicates LAG state change to the peer using CCP. Any
downstream traffic to the client from this node will use the remaining links in the LAG group.
If no alternate client links are available on this MCT node, traffic will be transmitted over the
ICL and use the downlinks on the peer node to ensure traffic delivery. Downstream traffic
arriving on the peer node will be sent directly to the client, just as it would have without the
failure.
The Brocade devices also support Port Loop Detection (PLD), a protocol that can be run along
Subnet
10.10.10.0/24
Layer 3
VRRP-E
master
ICL
VRRP-E
backup/
forwarding
MCT peers
appear as a
single logical switch
Figure 2.
MCT with VRRP for
Layer 3 resiliency.
METRO
RING
Customer
Edge (CE)
MCT peers appear
as a single
logical switch
MCT
Standard
link aggregation
MCT
Figure 3.
MCT with VRRP for
Layer 3 resiliency.
Cluster 1
MCT
peers
Server
MRP for redundant
Layer 2 connectivity
between MCT clusters
Cluster 2
MCT
peers
Server
Figure 4.
Connected MCT clusters
in the data center.
6
with other loop prevention protocols to quickly detect and repair loops. Loops are typically
introduced due to network misconfiguration or an errant device in the network. ICL links are
usually configured as a LAG group, which can scale up to 64 x 10 Gigabit Ethernet (GbE) to
provide resiliency and design flexibility. In addition, ICL links are protected with a backup
keep-alive VLAN. This helps the network to continue to function in the unlikely event of
multiple failures, including an ICL failure.
Benefits
MCT helps create a network topology that is easy to configure and manage by eliminating
the need for STP from server to core in a data center. MCT offers five times the improvement
over alternate approaches by providing fast link and node failover times. Stranded network
capacity can be recovered by migrating to MCT and overall network utilization can be
improved by as high as 100 percent. All links from server to core are forwarding traffic and
Brocade’s patent pending hashing algorithms enable efficient link utilization. Further, with
this approach, the network can can appear as a single logical device with over 30 Terabits
per second (Tbps) of switching capacity.
MCT coupled with VRRP-E server virtualization extends these benefits to an upstream Layer
3 network and preserves efficient network utilization even when Virtual Machines (VMs) and
VM mobility are deployed. MCT helps provide investment protection by unlocking the available
bandwidth and seamlessly interoperating with third-party client devices.
In a metro network, MCT allows active-active dual-homing to a pair of access switches,
where the customer edge device needs to support a standard LAG. This can help a service
provider offer more resilient and/or high-bandwidth services than are possible using current
technologies. A majority of metro networks are ring topologies. And MCT can be used in
conjunction with Metro Ring Protocol to offer a resilient and a more efficient network.
Summary
Multi-Chassis Trunking helps organizations build resilient and high-performance network
architectures and allows them to transition smoothly to a world in which information and
applications can reside anywhere. It provides service providers the flexibility to offer new and
differentiated services. The resulting network architectures are fast and reliable and can
scale to meet the needs of customers or applications. A focus on multipathing and efficient
network usage helps contain capital budgets and because it does not use STP, operating
costs can be kept low. Availability of MCT on the Brocade NetIron XMR, CES, and CER and
Brocade MLX and MLXe Series products offers organizations the flexibility to use the right
product for an their specific needs
7
About Brocade
Brocade provides innovative, end-to-end network solutions that help the world’s leading
organizations transition smoothly to a virtualized world where applications and information
can reside anywhere. These solutions deliver the unique capabilities for a more flexible IT
infrastructure with unmatched simplicity, non-stop networking, optimized applications, and
investment protection. As a result, organizations in a wide range of industries can achieve
their most critical business objectives with greater simplicity and a faster return
on investment.
For more information about Brocade products and solutions, visit www.brocade.com.
WHITE PAPER
© 2010 Brocade Communications Systems, Inc. All Rights Reserved. 09/10 GA-WP-1521-00
Brocade, the B-wing symbol, BigIron, DCFM, DCX, Fabric OS, FastIron, IronView, NetIron, SAN Health, ServerIron,
TurboIron, and Wingspan are registered trademarks, and Brocade Assurance, Brocade NET Health, Brocade One,
Extraordinary Networks, MyBrocade, and VCS are trademarks of Brocade Communications Systems, Inc., in the United
States and/or in other countries. Other brands, products, or service names mentioned are or may be trademarks or
service marks of their respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied,
concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the
right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This
informational document describes features that may not be currently available. Contact a Brocade sales office for
information on feature and product availability. Export of technical data contained in this document may require an
export license from the United States government.
Corporate Headquarters
San Jose, CA USA
T: +1-408-333-8000
info@brocade.com
European Headquarters
Geneva, Switzerland
T: +41-22-799-56-40
emea-info@brocade.co
Asia Pacific Headquarters
Singapore
T: +65-6538-4700
apac-info@brocade.com
www.brocade.com

