SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
<Insert Picture Here>

Network TOI for NAS (Basic)
2013.11.27

Hisao Tsujimura
Sr. Technical Support Engineer
Storage Technology Service Center, Oracle Tokyo
Agenda
!

Ethernet

!

ARP

!

IP

!

Routing

!

IPoIB (IP over Infiniband)

!2
1. ETHERNET

!3
Ethernet
!

We call them “frames.”

!

It can be sent only to the same hub/switch.

!4
How Ethernet Works?

You check baggage claim tags (MAC Address) and pick up the bag
(frame) when the tag matches.
!5
Simplified Frame Format
•MAC address – 6 byte address (48bits), first 3 bytes indicate vendor. (OUI)
802.3 Ethernet II Frame
Destination

Source

Ethernet II 

MAC Address MAC Address Payload (up to 1500 bytes)
802.1Q Frame (Tagged VLAN)
Destination

Source

VLAN ID Ethernet II 

MAC Address MAC Address (4 bytes) Payload (up to 1500 bytes)
•Switch port settings have to match with what frame format to manage.
•The destination MAC address of all 1 (FF: FF: FF: FF: FF: FF) means broadcast.
•OUI search at IEEE < http://standards.ieee.org/develop/regauth/oui/public.html>

!6
Hubs

Frame 1:
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01

Node1 (Intel Card)
00:12:F0:00:00:01

Node2 (Intel Card)
00:12:F0:00:00:10

Node3 (Cisco Port)
00:05:9B:00:00:10

•Every node receives all frames
•Each node discards frames not addressed to them.
•If the destination is broadcast, all nodes process the frame.

!7
(2)

Switches

MAC table
Port #2 00:12:F0:00:00:10

Frame 1: (1)
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01
Frame 2: (3)
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01
Node1 (Intel Card)
00:12:F0:00:00:01

(1)

(3)

Node2 (Intel Card)
00:12:F0:00:00:10

(1)

Node3 (Cisco Port)
00:05:9B:00:00:10

•Every node receives the frames if the destination is not on switch’s mac table
•No other node receives frames if not addressed to them after the first frame.
•Frames with broadcast is sent to all ports.

!8
VLAN – Logical Partitioning of Switch
Frame 1: (VLAN2)
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01

VLAN 2

VLAN 3

Frame 2: (VLAN2)
Dst: 00:05:9B:00:00:10
Src: 00:12:F0:00:00:01

Node1 (Intel Card)
00:12:F0:00:00:01

Node2 (Intel Card)
00:12:F0:00:00:10

Node3 (Cisco Port)
00:05:9B:00:00:10

•Different VLAN ID means different logical switch.
•No way to go beyond the VLAN boundary unless routed.
•Therefore frame is invalid for transmission.

!9
Checking Mac Address
-bash-4.1$ more ifconfig-a.out
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
igb0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 5
inet 172.23.210.177 netmask ffffff80 broadcast 172.23.210.255
ether 0:10:e0:35:e0:5c
igb1: flags=1000842<BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4
inet 172.23.210.179 netmask ffffff80 broadcast 172.23.210.255
ether 0:10:e0:35:e0:5d
ipmp1: flags=8001000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4,IPMP> mtu 65520 index 6
inet 192.168.28.1 netmask fffffc00 broadcast 192.168.31.255
groupname ipmp1
lo0: flags=2002000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv6,VIRTUAL> mtu 8252 index 1
inet6 ::1/128

!10
2. ARP

!11
ARP – Find MAC address from IP Address

Bean

!12
ARP – Find MAC address from IP Address
•Destination Mac Address is FF:FF:FF:FF:FF:FF
•Asks “Who is IP of aa.bb.cc.dd”
ARP Request Packet (Simplified)
Ethernet Header)
Destination

Source

Frame
MAC Address MAC Address Type
(All 1)

…

ARP Request
Source

Source

Destination

Destination

MAC Address IP Address MAC Address IP Address
(All 1)

!13
ARP

ARP Request
Who is 192.168.100.1?

Node1 (Intel Card)
00:12:F0:00:00:01
192.168.100.100

ARP Reply
00:05:9B:00:00:10

Node2 (Intel Card)
00:12:F0:00:00:10
192.168.100.101

Node3 (Cisco Port)
00:05:9B:00:00:10
192.168.100.1

•Node 1 “broadcasts” an ARP request asking 192.168.100.1
•Because the frames are addressed to every node, every node receives the frame.
•Node 3 with the target IP address sends back the ARP reply to node 1.

