SlideShare a Scribd company logo
1 of 46
Learning the Basics of Ethernet Networking
2
Overview
 Team Introduction
 Introduction to Westermo
 Industrial Networking Introduction and Considerations
 Physical Layers
 How does Ethernet Handle Data?
 Switching and Layer 2
 Routing and Layer 3
 Firewalls
 Tying it all together
 Further Learning
3
Introductions
John Pavlos
Managing Director
john.pavlos@westermo.com
847-453-3898
Benjamin Campbell
Technical Support Engineer
benjamin.campbell@westermo.com
847.453.3896
4
Who is Westermo 2021
 Founded in 1975
 No. of employees: 250
 14% R&D
 Extensive IPR portfolio for key
technologies
 Recent Aquistions:
 Naretech Solutions AG – June 2019
 Virtual Access – November 2019
 Eltek – April 2021
 Flexible production with state of the
art process control
 Sales and support units in 12
countries, distributors in another 36
 Member of the Beijer Electronics
Group
5
Industrial Networking Introduction
 Operate on the “Edge”
 Likely interfaces with the core network
 Completely different considerations
 Environmental
 Noise
 Legacy Cabling
 Focuses on “LAN” type networking
 Many Physical Layers (Layer 1)
 MAC Addresses (Layer 2)
 IP Addresses (Layer 3)
 Firewalls (Layer 3 and 4)
6
 Tough Physical Environment
 Noisy Electromagnetic Environments
 Many Different Physical Mediums
 Fiber
 Multi-mode
 Single-mode
 Copper
 Cat 5 and better
 “Legacy” Copper
 Legacy Devices
 Serial Devices
 ISDN
 Dial-up
Industrial Networking Considerations
7
Tough Physical Environments
 Hot
 +70 c
 Cold
 -40 c
 Dusty
 No fans to pull in dirt
 Wet
 Environmental ratings as high as IP67
 Shock and Vibration
 “Core Networking” devices won’t cut it
 Requires devices designed to live in these places
8
Noisy Environments and Old Cables
 High levels of Electromagnetic Noise
 Extreme spikes
 High average noise (Noise Floor)
 Cables installed for legacy systems
 RS 232/422/485
 LonWorks
 New cables cost prohibitive
 Fiber or Cat 5,6,7 is rare
 Requires a “Media Conversion”
9
Physical Mediums
 Fiber optic is the best choice
 Expensive to install
 Relatively rare in brown field applications
 Cat 5,6,7
 Ethernet Compliant
 Legacy cabling
 Installed for legacy systems
 Non-Ethernet compliant
 Often not shielded
 Maybe twisted pair, maybe not (50/50)
 Coax
10
More Physical Mediums
 PLC
 Extreme environments
 Cable sharing
 Shorter Distances
 300 m
 Higher Speeds
 70 Mbit/s
 Wireless (WiFi)
 Only option sometimes
 Can be affected by high noise floors
 Media Conversions (Legacy Cables)
 SHDSL
 Long distances (15 km)
 High noise resilience
 Limited Speed
 15.3 Mbit/s
 30.6 Mbit/s with bonding
OSI Model and
Packetization
12
OSI Model Overview
• Stands for Open Systems Interconnection Model.
• Consists of 7 layers that explains how data
interchange occurs.
• Layers are named based on what they manage, with
each layer working with a different form of data.
• Each layer only interacts with the layers immediately
above and below it.
13
Physical and Data Link Layers
Layers 1 and 2
• The Physical Layer refers to the physical medium through which data communication occurs.
• Includes Copper, Fiber, even Air as a wireless medium.
• Focuses on the conversion of binary 1 and 0s (bits) into a signal.
• Outlines the method for node-to-node data transfer, a link over which data is transferred.
• The layer establishes and terminates connections between two physically connected devices.
• MAC Addresses are assigned at this layer, with any physical Network Interface Card (NIC) receiving a
standardized MAC address for all communications.
14
Network and Transport Layers
Layers 3 and 4
• The Network Layer provides the means to transfer packets from one node to another, located in different
networks.
• Assigns a logical address of nodes (IP Address).
• Path determination, or Routing is enforced. Many protocols were created to cover many different network types.
• Transport layer covers how to transfer data from source to host while maintaining the Quality of Service (QoS).