Weitere ähnliche Inhalte

Was ist angesagt?

Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPDesign and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPAssociate Professor in VSB Coimbatore
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...IJCSIS Research Publications
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
Multiple routing configuration
Multiple routing configurationMultiple routing configuration
Multiple routing configurationIAEME Publication
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04daniel ayalew
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015TTA_TNagar
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qosijwmn
 
IJSRED-V1I1P4
IJSRED-V1I1P4IJSRED-V1I1P4
IJSRED-V1I1P4IJSRED
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service CompositionIJERD Editor
 

Was ist angesagt? (19)

Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPDesign and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Multiple routing configuration
Multiple routing configurationMultiple routing configuration
Multiple routing configuration
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
Frame Relay Chapter 04
Frame Relay Chapter 04Frame Relay Chapter 04
Frame Relay Chapter 04
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETCross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
Comparative study on priority based qos
Comparative study on priority based qosComparative study on priority based qos
Comparative study on priority based qos
 
IJSRED-V1I1P4
IJSRED-V1I1P4IJSRED-V1I1P4
IJSRED-V1I1P4
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service Composition
 
I41026670
I41026670I41026670
I41026670
 

Ähnlich wie Multi-Chassis Trunking for Resilient and High-Performance Network Architectures

Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer modeaniston0108
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfGandhibabu8
 
An energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsAn energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsHamdamboy
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
Cisco discovery drs ent module 7 - v.4 in english.
Cisco discovery   drs ent module 7 - v.4 in english.Cisco discovery   drs ent module 7 - v.4 in english.
Cisco discovery drs ent module 7 - v.4 in english.igede tirtanata
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Motty Ben Atia
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfashumasih3
 
OptiQNet-842-DM-v0.4-for-852
OptiQNet-842-DM-v0.4-for-852OptiQNet-842-DM-v0.4-for-852
OptiQNet-842-DM-v0.4-for-852Yi-Neng Lin
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Cisco Service Provider
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Meenakshi Devi
 
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...IBM India Smarter Computing
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Nirmal Thaliyil
 

Ähnlich wie Multi-Chassis Trunking for Resilient and High-Performance Network Architectures (20)

Lan Switching[1]
Lan Switching[1]Lan Switching[1]
Lan Switching[1]
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
 
An energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocolsAn energy efficiency analysis of lightweight security protocols
An energy efficiency analysis of lightweight security protocols
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Cisco discovery drs ent module 7 - v.4 in english.
Cisco discovery   drs ent module 7 - v.4 in english.Cisco discovery   drs ent module 7 - v.4 in english.
Cisco discovery drs ent module 7 - v.4 in english.
 
Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging Network Virtualization using Shortest Path Bridging
Network Virtualization using Shortest Path Bridging
 
What is the application protocol for IoT.pdf
What is the application protocol for IoT.pdfWhat is the application protocol for IoT.pdf
What is the application protocol for IoT.pdf
 
OptiQNet-842-DM-v0.4-for-852
OptiQNet-842-DM-v0.4-for-852OptiQNet-842-DM-v0.4-for-852
OptiQNet-842-DM-v0.4-for-852
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
frame relay.pdf
frame relay.pdfframe relay.pdf
frame relay.pdf
 
Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...Application Engineered Routing Enables Applications and Network Infrastructur...
Application Engineered Routing Enables Applications and Network Infrastructur...
 
Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)
 
MadgeOne
MadgeOneMadgeOne
MadgeOne
 
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
Distribution Automation based on IEC61850
Distribution Automation based on IEC61850Distribution Automation based on IEC61850
Distribution Automation based on IEC61850
 
IoT Protocol Stack.pdf
IoT Protocol Stack.pdfIoT Protocol Stack.pdf
IoT Protocol Stack.pdf
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures

  • 1. IP Network Multi-Chassis Trunking for Resilient and High-Performance Network Architectures WHITE PAPER Multi-Chassis Trunking is a key Brocade technology in the Brocade One architecture that helps organizations build scalable and resilient network infrastructures to support business needs today and scale to meet future needs. www.brocade.com
  • 2. 2 Evolving Network Demands We are living in an information age where the interaction among organizations, their employees, and their customers is continuously evolving. Organizations are communicating with their customers using tools such as eCommerce, e-mail, YouTube, and video conferencing-- making a reliable network and high-performance infrastructure key business enablers. Disruption to this key infrastructure leads to lost productivity and in turn, loss of customer confidence and revenue. Furthermore, today’s organizations demand flexible network infrastructures capable of handling ever-increasing data traffic and optimized for virtualization technologies to deliver a wide range of on-demand services. The Brocade® One™ architecture is designed to help these organizations transition smoothly to a world in which information and applications can reside anywhere. Multi-Chassis Trunking (MCT) is a key Brocade technology enabling this network architecture. It helps organizations build scalable and resilient network infrastructures for tomorrow, so that they can continue to leverage their existing assets and still establish new standards for uptime with the introduction of future-proof technologies. Layer 2 networks are ubiquitous in Metropolitan Area Networks (MANs), in the data center, and in enterprise network infrastructures. These networks are dependent on loop prevention protocols such as Spanning Tree Protocol (STP) and variations. However STP protocols suffer from many drawbacks, the most significant being slow convergence and lack of load balancing on redundant paths. They operate by blocking ports and create unused capacity in the network. Network architects have overcome slow convergence using technolog.ies such as Virtual Switch Redundancy Protocol (VSRP), Metro Ring Protocol (MRP), and Ethernet Ring Protection (ITU G.8032), all of which offer sub-second convergence. However, they works on the same link-blocking technology and do not provide the desired active-active load balancing. The onus of efficient network operation lies with the network architect and advance planning using load balancing on a per-VLAN basis. Further, the network operator needs to continuously monitor the network to rebalance. IEEE 802.1AX Link Aggregation (LAG) technology has solved this using multipathing at Layer 2 and flow-based load balancing. However, the protocol constrains the network to a node-to- node topology. Organizations require a Layer 2 multipath solution that can provide dynamic flow-based load balancing to multiple network nodes. Brocade MCT is designed to address these requirements for today’s resilient and high-performance networks.
  • 3. 3 MCT Overview Multi-Chassis Trunking is technology that allows multiple switches to appear as single logical switch connecting to another switch using a standard LAG. Since the technology is an enhancement to the standard LAG protocol, a single MCT-unaware server or switch using a standard LAG trunk can connect to two MCT-aware switches--and the traffic is dynamically load balanced. MCT inherits the all benefits of LAG by providing multiple physical links to act as a single logical link; the new bandwidth available is an aggregate of all the links in the group. The traffic is shared across the links in the group using dynamic flow-based load balancing and traffic is moved to a remaining link group in tens of milliseconds in the event of a failure in one of the links. While standard LAG provides link- and module-level protection, MCT adds node-level protection, while maintaining failover times better than sub-200 milliseconds for uplink failure. Further, it works with existing switches and servers that connect to MCT and does not require any rip-and-replace of existing infrastructure. MCT is available on all Brocade NetIron® XMR, CER, and CES and Brocade MLX and MLXe Series platforms. MCT Operation MCT is designed to achieve the desired active-active topology and efficient Layer 2 multipathing, while ensuring that the network scales effectively. Hence the load on the Inter- Chassis Link (ICL), the link connecting the MCT peers, is kept to a minimum and the protocol relies on direct forwarding of traffic to the client wherever possible. To understand how MCT functions, the following sections explain the key elements of MCT. MCT Elements MCT peers.