SlideShare a Scribd company logo
<Insert Picture Here>

Network TOI for NAS (Basic)
2013.11.27

Hisao Tsujimura
Sr. Technical Support Engineer
Storage Technology Service Center, Oracle Tokyo
Agenda
!

Ethernet

!

ARP

!

IP

!

Routing

!

IPoIB (IP over Infiniband)

!2
1. ETHERNET

!3
Ethernet
!

We call them “frames.”

!

It can be sent only to the same hub/switch.

!4
How Ethernet Works?

You check baggage claim tags (MAC Address) and pick up the bag
(frame) when the tag matches.
!5
Simplified Frame Format
•MAC address – 6 byte address (48bits), first 3 bytes indicate vendor. (OUI)
802.3 Ethernet II Frame
Destination

Source

Ethernet II 

MAC Address MAC Address Payload (up to 1500 bytes)
802.1Q Frame (Tagged VLAN)
Destination

Source

VLAN ID Ethernet II 

MAC Address MAC Address (4 bytes) Payload (up to 1500 bytes)
•Switch port settings have to match with what frame format to manage.
•The destination MAC address of all 1 (FF: FF: FF: FF: FF: FF) means broadcast.
•OUI search at IEEE < http://standards.ieee.org/develop/regauth/oui/public.html>

!6
Hubs

Frame 1:
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01

Node1 (Intel Card)
00:12:F0:00:00:01

Node2 (Intel Card)
00:12:F0:00:00:10

Node3 (Cisco Port)
00:05:9B:00:00:10

•Every node receives all frames
•Each node discards frames not addressed to them.
•If the destination is broadcast, all nodes process the frame.

!7
(2)

Switches

MAC table
Port #2 00:12:F0:00:00:10

Frame 1: (1)
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01
Frame 2: (3)
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01
Node1 (Intel Card)
00:12:F0:00:00:01

(1)

(3)

Node2 (Intel Card)
00:12:F0:00:00:10

(1)

Node3 (Cisco Port)
00:05:9B:00:00:10

•Every node receives the frames if the destination is not on switch’s mac table
•No other node receives frames if not addressed to them after the first frame.
•Frames with broadcast is sent to all ports.

!8
VLAN – Logical Partitioning of Switch
Frame 1: (VLAN2)
Dst: 00:12:F0:00:00:10
Src: 00:12:F0:00:00:01

VLAN 2

VLAN 3

Frame 2: (VLAN2)
Dst: 00:05:9B:00:00:10
Src: 00:12:F0:00:00:01

Node1 (Intel Card)
00:12:F0:00:00:01

Node2 (Intel Card)
00:12:F0:00:00:10

Node3 (Cisco Port)
00:05:9B:00:00:10

•Different VLAN ID means different logical switch.
•No way to go beyond the VLAN boundary unless routed.
•Therefore frame is invalid for transmission.

!9
Checking Mac Address
-bash-4.1$ more ifconfig-a.out
lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1
inet 127.0.0.1 netmask ff000000
igb0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 5
inet 172.23.210.177 netmask ffffff80 broadcast 172.23.210.255
ether 0:10:e0:35:e0:5c
igb1: flags=1000842<BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4
inet 172.23.210.179 netmask ffffff80 broadcast 172.23.210.255
ether 0:10:e0:35:e0:5d
ipmp1: flags=8001000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4,IPMP> mtu 65520 index 6
inet 192.168.28.1 netmask fffffc00 broadcast 192.168.31.255
groupname ipmp1
lo0: flags=2002000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv6,VIRTUAL> mtu 8252 index 1
inet6 ::1/128

!10
2. ARP

!11
ARP – Find MAC address from IP Address

Bean

!12
ARP – Find MAC address from IP Address
•Destination Mac Address is FF:FF:FF:FF:FF:FF
•Asks “Who is IP of aa.bb.cc.dd”
ARP Request Packet (Simplified)
Ethernet Header)
Destination

Source

Frame
MAC Address MAC Address Type
(All 1)

…

ARP Request
Source

Source

Destination

Destination

MAC Address IP Address MAC Address IP Address
(All 1)

!13
ARP

ARP Request
Who is 192.168.100.1?

Node1 (Intel Card)
00:12:F0:00:00:01
192.168.100.100

ARP Reply
00:05:9B:00:00:10

Node2 (Intel Card)
00:12:F0:00:00:10
192.168.100.101

Node3 (Cisco Port)
00:05:9B:00:00:10
192.168.100.1

•Node 1 “broadcasts” an ARP request asking 192.168.100.1
•Because the frames are addressed to every node, every node receives the frame.
•Node 3 with the target IP address sends back the ARP reply to node 1.

