Russ White - Academia.edu (original) (raw)
Books by Russ White
Cisco Express ForwardingUnderstanding and troubleshooting CEF in Cisco routers and switchesNakia ... more Cisco Express ForwardingUnderstanding and troubleshooting CEF in Cisco routers and switchesNakia Stringfield, CCIE® No. 13451Russ White, CCIE No. 2635Stacia McKeeHow does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and Catalyst® switches packet-switch (route) frames. CEF is found in almost all Cisco routers and Catalyst switches, and understanding how CEF operates can improve the performance, scalability, and efficiency of your network.Cisco Express Forwarding demystifies the internal workings of Cisco routers and switches, making it easier for you to optimize performance and troubleshoot issues that arise in Cisco network environments. This book addresses common misconceptions about CEF and packet switching acr...
From the Book: PREFACE: Cisco Systems designed EIGRP (Enhanced Interior Gateway Routing Protocol)... more From the Book: PREFACE: Cisco Systems designed EIGRP (Enhanced Interior Gateway Routing Protocol) to support the Internet Protocol (IP), Novell's IPX, and Apple's AppleTalk protocols. EIGRP is used in networks of all sizes, including many large corporate networks, across the world. Routers direct trafficuser data in the form of packetsthrough the network toward its destination. Routing protocols provide the road signs for the routers to use to decide where to forward the traffic to next on the path to the destination. EIGRP is designed to provide routing knowledge within a single domainor between routers controlled and maintained by the same group of people. A domain is usually understood as containing all the routers owned and operated by a single administration, such as a company or a department. Although EIGRP can provide routing information for various protocols, we have limited the scope of this book to just IP. The primary reason for this decision is to maintain foc...
An essential guide to understanding the Cisco IOS architecture In-depth coverage of Cisco's I... more An essential guide to understanding the Cisco IOS architecture In-depth coverage of Cisco's IOS Software architecture provides crucial information to: Prevent network problems and optimize performance through more efficient design and configuration Isolate and resolve network problems more quickly and easily Apply the appropriate packet switching method, such as process switching, fast switching, optimum switching, or Cisco Express Forwarding (CEF) Understand the hardware architecture, packet buffering, and packet switching processes for shared memory routers (Cisco 1600, 2500, 3600, 4000, 4500, and 4700 series) Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco 7200 series routers Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco 7500 series routers Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco GSR 12000 series routers Furth...
From the Book: From the first inception of networked systems, networks have grown into large inte... more From the Book: From the first inception of networked systems, networks have grown into large international systems that impact our daily lives in ways we can hardly begin to imagine. Just about every piece of information about any good or service, any financial transaction, and many other forms of communication, all pass through a network of some type. Each of these networks generally relies on one of four routing protocols to direct and guide these packets of information flowing from place to place: Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), the Border Gateway Protocol (BGP), and/or Intermediate System to Intermediate System (IS-IS). The goal of this book is to examine and describe the last of these protocols, IS-IS, a widely used protocol that hasn't been examined in the detail that other routing protocols have, in the context of routing for the Internet Protocol (TCP/IP) protocol suite. While IS-IS was originally designed to (and stil...
Techniques for optimizing large-scale IP routing operation and managing network growthi¾ Understa... more Techniques for optimizing large-scale IP routing operation and managing network growthi¾ Understand the goals of scalable network design, including tradeoffs between network scaling, convergence speed, and resiliency Learn basic techniques applicable to any network design, including hierarchy, addressing, summarization, and information hiding Examine the deployment and operation of EIGRP, OSPF, and IS-IS protocols on large-scale networks Understand when and how to use a BGP core in a large-scale network and how to use BGP to connect to external networks Apply high availability and fast convergence to achieve 99.999 percent, or “five 9s” network uptime Secure routing systems with the latest routing protocol security best practices Understand the various techniques used for carrying routing information through a VPNOptimal Routing Design provides the tools and techniques, learned through years of experience with network design and deployment, to build a large-scale or scalable IP-rout...
