SlideShare a Scribd company logo
Learning the Basics of Ethernet Networking
2
Overview
 Team Introduction
 Introduction to Westermo
 Industrial Networking Introduction and Considerations
 Physical Layers
 How does Ethernet Handle Data?
 Switching and Layer 2
 Routing and Layer 3
 Firewalls
 Tying it all together
 Further Learning
3
Introductions
John Pavlos
Managing Director
john.pavlos@westermo.com
847-453-3898
Benjamin Campbell
Technical Support Engineer
benjamin.campbell@westermo.com
847.453.3896
4
Who is Westermo 2021
 Founded in 1975
 No. of employees: 250
 14% R&D
 Extensive IPR portfolio for key
technologies
 Recent Aquistions:
 Naretech Solutions AG – June 2019
 Virtual Access – November 2019
 Eltek – April 2021
 Flexible production with state of the
art process control
 Sales and support units in 12
countries, distributors in another 36
 Member of the Beijer Electronics
Group
5
Industrial Networking Introduction
 Operate on the “Edge”
 Likely interfaces with the core network
 Completely different considerations
 Environmental
 Noise
 Legacy Cabling
 Focuses on “LAN” type networking
 Many Physical Layers (Layer 1)
 MAC Addresses (Layer 2)
 IP Addresses (Layer 3)
 Firewalls (Layer 3 and 4)
6
 Tough Physical Environment
 Noisy Electromagnetic Environments
 Many Different Physical Mediums
 Fiber
 Multi-mode
 Single-mode
 Copper
 Cat 5 and better
 “Legacy” Copper
 Legacy Devices
 Serial Devices
 ISDN
 Dial-up
Industrial Networking Considerations
7
Tough Physical Environments
 Hot
 +70 c
 Cold
 -40 c
 Dusty
 No fans to pull in dirt
 Wet
 Environmental ratings as high as IP67
 Shock and Vibration
 “Core Networking” devices won’t cut it
 Requires devices designed to live in these places
8
Noisy Environments and Old Cables
 High levels of Electromagnetic Noise
 Extreme spikes
 High average noise (Noise Floor)
 Cables installed for legacy systems
 RS 232/422/485
 LonWorks
 New cables cost prohibitive
 Fiber or Cat 5,6,7 is rare
 Requires a “Media Conversion”
9
Physical Mediums
 Fiber optic is the best choice
 Expensive to install
 Relatively rare in brown field applications
 Cat 5,6,7
 Ethernet Compliant
 Legacy cabling
 Installed for legacy systems
 Non-Ethernet compliant
 Often not shielded
 Maybe twisted pair, maybe not (50/50)
 Coax
10
More Physical Mediums
 PLC
 Extreme environments
 Cable sharing
 Shorter Distances
 300 m
 Higher Speeds
 70 Mbit/s
 Wireless (WiFi)
 Only option sometimes
 Can be affected by high noise floors
 Media Conversions (Legacy Cables)
 SHDSL
 Long distances (15 km)
 High noise resilience
 Limited Speed
 15.3 Mbit/s
 30.6 Mbit/s with bonding
OSI Model and
Packetization
12
OSI Model Overview
• Stands for Open Systems Interconnection Model.
• Consists of 7 layers that explains how data
interchange occurs.
• Layers are named based on what they manage, with
each layer working with a different form of data.
• Each layer only interacts with the layers immediately
above and below it.
13
Physical and Data Link Layers
Layers 1 and 2
• The Physical Layer refers to the physical medium through which data communication occurs.
• Includes Copper, Fiber, even Air as a wireless medium.
• Focuses on the conversion of binary 1 and 0s (bits) into a signal.
• Outlines the method for node-to-node data transfer, a link over which data is transferred.
• The layer establishes and terminates connections between two physically connected devices.
• MAC Addresses are assigned at this layer, with any physical Network Interface Card (NIC) receiving a
standardized MAC address for all communications.
14
Network and Transport Layers
Layers 3 and 4
• The Network Layer provides the means to transfer packets from one node to another, located in different
networks.
• Assigns a logical address of nodes (IP Address).
• Path determination, or Routing is enforced. Many protocols were created to cover many different network types.
• Transport layer covers how to transfer data from source to host while maintaining the Quality of Service (QoS).
• Reliability is maintained through flow control and error checking.