!14
Checking ARP Table
•No data in the supportbundle
-bash-4.1$ arp -a"
Net to Media Table: IPv4"
Device IP Address
Mask
Flags
Phys Addr"
------ -------------------- --------------- -------- ---------------"
net8 169.254.182.77
255.255.255.255 SPLA 02:21:28:57:47:17"
net8 169.254.182.76
255.255.255.255
02:21:28:57:47:16"
(….omitted….)

ipmp_vfdom0 amogg0005.us.oracle.com 255.255.255.255
00:10:e0:23:9c:84"
ipmp_vfdom0 amogg0006.us.oracle.com 255.255.255.255
00:10:e0:0e:09:1c

!15
3. IP

!16
IP – Travelling to Final Destination
Germany
Office
Frankfurt
Direct flight

Indirect flight
Singapore
(Changi)

Indirect flight

Tokyo

(Narita)
My
House

!17
IPv4 Addressing
•IP Version 4 address is 4 byte address, delimited by dots e.g. 192.168.100.1.
•Subnet mask decides what part of IPv4 address to look at to identify if the IP
addresses belong to the same subnet.
•The network address is the beginning of the subnet.
•Subnet masks can be described in AA.BB.CC.DD or CIDR notation (/nn
format , where nn is the number of bits to mask from MSB.)
Examples:
(The below mean the same thing.)

"

IP: 192.168.0.1 Subnet mask: 255.255.255.0
IP: 192.168.0.1/24

!18
Do They Belong To The Same Subnet?
Q1:
(a) 192.168.0.1/24
(b) 192.168.1.1/24

Q2:
(a) 192.168.0.1/16
(b) 192.168.1.1/16

To identify the network address, we calculate “AND”
of IP address and subnet mask. /24 means FF:FF:FF:00.
The network addresses for each (a) and (b) are:
(a) 192.168.0.0

(b) 192.168.1.0

Therefore, they DO NOT belong to the same subnet.
To identify the network address, we calculate “AND”
of IP address and subnet mask. /24 means FF:FF:00:00.
The network addresses for each (a) and (b) are:
(a) 192.168.0.0

(b) 192.168.0.0

Therefore, they DO belong to the same subnet.

!19
How Is An IP Packet Delivered?

(1) ARP Request
Who is 192.168.100.1?

Node1 (Intel Card)
00:12:F0:00:00:01
192.168.100.100

(2) ARP Reply
00:05:9B:00:00:10

Node2 (Intel Card)
00:12:F0:00:00:10
192.168.100.101

Node3 (Cisco Port)
00:05:9B:00:00:10
192.168.100.1

(3) IP packet to 192.168.100.1

MAC address 00:05:9B:00:00:10

!20
4. ROUTING

!21
!22
IP – Travelling to Final Destination
Germany
Office
Frankfurt
Direct flight

Indirect flight
Singapore
(Changi)

Indirect flight

Tokyo

(Narita)
My
House

!23
IP – Travelling to Final Destination
192.168.100.1

R3
Route 1
(192.168.10.0/24)
192.168.11.0/24

R2

R1
192.168.12.0/24
192.168.0.1

!24
Checking Routing Table
"

RRoouuttiinngg 	
 TTaabbllee:: 	
 IIPPvv44


 	
  	
 DDeessttiinnaattiioonn 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 GGaatteewwaayy 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 FFllaaggss 	
  	
 RReeff 	
  	
  	
  	
  	
 UUssee 	
  	
  	
  	
  	
 IInntteerrffaaccee


---------------------------------------- 	
 ---------------------------------------- 	
 ---------- 	
 ---------- 	
 -------------------- 	
 ------------------


ddeeffaauulltt 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 117722..2233..221100..225544 	
  	
  	
  	
  	
  	
  	
 UUGG 	
  	
  	
  	
  	
  	
  	
  	
 55 	
  	
  	
  	
  	
  	
  	
 88552244 	
 iiggbb00


112277..00..00..11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 112277..00..00..11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 UUHH 	
  	
  	
  	
  	
  	
  	
  	
 66 	
  	
  	
  	
  	
 118811334433 	
 lloo00


117722..2233..221100..112288 	
  	
  	
  	
  	
  	