From the Book: Venture into any bookstore today and you can find numerous books on internetworkin... more From the Book: Venture into any bookstore today and you can find numerous books on internetworking covering a wide range of topics from protocols to network design techniques. There's no question that internetworking has become a popular field with the enormous growth of the Internet and the increasing convergence of voice, video, and data. Cisco has built a very successful business selling the equipment that forms the network infrastructure-by some accounts, Cisco has more than 85 percent of the market-and at the same time has seen its Cisco IOS Software become a de facto industry standard. Yet, although plenty of material is written about network design and the protocols lOS supports, very little information is available from sources other than Cisco.This lack of information is understandable-IOS is proprietary, after all-but it nevertheless leaves network implementers at a disadvantage. During our experience helping design and troubleshoot IOS-based networks, we've seen m...
Papers by Russ White
This document defines an information model associated with the I2RS ephemeral state for filter-ba... more This document defines an information model associated with the I2RS ephemeral state for filter-based routing of IP packets via a Filter- based Routing Information Base (FB-RIB). FB-RIBs (ephemeral and non- ephemeral) are associated with specific interfaces interfaces on a routing device, and process packets received on these interfaces according a filtering policy. A filtering policy is a a minimalistic event-match_condition-action (ECA) policy with only one event - the reception of a frame/packet of data on an interface. The match conditions in the filter policy are n-tuple matches based on the content of the frame/packet or the time of its arrival. Filter-based policy allows actions which modifying the frame/packet, forward the frame or packet, or drop the frame/packet. Filter-Based Policy in FB- RIBs engages before any destination based routing so the FB-RIBs provide a destination-based default RIB that will be used if none of the filters are matched.
This document defines a data model to support the Filter-based Routing Information Base (RIB) Yan... more This document defines a data model to support the Filter-based Routing Information Base (RIB) Yang data models. A routing system uses the Filter-based RIB to program FIB entries that process incoming packets by matching on multiple fields within the packet and then performing a specified action on it. The FB-RIB can also specify an action to forward the packet according to the FIB entries programmed using the RIBs of its routing instance. The Filter based RIB is a protocol independent data structure which can be deployed in a configuration datastore, an ephemeral control plane data stroe.
This document describes the yang data model for packet forwarding policy that filters received pa... more This document describes the yang data model for packet forwarding policy that filters received packets and forwards (or drops) the packets. Prior to forwarding the packets out other interfaces, some of the fields in the packets may be modified. If one considers the packet reception an event, this packet policy is a minimalistic Event-Match Condition-Action policy. This policy controls forwarding of packets received by a routing device on one or more interfaces on which this policy is enabled. The policy is composed of an ordered list of policy rules. Each policy policy rule contains a set of match conditions that filters for packets plus a set of actions to modify the packet and forward packets. The match conditions can match tuples in multiple layers (L1-L4, application), interface received on, and and other conditions regarding the packet (size of packet, time of day). The modify packet actions allow for setting things within the packet plus decapsulation and encapsulation packet. The forwarding actions include forwarding via interfaces, tunnels, or nexthops and dropping the packet. The policy model can be used with the session ephemeral (BGP Flow Specifications), reboot ephemeral state (I2RS ephemeral), and non-ephemeral routing/forwarding state (e.g. configuration state ).
PRACTICAL BGPI would recommend this book to network engineers, Internet service providers, netwo... more PRACTICAL BGPI would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing.ï¾ Enke Chen, Redback NetworksHands-on guidance for deploying and ...
