1 Dell+Networking+Introduction+-+Participant+Guide
1 Dell+Networking+Introduction+-+Participant+Guide
INTRODUCTION
PARTICIPANT GUIDE
PARTICIPANT GUIDE
Dell Networking Introduction
Third Party Operating Systems Supported by Dell EMC PowerSwitch Series ... 48
Open Networking ............................................................................................................... 49
Third Party Operating Systems Supported by Dell EMC PowerSwitch Series .................... 50
Open Networking Install Environment(ONIE) ..................................................................... 52
Summary................................................................................................................... 56
Summary ........................................................................................................................... 57
Module Objectives
→ Explain the purpose and function of network devices such as switches and
routers
→ Explain the Campus and Datacenter topologies
→ Explain the operation of the OSI and TCP/IP model
→ List the various models of the Dell EMC networking product line and their
features
• Ethernet Networking
• Internet Protocol (IP)
• Spanning Tree Protocol, Link Layer Discovery Protocol
• Link aggregation groups and Multi-Chassis Link Aggregation
• Virtual LANs
• Subnetting
• Static Routing and Routing Protocols
• Network Services - DHCP, DNS and NTP
• Internet Protocol Version 4 and 6(IPv4 and IPv6)
• iSCSI Storage Networking
• Network Security
• Dell Networking Portfolio (Campus, Data Center, and Modular Switches)
• SmartFabric Services
on-demand or instructor-led training and hands-on activities. The topics that are
covered include:
Network Components
Hubs
L1 Hub
Switch Hub
A B C D E
A hub connects multiple systems or other network devices together. Hubs are
considered as a legacy device in modern networks.
Hubs cannot make intelligent decisions on how to direct traffic, they have no
forwarding logic (no IP routing or MAC tables).
Hubs are half-duplex devices. They can either Transmit (Tx) or Receive (Rx), they
cannot send and receive simultaneously.
Hubs simply amplify received electrical signals and broadcasts them to every
device it is connected to.
Switch
Switch
Switch Hub
A B C D E
Switches are building blocks for a network that are used for connecting multiple
devices, such as systems, wireless access points, printers, and servers.
Switches possess forwarding logic. Switches can make intelligent decisions on how
to direct traffic. Traffic is forwarded based on destination MAC address.
Switches typically implement their forwarding logic in hardware using ASIC chips
which can run at full wire-speed.
Router
Router
Subnet 2
R1 R2
Subnet 4
Subnet 1
Subnet 3
Routers possess forwarding logic and can make intelligent decisions on how to
direct traffic. Traffic is forwarded based on destination network addresses
contained in a routing table.
Routers can forward traffic efficiently to known addresses and drop the traffic for
unknown addresses.
Routers act as broadcast boundaries that block broadcast traffic from interrupting
all devices on the network.
Network B
Network A Network C
Network B Network C
Internal Network
0 100
Internet
Firewalls typically block traffic by design and only allow traffic on exception.
IPS devices monitor traffic patterns and block the traffic that is unusual or traffic
that is recognized as a known threat.
• Historically deployed behind firewall separately, but today, the firewalls have
built in IPS functionality.
Network Topologies
Remote
Users
WAN/Internet
/Cloud Access
Edge
North/South Routers
Traffic
Campus Data Center Network
Core
Data Center
Core
Campus
Distribution
Data Center
Aggregation
Campus
Access Data Center
Printers
Access
Servers
Three-Tier Model
Core Switches
Core links
Core-1 Core-2
Building Blocks
Distribution Switches
Distribution-2
Distribution-1
Access Uplinks
Switches
• Core switches
− Aggregate distribution switches in large campus LANs, providing high
forwarding rates
• Distribution switches
− Provide an aggregation point for access switches, forwarding frames
between switches, but do not connect directly to end-user devices.
• Access switches
Two-Tier Model
WAN/Internet/
Cloud Access
Dell PowerSwitch
spine switches
TOR
Dell
PowerSwitch
leaf
switche
s
• Leaf and Spine is the design choice to accommodate Data Center traffic
requirements.