!14
Checking ARP Table
•No data in the supportbundle
-bash-4.1$ arp -a"
Net to Media Table: IPv4"
Device IP Address
Mask
Flags
Phys Addr"
------ -------------------- --------------- -------- ---------------"
net8 169.254.182.77
255.255.255.255 SPLA 02:21:28:57:47:17"
net8 169.254.182.76
255.255.255.255
02:21:28:57:47:16"
(….omitted….)

ipmp_vfdom0 amogg0005.us.oracle.com 255.255.255.255
00:10:e0:23:9c:84"
ipmp_vfdom0 amogg0006.us.oracle.com 255.255.255.255
00:10:e0:0e:09:1c

!15
3. IP

!16
IP – Travelling to Final Destination
Germany
Office
Frankfurt
Direct flight

Indirect flight
Singapore
(Changi)

Indirect flight

Tokyo

(Narita)
My
House

!17
IPv4 Addressing
•IP Version 4 address is 4 byte address, delimited by dots e.g. 192.168.100.1.
•Subnet mask decides what part of IPv4 address to look at to identify if the IP
addresses belong to the same subnet.
•The network address is the beginning of the subnet.
•Subnet masks can be described in AA.BB.CC.DD or CIDR notation (/nn
format , where nn is the number of bits to mask from MSB.)
Examples:
(The below mean the same thing.)

"

IP: 192.168.0.1 Subnet mask: 255.255.255.0
IP: 192.168.0.1/24

!18
Do They Belong To The Same Subnet?
Q1:
(a) 192.168.0.1/24
(b) 192.168.1.1/24

Q2:
(a) 192.168.0.1/16
(b) 192.168.1.1/16

To identify the network address, we calculate “AND”
of IP address and subnet mask. /24 means FF:FF:FF:00.
The network addresses for each (a) and (b) are:
(a) 192.168.0.0

(b) 192.168.1.0

Therefore, they DO NOT belong to the same subnet.
To identify the network address, we calculate “AND”
of IP address and subnet mask. /24 means FF:FF:00:00.
The network addresses for each (a) and (b) are:
(a) 192.168.0.0

(b) 192.168.0.0

Therefore, they DO belong to the same subnet.

!19
How Is An IP Packet Delivered?

(1) ARP Request
Who is 192.168.100.1?

Node1 (Intel Card)
00:12:F0:00:00:01
192.168.100.100

(2) ARP Reply
00:05:9B:00:00:10

Node2 (Intel Card)
00:12:F0:00:00:10
192.168.100.101

Node3 (Cisco Port)
00:05:9B:00:00:10
192.168.100.1

(3) IP packet to 192.168.100.1

MAC address 00:05:9B:00:00:10

!20
4. ROUTING

!21
!22
IP – Travelling to Final Destination
Germany
Office
Frankfurt
Direct flight

Indirect flight
Singapore
(Changi)

Indirect flight

Tokyo

(Narita)
My
House

!23
IP – Travelling to Final Destination
192.168.100.1

R3
Route 1
(192.168.10.0/24)
192.168.11.0/24

R2

R1
192.168.12.0/24
192.168.0.1

!24
Checking Routing Table
"

RRoouuttiinngg 	
 TTaabbllee:: 	
 IIPPvv44


 	
  	
 DDeessttiinnaattiioonn 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 GGaatteewwaayy 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 FFllaaggss 	
  	
 RReeff 	
  	
  	
  	
  	
 UUssee 	
  	
  	
  	
  	
 IInntteerrffaaccee


---------------------------------------- 	
 ---------------------------------------- 	
 ---------- 	
 ---------- 	
 -------------------- 	
 ------------------


ddeeffaauulltt 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 117722..2233..221100..225544 	
  	
  	
  	
  	
  	
  	
 UUGG 	
  	
  	
  	
  	
  	
  	
  	
 55 	
  	
  	
  	
  	
  	
  	
 88552244 	
 iiggbb00


112277..00..00..11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 112277..00..00..11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 UUHH 	
  	
  	
  	
  	
  	
  	
  	
 66 	
  	
  	
  	
  	
 118811334433 	
 lloo00


117722..2233..221100..112288 	
  	
  	
  	
  	
  	
  	
 117722..2233..221100..117777 	
  	
  	
  	
  	
  	
  	
 UU 	
  	
  	
  	
  	
  	
  	
  	
 1100 	
  	
  	
  	
  	
 664477771144 	
 iiggbb00


119922..116688..2288..00 	
  	
  	
  	
  	
  	
  	
  	
  	
 119922..116688..2288..11 	
  	
  	
  	
  	
  	
  	
  	
  	
 UU 	
  	
  	
  	
  	
  	
  	
  	
 3322 	
  	
  	
 1166118888664455 	
 iippmmpp11



"

RRoouuttiinngg 	
 TTaabbllee:: 	
 IIPPvv66


 	
  	
 DDeessttiinnaattiioonn//MMaasskk 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 GGaatteewwaayy 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 FFllaaggss 	
 RReeff 	
  	
  	
 UUssee 	
  	
  	
  	
 IIff


------------------------------------------------------ 	
 ------------------------------------------------------ 	
 ---------- 	
 ------ 	
 -------------- 	
 ----------


::::11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 ::::11 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 UUHH 	
  	
  	
  	
  	
  	
 22 	
  	
  	
  	
  	
 220000 	
 lloo00

•The default gateway is used when no other routes are available.
•You have to look at the subnet mask as well. (Example in next page.)

