Dell Networking Foundations
Dell Networking Foundations
fundamentals
DNF
Introduction
(8 (2
) )
Networking Terminologies
What does the following mean?
2
La comunicación
• Establecimiento de reglas
– Identificación de emisor y
receptor
– Método de comunicación
común
– Mismo idioma
– Velocidad idéntica
– Acuses de recibo
Calidad de las comunicaciones
• Intercambio de
información de interés
entre un origen y un
destino
• Dicho intercambio se
realiza por un medio
definido
• El término red se usará
para referirnos a datos o
redes de información
capaces de transportar
diferentes tipos de
comunicación
Protocolos
5
In 1982, the International Organization for
Standardization formed the Open
Systems Interconnection (OSI) initiative. 4
• A set of standards for computers to use when
communicating to each other.
• Creating an open standard would allow
3
computers made by different manufacturers to
more easily communicate with one another.
• The result of the initiative is referred to as The OSI 2
Reference Model.
• It is a “protocol stack” that consists of seven
layers: 1
How does OSI model work?
10
Encapsulation of the OSI Layers
11
Encapsulation and De-Encapsulation of Data from Layer to Layer
12
Layer 1 – Physical Layer
Binary code (ones and zeros) is turned into electrical, light or radio frequency signals and
prepared for communication across a media (air, cable)
13
Cabling and transceivers
14 14
Networking Fundamentals
Ethernet transmission types
Copper Fibre
- 10 / 100 Mbit Ethernet - 10 / 100 Mbit Ethernet
- 1 / 10 Gbit Ethernet - 1 / 10 / 40 / 100 Gbit Ethernet
- …400Gbit (Future)
- 10/100/1000/10000 Base T
Common types
- Distance: up to 100 Metres - 100 BaseFX (100Mbit)
- 1000 BaseX (X=SX, LX, ZX…)
- 10000 BaseX (X=SR, LR, ER…)
- 40000 BaseX (X=SR, LR4,…)
15
100/1000 Mbit Transceivers
16
10 GbE Transceivers
Data Rate Port Type Standards support Reach and media type
17
40 GbE Transceivers
18
1/10GBASE-T Cable Distances
High-performance 1/10/40GbE top-of-rack & aggregation switch
19
Examples of Cable Types, Optics and Uses
• DAC Cable – used for low cost, high speed and limited distance
connectivity (<7m) usually in the Data Centre. 10GbE and 40GbE.
20
Layer 2 Data Link (LAN Technologies)
The Data Link layer provides the functional and procedural means to transfer data between
network entities and to detect and possibly correct errors that may occur in the Physical
Layer (sometimes called the MAC Layer)
0101 1100 0010 0110 0000 1010 0111 1010 1010 1000 1011 1111
5c 26 0a 7a a8 bf
Layer 2 Device: Switch
• Used to segment the network (collision domains) to
improve performance
Common Switching
Standards 4 3
Purpose
802.1d Bridging (switching) standard 1 2
- Self-learning SAT Table C
- Spanning Tree Protocol (redundancy without loops) D
802.1q Virtual LANs (dot1q trunking and more)
802.1p Layer 2 Prioritization B
802.1x Access Control
802.1s Multiple Spanning Trees (MST)
802.1w Rapid Spaning Tree (RSTP) A
Layer 2: Switch
Switches are the most common access device used today to connect users and devices to
the network
Switches come in different form factors from standalone, to stackable, to chassis-based
Most (enterprise-class) switches today support routing protocols as well
Table (SAT) to help make forwarding decisions 802.11n 2.4 & 5 GHz, up to 450 Mbps
Floods broadcast/multicast packets
802.11ac 5 GHz, up to 6.9 Gbps
Ethernet 1, 2, 3
Radio Card A 4, 5, 6
Radio Card B 11, 12, 13
Redundant Switched Topologies
• Switches learn the MAC addresses of devices on their ports so that data can
be properly forwarded to the destination.
• Switches will flood frames for unknown destinations until they learn the
MAC addresses of the devices.
• Broadcasts and multicasts are also flooded. (Unless switch is doing Multicast
Snooping or IGMP)
• A redundant switched topology without spanning tree may (STP disabled)
26
cause broadcast storms, multiple frame copies, and MAC address table
instability problems.
Spanning-Tree Protocol (STP)
Switch
Switch Switch
Switch Switch
• It is because certain paths are blocked that a loop free topology is possible.
• Data frames received on blocked links are dropped.
• The Spanning-Tree Protocol requires network devices to exchange
messages to detect bridging loops - Bridge Protocol Data Units (BPDU).