• The two-tier model is considered the best option for small or medium campus
networks and is commonly known as collapsed core architecture.
• In collapsed core architecture, the core and distribution layers are combined to
simplify the design and reduce the cost.
• It minimizes East-West latency.
• It is a nonblocking network where all devices are the same number of hops
away.
Overlay
Underlay
− Overlay networks are often temporary or dynamic in nature. They exist for a
specific time to support a particular business need and can then be torn
down.
Hosting
Question
Question
2. The two-tier model (Leaf-Spine) is suitable for Data Center networking. True or
False
a. True
b. False
OSI Model
OSI Model
The OSI model divides key network functions into seven distinct categories that are
represented in the form of a layered stack.
Splitting networking functions into layers enables manufacturers to alter how they
implement the functions of a layer without impacting the operations of other layers.
The layers form a hierarchy and functions are in a logical order. The lower layers
provide services for upper layers, and higher layers complete their functions by
using input from the lower layers. To learn more about each OSI layer click here.
TCP/IP Model
TCP/IP Model
TCP and IP are two separate protocols that work together to ensure that data is
delivered to its correct destination within a network.
• IP obtains and defines the IP address of the application or device to which the
data must be sent.
• TCP performs transporting the data through the network and ensures that the
data is delivered to the destination application or device that IP has defined.
TCP/IP is the most widely used standard that is used by systems to communicate
with each other. To learn more about each TCP/IP layer click here.
Sample Protocols
Example Protocols
TCP Features
The common protocols and their associated port numbers are listed below:
22 TCP SSH
23 TCP Telnet
25 TCP SMTP
69 UDP TFTP
80 TCP HTTP
3-Way Handshake
SEQ=200
SYN, DPORT=80, SPORT=1027
SEQ=1450, ACK=201
SYN, ACK DPORT=1027, SPORT=80
SEQ=1450, ACK=1451
ACK DPORT=80, SPORT=1027
www.dell.com Barry
The three-way handshake is the sequence that is used to initialize a TCP session
between a source port and destination port. The three-way handshake occurs
before any other TCP feature starts.
• The client initiates the connection by sending the SYN segment to the
destination.
• The server responds with an SYN-ACK segment to confirm the port and
sequence numbers.
• Client acknowledges the response of the server by sending the
acknowledgment ACK segment. It acknowledges the receipt of the second
segment with the ACK flag.
Server Client
TCP
Seq# = 1001
TCP Len = 999
ACK# = 1000
TCP
Seq# = 1001
TCP Len = 999
ACK# = 2000
TCP
Seq# = 2001
TCP Len = 999
ACK# = 3000
The TCP sequence number is used to ensure reliability of transmission for TCP
streams. TCP numbers data bytes using the sequence and acknowledgment fields
in the TCP header.
Client
Server 1000 bytes of data, sequence = 2000
TCP error recovery is used to recover from the error which has occurred during the
transmission.
The sender also sets a retransmission timer, awaiting acknowledgment, in case the
ACK from the client is lost. If the timer expires, the TCP sender retransmits all the
segments again.
TCP Windowing
SEQ=1-1000
Client
Server
ACK = 1001
SEQ=1001-2000
ACK = 2001
Window size increases to 2000,
because the network has
SEQ=2001-4000
demonstrated that it can reliably
handle sending data using a
ACK = 4001 window size of 1000.
A TCP window is the amount of data a sender can send on a connection before the
receiver sends an acknowledgment. The acknowledgment indicates that the
amount of the data received.
TCP uses a sliding window to adjust the amount if unacknowledged data that can
be sent between TCP peers.
ACK ACK = M + 1
AC ACK = N + 1
Server K, Client
The standard process of terminating a TCP connection is carried out using the FIN
flag of TCP header. The termination process enables each side to release the
connection individually.
TCP
Header
UDP
Header
Attribute Comparison
TCP UDP
Question
Question
The Dell EMC Networking portfolio enables customers to meet the demands of
modern workloads from the edge to the core to the cloud with following series of
switches:
• X-series
• N-series
• S-series
• Z-series
• C-series
• M-Series
The Dell EMC Networking X-Series is a family of smart managed 1 GbE and 10
GbE Ethernet switches that are designed for small and medium businesses.