!25
Routing Tables with Subnet Masks
"

RRoouuttiinngg 	
 TTaabbllee:: 	
 IIPPvv44


 	
  	
 DDeessttiinnaattiioonn 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 GGaatteewwaayy 	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
 SSuubbnneettmmaasskk


---------------------------------------- 	
 ---------------------------------------- 	
 ----------------------------


119922..116688..110000..11 	
  	
  	
  	
  	
  	
  	
  	
 119922..116688..110000..11 	
  	
  	
  	
  	
  	
  	
  	
 225555..225555..225555..00


119922..116688..110000..112299 	
  	
  	
  	
  	
  	
 119922..116688..110000..113300 	
  	
  	
  	
  	
  	
 225555..225555..225555..112288

•Routes with more bits in subnet mask have priority.
•So if you would like to connect to 192.168.100.131, you take
192.168.100.130 because subnet mask is 25 bits.

!26
How Packet is Delivered Over a Router/L3 SW
(1) ARP Request
Who is 192.168.200.1?

(2) ARP Reply
MAC: 00:05:9B:00:00:10

R1 Eth0
00:05:9B:00:00:10
192.168.100.254

Node1

00:12:F0:00:00:01
192.168.100.100

Node2
00:12:F0:00:00:10
192.168.100.101

(3) Packet to 192.168.200.1

MAC :00:05:9B:00:00:10
(4) Packet to 192.168.200.1

MAC :00:12:F0:00:00:10
R1

R1 Eth1
00:05:9B:00:00:11
192.168.200.254

Node3
00:12:F0:00:00:10
192.168.200.1

!27
5. IPOIB

!28
IB Partitioning
PKEY:FFFF

Subnet
Manager
(Internal/External)

PKEY:8506

Node1 (PKEY: 8506)
10E00001328389

PKEY:8507

Node2 (PKEY:8506)
10E0000132838A

Node3 (PKEY: 8507)

10E0000132848C

•IB fabric is divided into “partitions” like VLANs
•We use PKEY instead of VLAN ID in IB partitioning.
•PKEY: FFFF means “connect to any port on fabric.”
•In the above example, Node 1 and 2 can talk, but not with node 3.
•Oracle supports only “on-switch” subnet manager with ZFSSA.

!29
Checking IB Partitioning
"

--bbaasshh--44..11$$ 	
 mmoorree 	
 ddllaaddmm--sshhooww--iibb..oouutt


LLIINNKK 	
  	
  	
  	
  	
  	
  	
  	
  	
 HHCCAAGGUUIIDD 	
  	
  	
  	
  	
  	
  	
  	
  	
 PPOORRTTGGUUIIDD 	
  	
  	
  	
  	
  	
  	
  	
 PPOORRTT 	
 SSTTAATTEE 	
  	
 PPKKEEYYSS


iibbpp00 	
  	
  	
  	
  	
  	
  	
  	
  	
 1100EE0000000011332288338888 	
  	
 1100EE0000000011332288338899 	
  	
 11 	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
 FFFFFFFF,,88550033


iibbpp11 	
  	
  	
  	
  	
  	
  	
  	
  	
 1100EE0000000011332288338888 	
  	
 1100EE00000000113322883388AA 	
  	
 22 	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
 FFFFFFFF,,88550033



"

--bbaasshh--44..11$$ 	
 mmoorree 	
 ddllaaddmm--sshhooww--ppaarrtt..oouutt


LLIINNKK 	
  	
  	
  	
  	
  	
  	
  	
  	
 PPKKEEYY 	
  	
 OOVVEERR 	
  	
  	
  	
  	
  	
  	
  	
  	
 SSTTAATTEE 	
  	
  	
  	
 FFLLAAGGSS


pp88550033__iibbpp00 	
  	
  	
 88550033 	
  	
 iibbpp00 	
  	
  	
  	
  	
  	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
  	
  	
 ff------


pp88550033__iibbpp11 	
  	
  	
 88550033 	
  	
 iibbpp11 	
  	
  	
  	
  	
  	
  	
  	
  	
 uupp 	
  	
  	
  	
  	
  	
  	
 ff------



"

--bbaasshh--44..11$$ 	
 mmoorree 	
 iiffccoonnffiigg--aa..oouutt


lloo00:: 	
 ffllaaggss==22000011000000884499<<UUPP,,LLOOOOPPBBAACCKK,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,IIPPvv44,,VVIIRRTTUUAALL>> 	
 mmttuu 	
 88223322 	
 iinnddeexx 	
 11