IEEE Internet Computing, Jul 1, 2013
Cisco Express ForwardingUnderstanding and troubleshooting CEF in Cisco routers and switchesNakia ... more Cisco Express ForwardingUnderstanding and troubleshooting CEF in Cisco routers and switchesNakia Stringfield, CCIE® No. 13451Russ White, CCIE No. 2635Stacia McKeeHow does a router switch a packet? What is the difference between routing a packet, switching a frame, and packet switching? What is the Cisco® Express Forwarding (CEF) feature referred to in Cisco documentation and commonly found in Cisco IOS® commands? CEF is a general term that describes the mechanism by which Cisco routers and Catalyst® switches packet-switch (route) frames. CEF is found in almost all Cisco routers and Catalyst switches, and understanding how CEF operates can improve the performance, scalability, and efficiency of your network.Cisco Express Forwarding demystifies the internal workings of Cisco routers and switches, making it easier for you to optimize performance and troubleshoot issues that arise in Cisco network environments. This book addresses common misconceptions about CEF and packet switching acr...
From the Book: PREFACE: Cisco Systems designed EIGRP (Enhanced Interior Gateway Routing Protocol)... more From the Book: PREFACE: Cisco Systems designed EIGRP (Enhanced Interior Gateway Routing Protocol) to support the Internet Protocol (IP), Novell's IPX, and Apple's AppleTalk protocols. EIGRP is used in networks of all sizes, including many large corporate networks, across the world. Routers direct trafficuser data in the form of packetsthrough the network toward its destination. Routing protocols provide the road signs for the routers to use to decide where to forward the traffic to next on the path to the destination. EIGRP is designed to provide routing knowledge within a single domainor between routers controlled and maintained by the same group of people. A domain is usually understood as containing all the routers owned and operated by a single administration, such as a company or a department. Although EIGRP can provide routing information for various protocols, we have limited the scope of this book to just IP. The primary reason for this decision is to maintain foc...
An essential guide to understanding the Cisco IOS architecture In-depth coverage of Cisco's I... more An essential guide to understanding the Cisco IOS architecture In-depth coverage of Cisco's IOS Software architecture provides crucial information to: Prevent network problems and optimize performance through more efficient design and configuration Isolate and resolve network problems more quickly and easily Apply the appropriate packet switching method, such as process switching, fast switching, optimum switching, or Cisco Express Forwarding (CEF) Understand the hardware architecture, packet buffering, and packet switching processes for shared memory routers (Cisco 1600, 2500, 3600, 4000, 4500, and 4700 series) Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco 7200 series routers Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco 7500 series routers Understand the hardware architecture, packet buffering, and packet switching processes for the Cisco GSR 12000 series routers Furth...
From the Book: From the first inception of networked systems, networks have grown into large inte... more From the Book: From the first inception of networked systems, networks have grown into large international systems that impact our daily lives in ways we can hardly begin to imagine. Just about every piece of information about any good or service, any financial transaction, and many other forms of communication, all pass through a network of some type. Each of these networks generally relies on one of four routing protocols to direct and guide these packets of information flowing from place to place: Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), the Border Gateway Protocol (BGP), and/or Intermediate System to Intermediate System (IS-IS). The goal of this book is to examine and describe the last of these protocols, IS-IS, a widely used protocol that hasn't been examined in the detail that other routing protocols have, in the context of routing for the Internet Protocol (TCP/IP) protocol suite. While IS-IS was originally designed to (and stil...
Techniques for optimizing large-scale IP routing operation and managing network growthi¾ Understa... more Techniques for optimizing large-scale IP routing operation and managing network growthi¾ Understand the goals of scalable network design, including tradeoffs between network scaling, convergence speed, and resiliency Learn basic techniques applicable to any network design, including hierarchy, addressing, summarization, and information hiding Examine the deployment and operation of EIGRP, OSPF, and IS-IS protocols on large-scale networks Understand when and how to use a BGP core in a large-scale network and how to use BGP to connect to external networks Apply high availability and fast convergence to achieve 99.999 percent, or “five 9s” network uptime Secure routing systems with the latest routing protocol security best practices Understand the various techniques used for carrying routing information through a VPNOptimal Routing Design provides the tools and techniques, learned through years of experience with network design and deployment, to build a large-scale or scalable IP-rout...