• Acknowledges failures in sent data and resend lost packets to ensure communications are not lost.
• Firewalls exist between layers 3 and 4.
15
The Application Layers
Layers 5 through 7
• The top 3 layers are referred to as the “Application Layers”.
• Application is the highest layer in the OSI model, and the
layer closest to the end user. This layer interacts directly
with the software applications.
• The Presentation layer works between the Application and
Session layers to translate between data the application
uses, to data that can span the network.
• The Session Layer manages connections between
computers. This layer establishes and terminates
connections between applications.
16
Packetization
BITS
DATA
DATA
DATA
SEGMENT
PACKET
FRAME
DATA
DATA
DATA
SEGMENT
PACKET
FRAME
DATA
DATA
APPLICATION
HEADER
DATA
APPLICATION
HEADER
DATA
APPLICATION
HEADER
APPLICATION DATA
TCP
HEADER
APPLICATION DATA
TCP
HEADER
IP
HEADER
APPLICATION DATA
TCP
HEADER
IP
HEADER
ETHERNET
HEADER
ETHERNET
FOOTER
01110111 01100101 01110011 01110100 01100101 01110010 01101101 01101111
Layer 2 Switching
Concepts
19
Introduction To Network Switching
 In network communications, traffic between nodes can result in collisions of packets,
rendering information useless.
 Hubs expand these collision domains, adding more chances of mangled packets.
 Switches segment the collision domain between the node and the switch by directing
traffic to only go to the intended recipient rather than over broadcast.
 All data is sent through “Frames”, which list the Source and Destination MAC Address.
Switches learn the MAC Addresses of the connected nodes.
 VLANs can be implemented to add security and further segment a network in Layer 2
Switching.
 Protocols such as Spanning Tree Protocol and FRNT add redundancy to switched
networks while avoiding broadcast storms.
20
Hub vs Switch
A
D
B
C
• With a Hub, all traffic is broadcasted (sent to all
connected nodes) regardless of destination.
21
Hub vs Switch
A
D
B
C
• The Switch only sends traffic to the intended recipient
based on information in the Frame.
22
Switching and Frames
 In a Layer 2 Environment, all data is sent in the form of Frames.
 Frames are a type of data transmission unit containing a single network packet.
Destination
Address
Source
Address
VLAN Tag Type Data FCS
• Destination Address: The physical address of where the frame is going.
• Source Address: The physical address of where the frame came from.
• VLAN Tag: Information that specifies what VLAN the frame belongs to.
• Type: Specifies the protocol type of network, typically Ethernet.
• Data: The payload including all the data and information requested.
• FCS: Frame Check Sequence, or error checking.
23
MAC Addresses
 Media Access Control Address is a unique identifier assigned to every Network Interface
Controller.
 Also known as a “Physical Address” or “Ethernet Hardware Address"
 6 pairs of hexadecimal values or Octets, separated by “ : ”
 Made up of 2 parts: OUI and NIC Specific
 OUI (Organizationally Unique Identifier) is first 3 octets of MAC Address
 Denotes a manufacturer of NIC or node
 NIC Specific are remaining 3 octets that are a unique number given to each device.
EC:B1:D7:9A:E9:D2
OUI NIC Specific
24
MAC Address Table
 Switches automatically build tables assigning MAC addresses to ports.
 When a frame is received it holds the Source MAC address.
 The switch then assigns the port the frame came through to that MAC address.
 Also uses the VLAN Tag portion of the frame to assign the VLAN the port belongs to.
VLAN MAC Address Port
1
1
10
10
00:07:91:21:23:8C
00:12:9E:5C:EE:D7
00:1D:9D:5D:37:55
00:20:2E:3B:24:76
Fa0/1
Fa0/2
Fa0/3
Fa0/4
25
VLANs
 VLAN, or Virtual LAN, or Virtual Local Area Network segments a single broadcast domain.
 Several physical devices can all share the same network while being separated by VLAN
software controls.
 “Pipes inside a pipe”
 Adds security, performance, and can organize a complex network.
 Frames are tagged with a VLAN ID to define what VLAN they belong to.
 VLANs can be configured to apply to either a physical port on the switch (Static VLAN) or
to all traffic coming from a specific MAC address (Dynamic VLAN).
26
VLANs
27
Layer 2 Redundancy
 When learning MAC Addresses, a switch broadcasts all traffic for the first time.