• Reliability is maintained through flow control and error checking.
• Acknowledges failures in sent data and resend lost packets to ensure communications are not lost.
• Firewalls exist between layers 3 and 4.
15
The Application Layers
Layers 5 through 7
• The top 3 layers are referred to as the “Application Layers”.
• Application is the highest layer in the OSI model, and the
layer closest to the end user. This layer interacts directly
with the software applications.
• The Presentation layer works between the Application and
Session layers to translate between data the application
uses, to data that can span the network.
• The Session Layer manages connections between
computers. This layer establishes and terminates
connections between applications.
16
Packetization
BITS
DATA
DATA
DATA
SEGMENT
PACKET
FRAME
DATA
DATA
DATA
SEGMENT
PACKET
FRAME
DATA
DATA
APPLICATION
HEADER
DATA
APPLICATION
HEADER
DATA
APPLICATION
HEADER
APPLICATION DATA
TCP
HEADER
APPLICATION DATA
TCP
HEADER
IP
HEADER
APPLICATION DATA
TCP
HEADER
IP
HEADER
ETHERNET
HEADER
ETHERNET
FOOTER
01110111 01100101 01110011 01110100 01100101 01110010 01101101 01101111
Layer 2 Switching
Concepts
19
Introduction To Network Switching
 In network communications, traffic between nodes can result in collisions of packets,
rendering information useless.
 Hubs expand these collision domains, adding more chances of mangled packets.
 Switches segment the collision domain between the node and the switch by directing
traffic to only go to the intended recipient rather than over broadcast.
 All data is sent through “Frames”, which list the Source and Destination MAC Address.
Switches learn the MAC Addresses of the connected nodes.
 VLANs can be implemented to add security and further segment a network in Layer 2
Switching.
 Protocols such as Spanning Tree Protocol and FRNT add redundancy to switched
networks while avoiding broadcast storms.
20
Hub vs Switch
A
D
B
C
• With a Hub, all traffic is broadcasted (sent to all
connected nodes) regardless of destination.
21
Hub vs Switch
A
D
B
C
• The Switch only sends traffic to the intended recipient
based on information in the Frame.
22
Switching and Frames
 In a Layer 2 Environment, all data is sent in the form of Frames.
 Frames are a type of data transmission unit containing a single network packet.
Destination
Address
Source
Address
VLAN Tag Type Data FCS
• Destination Address: The physical address of where the frame is going.
• Source Address: The physical address of where the frame came from.
• VLAN Tag: Information that specifies what VLAN the frame belongs to.
• Type: Specifies the protocol type of network, typically Ethernet.
• Data: The payload including all the data and information requested.
• FCS: Frame Check Sequence, or error checking.
23
MAC Addresses
 Media Access Control Address is a unique identifier assigned to every Network Interface
Controller.
 Also known as a “Physical Address” or “Ethernet Hardware Address"
 6 pairs of hexadecimal values or Octets, separated by “ : ”
 Made up of 2 parts: OUI and NIC Specific
 OUI (Organizationally Unique Identifier) is first 3 octets of MAC Address
 Denotes a manufacturer of NIC or node
 NIC Specific are remaining 3 octets that are a unique number given to each device.
EC:B1:D7:9A:E9:D2
OUI NIC Specific
24
MAC Address Table
 Switches automatically build tables assigning MAC addresses to ports.
 When a frame is received it holds the Source MAC address.
 The switch then assigns the port the frame came through to that MAC address.
 Also uses the VLAN Tag portion of the frame to assign the VLAN the port belongs to.
VLAN MAC Address Port
1
1
10
10
00:07:91:21:23:8C
00:12:9E:5C:EE:D7
00:1D:9D:5D:37:55
00:20:2E:3B:24:76
Fa0/1
Fa0/2
Fa0/3
Fa0/4
25
VLANs
 VLAN, or Virtual LAN, or Virtual Local Area Network segments a single broadcast domain.
 Several physical devices can all share the same network while being separated by VLAN
software controls.
 “Pipes inside a pipe”
 Adds security, performance, and can organize a complex network.