• N1100-Series Models
• N1500-Series Models
• N2000-Series Models
• N3000-Series Models
• N4000-Series Models
The Dell EMC PowerSwitch S-Series offers a range of modular and fixed
configuration 1/10/40GbE systems that are designed principally for data-center top-
of-rack (ToR) and aggregation applications.
Works with DNOS9 and OS10 operating system and select third-party operating
systems.
• 1GBE Switches
• 10GBE Switches
• 25,40,50,100GbE Switches
Z-Series Models
Dell EMC Virtual Edge Platform (VEP) empowers you to modernize edge
networking for the cloud applications.
Dell EMC Virtual Edge Platform uses a single, open hardware platform which
makes the user quickly add or remove any number of Virtual Network Functions -
through a centralized, managed offering to ensure operational efficiency.
VEP Models
Typical usage includes using the C9010 as the network director, together with
C1048P rapid access nodes for managing the network.
C-Series Models
Lower overall costs and network management complexity while maximizing the
nonstop connectivity needs of today’s demanding data centers.
The rear of the chassis provides six slots for network switches.
There are four different models to choose and makes them perfect fit for business
needs of all sizes. The portfolio includes:
Open Networking
Open Networking introduces more choices and options for customers when
building their network solutions.
Developer Instructions
The list of third-party operating systems that are supported by Dell EMC
PowerSwitch series is:
• It is based on a streamlined
Linux operating system.
• Primary role of ONIE is as a
Network operating system
Installer.
• It provides access to the
switch OOB network port
(eth0) and USB port.
• ONIE is preinstalled on Dell
“-ON” switches.
Question
Question
Summary
Summary
In this module, we
Hub Example
Switch Hub
A B C D E
The image shows a topology with five PCs connected with a hub and a switch. A
frame sent by PC-D to PC-E would be received by PC-E and the switch. The frame
that is received by the switch is received by all the PCs connected to the switch.
(PC-A, B & C.)
Switch Operation
Switch Hub
A B C D E
When a device is connected to a switch, the switch stores the physical address in
its memory. The physical address is a unique identifier for each device. When a
device sends a packet to another device, the switch reads its frame header and
compares it with a list of addresses that are stored in memory to determine the
destination device and corresponding port. Once the exact port is determined the
switch sends the packet through the appropriate ports to the destination device.
This image shows a topology that includes five PCs, a switch, and a hub. In this
example, a frame that is sent by PC-A to PC-C would be received by both PC-C
only. The switch does not forward the frame to the hub. Hence PC-D and PC-E will
not receive the frame that is sent by PC-A.
Internal Network
Internet 0 100
Joe
The image here shows stateful operation of the firewall. Joe wants to connect to the
Internet to watch a YouTube video. The firewall allows YouTube traffic into your
private network since this is a reply to request from Joe.
Underlay Networks
The underlay is a physical network that delivers the data between different portions
of the overlay network. It provides access between different customer locations, but
keeps the data separate between different customers.
• An underlay network was built using the 3-Tier Model (Access, Distribution, and
Core).
• An Underlay network that is seen as the underlying physical links that exist in
your network environment
• Some examples of an underlay network are: BGP leaf-spine and MPLS.
Overlay Networks
IT has used multitenancy and virtualization to become more efficient and scalable
to meet the demands of customers. These virtualized networks are typically
flexible, as new virtualized applications, servers, and networks are added, deleted,
and modified at a brisk pace. This virtual network is called an overlay network. The
services that are offered to customers and end users generally exist in the overlay
network.
OSI Layers
The tabs describe the functions of each layer of the OSI model. To learn more, click
each tab:
OSI Model
Physical
Layer 1 Physical Layer - Defines the standards for the physical media that connect
systems (cables, wireless, and so on) the equipment that is used to connect
systems to the media (Network Interface Cards, or NICs) and the electrical
signaling used as the form of communication.