 These broadcasts can propagate and flood the network in a “Broadcast Storm” when a
loop is made between multiple switches.
 Protocols exist such as Spanning Tree Protocol (STP) and Fast Reconfiguration of Network
Topology (FRNT) that automatically disable a link to prevent Broadcast Storms and only
enable it when another link is detected to go down.
 In networks without these protocols configured, it’s very important to avoid looping the
network.
28
Broadcast Storm
29
Broadcast Storm
30
Broadcast Storm
31
Broadcast Storm
32
Broadcast Storm
33
FRNT
34
FRNT
Layer 3 Routing Concepts
36
Overview
 IP Addressing, Subnets and Ports
 Basics of Routing
 Firewalls
 Tying it all together
 Address Resolution Protocol (ARP)
37
IP Addressing
 IP Addresses
 Not burned into the hardware
 Divided into 4 octets
 Required for any IP routing functions
 IPv4 still most common in industrial
 IPv6 becoming more common in core networks
 Private vs. Public Addresses
 192.168.0.0 – 192.168.255.255
 172.16.0.0 – 172.31.255.255
 10.0.0.0/8 – 10.255.255.255
38
Subnetting
 Defined by a Subnet Mask
 32 bit number like an IP Address
 Used to logically divide IP Networks
 Segregates a physical network into smaller logical subnetworks
 A “filter” of sorts
 Helps a device determine if the host it wishes to reach is in the same
network
 Controls how many hosts can be on a network
 Requires a router to communicate across subnets
39
Ports
 The “room number” at the hotel
 Paired with an IP Address
 192.168.1.1:80
 Many network applications running on the same computer
 Each application would be “bound” to a port
 Web Server : 80
 SSH : 22
 FTP : 21
40
Routing Basics
 Allows communications between subnets or VLANs
 Device 1 wants to talk to Device 2
 Device 1 will calculate that Device 2’s IP address is outside of its subnet.
 Device 1, who’s default gateway is the router, sends the packet to the router.
 The router will realize that Device 2 lives on VLAN2 and will route the packet to Device 2 on that
subnet.
 If the communications are 2 way, the exact same thing happens in reverse from Device 2.
Device 1
192.168.0.100
255.255.255.0
Device 2
10.2.1.50
255.0.0.0
VLAN1 VLAN2
VLAN1: 192.168.0.1
VLAN2: 10.0.0.1
41
Firewalls
 Controls what data can enter or leave a network
 Work on a “deny by default” policy
 Only traffic that is explicitly allowed is passed thru the firewall
 Different kinds
 Port Based
 Port 80 is allowed in
 Host Based
 10.0.1.2 is allowed
 10.0.0.0/24 is allowed
 Deep Packet Inspection
 Looks at the data in a packet
 Requires a lot of “horsepower”
 Generally standalone appliance
42
Address Resolution Protocol
 The glue that ties Layer 2 to 3
 “Links” a MAC Address to an IP
 Switches, Routers, Computers all rely on this. Any network device.
 Expire after some time. Different from operating system to operating system.
 Cleared after reboot.
When a device wants to send a message to a device that it’s never talked to, it will only
have it’s IP address. The device will send a layer 2 message to all devices asking, “who as IP
Address aaa.bbb.ccc.ddd”. If a device has that IP it will respond saying “IP Address
aaa.bbb.ccc.ddd is at MAC Address eee.fff.ggg.hhh”.
Further Learning
44
44
Westermo Certified Training
 Introduction to IP
 Introduction to WeOS
 Certified Engineer Switching
 Certified Engineer Routing
 Also Available Customer Tailored Training
https://www.westermo.us/support/academy
45
45
Further Webinars
 Redundant and Resilient Networks with Microsegmentation
 Presentation in June
 Focusing on Cybersecurity and how to configure and install a
secure network from the ground up
 Redundancy protocols, how they work, as well as VPNs and other
services
 We look forward to seeing you there!