 Frames are tagged with a VLAN ID to define what VLAN they belong to.
 VLANs can be configured to apply to either a physical port on the switch (Static VLAN) or
to all traffic coming from a specific MAC address (Dynamic VLAN).
26
VLANs
27
Layer 2 Redundancy
 When learning MAC Addresses, a switch broadcasts all traffic for the first time.
 These broadcasts can propagate and flood the network in a “Broadcast Storm” when a
loop is made between multiple switches.
 Protocols exist such as Spanning Tree Protocol (STP) and Fast Reconfiguration of Network
Topology (FRNT) that automatically disable a link to prevent Broadcast Storms and only
enable it when another link is detected to go down.
 In networks without these protocols configured, it’s very important to avoid looping the
network.
28
Broadcast Storm
29
Broadcast Storm
30
Broadcast Storm
31
Broadcast Storm
32
Broadcast Storm
33
FRNT
34
FRNT
Layer 3 Routing Concepts
36
Overview
 IP Addressing, Subnets and Ports
 Basics of Routing
 Firewalls
 Tying it all together
 Address Resolution Protocol (ARP)
37
IP Addressing
 IP Addresses
 Not burned into the hardware
 Divided into 4 octets
 Required for any IP routing functions
 IPv4 still most common in industrial
 IPv6 becoming more common in core networks
 Private vs. Public Addresses
 192.168.0.0 – 192.168.255.255
 172.16.0.0 – 172.31.255.255
 10.0.0.0/8 – 10.255.255.255
38
Subnetting
 Defined by a Subnet Mask
 32 bit number like an IP Address
 Used to logically divide IP Networks
 Segregates a physical network into smaller logical subnetworks
 A “filter” of sorts
 Helps a device determine if the host it wishes to reach is in the same
network
 Controls how many hosts can be on a network
 Requires a router to communicate across subnets
39
Ports
 The “room number” at the hotel
 Paired with an IP Address
 192.168.1.1:80
 Many network applications running on the same computer
 Each application would be “bound” to a port
 Web Server : 80
 SSH : 22
 FTP : 21
40
Routing Basics
 Allows communications between subnets or VLANs
 Device 1 wants to talk to Device 2
 Device 1 will calculate that Device 2’s IP address is outside of its subnet.
 Device 1, who’s default gateway is the router, sends the packet to the router.
 The router will realize that Device 2 lives on VLAN2 and will route the packet to Device 2 on that
subnet.
 If the communications are 2 way, the exact same thing happens in reverse from Device 2.
Device 1
192.168.0.100
255.255.255.0
Device 2
10.2.1.50
255.0.0.0
VLAN1 VLAN2
VLAN1: 192.168.0.1
VLAN2: 10.0.0.1
41
Firewalls
 Controls what data can enter or leave a network
 Work on a “deny by default” policy
 Only traffic that is explicitly allowed is passed thru the firewall
 Different kinds
 Port Based
 Port 80 is allowed in
 Host Based
 10.0.1.2 is allowed
 10.0.0.0/24 is allowed
 Deep Packet Inspection
 Looks at the data in a packet
 Requires a lot of “horsepower”
 Generally standalone appliance
42
Address Resolution Protocol
 The glue that ties Layer 2 to 3
 “Links” a MAC Address to an IP
 Switches, Routers, Computers all rely on this. Any network device.
 Expire after some time. Different from operating system to operating system.
 Cleared after reboot.
When a device wants to send a message to a device that it’s never talked to, it will only
have it’s IP address. The device will send a layer 2 message to all devices asking, “who as IP
Address aaa.bbb.ccc.ddd”. If a device has that IP it will respond saying “IP Address
aaa.bbb.ccc.ddd is at MAC Address eee.fff.ggg.hhh”.
Further Learning
44
44
Westermo Certified Training
 Introduction to IP
 Introduction to WeOS
 Certified Engineer Switching
 Certified Engineer Routing
 Also Available Customer Tailored Training
https://www.westermo.us/support/academy
45
45
Further Webinars
 Redundant and Resilient Networks with Microsegmentation
 Presentation in June
 Focusing on Cybersecurity and how to configure and install a
secure network from the ground up
 Redundancy protocols, how they work, as well as VPNs and other
services
 We look forward to seeing you there!
46