From the Book: Venture into any bookstore today and you can find numerous books on internetworkin... more From the Book: Venture into any bookstore today and you can find numerous books on internetworking covering a wide range of topics from protocols to network design techniques. There's no question that internetworking has become a popular field with the enormous growth of the Internet and the increasing convergence of voice, video, and data. Cisco has built a very successful business selling the equipment that forms the network infrastructure-by some accounts, Cisco has more than 85 percent of the market-and at the same time has seen its Cisco IOS Software become a de facto industry standard. Yet, although plenty of material is written about network design and the protocols lOS supports, very little information is available from sources other than Cisco.This lack of information is understandable-IOS is proprietary, after all-but it nevertheless leaves network implementers at a disadvantage. During our experience helping design and troubleshoot IOS-based networks, we've seen m...
This document defines an information model associated with the I2RS ephemeral state for filter-ba... more This document defines an information model associated with the I2RS ephemeral state for filter-based routing of IP packets via a Filter- based Routing Information Base (FB-RIB). FB-RIBs (ephemeral and non- ephemeral) are associated with specific interfaces interfaces on a routing device, and process packets received on these interfaces according a filtering policy. A filtering policy is a a minimalistic event-match_condition-action (ECA) policy with only one event - the reception of a frame/packet of data on an interface. The match conditions in the filter policy are n-tuple matches based on the content of the frame/packet or the time of its arrival. Filter-based policy allows actions which modifying the frame/packet, forward the frame or packet, or drop the frame/packet. Filter-Based Policy in FB- RIBs engages before any destination based routing so the FB-RIBs provide a destination-based default RIB that will be used if none of the filters are matched.
This document defines a data model to support the Filter-based Routing Information Base (RIB) Yan... more This document defines a data model to support the Filter-based Routing Information Base (RIB) Yang data models. A routing system uses the Filter-based RIB to program FIB entries that process incoming packets by matching on multiple fields within the packet and then performing a specified action on it. The FB-RIB can also specify an action to forward the packet according to the FIB entries programmed using the RIBs of its routing instance. The Filter based RIB is a protocol independent data structure which can be deployed in a configuration datastore, an ephemeral control plane data stroe.
This document describes the yang data model for packet forwarding policy that filters received pa... more This document describes the yang data model for packet forwarding policy that filters received packets and forwards (or drops) the packets. Prior to forwarding the packets out other interfaces, some of the fields in the packets may be modified. If one considers the packet reception an event, this packet policy is a minimalistic Event-Match Condition-Action policy. This policy controls forwarding of packets received by a routing device on one or more interfaces on which this policy is enabled. The policy is composed of an ordered list of policy rules. Each policy policy rule contains a set of match conditions that filters for packets plus a set of actions to modify the packet and forward packets. The match conditions can match tuples in multiple layers (L1-L4, application), interface received on, and and other conditions regarding the packet (size of packet, time of day). The modify packet actions allow for setting things within the packet plus decapsulation and encapsulation packet. The forwarding actions include forwarding via interfaces, tunnels, or nexthops and dropping the packet. The policy model can be used with the session ephemeral (BGP Flow Specifications), reboot ephemeral state (I2RS ephemeral), and non-ephemeral routing/forwarding state (e.g. configuration state ).
PRACTICAL BGPI would recommend this book to network engineers, Internet service providers, netwo... more PRACTICAL BGPI would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing.ï¾ Enke Chen, Redback NetworksHands-on guidance for deploying and ...