46

More Related Content

PPTX
Webinar how to prepare for the sunset of 2G and 3G cellular communications
PPTX
How to build resilient industrial networks
PPTX
How to secure your industrial network using segmentation and segregation
PPTX
The Basics of Industrial Ethernet Communications
PPTX
How to migrate legacy serial devices to IP broadband
PDF
Computer Networking Solutions for Energy Systems
PPTX
Accessing remote networks
PDF
Westermo solutions for onboard rail networks
Webinar how to prepare for the sunset of 2G and 3G cellular communications
How to build resilient industrial networks
How to secure your industrial network using segmentation and segregation
The Basics of Industrial Ethernet Communications
How to migrate legacy serial devices to IP broadband
Computer Networking Solutions for Energy Systems
Accessing remote networks
Westermo solutions for onboard rail networks

What's hot (20)

PDF
Westermo solutions for trackside networks
PDF
Profibus commissioning and maintenance - Richard Needham
PDF
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PDF
IO-Link technology - Adrian Sorsby
PDF
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PPT
Zigbee 802-15-4
PDF
SELTA Access Network Portfolio
PDF
PI UK Seminar (Nov 2021) - Update on APL
PDF
C1 profinet design, pete brown
PDF
Profinet network design webinar - Peter Thomas may 2020 - v1.0
PDF
PI UK Seminar (Nov 2021) - PROFINET Gateways
PDF
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
PDF
Profinet implementation and testing - Dave Tomlin and Xing Ye
PDF
ComNet NWK3 Data Sheet
PDF
PDF
ComNet NWK1 Data Sheet
PDF
Profinet in process automation - Peter Brown
PDF
Copper cables an alternative to fibre - Extending Industrial Ethernet
PDF
10. IO-Link technology - russell smith
PPT
Siemens & TPP Collaboration
Westermo solutions for trackside networks
Profibus commissioning and maintenance - Richard Needham
PROFINET network diagnostics and support - May 2020 - Peter Thomas
IO-Link technology - Adrian Sorsby
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
Zigbee 802-15-4
SELTA Access Network Portfolio
PI UK Seminar (Nov 2021) - Update on APL
C1 profinet design, pete brown
Profinet network design webinar - Peter Thomas may 2020 - v1.0
PI UK Seminar (Nov 2021) - PROFINET Gateways
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Profinet implementation and testing - Dave Tomlin and Xing Ye
ComNet NWK3 Data Sheet
ComNet NWK1 Data Sheet
Profinet in process automation - Peter Brown
Copper cables an alternative to fibre - Extending Industrial Ethernet
10. IO-Link technology - russell smith
Siemens & TPP Collaboration
Ad

Similar to Westermo webinar: Learning the Basics of Ethernet Networking (20)

PDF
Introduction to networking
PPT
Basic networking hardware pre final 1
PPTX
Ethernet Computer network
PPTX
Ccna PPT
PPT
Ccna day1
PPT
Ccna day1
PPT
Ccna day1-130802165909-phpapp01
PPT
PPT
Ccna day1
PPT
Ccna day 1
PPT
networking1.ppt
PPT
Computer-Networks--Networking_Hardware.ppt
PPT
Computer-Networks--Networking_Hardware.ppt
PPT
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
PPT
Ccna day1
PPT
C C N A Day1
PPT
PPT
Computer networks--networking hardware
PPT
Ccna day1
PPTX
Computer-Networks--Networking_Hardware.pptx
Introduction to networking
Basic networking hardware pre final 1
Ethernet Computer network
Ccna PPT
Ccna day1
Ccna day1
Ccna day1-130802165909-phpapp01
Ccna day1
Ccna day 1
networking1.ppt
Computer-Networks--Networking_Hardware.ppt
Computer-Networks--Networking_Hardware.ppt
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Ccna day1
C C N A Day1
Computer networks--networking hardware
Ccna day1
Computer-Networks--Networking_Hardware.pptx
Ad

More from Westermo Network Technologies (20)

PDF
Westermo Technologie Webinar WeOS4 und WeOS5
PDF
Westermo Webinar - Geroutete Redundanzen
PDF
Webinar - WeOS 4.33.0 und WeConfig 1.19.0.pdf
PDF
Webinar WeConfig - State of the Art NCM
PDF
Webinar Serial-over-IP
PDF
Webinar - Protokollkonvertierung
PDF
OpenWRT - Überblick
PDF
Switchkonfiguration