More Related Content

What's hot

SELTA Access Network Portfolio
SELTA Access Network PortfolioSELTA Access Network Portfolio
SELTA Access Network PortfolioSELTA
 
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)bsidesaugusta
 
ComNet NWK3 Data Sheet
ComNet NWK3 Data SheetComNet NWK3 Data Sheet
ComNet NWK3 Data SheetJMAC Supply
 
ComNet NWK1 Data Sheet
ComNet NWK1 Data SheetComNet NWK1 Data Sheet
ComNet NWK1 Data SheetJMAC Supply
 
Copper cables an alternative to fibre - Extending Industrial Ethernet
Copper cables an alternative to fibre - Extending Industrial EthernetCopper cables an alternative to fibre - Extending Industrial Ethernet
Copper cables an alternative to fibre - Extending Industrial EthernetWestermo Network Technologies
 
Siemens & TPP Collaboration
Siemens & TPP CollaborationSiemens & TPP Collaboration
Siemens & TPP Collaborationtelemetria
 

What's hot (20)

Westermo solutions for trackside networks
Westermo solutions for trackside networksWestermo solutions for trackside networks
Westermo solutions for trackside networks
 
Profibus commissioning and maintenance - Richard Needham
Profibus commissioning and maintenance - Richard NeedhamProfibus commissioning and maintenance - Richard Needham
Profibus commissioning and maintenance - Richard Needham
 
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter ThomasPROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter Thomas
 
IO-Link technology - Adrian Sorsby
IO-Link technology - Adrian SorsbyIO-Link technology - Adrian Sorsby
IO-Link technology - Adrian Sorsby
 
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and TestingPI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
 
Zigbee 802-15-4
Zigbee 802-15-4Zigbee 802-15-4
Zigbee 802-15-4
 
SELTA Access Network Portfolio
SELTA Access Network PortfolioSELTA Access Network Portfolio
SELTA Access Network Portfolio
 
PI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APLPI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APL
 
C1 profinet design, pete brown
C1 profinet design, pete brownC1 profinet design, pete brown
C1 profinet design, pete brown
 
Profinet network design webinar - Peter Thomas may 2020 - v1.0
Profinet network design webinar - Peter Thomas   may 2020 - v1.0Profinet network design webinar - Peter Thomas   may 2020 - v1.0
Profinet network design webinar - Peter Thomas may 2020 - v1.0
 
PI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET GatewaysPI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET Gateways
 
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
 
Profinet implementation and testing - Dave Tomlin and Xing Ye
Profinet implementation and testing - Dave Tomlin and Xing YeProfinet implementation and testing - Dave Tomlin and Xing Ye
Profinet implementation and testing - Dave Tomlin and Xing Ye
 
ComNet NWK3 Data Sheet
ComNet NWK3 Data SheetComNet NWK3 Data Sheet
ComNet NWK3 Data Sheet
 
Ap6562 ss
Ap6562 ssAp6562 ss
Ap6562 ss
 
ComNet NWK1 Data Sheet
ComNet NWK1 Data SheetComNet NWK1 Data Sheet
ComNet NWK1 Data Sheet
 
Profinet in process automation - Peter Brown
Profinet in process automation - Peter BrownProfinet in process automation - Peter Brown
Profinet in process automation - Peter Brown
 