 	
  	
  	
  	
  	
  	
  	
  	
 iinneett 	
 112277..00..00..11 	
 nneettmmaasskk 	
 ffff000000000000


pp88550033__iibbpp00:: 	
 ffllaaggss==99004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> 	
 mmttuu 	
 6655552200 	
 iinnddeexx 	
 22


 	
  	
  	
  	
  	
  	
  	
  	
 iinneett 	
 00..00..00..00 	
 nneettmmaasskk 	
 ffff000000000000 	
 bbrrooaaddccaasstt 	
 00..225555..225555..225555


 	
  	
  	
  	
  	
  	
  	
  	
 ggrroouuppnnaammee 	
 iippmmpp11


 	
  	
  	
  	
  	
  	
  	
  	
 iippiibb 	
 8800::00::00::44aa::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::8899


pp88550033__iibbpp11:: 	
 ffllaaggss==6699004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> 	
 mmttuu 	
 6655552200 	
 iinnddeexx 	
 33


 	
  	
  	
  	
  	
  	
  	
  	
 iinneett 	
 00..00..00..00 	
 nneettmmaasskk 	
 ffff000000000000 	
 bbrrooaaddccaasstt 	
 00..225555..225555..225555


 	
  	
  	
  	
  	
  	
  	
  	
 ggrroouuppnnaammee 	
 iippmmpp11


 	
  	
  	
  	
  	
  	
  	
  	
 iippiibb 	
 8800::00::00::44bb::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::88aa

!30
References
•Ethernet Frame

< http://en.wikipedia.org/wiki/Ethernet_frame>
•802.1Q

< http://en.wikipedia.org/wiki/802.1Q>
•ARP(Address Resolution Protocol) 

< http://en.wikipedia.org/wiki/Address_Resolution_Protocol>
•Subnetwork

<http://en.wikipedia.org/wiki/Subnetwork>
•

!31

More Related Content

What's hot

Eigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configurationEigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configuration3Anetwork com
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1
Kishore Kumar
 
Configuracion EIGRP
Configuracion EIGRPConfiguracion EIGRP
Configuracion EIGRP
alexis marck Huiza Canchanya
 
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandosConfigurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos1 2d
 
Policy Based Routing
Policy Based RoutingPolicy Based Routing
Policy Based Routing
NetProtocol Xpert
 
Basic BGP Configuration
Basic BGP ConfigurationBasic BGP Configuration
Basic BGP Configuration
NetProtocol Xpert
 
Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01Ralph Nguyen
 
Serial number soft
Serial number softSerial number soft
Serial number soft
sandi271979
 
Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!
shira koper
 
AWS VPC by hellocloud.io
AWS VPC by hellocloud.ioAWS VPC by hellocloud.io
AWS VPC by hellocloud.io
Hello Cloud
 
The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184
Mahmoud Samir Fayed
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
AlgoSec
 
Miniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji ElectricMiniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji Electric
CTY TNHH HẠO PHƯƠNG
 
Cisco catalyst 2960 plus series switch datasheet
Cisco catalyst 2960 plus  series switch datasheetCisco catalyst 2960 plus  series switch datasheet
Cisco catalyst 2960 plus series switch datasheet
Amy Huang
 
Output drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switchesOutput drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switches
candy tang
 
1 million serial numbers of different softwares
1 million serial numbers of different softwares1 million serial numbers of different softwares
1 million serial numbers of different softwaresmifdov
 
Ursalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start GuideUrsalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start Guide
Ivete Huang
 

What's hot (20)

Eigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configurationEigrp on a cisco asa firewall configuration
Eigrp on a cisco asa firewall configuration
 
Access Control List 1
Access Control List 1Access Control List 1
Access Control List 1
 
Configuracion EIGRP
Configuracion EIGRPConfiguracion EIGRP
Configuracion EIGRP
 
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandosConfigurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
Configurando vlan, vtp, trunking e vmps em cisco catalyst switches comandos
 
Policy Based Routing
Policy Based RoutingPolicy Based Routing
Policy Based Routing
 
Vt6655 linux user_guide
Vt6655 linux user_guideVt6655 linux user_guide
Vt6655 linux user_guide
 
JCM STOCK LIST 2016
JCM STOCK LIST 2016JCM STOCK LIST 2016
JCM STOCK LIST 2016
 
Basic BGP Configuration
Basic BGP ConfigurationBasic BGP Configuration
Basic BGP Configuration
 
Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01Tri aoi training-supplementary_2011.01
Tri aoi training-supplementary_2011.01
 
Serial number soft
Serial number softSerial number soft
Serial number soft
 
Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!Simple Misconfiguration Equals Network Vulnerability!
Simple Misconfiguration Equals Network Vulnerability!
 