  	
 117722..2233..221100..117777 	
  	
  	
  	
  	
  	
  	
 UU 	
  	
  	
  	
  	
  	
  	
  	
 1100 	
  	
  	
  	
  	
 664477771144 	
 iiggbb00


119922..116688..2288..00 	
  	
  	
  	
  	
  	
  	
  	
  	
 119922..116688..2288..11 	
  	
  	
  	
  	
  	
  	
  	
  	
 UU 	
  	
  	
  	
  	
  	
  	
  	
 3322 	
  	
  	
 1166118888664455 	
 iippmmpp11



"

RRoouuttiinngg 	
 TTaabbllee:: 	
 IIPPvv66


 	
  	
 DDeessttiinnaattiioonn//MMaasskk 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 GGaatteewwaayy 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 FFllaaggss 	
 RReeff 	
  	
  	
 UUssee 	
  	
  	
  	
 IIff


------------------------------------------------------ 	
 ------------------------------------------------------ 	
 ---------- 	
 ------ 	
 -------------- 	
 ----------


::::11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 ::::11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 UUHH 	
  	
  	
  	
  	
  	
 22 	
  	
  	
  	
  	
 220000 	
 lloo00

•The default gateway is used when no other routes are available.
•You have to look at the subnet mask as well. (Example in next page.)

!25
Routing Tables with Subnet Masks
"

RRoouuttiinngg 	
 TTaabbllee:: 	
 IIPPvv44


 	
  	
 DDeessttiinnaattiioonn 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 GGaatteewwaayy 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 SSuubbnneettmmaasskk


---------------------------------------- 	
 ---------------------------------------- 	
 ----------------------------


119922..116688..110000..11 	
  	
  	
  	
  	
  	
  	
  	
 119922..116688..110000..11 	
  	
  	
  	
  	
  	
  	
  	
 225555..225555..225555..00


119922..116688..110000..112299 	
  	
  	
  	
  	
  	
 119922..116688..110000..113300 	
  	
  	
  	
  	
  	
 225555..225555..225555..112288

•Routes with more bits in subnet mask have priority.
•So if you would like to connect to 192.168.100.131, you take
192.168.100.130 because subnet mask is 25 bits.

!26
How Packet is Delivered Over a Router/L3 SW
(1) ARP Request
Who is 192.168.200.1?

(2) ARP Reply
MAC: 00:05:9B:00:00:10

R1 Eth0
00:05:9B:00:00:10
192.168.100.254

Node1

00:12:F0:00:00:01
192.168.100.100

Node2
00:12:F0:00:00:10
192.168.100.101

(3) Packet to 192.168.200.1

MAC :00:05:9B:00:00:10
(4) Packet to 192.168.200.1

MAC :00:12:F0:00:00:10
R1

R1 Eth1
00:05:9B:00:00:11
192.168.200.254

Node3
00:12:F0:00:00:10
192.168.200.1

!27
5. IPOIB

!28
IB Partitioning
PKEY:FFFF

Subnet
Manager
(Internal/External)

PKEY:8506

Node1 (PKEY: 8506)
10E00001328389

PKEY:8507

Node2 (PKEY:8506)
10E0000132838A

Node3 (PKEY: 8507)

10E0000132848C

•IB fabric is divided into “partitions” like VLANs
•We use PKEY instead of VLAN ID in IB partitioning.
•PKEY: FFFF means “connect to any port on fabric.”
•In the above example, Node 1 and 2 can talk, but not with node 3.
•Oracle supports only “on-switch” subnet manager with ZFSSA.

!29
Checking IB Partitioning
"

--bbaasshh--44..11$$ 	
 mmoorree 	
 ddllaaddmm--sshhooww--iibb..oouutt


LLIINNKK 	
  	
  	
  	
  	
  	
  	
  	
  	
 HHCCAAGGUUIIDD 	
  	
  	
  	
  	
  	
  	
  	
  	
 PPOORRTTGGUUIIDD 	
  	
  	
  	
  	
  	
  	
  	
 PPOORRTT 	
 SSTTAATTEE 	
  	
 PPKKEEYYSS


iibbpp00 	
  	
  	
  	
  	
  	
  	
  	
  	
 1100EE0000000011332288338888 	
  	
 1100EE0000000011332288338899 	
  	
 11 	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
 FFFFFFFF,,88550033


iibbpp11 	
  	
  	
  	
  	
  	
  	
  	
