0 output buffer failures, 0 output buffers swapped out
This seems to say 3.7GB in, 4.2GB out, with no errors; similar clean stats were reported by the 3524 on the remote end. However, large files transferred from Outlook clients to an Exchange server were often "corrupted", (which IMHO is a cop-out word meaning something went wrong, but damned if we know what), and everything at the remote site seemed sluggish. Also, odd, random, telephone errors kept popping up.
The fiber cable connecting the remote building got badly kinked by a klutzy A/C mechanic a couple of years ago, so we've always wondered if it was OK, but the lights always blinked, and the switches at both ends reported no errors, so we didn't do anything about it. Working my way down the layers, however, I decided to check on it, and hooked up a gigabit cable analyzer, which puked big-time. The near end couldn't talk to the remote end at all, let alone run diagnostics.
So we replaced the cable, and everything seems hunky-dory. Exchange no longer reports corrupted files, the tester loves the link, and the switches continue to report no errors. People in the remote building think the network "has gotten faster". My question is obvious -- what kind(s) of error(s) would cause all these problems, but not be reported by the switches?
I accept that there was in fact an error being caused by the bad cable. My question is, why wasn't this error being detected by the switch? It would seem that the error would have to ultimately cause some kind of CRC/FRC error, but no such errors were reported.
I like the "wandering photons" description. I'd put it in the same league with "bit rot".
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...