Data Link
Layer 2 Data Link Layer - Provides the functional and procedural means to transfer
data between network entities and to detect and possibly correct errors that may
occur in the Physical Layer. The Data Link Layer is responsible for the unique
identification of each device that resides on a local network.
Network
Layer 3 Network Layer - Provides the function and procedural means of transferring
variable length data sequences from a source to destination by one or more
networks by routing. Here also lies the responsibility for maintaining the quality of
service that is requested by the Transport Layer. The Internet Protocol, are IP
operates at this layer.
Transport
Layer 4 Transport Layer - Provides transparent transfer of data between end users.
A protocol can be included at this layer to provide reliable data transfer services to
the upper layers. This is known as quality of service. The protocol that is typically
applied is the Transmission Control Protocol, or TCP. Other protocols can be used
at this layer. The next most popular protocol is the User Datagram Protocol, or
UDP.
Session
Presentation
Application
Layer 7 Application Layer - The layer closest to the end user, this layer is the
interface between the networked user data and the user application on the device.
TCP/IP Layers
The tabs describe the functions of each layer of the TCP/IP model. To learn more,
click each tab:
TCP/IP Model
Physical Layer
The physical layer specifies the characteristics of the hardware to be used for the
network. The physical layer is responsible for encoding the data for transmission to
the destination device and the transmission rate. The physical layer transmits the
data either electrically, optically or as radio waves.
Provides the functional and procedural means to transfer data between network
entities and to detect and possibly correct errors that may occur in the Physical
Layer. This is the layer where connection between devices in a network is ensured
through switches. Data link layer uses Ethernet Protocol to efficiently send data
packets(Ethernet frames). The datalink layer uses MAC addresses to identify the
source and destination devices. Ethernet protocol verifies the identity of the device
(MAC address-Hardware address) before sending the data packets to the
destination device.
Network Layer
The network layer is responsible moving data from one network to another network.
The routing function is associated with network Layer. The network layer uses
Internet Protocol (IP) to find the correct network where the destination device is
present through routers which connect the networks.
Transport Layer
Application Layer
The application layer provides applications the ability to access services of the
other layers. This layer defines the protocols that applications use to exchange
data.
Most common protocols include:
• Hypertext Transfer Protocol (HTTP)
• File Transfer Protocol (FTP)
• Simple Mail Transfer Protocol (SMTP)
• Simple Network Management Protocol (SNMP)
Application Layer
Application Layer
Presentation Layer Data
Session Layer
In a layered network model, both data and protocol information for a layer is
packaged in a Protocol Data Unit or PDU. The protocol information for the layer is
put in a header, and the header is attached to the front of the data. The entire PDU
is passed down to the next layer. Again, protocol information for the layer is put into
a header and attached at the beginning of the data to form a PDU for that layer.
This new PDU is passed to the next below layer.
The information size grows as it is encapsulated and passed from layer to layer.
After reaching the bottom layer, the final PDU is ready to exit onto the network
media. All data is encoded onto a serial bit stream and is placed onto the media as
electrical or optical on and off pulses.
The reverse process happens at the receiving device. The data comes in through
Layer 1 and is passed up to Layer 2. Layer 2 removes the Layer 2 header and
parses the Layer 2 protocol information. The remaining information is sent up to
Layer 3, where the Layer 3 header is removed and the Layer 3 protocol information
is parsed. This procedure continues up the stack. Each source layer in this network
model communicates logically with the same layer in the destination device.
In the TCP/IP model, the Layer 4 PDU is called a TCP segment. The Layer 3 PDU
is called an IP packet, and the Layer 2 PDU is called an Ethernet frame. Layer 1 is
always data bits. The header has layer-specific information like addressing,
formatting, and various switches and flags.
Transmitters and receivers use the OSI in the same way. The sender nests PDUs
on the way to the network and the receiver decapsulates them and passes them
through its own OSI stack.
The following table shows the comparison between OSI and TCP/IP Model.