• A pair of MCT nodes that appear as a single logical node. A LAG from a server or a switch can be spread across the MCT peers and they will appear as a single logical endpoint. MCT client.• A switch or server connected to the MCT peers using a LAG. The client device is only required to support IEEE 802.1AX LAG; it could be static or dynamic using Link Aggregation Control Protocol (LACP). In a multi-tier topology, the client could be a pair of MCT devices. Inter-Chassis Link (ICL).• A physical link or a LAG group connecting the two MCT peers. ICL is an important link and it is recommended as a LAG group for protection against link or module failure. Keep-alive VLAN.• An optional VLAN for continuity check messages and failure handling in the event of ICL failure. Figure 1. Typical MCT topology. MCT peers acting as a single logical switch Standard link aggregation IEEE 802.3ad Layer 3 Access layer Brocade CES Keep-alive VLAN Glossary of MCT Terms Cluster Communication Protocol (CCP):• A reliable protocol that maintains state and MAC table synchronization between the MCT peers Inter Chassis Link (ICL): Physical link or• LAG group connecting the MCT peers MCT client: A switch or server• connected to MCT peers using a LAG MCT peers: Pair of MCT nodes that• appear as a single logical node Port Loop Detection (PLD): A protocol• to detect and repair loops in a Layer 2 networks RBridge ID: A unique ID associated with• each bridge that includes MCT peers or clients
  • 4. 4 MCT functionality can be divided into to two main parts: LAG operation and Cluster Communication Protocol (CCP). MCT clients perform only the LAG operations defined in IEEE 802.1AX. The LAG can be a static or a dynamic LACP trunk. Cluster Communication Protocol is a reliable protocol that runs between the MCT peers over the ICL, and it maintains state and MAC table synchronization between the two peer nodes. The network design and configuration is fairly simple. Each MCT peer and client is assigned a unique ID, known as the RBridge ID. The MCT peer nodes are connected using an ICL and configured as a cluster. Once the peering relationship is established between the two nodes, CCP runs over them to make them appear as a single logical node for LAG purposes. Adding a client is Justas straightforward as associating client RBridge ID with the connected port on the MCT peers. The CCP protocol manages the rest and keeps the network operation simple. Traffic from the client is load balanced using a hashing algorithm over the LAG ports. The MCT nodes forward the traffic to the destination directly. The CCP ensures that the MAC table between the two nodes is always synchronized, hence in steady state, and ICL use is kept to a minimum to limit overhead. Downstream traffic on MCT nodes is also directly sent to the client. Layer 3 Resiliency A simple MCT topology addresses resiliency and efficient multipathing in Layer 2 network topologies. To interface with a Layer 3 network, MCT is configured with Virtual Router Redundancy Protocol (VRRP) to add redundancy in Layer 3. The standard VRRP mode is active-standby and all traffic is forwarded through the master. The Brocade NetIron platforms also support VRRP-E server virtualization (see Figure 2), in which multiple VRRP standby nodes are supported and each node is capable of forwarding to an upstream Layer 3 network. This provides efficient deployment for both Layer 2 and Layer 3 networks. Metro Ring Protocol (MRP) was designed to create a scalable, Layer 2, loop-free ring topology and is a faster alternative to spanning tree protocols. When used with MCT, the MCT peers act as a logical MCT pair and participate in the MRP ring. The client nodes can then use standard LAG and achieve active-active dual-homing to the MRP ring. This provides greater flexibility in network design and helps connect MCT clusters. Typical use cases are dual- homing in metro networks, as shown in Figure 3, and joining MCT clusters in medium to large data centers, shown in Figure 4. Failure Handling A link or node failure in the MCT network is handled in the same way as a failure in a standard LAG. In the event of a failure in any of the client links, the client instantly rebalances the upstream traffic over the rest of the links in a LAG group. Most clients use a hashing mechanism based on the packet header to ensure that each flow is maintained on a single link and load balancing occurs on a flow basis.
