12.07.2015 Views

BROCADE IP PRIMER

BROCADE IP PRIMER

BROCADE IP PRIMER

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ContentsChapter 2: TCP/<strong>IP</strong> ................................................................................... 37Layer 3 TCP/<strong>IP</strong>: <strong>IP</strong> ...............................................................................................37Thinking in Binary ...............................................................................................39Network Classes .................................................................................................41The Subnet ..........................................................................................................45How Does the Network Layer Know Where to Go? ...................................47CIDR .............................................................................................................51Private Networks (RFC 1918) ............................................................................52Layer 4 TCP/<strong>IP</strong>: TCP/UDP ...................................................................................53Transmission Control Protocol (TCP) .................................................................56The 3-Way Handshake ................................................................................57Windows and Acknowledgments ...............................................................58User Datagram Protocol (UDP) ..........................................................................59Dynamic Host Configuration Protocol (DHCP) ..........................................60Network Address Translation (NAT) ...................................................................62Port Address Translation (PAT) ...........................................................................64Packet Capturing ................................................................................................65sFlow (RFC 3176) ................................................................................................68Summary .............................................................................................................69Chapter Review Questions .................................................................................70Answers to Review Questions ............................................................................72Chapter 3: Data Center Bridging (DCB) ............................................... 75Introduction .........................................................................................................75802.1Qbb: Priority-based Flow Control (PFC) ...........................................77802.1Qaz: Enhanced Transmission Selection (ETS) ................................77802.1Qau: Congestion Notification (QCN) ................................................77Making Ethernet Lossless ..................................................................................78The Ethernet PAUSE Function ............................................................................79Priority-based Flow Control ................................................................................80Enhanced Tranmission Selection ......................................................................81Data Center Bridge eXchange ............................................................................83Building the DCB Cloud ......................................................................................85Congestion Notification ......................................................................................86802.1Qau: Congestion Notification (QCN) ................................................86Summary .............................................................................................................86Chapter 4: TRILL—Adding Multi-Pathing to Layer 2 Networks ......... 89Why do we need it? ............................................................................................89Introducing TRILL ................................................................................................92The TRILL Protocol ..............................................................................................93TRILL Encapsulation ...................................................................................93Link-State Protocols ....................................................................................94Routing Bridges ..........................................................................................94Moving TRILL Data ..............................................................................................94Summary .............................................................................................................96viBrocade <strong>IP</strong> Primer

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!