• Links that will cause a loop are put into a blocking state.
• BPDUs continue to be received on blocked ports.
• This ensures that if an active path or device fails, a new spanning tree28can be
calculated.
Per VLAN Spanning Tree
VLAN 10,20,30
Root Port VLAN 20 Root Port VLAN 30
Designated Port VLAN 10 Designated Port VLAN 10
Designated Port VLAN 30 Non-Designated Port
VLAN 20 - BLOCKED
Most common:
IPv4: The basis for almost all communications within the
Internet and most LANs/WANs: 2³² possible addresses which
means that we have a strong limitation regarding available
public addresses around the globe (Approx 4 Billion Addresses)
Special addresses:
224.0.0.0 -> 239.255.255.255 (multicast)
10.0.0.0/8
172.16.0.0/12 RFC 1918 Addresses
192.168.0.0/16
33
Address Resolution Protocol
34
How do find the target IP address - ARP
35
Subnet Masks – Why Do We Need Them ?
36
Subnetting and Addressing
10.1.1.1/8 10.1.1.2/8
11.1.1.1/8 172.16.1.1/12
11.1.1.2/8 172.16.1.2/12
192.168.1.1/24 192.168.1.2/24
37
Example of Masking (1)
10.1.1.1 / 8
10 = 0000 1010
1 = 0000 0001
/8 means that the first 8 bits of the mask are used (starting from the left)
38
Example of Masking (2)
172.16.1.2/12
Network – 1010 1100 0001 0000 0000 0000 0000 0000 = 172.16.0.0
39
Online Subnet Calculators – Much Quicker!
4
0
What IP Address Should I use
41
Layer3: IP Protocol Version 6
IP version 4 addresses are becoming scare
resources
TCP UDP
Session Layer (Layer 5): The Session layer provides the mechanism for
managing the dialogue between end-user application processes.
Presentation Layer (Layer 6): The Presentation layer relieves the Application
layer of concern regarding syntactical differences in data representation
within the end-user systems. MIME encoding, encryption and similar
manipulation of the presentation of data is done at this layer. An example of
a presentation service would be the conversion of an EBCDIC-coded text
file to an ASCII-coded file.
Application Layer (Layer 7): This layer interfaces 7 APPLICATION
directly to and performs common application 6 PRESENTATION
services for the application processes. An examples 5 SESSION
of common application services is Telnet. 4 TRANSPORT
3 NETWORK
2 DATALINK
1 PHYSICAL
Types of networks and
topologies
47
Types of networks and topologies
A computer network will usually consist of much more than two devices:
48
What is a LAN?
A LAN is a computer
network covering a
small area like an
office, home, group
of buildings.
Normally relatively
high speed.
Consists of i.e.
switches, routers,
computers
What is a WAN?
Common protocols:
iSCSI, FibreChannel
Core
Aggregation/distribution
Edge/access
Star network
UNICAST BROADCAST
MULTICAST
Network devices
54
Networking fundamentals – Managed Switches
• Managed Switch
A "managed switch" can be configured via CLI (Command Line), Telnet/SSH (Remote via IP) or
the Web interface. Different parameters like VLANs, Routing, Security can be enabled or
disabled. Also supports protocols like SNMPv2/SNMPv3 for integration into a management
platform.
• Unmanaged Switch
"Plug and Play" Switches with no configuration possibilities and used for small offices or home –
normally for simple tasks.
A managed Switch which cannot be configured via CLI. It uses a WebGui instead of a CLI
and has limitations regarding to the configuration. The Dell X-Series is a smart managed
switch.
Switches – Different Learning Mechanisms
• Cut-though switch
Fast and efficent. Only copies destination MAC-address which speeds
up and does not CRC check before start sending. Large frames starts
to leave the switch before it is fully received.
• Store-and-forward switch
Stores the complete frame in memory and does a CRC check before
forwarding the frame on.
57
Networking Fundamentals: Virtual LAN (VLAN)
• A VLAN has the same attributes as a physical local area network (LAN), but it allows for
end stations to be grouped together more easily even if they are not on the same
network switch.
• Domains are mutually isolated , i.e. packets can only pass between them via one or
more Routers
• Simpler devices only support partitioning on a port level (if at all), so sharing VLANs
across devices requires running dedicated cabling for each VLAN.
• More sophisticated devices can mark packets through tagging, so that a single
interconnect (trunk) may be used to transport data for various VLANs
59
Networking Fundamentals: Stacking
6
0
Networking Fundamentals: Quality of Service (QoS)
• Needs to be end-to-end