  • 5. 5 An MCT node with a failed link communicates LAG state change to the peer using CCP. Any downstream traffic to the client from this node will use the remaining links in the LAG group. If no alternate client links are available on this MCT node, traffic will be transmitted over the ICL and use the downlinks on the peer node to ensure traffic delivery. Downstream traffic arriving on the peer node will be sent directly to the client, just as it would have without the failure. The Brocade devices also support Port Loop Detection (PLD), a protocol that can be run along Subnet 10.10.10.0/24 Layer 3 VRRP-E master ICL VRRP-E backup/ forwarding MCT peers appear as a single logical switch Figure 2. MCT with VRRP for Layer 3 resiliency. METRO RING Customer Edge (CE) MCT peers appear as a single logical switch MCT Standard link aggregation MCT Figure 3. MCT with VRRP for Layer 3 resiliency. Cluster 1 MCT peers Server MRP for redundant Layer 2 connectivity between MCT clusters Cluster 2 MCT peers Server Figure 4. Connected MCT clusters in the data center.
  • 6. 6 with other loop prevention protocols to quickly detect and repair loops. Loops are typically introduced due to network misconfiguration or an errant device in the network. ICL links are usually configured as a LAG group, which can scale up to 64 x 10 Gigabit Ethernet (GbE) to provide resiliency and design flexibility. In addition, ICL links are protected with a backup keep-alive VLAN. This helps the network to continue to function in the unlikely event of multiple failures, including an ICL failure. Benefits MCT helps create a network topology that is easy to configure and manage by eliminating the need for STP from server to core in a data center. MCT offers five times the improvement over alternate approaches by providing fast link and node failover times. Stranded network capacity can be recovered by migrating to MCT and overall network utilization can be improved by as high as 100 percent. All links from server to core are forwarding traffic and Brocade’s patent pending hashing algorithms enable efficient link utilization. Further, with this approach, the network can can appear as a single logical device with over 30 Terabits per second (Tbps) of switching capacity. MCT coupled with VRRP-E server virtualization extends these benefits to an upstream Layer 3 network and preserves efficient network utilization even when Virtual Machines (VMs) and VM mobility are deployed. MCT helps provide investment protection by unlocking the available bandwidth and seamlessly interoperating with third-party client devices. In a metro network, MCT allows active-active dual-homing to a pair of access switches, where the customer edge device needs to support a standard LAG. This can help a service provider offer more resilient and/or high-bandwidth services than are possible using current technologies. A majority of metro networks are ring topologies. And MCT can be used in conjunction with Metro Ring Protocol to offer a resilient and a more efficient network. Summary Multi-Chassis Trunking helps organizations build resilient and high-performance network architectures and allows them to transition smoothly to a world in which information and applications can reside anywhere. It provides service providers the flexibility to offer new and differentiated services. The resulting network architectures are fast and reliable and can scale to meet the needs of customers or applications. A focus on multipathing and efficient network usage helps contain capital budgets and because it does not use STP, operating costs can be kept low. Availability of MCT on the Brocade NetIron XMR, CES, and CER and Brocade MLX and MLXe Series products offers organizations the flexibility to use the right product for an their specific needs
  • 7. 7 About Brocade Brocade provides innovative, end-to-end network solutions that help the world’s leading organizations transition smoothly to a virtualized world where applications and information can reside anywhere. These solutions deliver the unique capabilities for a more flexible IT infrastructure with unmatched simplicity, non-stop networking, optimized applications, and investment protection. As a result, organizations in a wide range of industries can achieve their most critical business objectives with greater simplicity and a faster return on investment. For more information about Brocade products and solutions, visit www.brocade.com.
  • 8. WHITE PAPER © 2010 Brocade Communications Systems, Inc. All Rights Reserved. 09/10 GA-WP-1521-00 Brocade, the B-wing symbol, BigIron, DCFM, DCX, Fabric OS, FastIron, IronView, NetIron, SAN Health, ServerIron, TurboIron, and Wingspan are registered trademarks, and Brocade Assurance, Brocade NET Health, Brocade One, Extraordinary Networks, MyBrocade, and VCS are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned are or may be trademarks or service marks of their respective owners. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. Corporate Headquarters San Jose, CA USA T: +1-408-333-8000 info@brocade.com European Headquarters Geneva, Switzerland T: +41-22-799-56-40 emea-info@brocade.co Asia Pacific Headquarters Singapore T: +65-6538-4700 apac-info@brocade.com www.brocade.com