The model was developed first and The protocols were developed first, and then
then the protocols in each layer the model was developed.
were developed.
The transport layer guarantees the The transport layer does not guarantees
delivery of packets. delivery of packets.
OSI model provides both TCP/IP model network layer only provides
connection less and connection- connection fewer services.
oriented services.
Example Protocols
Hypertext Transfer Protocol (HTTP): HTTP is an application-layer protocol for
transmitting hypermedia documents, such as HTML. HTTP is designed for
communication between web browsers and web servers.
POP (Post Office Protocol 3 (POP3): The POP3 enables an email client to
download an email from an email server
Simple Mail Transfer Protocol(SMTP): The SMTP protocol is used by the Mail
Transfer Agent (MTA) to deliver an e-Mail to the recipient's mail server. The SMTP
protocol is only used to send email messages, not to receive them.
Remote Procedure Call (RPC): RPC is a protocol that one program can use to
request a service from a program that is located in another system on a network
without having to understand the network's details. RPC is used to call other
processes on the remote systems like a local system.
Handshake-1
The TCP connection termination segment uses four-way handshake. The sender
and receiver side terminates the connection independently. In this example,
Handshake-2
The server end acknowledges with an ACK bit. A pair of FIN and ACK bits are
required from both of the TCP endpoints to perform the graceful termination. After
the server's acknowledgment, the server will no longer accept the data form the
client.
Handshake-3
The server terminates the connection by transmitting the FIN bit and the total
sequence.
Handshake-4
The client acknowledges the server's request and terminates the connection.
X-Series Models
1GBE Models
Dell EMC PowerSwitch S Series 1 GbE switches are optimized for high-
performance data-center environments:
• Deliver low-latency, superb performance, and high density with hardware and
software redundancy.
• Offer Active Fabric designs using S- or Z-Series core switches to create a two-
tier, 1/10/40 GbE data-center network architecture.
• Provide ideal solutions for ToR applications in enterprise, Web 2.0, and cloud
service providers’ data-center networks.
10GBE Models
Deploy modern workloads and applications that are designed for the open
networking era with an optimized data-center top-of-rack (ToR) networking solution
that:
• Includes the 10GbE S4000-ON Series and S4100-ON Series switches, 1/10G
BASE-T S4048T-ON, S4128T-ON and S4148T-ON switches, and 10GbE
S4148FE, S4248FB-ON, and S4248FLB-ON switch
• The S4148U-ON has Fibre Channel ports for connections to Storage Area
Networks.
• Delivers low-latency, superb performance, and high density with hardware and
software redundancy
• Offers Active Fabric designs using S- or Z-Series core switches to create a two-
tier, 1/10/40 GbE data center network architecture.
• Provides an ideal solution for applications in high-performance data-center and
computing environments.
25,40,50,100GbE Models
Gain the flexibility to transform data centers with high-capacity network fabrics that
are easy to deploy, cost-effective, and provide a clear path to a software-defined
data center. They offer:
• High density for 40 GbE deployments in ToR, middle-of-row, and end-of-row
deployments
• A choice of S6000-ON and S6010-ON 40 GbE switches and the S6100-ON
10/25/40/50/100GbE modular switch
• S6100-ON modules that include: 16-port 40GbE QSFP+; 8-port 100GbE
QSFP28; combo module with four 100GbE CXP ports and four 100GbE
QSFP28 ports
• An ideal solution for modern workloads and applications that are designed for
the open networking era
- 48x 25 GbE SFP+, 6x 100 - 48x 25 GbE - 32-Port 40G - 32-port 100G
GbE QSFP28 SFP+, 6x 100 QSFP+ Ports QSFP+
- Available in both I/O Panel GbE QSFP28 - Available in both - Available in
to PSU Airflow and PSU to - Available in I/O Panel to PSU both I/O Panel
I/O Panel models both I/O Airflow and PSU to to PSU Airflow
Panel to PSU I/O Panel models and PSU to I/O
Airflow and Panel models
PSU to I/O
Panel models
Z-Series Models
Developer Instructions
Dell EMC Power Switch Z9100-ON Dell EMC Power Switch Z9264F-ON
Multirate Fabric Switch Multirate Fabric Switch
VEP1400 VEP4600
Front Front
Back
Back
• Up to 16 Core • Up to 16 Core
• Fan less • Short depth
• 6+ GbE—all Intel® • 6+ GbE—all DPDK supported
Data Plane • Internal SSD up to 1024G
Development Kit
(DPDK) supported • DDR4 ECC memory
C-Series Models
Models Features
Dell Networking 1 Gb Ethernet Pass- -1.0 Gbit/sec line speed with backward
Through compatibility to 100 and 10 Mbit/sec line
speed
-Ethernet connectivity of Dell server with
the Gigabit Ethernet Pass-Through Module
Models Features
Cisco Nexus B22DELL Blade Fabric -The Cisco Nexus® B22DELL Fabric
Extender Extenders behave as remote line
cards for a parent Cisco Nexus®
5000 switch.