  	
 1100EE0000000011332288338888 	
  	
 1100EE00000000113322883388AA 	
  	
 22 	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
 FFFFFFFF,,88550033



"

--bbaasshh--44..11$$ 	
 mmoorree 	
 ddllaaddmm--sshhooww--ppaarrtt..oouutt


LLIINNKK 	
  	
  	
  	
  	
  	
  	
  	
  	
 PPKKEEYY 	
  	
 OOVVEERR 	
  	
  	
  	
  	
  	
  	
  	
  	
 SSTTAATTEE 	
  	
  	
  	
 FFLLAAGGSS


pp88550033__iibbpp00 	
  	
  	
 88550033 	
  	
 iibbpp00 	
  	
  	
  	
  	
  	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
  	
  	
 ff------


pp88550033__iibbpp11 	
  	
  	
 88550033 	
  	
 iibbpp11 	
  	
  	
  	
  	
  	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
  	
  	
 ff------



"

--bbaasshh--44..11$$ 	
 mmoorree 	
 iiffccoonnffiigg--aa..oouutt


lloo00:: 	
 ffllaaggss==22000011000000884499<<UUPP,,LLOOOOPPBBAACCKK,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,IIPPvv44,,VVIIRRTTUUAALL>> 	
 mmttuu 	
 88223322 	
 iinnddeexx 	
 11


 	
  	
  	
  	
  	
  	
  	
  	
 iinneett 	
 112277..00..00..11 	
 nneettmmaasskk 	
 ffff000000000000


pp88550033__iibbpp00:: 	
 ffllaaggss==99004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> 	
 mmttuu 	
 6655552200 	
 iinnddeexx 	
 22


 	
  	
  	
  	
  	
  	
  	
  	
 iinneett 	
 00..00..00..00 	
 nneettmmaasskk 	
 ffff000000000000 	
 bbrrooaaddccaasstt 	
 00..225555..225555..225555


 	
  	
  	
  	
  	
  	
  	
  	
 ggrroouuppnnaammee 	
 iippmmpp11


 	
  	
  	
  	
  	
  	
  	
  	
 iippiibb 	
 8800::00::00::44aa::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::8899


pp88550033__iibbpp11:: 	
 ffllaaggss==6699004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> 	
 mmttuu 	
 6655552200 	
 iinnddeexx 	
 33


 	
  	
  	
  	
  	
  	
  	
  	
 iinneett 	
 00..00..00..00 	
 nneettmmaasskk 	
 ffff000000000000 	
 bbrrooaaddccaasstt 	
 00..225555..225555..225555


 	
  	
  	
  	
  	
  	
  	
  	
 ggrroouuppnnaammee 	
 iippmmpp11


 	
  	
  	
  	
  	
  	
  	
  	
 iippiibb 	
 8800::00::00::44bb::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::88aa

!30
References
•Ethernet Frame

< http://en.wikipedia.org/wiki/Ethernet_frame>
•802.1Q

< http://en.wikipedia.org/wiki/802.1Q>
•ARP(Address Resolution Protocol) 

< http://en.wikipedia.org/wiki/Address_Resolution_Protocol>
•Subnetwork

<http://en.wikipedia.org/wiki/Subnetwork>
•

!31

Más contenido relacionado

La actualidad más candente

Eigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configurationEigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configuration3Anetwork com
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1Kishore Kumar
 
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandosConfigurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos1 2d
 
Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01Ralph Nguyen
 
Serial number soft
Serial number softSerial number soft
Serial number softsandi271979
 
Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!shira koper
 
AWS VPC by hellocloud.io
AWS VPC by hellocloud.ioAWS VPC by hellocloud.io
AWS VPC by hellocloud.ioHello Cloud
 
The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184Mahmoud Samir Fayed
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Miniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji ElectricMiniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji ElectricCTY TNHH HẠO PHƯƠNG
 
Cisco catalyst 2960 plus series switch datasheet
Cisco catalyst 2960 plus  series switch datasheetCisco catalyst 2960 plus  series switch datasheet
Cisco catalyst 2960 plus series switch datasheetAmy Huang
 
Output drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switchesOutput drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switchescandy tang
 
1 million serial numbers of different softwares
1 million serial numbers of different softwares1 million serial numbers of different softwares
1 million serial numbers of different softwaresmifdov
 
Ursalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start GuideUrsalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start GuideIvete Huang
 