PDF
PoE & Lösungen.pdf
PDF
VPN&Verschlüsselung
PDF
Mobilfunkanbindungen
PDF
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
PDF
Netzwerkmonitoring.pdf
PDF
WeOS 4.32.0 und WeConfig 1.15.pdf
PDF
Merlin - Die neue Mobilfunkrouterserie
PDF
We os 4.31.0 und weconfig 1.14.0
PDF
Layer 2 Redundanzen
Westermo Technologie Webinar WeOS4 und WeOS5
Westermo Webinar - Geroutete Redundanzen
Webinar - WeOS 4.33.0 und WeConfig 1.19.0.pdf
Webinar WeConfig - State of the Art NCM
Webinar Serial-over-IP
Webinar - Protokollkonvertierung
OpenWRT - Überblick
Switchkonfiguration
PoE & Lösungen.pdf
VPN&Verschlüsselung
Mobilfunkanbindungen
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
Netzwerkmonitoring.pdf
WeOS 4.32.0 und WeConfig 1.15.pdf
Merlin - Die neue Mobilfunkrouterserie
We os 4.31.0 und weconfig 1.14.0
Layer 2 Redundanzen

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Modernizing your data center with Dell and AMD
KodekX | Application Modernization Development

Westermo webinar: Learning the Basics of Ethernet Networking

  • 1. Learning the Basics of Ethernet Networking
  • 2. 2 Overview  Team Introduction  Introduction to Westermo  Industrial Networking Introduction and Considerations  Physical Layers  How does Ethernet Handle Data?  Switching and Layer 2  Routing and Layer 3  Firewalls  Tying it all together  Further Learning
  • 3. 3 Introductions John Pavlos Managing Director john.pavlos@westermo.com 847-453-3898 Benjamin Campbell Technical Support Engineer benjamin.campbell@westermo.com 847.453.3896
  • 4. 4 Who is Westermo 2021  Founded in 1975  No. of employees: 250  14% R&D  Extensive IPR portfolio for key technologies  Recent Aquistions:  Naretech Solutions AG – June 2019  Virtual Access – November 2019  Eltek – April 2021  Flexible production with state of the art process control  Sales and support units in 12 countries, distributors in another 36  Member of the Beijer Electronics Group
  • 5. 5 Industrial Networking Introduction  Operate on the “Edge”  Likely interfaces with the core network  Completely different considerations  Environmental  Noise  Legacy Cabling  Focuses on “LAN” type networking  Many Physical Layers (Layer 1)  MAC Addresses (Layer 2)  IP Addresses (Layer 3)  Firewalls (Layer 3 and 4)
  • 6. 6  Tough Physical Environment  Noisy Electromagnetic Environments  Many Different Physical Mediums  Fiber  Multi-mode  Single-mode  Copper  Cat 5 and better  “Legacy” Copper  Legacy Devices  Serial Devices  ISDN  Dial-up Industrial Networking Considerations
  • 7. 7 Tough Physical Environments  Hot  +70 c  Cold  -40 c  Dusty  No fans to pull in dirt  Wet  Environmental ratings as high as IP67  Shock and Vibration  “Core Networking” devices won’t cut it  Requires devices designed to live in these places
  • 8. 8 Noisy Environments and Old Cables  High levels of Electromagnetic Noise  Extreme spikes  High average noise (Noise Floor)  Cables installed for legacy systems  RS 232/422/485  LonWorks  New cables cost prohibitive  Fiber or Cat 5,6,7 is rare  Requires a “Media Conversion”
  • 9. 9 Physical Mediums  Fiber optic is the best choice  Expensive to install  Relatively rare in brown field applications  Cat 5,6,7  Ethernet Compliant  Legacy cabling  Installed for legacy systems  Non-Ethernet compliant  Often not shielded  Maybe twisted pair, maybe not (50/50)  Coax
  • 10. 10 More Physical Mediums  PLC  Extreme environments  Cable sharing  Shorter Distances  300 m  Higher Speeds  70 Mbit/s  Wireless (WiFi)  Only option sometimes  Can be affected by high noise floors  Media Conversions (Legacy Cables)  SHDSL  Long distances (15 km)  High noise resilience  Limited Speed  15.3 Mbit/s  30.6 Mbit/s with bonding
  • 12. 12 OSI Model Overview • Stands for Open Systems Interconnection Model. • Consists of 7 layers that explains how data interchange occurs. • Layers are named based on what they manage, with each layer working with a different form of data. • Each layer only interacts with the layers immediately above and below it.