Ccna command
Ccna commandCcna command
Ccna command
 
AWS VPC by hellocloud.io
AWS VPC by hellocloud.ioAWS VPC by hellocloud.io
AWS VPC by hellocloud.io
 
The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184The Ring programming language version 1.5.3 book - Part 68 of 184
The Ring programming language version 1.5.3 book - Part 68 of 184
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Miniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji ElectricMiniature Circuit Breakers BC-E Series - Fuji Electric
Miniature Circuit Breakers BC-E Series - Fuji Electric
 
Cisco catalyst 2960 plus series switch datasheet
Cisco catalyst 2960 plus  series switch datasheetCisco catalyst 2960 plus  series switch datasheet
Cisco catalyst 2960 plus series switch datasheet
 
Output drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switchesOutput drops due to qo s on cisco 2960 3560 3750 switches
Output drops due to qo s on cisco 2960 3560 3750 switches
 
1 million serial numbers of different softwares
1 million serial numbers of different softwares1 million serial numbers of different softwares
1 million serial numbers of different softwares
 
Ursalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start GuideUrsalink UR51 Industrial Cellular Router Quick Start Guide
Ursalink UR51 Industrial Cellular Router Quick Start Guide
 

Similar to 001 network toi_basics_v1

Introduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignIntroduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI Design
Pratik Gohel
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013Tom Paseka
 
Cisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheetCisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheet
Amy Huang
 
Applied motion products si5580 datasheet
Applied motion products si5580 datasheetApplied motion products si5580 datasheet
Applied motion products si5580 datasheet
Electromate
 
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
SilvioDias29
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
ssuserfcf43f
 
crack satellite
crack satellite crack satellite
crack satellite
TecnicoAInstrumentos
 
Cloud Monitors Cloud
Cloud Monitors CloudCloud Monitors Cloud
Cloud Monitors Cloud
Raymond Burkholder
 
fdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdffdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdf
SaidHaman
 
Cisco sfp glc module datasheet
Cisco sfp glc module datasheetCisco sfp glc module datasheet
Cisco sfp glc module datasheet
Amy Huang
 
Lab 9 instructions
Lab 9 instructionsLab 9 instructions
Lab 9 instructions
trayyoo
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
Amir Jafari
 
Day 20.1 configuringframerelay
Day 20.1 configuringframerelayDay 20.1 configuringframerelay
Day 20.1 configuringframerelay
CYBERINTELLIGENTS
 
cisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdfcisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdf
Hi-Network.com
 
cisco-ws-x6716-10g-3cxl-datasheet.pdf
cisco-ws-x6716-10g-3cxl-datasheet.pdfcisco-ws-x6716-10g-3cxl-datasheet.pdf
cisco-ws-x6716-10g-3cxl-datasheet.pdf
Hi-Network.com
 
HPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data SheetHPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data Sheet
美兰 曾
 
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdfThe_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
ssuser340a0c
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
Amir Jafari
 
Debugging Ruby
Debugging RubyDebugging Ruby
Debugging Ruby
Aman Gupta
 

Similar to 001 network toi_basics_v1 (20)

Introduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI DesignIntroduction to Asic Design and VLSI Design
Introduction to Asic Design and VLSI Design
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013
 
Aruba mobility access switch useful commands v2
Aruba mobility access switch useful commands v2Aruba mobility access switch useful commands v2
Aruba mobility access switch useful commands v2
 
Cisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheetCisco catalyst 2960 xr series switches datasheet
Cisco catalyst 2960 xr series switches datasheet
 
Applied motion products si5580 datasheet
Applied motion products si5580 datasheetApplied motion products si5580 datasheet
Applied motion products si5580 datasheet
 
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
ENCOR SA Scenario Especifica o algoritmo de hashing de senha a ser usado, nes...
 
hacking-embedded-devices.pptx
hacking-embedded-devices.pptxhacking-embedded-devices.pptx
hacking-embedded-devices.pptx
 
crack satellite
crack satellite crack satellite
crack satellite
 
Cloud Monitors Cloud
Cloud Monitors CloudCloud Monitors Cloud
Cloud Monitors Cloud
 
fdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdffdocuments.in_the-ericsson-commands.pdf
fdocuments.in_the-ericsson-commands.pdf
 
Cisco sfp glc module datasheet
Cisco sfp glc module datasheetCisco sfp glc module datasheet
Cisco sfp glc module datasheet
 
Lab 9 instructions
Lab 9 instructionsLab 9 instructions
Lab 9 instructions
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
 