La actualidad más candente (20)

Eigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configurationEigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configuration
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1
 
Configuracion EIGRP
Configuracion EIGRPConfiguracion EIGRP
Configuracion EIGRP
 
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandosConfigurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
 
Policy Based Routing
Policy Based RoutingPolicy Based Routing
Policy Based Routing
 
Vt6655 linux user_guide
Vt6655 linux user_guideVt6655 linux user_guide
Vt6655 linux user_guide
 
JCM STOCK LIST 2016
JCM STOCK LIST 2016JCM STOCK LIST 2016
JCM STOCK LIST 2016
 
Basic BGP Configuration
Basic BGP ConfigurationBasic BGP Configuration
Basic BGP Configuration
 
Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01
 
Serial number soft
Serial number softSerial number soft
Serial number soft
 
Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!
 
Ccna command
Ccna commandCcna command
Ccna command
 
AWS VPC by hellocloud.io
AWS VPC by hellocloud.ioAWS VPC by hellocloud.io
AWS VPC by hellocloud.io
 
The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Miniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji ElectricMiniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji Electric
 
Cisco catalyst 2960 plus series switch datasheet
Cisco catalyst 2960 plus  series switch datasheetCisco catalyst 2960 plus  series switch datasheet
Cisco catalyst 2960 plus series switch datasheet
 
Output drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switchesOutput drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switches
 
1 million serial numbers of different softwares
1 million serial numbers of different softwares1 million serial numbers of different softwares
1 million serial numbers of different softwares
 
Ursalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start GuideUrsalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start Guide
 

Similar a 001 network toi_basics_v1

Introduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignIntroduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignPratik Gohel
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013Tom Paseka
 
Cisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheetCisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheetAmy Huang
 
Applied motion products si5580 datasheet
Applied motion products si5580 datasheetApplied motion products si5580 datasheet
Applied motion products si5580 datasheetElectromate
 
Fine grained monitoring
Fine grained monitoringFine grained monitoring
Fine grained monitoringIben Rodriguez
 
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...SilvioDias29
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptxssuserfcf43f
 
IO_Analysis_with_SAR.ppt
IO_Analysis_with_SAR.pptIO_Analysis_with_SAR.ppt
IO_Analysis_with_SAR.pptcookie1969
 
fdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdffdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdfSaidHaman
 
Cisco sfp glc module datasheet
Cisco sfp glc module datasheetCisco sfp glc module datasheet
Cisco sfp glc module datasheetAmy Huang
 
Lab 9 instructions
Lab 9 instructionsLab 9 instructions
Lab 9 instructionstrayyoo
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NamePositive Hack Days
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяEkaterina Melnik
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...Amir Jafari
 
Day 20.1 configuringframerelay
Day 20.1 configuringframerelayDay 20.1 configuringframerelay
Day 20.1 configuringframerelayCYBERINTELLIGENTS
 
cisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdfcisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdfHi-Network.com
 
HPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data SheetHPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data Sheet美兰 曾
 
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdfThe_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdfssuser340a0c
 

Similar a 001 network toi_basics_v1 (20)

Introduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignIntroduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI Design
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013
 
Aruba mobility access switch useful commands v2
Aruba mobility access switch useful commands v2Aruba mobility access switch useful commands v2
Aruba mobility access switch useful commands v2
 
Cisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheetCisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheet
 
Applied motion products si5580 datasheet
Applied motion products si5580 datasheetApplied motion products si5580 datasheet
Applied motion products si5580 datasheet
 
Fine grained monitoring
Fine grained monitoringFine grained monitoring
Fine grained monitoring
 
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
 
IO_Analysis_with_SAR.ppt
IO_Analysis_with_SAR.pptIO_Analysis_with_SAR.ppt
IO_Analysis_with_SAR.ppt
 
crack satellite
crack satellite crack satellite
crack satellite
 
fdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdffdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdf
 
Cisco sfp glc module datasheet
Cisco sfp glc module datasheetCisco sfp glc module datasheet
Cisco sfp glc module datasheet
 
Lab 9 instructions
Lab 9 instructionsLab 9 instructions
Lab 9 instructions
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the Name
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
 
Day 20.1 configuringframerelay
Day 20.1 configuringframerelayDay 20.1 configuringframerelay
Day 20.1 configuringframerelay
 
cisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdfcisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdf
 
HPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data SheetHPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data Sheet
 
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdfThe_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

001 network toi_basics_v1

  • 1. <Insert Picture Here> Network TOI for NAS (Basic) 2013.11.27 Hisao Tsujimura Sr. Technical Support Engineer Storage Technology Service Center, Oracle Tokyo
  • 4. Ethernet ! We call them “frames.” ! It can be sent only to the same hub/switch. !4
  • 5. How Ethernet Works? You check baggage claim tags (MAC Address) and pick up the bag (frame) when the tag matches. !5
  • 6. Simplified Frame Format •MAC address – 6 byte address (48bits), first 3 bytes indicate vendor. (OUI) 802.3 Ethernet II Frame Destination
 Source
 Ethernet II 
 MAC Address MAC Address Payload (up to 1500 bytes) 802.1Q Frame (Tagged VLAN) Destination
 Source
 VLAN ID Ethernet II 
 MAC Address MAC Address (4 bytes) Payload (up to 1500 bytes) •Switch port settings have to match with what frame format to manage. •The destination MAC address of all 1 (FF: FF: FF: FF: FF: FF) means broadcast. •OUI search at IEEE < http://standards.ieee.org/develop/regauth/oui/public.html> !6
  • 7. Hubs Frame 1: Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 Node1 (Intel Card) 00:12:F0:00:00:01 Node2 (Intel Card) 00:12:F0:00:00:10 Node3 (Cisco Port) 00:05:9B:00:00:10 •Every node receives all frames •Each node discards frames not addressed to them. •If the destination is broadcast, all nodes process the frame. !7
  • 8. (2) Switches MAC table Port #2 00:12:F0:00:00:10 Frame 1: (1) Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 Frame 2: (3) Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 Node1 (Intel Card) 00:12:F0:00:00:01 (1) (3) Node2 (Intel Card) 00:12:F0:00:00:10 (1) Node3 (Cisco Port) 00:05:9B:00:00:10 •Every node receives the frames if the destination is not on switch’s mac table •No other node receives frames if not addressed to them after the first frame. •Frames with broadcast is sent to all ports. !8
  • 9. VLAN – Logical Partitioning of Switch Frame 1: (VLAN2) Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 VLAN 2 VLAN 3 Frame 2: (VLAN2) Dst: 00:05:9B:00:00:10 Src: 00:12:F0:00:00:01 Node1 (Intel Card) 00:12:F0:00:00:01 Node2 (Intel Card) 00:12:F0:00:00:10 Node3 (Cisco Port) 00:05:9B:00:00:10 •Different VLAN ID means different logical switch. •No way to go beyond the VLAN boundary unless routed. •Therefore frame is invalid for transmission. !9
  • 10. Checking Mac Address -bash-4.1$ more ifconfig-a.out lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1 inet 127.0.0.1 netmask ff000000 igb0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 5 inet 172.23.210.177 netmask ffffff80 broadcast 172.23.210.255 ether 0:10:e0:35:e0:5c igb1: flags=1000842<BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4 inet 172.23.210.179 netmask ffffff80 broadcast 172.23.210.255 ether 0:10:e0:35:e0:5d ipmp1: flags=8001000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4,IPMP> mtu 65520 index 6 inet 192.168.28.1 netmask fffffc00 broadcast 192.168.31.255 groupname ipmp1 lo0: flags=2002000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv6,VIRTUAL> mtu 8252 index 1 inet6 ::1/128 !10
  • 12. ARP – Find MAC address from IP Address Bean !12
  • 13. ARP – Find MAC address from IP Address •Destination Mac Address is FF:FF:FF:FF:FF:FF •Asks “Who is IP of aa.bb.cc.dd” ARP Request Packet (Simplified) Ethernet Header) Destination
 Source
 Frame MAC Address MAC Address Type (All 1) … ARP Request Source
 Source
 Destination
 Destination
