Skip to main content

General Network Challenges [ micro-burst ] CCNP.


A micro-burst occurs when a specific amount of data (in bytes) is exceeded in a given time interval.

Micro-Burst Monitoring Overview
The micro-burst monitoring feature allows you to monitor traffic on a per-port basis for both ingress and
egress ports and to detect unexpected data bursts within a very small time window (micro-seconds). This allows you to detect flows in the network that are at risk of data loss, and that may require extra bandwidth. The micro-burst monitoring feature allows you to specify these limits as absolute values (for data and burst size) or as a percentage of the link speed. When these thresholds are exceeded the system generates a Syslog alarm message.

How to Use Micro-Burst Monitoring
The micro-burst monitoring feature monitors bursts in real time. The monitoring process also provides an overview of data path issues, and is helpful in identifying potential capacity issues in a network. Syslog
messages are generated with the burst exceeds the configured value.

Micro-burst monitoring provides real-time burst information that is used to:
• monitor network micro bursts
• trigger to congestion detection and latency processes

knowing your micro-burst is key to a smoothly functioning network environment. if that's for ultra low latency or high throughput enterprise networks having the right tools to understand your network flow is critical.


Configuration Example for Micro-Burst Monitoring The following example shows how to configure micro-burst monitoring on an Ethernet interface:

switch# configure terminal
switch(config)# interface ethernet 1/1
switch(config-if)# burst threshold egress limit 50 interval 30
switch(config-if)# burst threshold ingress size 500000 interval 16000
switch(config-if)# burst maximum egress burst-count 50000
switch(config-if)# burst maximum ingress burst-count 600000
switch(config-if)# exit
switch(config)#exit
switch# copy running-config startup-config




Related topics-



Comments

Popular posts from this blog

How to Upgrade Software on Cisco 5508/5520 HA WLC

The process to upgrade a Cisco Wireless Lan Controller is quite straightforward but there are a few things you need to be aware of which can minimise the downtime for your wireless network. This guide will go through the process to upgrade a pair of 5508 WLC’s configured in HA setup and connected back to back with RP port. Here is the Topology: Upgrade Software on Cisco 5508/5520 WLC – Steps The first step is to upload the new image to the controller. This process does nothing to your live network and only uploads the image to the controller. Download the image from  cisco.com  and store in a known location on your laptop. For the purpose of this guide I am using 8.0.121.0 .Don't forget to check compatible matrix for your AP Models.  You will need a TFTP server running, I am using TFTPD32 running locally on my laptop. You can also use FTP or SFTP server to transfer the image.  Copy the new image into your tftp directory and go to the GUI on your controller

How to upgrade software on a Cisco 3850 Switch | Recover Password | Configuration Backup | Restore Configuration

This short post will show you how to upgrade the software on a single Cisco 3850 switch or a 3850 stack, using TFTP and USB. The process is very easy but it is a bit different than the usual software image of previous switches i.e 3750 etc. The main difference is the Cisco 3850 switch run IOS-XE so you have to copy the .bin file to the flash on the switch and then install the software on the switch. Download the required image from cisco.com Begin the install Reboot the switch Step 1 copy the new image to the 3850 3850-SW1# copy tftp flash Address or name of remote host []? 10.1.1.100 Source filename []? cat3k_caa-universalk9.SPA.03.03.01.SE.150-1.EZ1.bin Destination filename [cat3k_caa-universalk9.SPA.03.03.01.SE.150-1.EZ1.bin]? Accessing tftp://10.1.1.250/cat3k_caa-universalk9.SPA.03.03.01.SE.150-1.EZ1.bin… Loading cat3k_caa-universalk9.SPA.03.03.01.SE.150-1.EZ1.bin from 10.251.226.253 (via Port-channel1): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

RSTP and MST Interview Questions and Answers[CCNP]

What are the Port Roles in RSTP? 1. Root port - It is the port on the switch that has the best root path cost to the root bridge. This is identical to 802.1D. 2. Designated port - The switch port on a network segment that has the best root path cost to the root. 3. Alternate port - A port that has an alternative path to the root, different from the path the root port takes. This path is less desirable than that of the root port. 4. Backup port - A port that provides a redundant (but less desirable) connection to a segment where another switch port already connects. If that common segment is lost, the switch might or might not have a path back to the root. What are different port states in RSTP? 1. Discarding - Incoming frames simply are dropped; no MAC addresses are learned.This state combines the 802.1D Disabled, Blocking, and Listening states. 2. Learning - Incoming frames are dropped, but MAC addresses are learned. 3. Forwarding - Incoming frames are forwa