Day 20.1 configuringframerelay
Day 20.1 configuringframerelayDay 20.1 configuringframerelay
Day 20.1 configuringframerelay
 
cisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdfcisco-n3k-c3172tq-32t-datasheet.pdf
cisco-n3k-c3172tq-32t-datasheet.pdf
 
cisco-ws-x6716-10g-3cxl-datasheet.pdf
cisco-ws-x6716-10g-3cxl-datasheet.pdfcisco-ws-x6716-10g-3cxl-datasheet.pdf
cisco-ws-x6716-10g-3cxl-datasheet.pdf
 
HPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data SheetHPE ProLiant DL380 Gen9 Server Data Sheet
HPE ProLiant DL380 Gen9 Server Data Sheet
 
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdfThe_ERICSSON_commands_listed_below_are_f (1) (1).pdf
The_ERICSSON_commands_listed_below_are_f (1) (1).pdf
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
 
Debugging Ruby
Debugging RubyDebugging Ruby
Debugging Ruby
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

001 network toi_basics_v1

  • 1. <Insert Picture Here> Network TOI for NAS (Basic) 2013.11.27 Hisao Tsujimura Sr. Technical Support Engineer Storage Technology Service Center, Oracle Tokyo
  • 4. Ethernet ! We call them “frames.” ! It can be sent only to the same hub/switch. !4
  • 5. How Ethernet Works? You check baggage claim tags (MAC Address) and pick up the bag (frame) when the tag matches. !5
  • 6. Simplified Frame Format •MAC address – 6 byte address (48bits), first 3 bytes indicate vendor. (OUI) 802.3 Ethernet II Frame Destination
 Source
 Ethernet II 
 MAC Address MAC Address Payload (up to 1500 bytes) 802.1Q Frame (Tagged VLAN) Destination
 Source
 VLAN ID Ethernet II 
 MAC Address MAC Address (4 bytes) Payload (up to 1500 bytes) •Switch port settings have to match with what frame format to manage. •The destination MAC address of all 1 (FF: FF: FF: FF: FF: FF) means broadcast. •OUI search at IEEE < http://standards.ieee.org/develop/regauth/oui/public.html> !6
  • 7. Hubs Frame 1: Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 Node1 (Intel Card) 00:12:F0:00:00:01 Node2 (Intel Card) 00:12:F0:00:00:10 Node3 (Cisco Port) 00:05:9B:00:00:10 •Every node receives all frames •Each node discards frames not addressed to them. •If the destination is broadcast, all nodes process the frame. !7
  • 8. (2) Switches MAC table Port #2 00:12:F0:00:00:10 Frame 1: (1) Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 Frame 2: (3) Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 Node1 (Intel Card) 00:12:F0:00:00:01 (1) (3) Node2 (Intel Card) 00:12:F0:00:00:10 (1) Node3 (Cisco Port) 00:05:9B:00:00:10 •Every node receives the frames if the destination is not on switch’s mac table •No other node receives frames if not addressed to them after the first frame. •Frames with broadcast is sent to all ports. !8
  • 9. VLAN – Logical Partitioning of Switch Frame 1: (VLAN2) Dst: 00:12:F0:00:00:10 Src: 00:12:F0:00:00:01 VLAN 2 VLAN 3 Frame 2: (VLAN2) Dst: 00:05:9B:00:00:10 Src: 00:12:F0:00:00:01 Node1 (Intel Card) 00:12:F0:00:00:01 Node2 (Intel Card) 00:12:F0:00:00:10 Node3 (Cisco Port) 00:05:9B:00:00:10 •Different VLAN ID means different logical switch. •No way to go beyond the VLAN boundary unless routed. •Therefore frame is invalid for transmission. !9
  • 10. Checking Mac Address -bash-4.1$ more ifconfig-a.out lo0: flags=2001000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv4,VIRTUAL> mtu 8232 index 1 inet 127.0.0.1 netmask ff000000 igb0: flags=1000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 5 inet 172.23.210.177 netmask ffffff80 broadcast 172.23.210.255 ether 0:10:e0:35:e0:5c igb1: flags=1000842<BROADCAST,RUNNING,MULTICAST,IPv4> mtu 1500 index 4 inet 172.23.210.179 netmask ffffff80 broadcast 172.23.210.255 ether 0:10:e0:35:e0:5d ipmp1: flags=8001000843<UP,BROADCAST,RUNNING,MULTICAST,IPv4,IPMP> mtu 65520 index 6 inet 192.168.28.1 netmask fffffc00 broadcast 192.168.31.255 groupname ipmp1 lo0: flags=2002000849<UP,LOOPBACK,RUNNING,MULTICAST,IPv6,VIRTUAL> mtu 8252 index 1 inet6 ::1/128 !10