Copper cables an alternative to fibre - Extending Industrial Ethernet
Copper cables an alternative to fibre - Extending Industrial EthernetCopper cables an alternative to fibre - Extending Industrial Ethernet
Copper cables an alternative to fibre - Extending Industrial Ethernet
 
10. IO-Link technology - russell smith
10. IO-Link technology - russell smith10. IO-Link technology - russell smith
10. IO-Link technology - russell smith
 
Siemens & TPP Collaboration
Siemens & TPP CollaborationSiemens & TPP Collaboration
Siemens & TPP Collaboration
 

Similar to Learn Ethernet Networking Basics

Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 

Similar to Learn Ethernet Networking Basics (20)

Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 

More from Westermo Network Technologies

450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
450 MHz – Das neue Medium in OT-Netzwerken der EnergiewirtschaftWestermo Network Technologies
 

More from Westermo Network Technologies (20)

Westermo Technologie Webinar WeOS4 und WeOS5
Westermo Technologie Webinar WeOS4 und WeOS5Westermo Technologie Webinar WeOS4 und WeOS5
Westermo Technologie Webinar WeOS4 und WeOS5
 
Westermo Webinar - Geroutete Redundanzen
Westermo Webinar - Geroutete RedundanzenWestermo Webinar - Geroutete Redundanzen
Westermo Webinar - Geroutete Redundanzen
 
Webinar - WeOS 4.33.0 und WeConfig 1.19.0.pdf
Webinar - WeOS 4.33.0 und WeConfig 1.19.0.pdfWebinar - WeOS 4.33.0 und WeConfig 1.19.0.pdf
Webinar - WeOS 4.33.0 und WeConfig 1.19.0.pdf
 
Webinar WeConfig - State of the Art NCM
Webinar WeConfig - State of the Art NCMWebinar WeConfig - State of the Art NCM
Webinar WeConfig - State of the Art NCM
 
Webinar Serial-over-IP
Webinar Serial-over-IPWebinar Serial-over-IP
Webinar Serial-over-IP
 
Webinar - Protokollkonvertierung
Webinar - ProtokollkonvertierungWebinar - Protokollkonvertierung
Webinar - Protokollkonvertierung
 
OpenWRT - Überblick
OpenWRT - ÜberblickOpenWRT - Überblick
OpenWRT - Überblick
 
DHCP
DHCPDHCP
DHCP
 
Switchkonfiguration
SwitchkonfigurationSwitchkonfiguration
Switchkonfiguration
 
PoE & Lösungen.pdf
PoE & Lösungen.pdfPoE & Lösungen.pdf
PoE & Lösungen.pdf
 
VPN&Verschlüsselung
VPN&VerschlüsselungVPN&Verschlüsselung
VPN&Verschlüsselung
 
Mobilfunkanbindungen
MobilfunkanbindungenMobilfunkanbindungen
Mobilfunkanbindungen
 
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
 
Netzwerkmonitoring.pdf
Netzwerkmonitoring.pdfNetzwerkmonitoring.pdf
Netzwerkmonitoring.pdf
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
WeOS 4.32.0 und WeConfig 1.15.pdf
WeOS 4.32.0 und WeConfig 1.15.pdfWeOS 4.32.0 und WeConfig 1.15.pdf
WeOS 4.32.0 und WeConfig 1.15.pdf
 
WLAN
WLANWLAN
WLAN
 
Merlin - Die neue Mobilfunkrouterserie
Merlin - Die neue MobilfunkrouterserieMerlin - Die neue Mobilfunkrouterserie
Merlin - Die neue Mobilfunkrouterserie
 
We os 4.31.0 und weconfig 1.14.0
We os 4.31.0 und weconfig 1.14.0We os 4.31.0 und weconfig 1.14.0
We os 4.31.0 und weconfig 1.14.0
 
Layer 2 Redundanzen
Layer 2 RedundanzenLayer 2 Redundanzen
Layer 2 Redundanzen
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Learn Ethernet Networking Basics