  • 13. 13 Physical and Data Link Layers Layers 1 and 2 • The Physical Layer refers to the physical medium through which data communication occurs. • Includes Copper, Fiber, even Air as a wireless medium. • Focuses on the conversion of binary 1 and 0s (bits) into a signal. • Outlines the method for node-to-node data transfer, a link over which data is transferred. • The layer establishes and terminates connections between two physically connected devices. • MAC Addresses are assigned at this layer, with any physical Network Interface Card (NIC) receiving a standardized MAC address for all communications.
  • 14. 14 Network and Transport Layers Layers 3 and 4 • The Network Layer provides the means to transfer packets from one node to another, located in different networks. • Assigns a logical address of nodes (IP Address). • Path determination, or Routing is enforced. Many protocols were created to cover many different network types. • Transport layer covers how to transfer data from source to host while maintaining the Quality of Service (QoS). • Reliability is maintained through flow control and error checking. • Acknowledges failures in sent data and resend lost packets to ensure communications are not lost. • Firewalls exist between layers 3 and 4.
  • 15. 15 The Application Layers Layers 5 through 7 • The top 3 layers are referred to as the “Application Layers”. • Application is the highest layer in the OSI model, and the layer closest to the end user. This layer interacts directly with the software applications. • The Presentation layer works between the Application and Session layers to translate between data the application uses, to data that can span the network. • The Session Layer manages connections between computers. This layer establishes and terminates connections between applications.
  • 17. DATA DATA APPLICATION HEADER DATA APPLICATION HEADER DATA APPLICATION HEADER APPLICATION DATA TCP HEADER APPLICATION DATA TCP HEADER IP HEADER APPLICATION DATA TCP HEADER IP HEADER ETHERNET HEADER ETHERNET FOOTER 01110111 01100101 01110011 01110100 01100101 01110010 01101101 01101111
  • 19. 19 Introduction To Network Switching  In network communications, traffic between nodes can result in collisions of packets, rendering information useless.  Hubs expand these collision domains, adding more chances of mangled packets.  Switches segment the collision domain between the node and the switch by directing traffic to only go to the intended recipient rather than over broadcast.  All data is sent through “Frames”, which list the Source and Destination MAC Address. Switches learn the MAC Addresses of the connected nodes.  VLANs can be implemented to add security and further segment a network in Layer 2 Switching.  Protocols such as Spanning Tree Protocol and FRNT add redundancy to switched networks while avoiding broadcast storms.
  • 20. 20 Hub vs Switch A D B C • With a Hub, all traffic is broadcasted (sent to all connected nodes) regardless of destination.
  • 21. 21 Hub vs Switch A D B C • The Switch only sends traffic to the intended recipient based on information in the Frame.
  • 22. 22 Switching and Frames  In a Layer 2 Environment, all data is sent in the form of Frames.  Frames are a type of data transmission unit containing a single network packet. Destination Address Source Address VLAN Tag Type Data FCS • Destination Address: The physical address of where the frame is going. • Source Address: The physical address of where the frame came from. • VLAN Tag: Information that specifies what VLAN the frame belongs to. • Type: Specifies the protocol type of network, typically Ethernet. • Data: The payload including all the data and information requested. • FCS: Frame Check Sequence, or error checking.
  • 23. 23 MAC Addresses  Media Access Control Address is a unique identifier assigned to every Network Interface Controller.  Also known as a “Physical Address” or “Ethernet Hardware Address"  6 pairs of hexadecimal values or Octets, separated by “ : ”  Made up of 2 parts: OUI and NIC Specific  OUI (Organizationally Unique Identifier) is first 3 octets of MAC Address  Denotes a manufacturer of NIC or node  NIC Specific are remaining 3 octets that are a unique number given to each device. EC:B1:D7:9A:E9:D2 OUI NIC Specific
  • 24. 24 MAC Address Table  Switches automatically build tables assigning MAC addresses to ports.  When a frame is received it holds the Source MAC address.  The switch then assigns the port the frame came through to that MAC address.  Also uses the VLAN Tag portion of the frame to assign the VLAN the port belongs to. VLAN MAC Address Port 1 1 10 10 00:07:91:21:23:8C 00:12:9E:5C:EE:D7 00:1D:9D:5D:37:55 00:20:2E:3B:24:76 Fa0/1 Fa0/2 Fa0/3 Fa0/4
  • 25. 25 VLANs  VLAN, or Virtual LAN, or Virtual Local Area Network segments a single broadcast domain.  Several physical devices can all share the same network while being separated by VLAN software controls.  “Pipes inside a pipe”  Adds security, performance, and can organize a complex network.  Frames are tagged with a VLAN ID to define what VLAN they belong to.  VLANs can be configured to apply to either a physical port on the switch (Static VLAN) or to all traffic coming from a specific MAC address (Dynamic VLAN).