  • 12. ARP – Find MAC address from IP Address Bean !12
  • 13. ARP – Find MAC address from IP Address •Destination Mac Address is FF:FF:FF:FF:FF:FF •Asks “Who is IP of aa.bb.cc.dd” ARP Request Packet (Simplified) Ethernet Header) Destination
 Source
 Frame MAC Address MAC Address Type (All 1) … ARP Request Source
 Source
 Destination
 Destination
 MAC Address IP Address MAC Address IP Address (All 1) !13
  • 14. ARP ARP Request Who is 192.168.100.1? Node1 (Intel Card) 00:12:F0:00:00:01 192.168.100.100 ARP Reply 00:05:9B:00:00:10 Node2 (Intel Card) 00:12:F0:00:00:10 192.168.100.101 Node3 (Cisco Port) 00:05:9B:00:00:10 192.168.100.1 •Node 1 “broadcasts” an ARP request asking 192.168.100.1 •Because the frames are addressed to every node, every node receives the frame. •Node 3 with the target IP address sends back the ARP reply to node 1. !14
  • 15. Checking ARP Table •No data in the supportbundle -bash-4.1$ arp -a" Net to Media Table: IPv4" Device IP Address Mask Flags Phys Addr" ------ -------------------- --------------- -------- ---------------" net8 169.254.182.77 255.255.255.255 SPLA 02:21:28:57:47:17" net8 169.254.182.76 255.255.255.255 02:21:28:57:47:16" (….omitted….)
 ipmp_vfdom0 amogg0005.us.oracle.com 255.255.255.255 00:10:e0:23:9c:84" ipmp_vfdom0 amogg0006.us.oracle.com 255.255.255.255 00:10:e0:0e:09:1c !15
  • 17. IP – Travelling to Final Destination Germany Office Frankfurt Direct flight Indirect flight Singapore (Changi) Indirect flight Tokyo
 (Narita) My House !17
  • 18. IPv4 Addressing •IP Version 4 address is 4 byte address, delimited by dots e.g. 192.168.100.1. •Subnet mask decides what part of IPv4 address to look at to identify if the IP addresses belong to the same subnet. •The network address is the beginning of the subnet. •Subnet masks can be described in AA.BB.CC.DD or CIDR notation (/nn format , where nn is the number of bits to mask from MSB.) Examples: (The below mean the same thing.) " IP: 192.168.0.1 Subnet mask: 255.255.255.0 IP: 192.168.0.1/24 !18
  • 19. Do They Belong To The Same Subnet? Q1: (a) 192.168.0.1/24 (b) 192.168.1.1/24 Q2: (a) 192.168.0.1/16 (b) 192.168.1.1/16 To identify the network address, we calculate “AND” of IP address and subnet mask. /24 means FF:FF:FF:00. The network addresses for each (a) and (b) are: (a) 192.168.0.0
 (b) 192.168.1.0
 Therefore, they DO NOT belong to the same subnet. To identify the network address, we calculate “AND” of IP address and subnet mask. /24 means FF:FF:00:00. The network addresses for each (a) and (b) are: (a) 192.168.0.0
 (b) 192.168.0.0
 Therefore, they DO belong to the same subnet. !19
  • 20. How Is An IP Packet Delivered? (1) ARP Request Who is 192.168.100.1? Node1 (Intel Card) 00:12:F0:00:00:01 192.168.100.100 (2) ARP Reply 00:05:9B:00:00:10 Node2 (Intel Card) 00:12:F0:00:00:10 192.168.100.101 Node3 (Cisco Port) 00:05:9B:00:00:10 192.168.100.1 (3) IP packet to 192.168.100.1
 MAC address 00:05:9B:00:00:10 !20
  • 22. !22
  • 23. IP – Travelling to Final Destination Germany Office Frankfurt Direct flight Indirect flight Singapore (Changi) Indirect flight Tokyo
 (Narita) My House !23
  • 24. IP – Travelling to Final Destination 192.168.100.1 R3 Route 1 (192.168.10.0/24) 192.168.11.0/24 R2 R1 192.168.12.0/24 192.168.0.1 !24
  • 25. Checking Routing Table " RRoouuttiinngg TTaabbllee:: IIPPvv44 DDeessttiinnaattiioonn GGaatteewwaayy FFllaaggss RReeff UUssee IInntteerrffaaccee ---------------------------------------- ---------------------------------------- ---------- ---------- -------------------- ------------------ ddeeffaauulltt 117722..2233..221100..225544 UUGG 55 88552244 iiggbb00 112277..00..00..11 112277..00..00..11 UUHH 66 118811334433 lloo00 117722..2233..221100..112288 117722..2233..221100..117777 UU 1100 664477771144 iiggbb00 119922..116688..2288..00 119922..116688..2288..11 UU 3322 1166118888664455 iippmmpp11 " RRoouuttiinngg TTaabbllee:: IIPPvv66 DDeessttiinnaattiioonn//MMaasskk GGaatteewwaayy FFllaaggss RReeff UUssee IIff ------------------------------------------------------ ------------------------------------------------------ ---------- ------ -------------- ---------- ::::11 ::::11 UUHH 22 220000 lloo00 •The default gateway is used when no other routes are available. •You have to look at the subnet mask as well. (Example in next page.) !25