 MAC Address IP Address MAC Address IP Address (All 1) !13
  • 14. ARP ARP Request Who is 192.168.100.1? Node1 (Intel Card) 00:12:F0:00:00:01 192.168.100.100 ARP Reply 00:05:9B:00:00:10 Node2 (Intel Card) 00:12:F0:00:00:10 192.168.100.101 Node3 (Cisco Port) 00:05:9B:00:00:10 192.168.100.1 •Node 1 “broadcasts” an ARP request asking 192.168.100.1 •Because the frames are addressed to every node, every node receives the frame. •Node 3 with the target IP address sends back the ARP reply to node 1. !14
  • 15. Checking ARP Table •No data in the supportbundle -bash-4.1$ arp -a" Net to Media Table: IPv4" Device IP Address Mask Flags Phys Addr" ------ -------------------- --------------- -------- ---------------" net8 169.254.182.77 255.255.255.255 SPLA 02:21:28:57:47:17" net8 169.254.182.76 255.255.255.255 02:21:28:57:47:16" (….omitted….)
 ipmp_vfdom0 amogg0005.us.oracle.com 255.255.255.255 00:10:e0:23:9c:84" ipmp_vfdom0 amogg0006.us.oracle.com 255.255.255.255 00:10:e0:0e:09:1c !15
  • 17. IP – Travelling to Final Destination Germany Office Frankfurt Direct flight Indirect flight Singapore (Changi) Indirect flight Tokyo
 (Narita) My House !17
  • 18. IPv4 Addressing •IP Version 4 address is 4 byte address, delimited by dots e.g. 192.168.100.1. •Subnet mask decides what part of IPv4 address to look at to identify if the IP addresses belong to the same subnet. •The network address is the beginning of the subnet. •Subnet masks can be described in AA.BB.CC.DD or CIDR notation (/nn format , where nn is the number of bits to mask from MSB.) Examples: (The below mean the same thing.) " IP: 192.168.0.1 Subnet mask: 255.255.255.0 IP: 192.168.0.1/24 !18
  • 19. Do They Belong To The Same Subnet? Q1: (a) 192.168.0.1/24 (b) 192.168.1.1/24 Q2: (a) 192.168.0.1/16 (b) 192.168.1.1/16 To identify the network address, we calculate “AND” of IP address and subnet mask. /24 means FF:FF:FF:00. The network addresses for each (a) and (b) are: (a) 192.168.0.0
 (b) 192.168.1.0
 Therefore, they DO NOT belong to the same subnet. To identify the network address, we calculate “AND” of IP address and subnet mask. /24 means FF:FF:00:00. The network addresses for each (a) and (b) are: (a) 192.168.0.0
 (b) 192.168.0.0
 Therefore, they DO belong to the same subnet. !19
  • 20. How Is An IP Packet Delivered? (1) ARP Request Who is 192.168.100.1? Node1 (Intel Card) 00:12:F0:00:00:01 192.168.100.100 (2) ARP Reply 00:05:9B:00:00:10 Node2 (Intel Card) 00:12:F0:00:00:10 192.168.100.101 Node3 (Cisco Port) 00:05:9B:00:00:10 192.168.100.1 (3) IP packet to 192.168.100.1
 MAC address 00:05:9B:00:00:10 !20
  • 22. !22
  • 23. IP – Travelling to Final Destination Germany Office Frankfurt Direct flight Indirect flight Singapore (Changi) Indirect flight Tokyo
 (Narita) My House !23
  • 24. IP – Travelling to Final Destination 192.168.100.1 R3 Route 1 (192.168.10.0/24) 192.168.11.0/24 R2 R1 192.168.12.0/24 192.168.0.1 !24
  • 25. Checking Routing Table " RRoouuttiinngg TTaabbllee:: IIPPvv44 DDeessttiinnaattiioonn GGaatteewwaayy FFllaaggss RReeff UUssee IInntteerrffaaccee ---------------------------------------- ---------------------------------------- ---------- ---------- -------------------- ------------------ ddeeffaauulltt 117722..2233..221100..225544 UUGG 55 88552244 iiggbb00 112277..00..00..11 112277..00..00..11 UUHH 66 118811334433 lloo00 117722..2233..221100..112288 117722..2233..221100..117777 UU 1100 664477771144 iiggbb00 119922..116688..2288..00 119922..116688..2288..11 UU 3322 1166118888664455 iippmmpp11 " RRoouuttiinngg TTaabbllee:: IIPPvv66 DDeessttiinnaattiioonn//MMaasskk GGaatteewwaayy FFllaaggss RReeff UUssee IIff ------------------------------------------------------ ------------------------------------------------------ ---------- ------ -------------- ---------- ::::11 ::::11 UUHH 22 220000 lloo00 •The default gateway is used when no other routes are available. •You have to look at the subnet mask as well. (Example in next page.) !25