  • 27. 27 Layer 2 Redundancy  When learning MAC Addresses, a switch broadcasts all traffic for the first time.  These broadcasts can propagate and flood the network in a “Broadcast Storm” when a loop is made between multiple switches.  Protocols exist such as Spanning Tree Protocol (STP) and Fast Reconfiguration of Network Topology (FRNT) that automatically disable a link to prevent Broadcast Storms and only enable it when another link is detected to go down.  In networks without these protocols configured, it’s very important to avoid looping the network.
  • 35. Layer 3 Routing Concepts
  • 36. 36 Overview  IP Addressing, Subnets and Ports  Basics of Routing  Firewalls  Tying it all together  Address Resolution Protocol (ARP)
  • 37. 37 IP Addressing  IP Addresses  Not burned into the hardware  Divided into 4 octets  Required for any IP routing functions  IPv4 still most common in industrial  IPv6 becoming more common in core networks  Private vs. Public Addresses  192.168.0.0 – 192.168.255.255  172.16.0.0 – 172.31.255.255  10.0.0.0/8 – 10.255.255.255
  • 38. 38 Subnetting  Defined by a Subnet Mask  32 bit number like an IP Address  Used to logically divide IP Networks  Segregates a physical network into smaller logical subnetworks  A “filter” of sorts  Helps a device determine if the host it wishes to reach is in the same network  Controls how many hosts can be on a network  Requires a router to communicate across subnets
  • 39. 39 Ports  The “room number” at the hotel  Paired with an IP Address  192.168.1.1:80  Many network applications running on the same computer  Each application would be “bound” to a port  Web Server : 80  SSH : 22  FTP : 21
  • 40. 40 Routing Basics  Allows communications between subnets or VLANs  Device 1 wants to talk to Device 2  Device 1 will calculate that Device 2’s IP address is outside of its subnet.  Device 1, who’s default gateway is the router, sends the packet to the router.  The router will realize that Device 2 lives on VLAN2 and will route the packet to Device 2 on that subnet.  If the communications are 2 way, the exact same thing happens in reverse from Device 2. Device 1 192.168.0.100 255.255.255.0 Device 2 10.2.1.50 255.0.0.0 VLAN1 VLAN2 VLAN1: 192.168.0.1 VLAN2: 10.0.0.1
  • 41. 41 Firewalls  Controls what data can enter or leave a network  Work on a “deny by default” policy  Only traffic that is explicitly allowed is passed thru the firewall  Different kinds  Port Based  Port 80 is allowed in  Host Based  10.0.1.2 is allowed  10.0.0.0/24 is allowed  Deep Packet Inspection  Looks at the data in a packet  Requires a lot of “horsepower”  Generally standalone appliance
  • 42. 42 Address Resolution Protocol  The glue that ties Layer 2 to 3  “Links” a MAC Address to an IP  Switches, Routers, Computers all rely on this. Any network device.  Expire after some time. Different from operating system to operating system.  Cleared after reboot. When a device wants to send a message to a device that it’s never talked to, it will only have it’s IP address. The device will send a layer 2 message to all devices asking, “who as IP Address aaa.bbb.ccc.ddd”. If a device has that IP it will respond saying “IP Address aaa.bbb.ccc.ddd is at MAC Address eee.fff.ggg.hhh”.
  • 44. 44 44 Westermo Certified Training  Introduction to IP  Introduction to WeOS  Certified Engineer Switching  Certified Engineer Routing  Also Available Customer Tailored Training https://www.westermo.us/support/academy
  • 45. 45 45 Further Webinars  Redundant and Resilient Networks with Microsegmentation  Presentation in June  Focusing on Cybersecurity and how to configure and install a secure network from the ground up  Redundancy protocols, how they work, as well as VPNs and other services  We look forward to seeing you there!
  • 46. 46