  • 26. Routing Tables with Subnet Masks " RRoouuttiinngg TTaabbllee:: IIPPvv44 DDeessttiinnaattiioonn GGaatteewwaayy SSuubbnneettmmaasskk ---------------------------------------- ---------------------------------------- ---------------------------- 119922..116688..110000..11 119922..116688..110000..11 225555..225555..225555..00 119922..116688..110000..112299 119922..116688..110000..113300 225555..225555..225555..112288 •Routes with more bits in subnet mask have priority. •So if you would like to connect to 192.168.100.131, you take 192.168.100.130 because subnet mask is 25 bits. !26
  • 27. How Packet is Delivered Over a Router/L3 SW (1) ARP Request Who is 192.168.200.1? (2) ARP Reply MAC: 00:05:9B:00:00:10 R1 Eth0 00:05:9B:00:00:10 192.168.100.254 Node1
 00:12:F0:00:00:01 192.168.100.100 Node2 00:12:F0:00:00:10 192.168.100.101 (3) Packet to 192.168.200.1
 MAC :00:05:9B:00:00:10 (4) Packet to 192.168.200.1
 MAC :00:12:F0:00:00:10 R1 R1 Eth1 00:05:9B:00:00:11 192.168.200.254 Node3 00:12:F0:00:00:10 192.168.200.1 !27
  • 29. IB Partitioning PKEY:FFFF Subnet Manager (Internal/External) PKEY:8506 Node1 (PKEY: 8506) 10E00001328389 PKEY:8507 Node2 (PKEY:8506) 10E0000132838A Node3 (PKEY: 8507)
 10E0000132848C •IB fabric is divided into “partitions” like VLANs •We use PKEY instead of VLAN ID in IB partitioning. •PKEY: FFFF means “connect to any port on fabric.” •In the above example, Node 1 and 2 can talk, but not with node 3. •Oracle supports only “on-switch” subnet manager with ZFSSA. !29
  • 30. Checking IB Partitioning " --bbaasshh--44..11$$ mmoorree ddllaaddmm--sshhooww--iibb..oouutt LLIINNKK HHCCAAGGUUIIDD PPOORRTTGGUUIIDD PPOORRTT SSTTAATTEE PPKKEEYYSS iibbpp00 1100EE0000000011332288338888 1100EE0000000011332288338899 11 uupp FFFFFFFF,,88550033 iibbpp11 1100EE0000000011332288338888 1100EE00000000113322883388AA 22 uupp FFFFFFFF,,88550033 " --bbaasshh--44..11$$ mmoorree ddllaaddmm--sshhooww--ppaarrtt..oouutt LLIINNKK PPKKEEYY OOVVEERR SSTTAATTEE FFLLAAGGSS pp88550033__iibbpp00 88550033 iibbpp00 uupp ff------ pp88550033__iibbpp11 88550033 iibbpp11 uupp ff------ " --bbaasshh--44..11$$ mmoorree iiffccoonnffiigg--aa..oouutt lloo00:: ffllaaggss==22000011000000884499<<UUPP,,LLOOOOPPBBAACCKK,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,IIPPvv44,,VVIIRRTTUUAALL>> mmttuu 88223322 iinnddeexx 11 iinneett 112277..00..00..11 nneettmmaasskk ffff000000000000 pp88550033__iibbpp00:: ffllaaggss==99004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> mmttuu 6655552200 iinnddeexx 22 iinneett 00..00..00..00 nneettmmaasskk ffff000000000000 bbrrooaaddccaasstt 00..225555..225555..225555 ggrroouuppnnaammee iippmmpp11 iippiibb 8800::00::00::44aa::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::8899 pp88550033__iibbpp11:: ffllaaggss==6699004400884433<<UUPP,,BBRROOAADDCCAASSTT,,RRUUNNNNIINNGG,,MMUULLTTIICCAASSTT,,DDEEPPRREECCAATTEEDD,,IIPPvv44,,…>> mmttuu 6655552200 iinnddeexx 33 iinneett 00..00..00..00 nneettmmaasskk ffff000000000000 bbrrooaaddccaasstt 00..225555..225555..225555 ggrroouuppnnaammee iippmmpp11 iippiibb 8800::00::00::44bb::ffee::8800::00::00::00::00::00::00::00::1100::ee00::00::11::3322::8833::88aa !30
  • 31. References •Ethernet Frame
 < http://en.wikipedia.org/wiki/Ethernet_frame> •802.1Q
 < http://en.wikipedia.org/wiki/802.1Q> •ARP(Address Resolution Protocol) 
 < http://en.wikipedia.org/wiki/Address_Resolution_Protocol> •Subnetwork
 <http://en.wikipedia.org/wiki/Subnetwork> • !31