  • 1. Learning the Basics of Ethernet Networking
  • 2. 2 Overview  Team Introduction  Introduction to Westermo  Industrial Networking Introduction and Considerations  Physical Layers  How does Ethernet Handle Data?  Switching and Layer 2  Routing and Layer 3  Firewalls  Tying it all together  Further Learning
  • 3. 3 Introductions John Pavlos Managing Director john.pavlos@westermo.com 847-453-3898 Benjamin Campbell Technical Support Engineer benjamin.campbell@westermo.com 847.453.3896
  • 4. 4 Who is Westermo 2021  Founded in 1975  No. of employees: 250  14% R&D  Extensive IPR portfolio for key technologies  Recent Aquistions:  Naretech Solutions AG – June 2019  Virtual Access – November 2019  Eltek – April 2021  Flexible production with state of the art process control  Sales and support units in 12 countries, distributors in another 36  Member of the Beijer Electronics Group
  • 5. 5 Industrial Networking Introduction  Operate on the “Edge”  Likely interfaces with the core network  Completely different considerations  Environmental  Noise  Legacy Cabling  Focuses on “LAN” type networking  Many Physical Layers (Layer 1)  MAC Addresses (Layer 2)  IP Addresses (Layer 3)  Firewalls (Layer 3 and 4)
  • 6. 6  Tough Physical Environment  Noisy Electromagnetic Environments  Many Different Physical Mediums  Fiber  Multi-mode  Single-mode  Copper  Cat 5 and better  “Legacy” Copper  Legacy Devices  Serial Devices  ISDN  Dial-up Industrial Networking Considerations
  • 7. 7 Tough Physical Environments  Hot  +70 c  Cold  -40 c  Dusty  No fans to pull in dirt  Wet  Environmental ratings as high as IP67  Shock and Vibration  “Core Networking” devices won’t cut it  Requires devices designed to live in these places
  • 8. 8 Noisy Environments and Old Cables  High levels of Electromagnetic Noise  Extreme spikes  High average noise (Noise Floor)  Cables installed for legacy systems  RS 232/422/485  LonWorks  New cables cost prohibitive  Fiber or Cat 5,6,7 is rare  Requires a “Media Conversion”
  • 9. 9 Physical Mediums  Fiber optic is the best choice  Expensive to install  Relatively rare in brown field applications  Cat 5,6,7  Ethernet Compliant  Legacy cabling  Installed for legacy systems  Non-Ethernet compliant  Often not shielded  Maybe twisted pair, maybe not (50/50)  Coax
  • 10. 10 More Physical Mediums  PLC  Extreme environments  Cable sharing  Shorter Distances  300 m  Higher Speeds  70 Mbit/s  Wireless (WiFi)  Only option sometimes  Can be affected by high noise floors  Media Conversions (Legacy Cables)  SHDSL  Long distances (15 km)  High noise resilience  Limited Speed  15.3 Mbit/s  30.6 Mbit/s with bonding
  • 12. 12 OSI Model Overview • Stands for Open Systems Interconnection Model. • Consists of 7 layers that explains how data interchange occurs. • Layers are named based on what they manage, with each layer working with a different form of data. • Each layer only interacts with the layers immediately above and below it.
  • 13. 13 Physical and Data Link Layers Layers 1 and 2 • The Physical Layer refers to the physical medium through which data communication occurs. • Includes Copper, Fiber, even Air as a wireless medium. • Focuses on the conversion of binary 1 and 0s (bits) into a signal. • Outlines the method for node-to-node data transfer, a link over which data is transferred. • The layer establishes and terminates connections between two physically connected devices. • MAC Addresses are assigned at this layer, with any physical Network Interface Card (NIC) receiving a standardized MAC address for all communications.
  • 14. 14 Network and Transport Layers Layers 3 and 4 • The Network Layer provides the means to transfer packets from one node to another, located in different networks. • Assigns a logical address of nodes (IP Address). • Path determination, or Routing is enforced. Many protocols were created to cover many different network types. • Transport layer covers how to transfer data from source to host while maintaining the Quality of Service (QoS). • Reliability is maintained through flow control and error checking. • Acknowledges failures in sent data and resend lost packets to ensure communications are not lost. • Firewalls exist between layers 3 and 4.