IEEE Internet Computing, Jul 1, 2013
Programmatic interfaces to provide control over individual forwarding devices in a network promis... more Programmatic interfaces to provide control over individual forwarding devices in a network promise to reduce operational costs while improving scaling, control, and visibility into the operation of large scale networks. To this end, several programmatic interfaces have been proposed. OpenFlow, for instance, provides a mechanism to replace the dynamic control plane processes on individual forwarding devices throughout a network with off box processes that interact with the forwarding tables on each device. Another example is NETCONF, which provides a fast and flexible mechanism to interact with device configuration and policy. There is, however, no proposal which provides an interface to all aspects of the routing system as a system. Such a system would not interact with the forwarding system on individual devices, but rather with the control plane processes already used to discover the best path to any given destination through the network, as well as interact with the routing information base (RIB), which feeds the forwarding table the information needed to actually switch traffic at a local level. This document describes a set of use cases such a system could fulfill. It is designed to provide underlying support for the framework, policy, and other drafts describing the Interface to the Routing System (I2RS).
The BGP specification describes a Decision Process for selecting the best route. This process use... more The BGP specification describes a Decision Process for selecting the best route. This process uses a series of steps, made up of path attributes and other values, to first determine the Degree of Preference of a route and later as tie breakers. While existing mechanisms may achieve some of the same results described in this document, they can only do so through extensive configuration such as matching communities to explicit policy and/or route preference configurations present on each BGP speaker within their administrative domain (autonomous system). Implementing some specific fine grained policies through such mechanisms is cumbersome, if even possible. This document defines a new Extended Community, called the Cost Community, which may be used as part of the Decision Process. The end result is a local Custom Decision Process.
Cisco Press eBooks, Jun 1, 2005
Techniques for optimizing large-scale IP routing operation and managing network growthi¾ Understa... more Techniques for optimizing large-scale IP routing operation and managing network growthi¾ Understand the goals of scalable network design, including tradeoffs between network scaling, convergence speed, and resiliency Learn basic techniques applicable to any network design, including hierarchy, addressing, summarization, and information hiding Examine the deployment and operation of EIGRP, OSPF, and IS-IS protocols on large-scale networks Understand when and how to use a BGP core in a large-scale network and how to use BGP to connect to external networks Apply high availability and fast convergence to achieve 99.999 percent, or “five 9s” network uptime Secure routing systems with the latest routing protocol security best practices Understand the various techniques used for carrying routing information through a VPNOptimal Routing Design provides the tools and techniques, learned through years of experience with network design and deployment, to build a large-scale or scalable IP-routed network. The book takes an easy-to-read approach that is accessible to novice network designers while presenting invaluable, hard-to-find insight that appeals to more advanced-level professionals as well.Written by experts in the design and deployment of routing protocols, Optimal Routing Design leverages the authors' extensive experience with thousands of customer cases and network designs. Boiling down years of experience into best practices for building scalable networks, this book presents valuable information on the most common problems network operators face when seeking to turn best effort IP networks into networks that can support Public Switched Telephone Network (PSTN)-type availability and reliability.Beginning with an overview of design fundamentals, the authors discuss the tradeoffs between various competing points of network design, the concepts of hierarchical network design, redistribution, and addressing and summarization. This first part provides specific techniques, usable in all routing protocols, to work around real-world problems. The next part of the book details specific information on deploying each interior gateway protocol (IGP)i¾including EIGRP, OSPF, and IS-ISi¾in real-world network environments. Part III covers advanced topics in network design, including border gateway protocol (BGP), high-availability, routing protocol security, and virtual private networks (VPN). Appendixes cover the fundamentals of each routing protocol discussed in the book; include a checklist of questions and design goals that provides network engineers with a useful tool when evaluating a network design; and compare routing protocols strengths and weaknesses to help you decide when to choose one protocol over another or when to switch between protocols.“The complexity associated with overlaying voice and video onto an IP network involves thinking through latency, jitter, availability, and recovery issues. This text offers keen insights into the fundamentals of network architecture for these converged environments.”i¾John Cavanaugh, Distinguished Services Engineer, Cisco Systems®This book is part of the Networking Technology Series from Cisco Pressi¾ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Many of the designations used by manufacturers and sellers to distinguish their products are clai... more Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and we were aware of a trademark claim, the designations have been printed in initial capital letters or all capital ...