-16 internal 10 GbE ports and 8
external 10 GbE ports; provides 10
GbE connectivity to Cisco Nexus
5500 series infrastructure.
-Ease the commissioning and
decommissioning of blades through
a single point of management, zero-
touch installation and automatic
configuration of fabric extenders.
Models Features
Brocade M6505 Fibre Channel Switch -16 Gbps Fibre Channel connectivity
across servers, storage, and SAN as
needed, without increasing the existing
data center footprint.
Mellanox InfiniBand blade switches -High bandwidth and low latency across
InfiniBand-connected server nodes in
M1000e blade chassis high-performance
computing (HPC) cluster.
Ethernet Switching
MX9916n
Fabric A
MX7116n
MX5108n
Ethernet Passthrough
Fabric B
25Gb PTM
10 Gb TPM
• Switch layout
– 8 x 25 GbE server facing ports
– 1 x 40 GbE port
– 2 x 100 GbE ports
– 4 x 10GBase-T ports
• Dell EMC Networking OS10
• Supports Open Networking, Full Switch, and SmartFabric operating modes
The Dell EMC Networking MX9116n Fabric Switching Engine is a scalable, high-
performance, low latency 25 Gbps Ethernet switch purpose-built for the
PowerEdge™ MX platform providing enhanced capabilities and cost-effectiveness
for the enterprise, mid-market, Tier 2 cloud and NFV service providers with
demanding compute and storage traffic environments.
Starting at two chassis, the MX9116n can scale to 10 chassis in a scalable fabric,
and then to dozens as part of a Spine/Leaf fabric.
• Switch layout
– 16 x 25 GbE server-facing ports
– 12 x Fabric Expansion ports
– 2 x 100 GbE ports
– 2 x 100GbE/8 x 32G FC unified ports
• Dell EMC Networking OS10
The Dell EMC Networking MX7116n Fabric Expander Module is a key component
in the MX Scalable Fabric Architecture. The MX7116n extends the capabilities of
the MX9116n Fabric Switching Engine to a total of ten MX7000 chassis, and 80
PowerEdge MX compute sleds.
The MX7116n extends that capability to additional MX7000 chassis, adding less
than 75 ns of latency for a total of less than 600 ns latency between any two
compute sleds in a Scalable Fabric.
The MX7116n does not run an operating system or have firmware that requires
frequent updating to keep “synchronized” with the Fabric Switching Engine. It is
transparently managed by the MX7000 infrastructure and does not require user
configuration.
• Module layout
– 16 x 25 GbE server facing ports
– Two Fabric Expansion ports
• No switch operating system
The Dell EMC Networking MXG610s 32G Fibre Channel I/O Module for the
PowerEdge MX7000 is the right choice for mission-critical applications accessing
data on external storage.
The MXG610s comes in three models to meet the specific needs of organizations:
8-port, 16-port, and 16-port enterprise licensed models.
• Module layout
• Hardware independence
• Scales with ease.