  • 15. 15 The Application Layers Layers 5 through 7 • The top 3 layers are referred to as the “Application Layers”. • Application is the highest layer in the OSI model, and the layer closest to the end user. This layer interacts directly with the software applications. • The Presentation layer works between the Application and Session layers to translate between data the application uses, to data that can span the network. • The Session Layer manages connections between computers. This layer establishes and terminates connections between applications.
  • 17. DATA DATA APPLICATION HEADER DATA APPLICATION HEADER DATA APPLICATION HEADER APPLICATION DATA TCP HEADER APPLICATION DATA TCP HEADER IP HEADER APPLICATION DATA TCP HEADER IP HEADER ETHERNET HEADER ETHERNET FOOTER 01110111 01100101 01110011 01110100 01100101 01110010 01101101 01101111
  • 19. 19 Introduction To Network Switching  In network communications, traffic between nodes can result in collisions of packets, rendering information useless.  Hubs expand these collision domains, adding more chances of mangled packets.  Switches segment the collision domain between the node and the switch by directing traffic to only go to the intended recipient rather than over broadcast.  All data is sent through “Frames”, which list the Source and Destination MAC Address. Switches learn the MAC Addresses of the connected nodes.  VLANs can be implemented to add security and further segment a network in Layer 2 Switching.  Protocols such as Spanning Tree Protocol and FRNT add redundancy to switched networks while avoiding broadcast storms.
  • 20. 20 Hub vs Switch A D B C • With a Hub, all traffic is broadcasted (sent to all connected nodes) regardless of destination.
  • 21. 21 Hub vs Switch A D B C • The Switch only sends traffic to the intended recipient based on information in the Frame.
  • 22. 22 Switching and Frames  In a Layer 2 Environment, all data is sent in the form of Frames.  Frames are a type of data transmission unit containing a single network packet. Destination Address Source Address VLAN Tag Type Data FCS • Destination Address: The physical address of where the frame is going. • Source Address: The physical address of where the frame came from. • VLAN Tag: Information that specifies what VLAN the frame belongs to. • Type: Specifies the protocol type of network, typically Ethernet. • Data: The payload including all the data and information requested. • FCS: Frame Check Sequence, or error checking.
  • 23. 23 MAC Addresses  Media Access Control Address is a unique identifier assigned to every Network Interface Controller.  Also known as a “Physical Address” or “Ethernet Hardware Address"  6 pairs of hexadecimal values or Octets, separated by “ : ”  Made up of 2 parts: OUI and NIC Specific  OUI (Organizationally Unique Identifier) is first 3 octets of MAC Address  Denotes a manufacturer of NIC or node  NIC Specific are remaining 3 octets that are a unique number given to each device. EC:B1:D7:9A:E9:D2 OUI NIC Specific
  • 24. 24 MAC Address Table  Switches automatically build tables assigning MAC addresses to ports.  When a frame is received it holds the Source MAC address.  The switch then assigns the port the frame came through to that MAC address.  Also uses the VLAN Tag portion of the frame to assign the VLAN the port belongs to. VLAN MAC Address Port 1 1 10 10 00:07:91:21:23:8C 00:12:9E:5C:EE:D7 00:1D:9D:5D:37:55 00:20:2E:3B:24:76 Fa0/1 Fa0/2 Fa0/3 Fa0/4
  • 25. 25 VLANs  VLAN, or Virtual LAN, or Virtual Local Area Network segments a single broadcast domain.  Several physical devices can all share the same network while being separated by VLAN software controls.  “Pipes inside a pipe”  Adds security, performance, and can organize a complex network.  Frames are tagged with a VLAN ID to define what VLAN they belong to.  VLANs can be configured to apply to either a physical port on the switch (Static VLAN) or to all traffic coming from a specific MAC address (Dynamic VLAN).