  • 26. Routing Tables with Subnet Masks " RRoouuttiinngg TTaabbllee:: IIPPvv44 DDeessttiinnaattiioonn GGaatteewwaayy SSuubbnneettmmaasskk ---------------------------------------- ---------------------------------------- ---------------------------- 119922..116688..110000..11 119922..116688..110000..11 225555..225555..225555..00 119922..116688..110000..112299 119922..116688..110000..113300 225555..225555..225555..112288 •Routes with more bits in subnet mask have priority. •So if you would like to connect to 192.168.100.131, you take 192.168.100.130 because subnet mask is 25 bits. !26
  • 27. How Packet is Delivered Over a Router/L3 SW (1) ARP Request Who is 192.168.200.1? (2) ARP Reply MAC: 00:05:9B:00:00:10 R1 Eth0 00:05:9B:00:00:10 192.168.100.254 Node1
 00:12:F0:00:00:01 192.168.100.100 Node2 00:12:F0:00:00:10 192.168.100.101 (3) Packet to 192.168.200.1
 MAC :00:05:9B:00:00:10 (4) Packet to 192.168.200.1
 MAC :00:12:F0:00:00:10 R1 R1 Eth1 00:05:9B:00:00:11 192.168.200.254 Node3 00:12:F0:00:00:10 192.168.200.1 !27
  • 29. IB Partitioning PKEY:FFFF Subnet Manager (Internal/External) PKEY:8506 Node1 (PKEY: 8506) 10E00001328389 PKEY:8507 Node2 (PKEY:8506) 10E0000132838A Node3 (PKEY: 8507)
 10E0000132848C •IB fabric is divided into “partitions” like VLANs •We use PKEY instead of VLAN ID in IB partitioning. •PKEY: FFFF means “connect to any port on fabric.” •In the above example, Node 1 and 2 can talk, but not with node 3. •Oracle supports only “on-switch” subnet manager with ZFSSA. !29
  • 30. Checking IB Partitioning " --bbaasshh--44..11$$ mmoorree ddllaaddmm--sshhooww--iibb..oouutt LLIINNKK HHCCAAGGUUIIDD PPOORRTTGGUUIIDD PPOORRTT SSTTAATTEE PPKKEEYYSS iibbpp00 1100EE0000000011332288338888 1100EE0000000011332288338899 11 uupp FFFFFFFF,,88550033 iibbpp11 1100EE0000000011332288338888 1100EE00000000113322883388AA 22 uupp FFFFFFFF,,88550033 " --bbaasshh--44..11$$ mmoorree ddllaaddmm--sshhooww--ppaarrtt..oouutt LLIINNKK PPKKEEYY OOVVEERR SSTTAATTEE FFLLAAGGSS pp88550033__iibbpp00 88550033 iibbpp00 uupp ff------ pp88550033__iibbpp11 88550033 iibbpp11 uupp ff------ " --bbaasshh--44..11$$ mmoorree iiffccoonnffiigg--aa..oouutt lloo00:: ffllaaggss==22000011000000884499<<UUPP,,LLOOOOPPBBAACCKK,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,IIPPvv44,,VVIIRRTTUUAALL>> mmttuu 88223322 iinnddeexx 11 iinneett 112277..00..00..11 nneettmmaasskk ffff000000000000 pp88550033__iibbpp00:: ffllaaggss==99004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> mmttuu 6655552200 iinnddeexx 22 iinneett 00..00..00..00 nneettmmaasskk ffff000000000000 bbrrooaaddccaasstt 00..225555..225555..225555 ggrroouuppnnaammee iippmmpp11 iippiibb 8800::00::00::44aa::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::8899 pp88550033__iibbpp11:: ffllaaggss==6699004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> mmttuu 6655552200 iinnddeexx 33 iinneett 00..00..00..00 nneettmmaasskk ffff000000000000 bbrrooaaddccaasstt 00..225555..225555..225555 ggrroouuppnnaammee iippmmpp11 iippiibb 8800::00::00::44bb::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::88aa !30
  • 31. References •Ethernet Frame
 < http://en.wikipedia.org/wiki/Ethernet_frame> •802.1Q
 < http://en.wikipedia.org/wiki/802.1Q> •ARP(Address Resolution Protocol) 
 < http://en.wikipedia.org/wiki/Address_Resolution_Protocol> •Subnetwork
 <http://en.wikipedia.org/wiki/Subnetwork> • !31