• Open-source
• High performance
• Agility with a flexible management framework
Cumulus Linux is the first full-featured Linux operating system for data center
networks which can run seamlessly over industry standard switches to help deliver
high capacity fabrics with attractive price-performance and ROI metrics. The
Cumulus operating system leverages a large ecosystem of native Linux
applications and automation tools to drive new levels of innovation bringing needed
flexibility and agility to the data center. This new disaggregated model helps
organizations deploy next-generation workloads on rich data center networking
solutions that are built on large-scale Clos fabrics and new data center
architectures. Cumulus Linux empowers customers to build a modern, scalable
data center bringing the server, virtual machine paradigms of manageability,
clustering, monitoring, and orchestration to networking.
Together Dell and Cumulus are transforming the network with an innovative
solution that combines the industry’s first, full-featured Linux operating system with
the market leading and field tested Dell Ethernet switching platforms. Dell with
Cumulus helps organizations realize the full potential of a software-defined data
center today.
Cumulus Linux
Hardware
Dell Hardware
Dell and Cumulus open networking solution disaggregating networking gear from operating system
Cumulus Linux is a full-featured Linux operating system for data center networks
which can run seamlessly over industry standard switches.
• Cumulus Networks is now owned by NVIDIA, and the operating system is called
as NVIDIA Cumulus Linux.
• Cumulus Linux operating system empowers customers to build a modern,
scalable data center bringing the server, virtual machine paradigms of
manageability, clustering, monitoring, and orchestration to networking.
• Cumulus Linux operating system offers disaggregated hardware + software
data center networking solution empowering organizations to deploy modern
workloads and applications that are designed for the open networking era.
• List of Dell EMC PoweSwitches supporting Cumulus operating system are:
− Dell EMC PowerSwitch S-3048–ON
− Dell EMC PowerSwitch S-4810-ON
− Dell EMC PowerSwitch S-6000-ON
− Dell EMC PowerSwitch S-6010-ON
• Combination of S4810-ON and S6000-ON networking switches with Cumulus
Linux has the following benefits:
− Power of choice
− Flexibility
− Accelerated innovation
List of Dell EMC PoweSwitches supporting Switch Light operating system are:
ZebOS
ZebOS is software-based routing and switching platform from IP infusion that is
used in data center network. ZebOS is built on a software defined networking
architecture. It includes hardware and embedded operating system abstraction
layers to enable communication with the underlying operating system or network
processor.
ACK
ACK is a flag inside the TCP header (1 bit). ACK acknowledges the successful
receipt of a packet.
FIN
The FIN flag specifies the end of data transmission to close the TCP connection.
Flexibility
The new offerings provide organizations the needed flexibility to transform their
data centers and offer high-capacity network fabrics that are easy to deploy, cost-
effective, and provide a clear path to a software-defined data center.
Internet Protocol(IP)
The Internet Protocol (IP) is a method for sending data from one device to another
across the Internet. Every device is uniquely identified by an IP address, which
enables the device to communicate and exchange data with other devices that are
connected to the Internet.
Power of choice
Organizations that benefited from using the disaggregation model with their data
center server platforms, can now leverage even greater benefits from Dell open
networking platforms.
Routed Mode
Sequence Number
The TCP client sends the sequence number, consists of the total data that has
been sent for the session.
SONiC
Software for Open Networking in the Cloud
SYN
SYN is a flag inside the TCP header (1 bit). SYN flag synchronizes the sequence
numbers to initiate a TCP connection.
TCP Header
The TCP header mainly consists of the source and destination port numbers, also
has a sequence number. The sequence number to track where each frame fits into
a sequence of frames. The header also includes an acknowledge (ACK) bit
and acknowledgment number to specify which frames are being acknowledged.
And a window size is used to specify how many data bytes the receiver can accept.
Transparent Mode
UDP Header
UDP header is less complex and incurs less overhead than TCP. The 16-bit Length
field describes the length of the user datagram, including the header and data. The
16-bit Checksum field covers the pseudo-IP header, the UDP header, and the data.
The pseudo-IP header, which is also used in TCP. It includes the IP address in the
checksum calculation to ensure that the frame has arrived at the proper destination.