  • 27. 27 Layer 2 Redundancy  When learning MAC Addresses, a switch broadcasts all traffic for the first time.  These broadcasts can propagate and flood the network in a “Broadcast Storm” when a loop is made between multiple switches.  Protocols exist such as Spanning Tree Protocol (STP) and Fast Reconfiguration of Network Topology (FRNT) that automatically disable a link to prevent Broadcast Storms and only enable it when another link is detected to go down.  In networks without these protocols configured, it’s very important to avoid looping the network.
  • 35. Layer 3 Routing Concepts
  • 36. 36 Overview  IP Addressing, Subnets and Ports  Basics of Routing  Firewalls  Tying it all together  Address Resolution Protocol (ARP)
  • 37. 37 IP Addressing  IP Addresses  Not burned into the hardware  Divided into 4 octets  Required for any IP routing functions  IPv4 still most common in industrial  IPv6 becoming more common in core networks  Private vs. Public Addresses  192.168.0.0 – 192.168.255.255  172.16.0.0 – 172.31.255.255  10.0.0.0/8 – 10.255.255.255
  • 38. 38 Subnetting  Defined by a Subnet Mask  32 bit number like an IP Address  Used to logically divide IP Networks  Segregates a physical network into smaller logical subnetworks  A “filter” of sorts  Helps a device determine if the host it wishes to reach is in the same network  Controls how many hosts can be on a network  Requires a router to communicate across subnets
  • 39. 39 Ports  The “room number” at the hotel  Paired with an IP Address  192.168.1.1:80  Many network applications running on the same computer  Each application would be “bound” to a port  Web Server : 80  SSH : 22  FTP : 21
  • 40. 40 Routing Basics  Allows communications between subnets or VLANs  Device 1 wants to talk to Device 2  Device 1 will calculate that Device 2’s IP address is outside of its subnet.  Device 1, who’s default gateway is the router, sends the packet to the router.  The router will realize that Device 2 lives on VLAN2 and will route the packet to Device 2 on that subnet.  If the communications are 2 way, the exact same thing happens in reverse from Device 2. Device 1 192.168.0.100 255.255.255.0 Device 2 10.2.1.50 255.0.0.0 VLAN1 VLAN2 VLAN1: 192.168.0.1 VLAN2: 10.0.0.1
  • 41. 41 Firewalls  Controls what data can enter or leave a network  Work on a “deny by default” policy  Only traffic that is explicitly allowed is passed thru the firewall  Different kinds  Port Based  Port 80 is allowed in  Host Based  10.0.1.2 is allowed  10.0.0.0/24 is allowed  Deep Packet Inspection  Looks at the data in a packet  Requires a lot of “horsepower”  Generally standalone appliance
  • 42. 42 Address Resolution Protocol  The glue that ties Layer 2 to 3  “Links” a MAC Address to an IP  Switches, Routers, Computers all rely on this. Any network device.  Expire after some time. Different from operating system to operating system.  Cleared after reboot. When a device wants to send a message to a device that it’s never talked to, it will only have it’s IP address. The device will send a layer 2 message to all devices asking, “who as IP Address aaa.bbb.ccc.ddd”. If a device has that IP it will respond saying “IP Address aaa.bbb.ccc.ddd is at MAC Address eee.fff.ggg.hhh”.
  • 44. 44 44 Westermo Certified Training  Introduction to IP  Introduction to WeOS  Certified Engineer Switching  Certified Engineer Routing  Also Available Customer Tailored Training https://www.westermo.us/support/academy
  • 45. 45 45 Further Webinars  Redundant and Resilient Networks with Microsegmentation  Presentation in June  Focusing on Cybersecurity and how to configure and install a secure network from the ground up  Redundancy protocols, how they work, as well as VPNs and other services  We look forward to seeing you there!
  • 46. 46