Top Banner
© 2004 IBM Corporation IBM ^ z/VM Module 11: Networking
57
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

z/VM Module 11: Networking

Page 2: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Objectives

Describe TCP/IP setup in conjunction with z/VM Understand the fundamental concepts of computer networks List and describe the four different protocols of the TCP/IP

architecture and their purpose Describe the purpose and function of routing

Page 3: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Objectives continued

List the reasons for using a routing table and the major differences between these dynamic routing table formats:

RIP-1 RIP-2 OSPF

List and describe the four different types of internet addressing: Network address format Broadcast address format Multicast address format Subnetwork address format

Page 4: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Objectives continued

Explain the major differences between the fiber connectors ESCON and FICON

Show and describe how a Parallel Sysplex is set up and the enhancements it can provide

Describe the devices and protocols that are available when configuring your network, including:

QDIO (can be configured into guest LANs with z/VM 4.3) OSA-Express and OSA-2 HiperSockets (can be configured into guest LANs)

Page 5: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Objectives continued

Describe how VIPA is capable of adding another level of protection against network failures, along with recovery

Discuss the four major commands needed to monitor your TCP/IP network:

NETSTAT RPCINFO PING TRACERTE

Page 6: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

z/VM and TCP/IP

Page 7: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Computer Network

Is a group of connected nodes that are used for data communication Its configuration consists of data processing devices, software, and

transmission media that are linked for information interchange Nodes are the functional units, located at the points of connection

among the data circuits Some of the more common network architectures, or protocols, used

today are OSI, TCP/IP, SNA, and ISDN.

Page 8: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Internet Addressing

Page 9: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

OSI Model

Page 10: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Internet Environment

The internet is a logical collection of networks supported by: Gateways

Routers

Bridges

Hosts

Various layers of protocols Protocols specify a set of rules and formats required to exchange and

transfer packets of information.

Page 11: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Internet Environment continued

Internet – a worldwide network of computer networks Intranet – a private network, usually used within a closed

environment supporting one company Extranet – a private network that uses the Internet protocols

and the public telecommunication system to share part of a company’s business information with outside vendors

Page 12: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

TCP/IP Architecture

Page 13: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

TCP/IP Architecture continued

Page 14: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Routing: Overview

It is the method by which a host or a gateway decides where to send a datagram.

There are two kinds of routing that are involved in communication within an internet:

Direct routing is used when the source and destination nodes are in the same logical network within an internet.

Indirect routing is used when the source and destination nodes are on different networks within an internet, where source nodes send packets to a gateway or router on the same network using direct routing and the packets are forwarded through intermediate gateways until the destination is reached

Page 15: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Routing: Overview - Terms

Important terms are: Router Gateway Daemon Network Interface Network Subnetwork FTP TELNET

Page 16: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Routing Tables

Page 17: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Routing Table Management

The most complex task in configuring the TCP/IP network routing is establishing the routing tables.

Static routing requires you to manually configure the routing tables yourself.

With dynamic routing, information is automatically exchanged among various routers in your network, which allows IP address to be found when a new IP host come online.

The more common interior gateway protocols in dynamic routing are: RIP-1 RIP-2

Page 18: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Dynamic Routing: RIP Version 1

Page 19: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Dynamic Routing: RIP Version 2

Page 20: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

OSPF

Open Shortest Path First OSPF differs from RIP in these ways:

No limitations on the hop count

Intelligent use of VLSM

Uses IP multicast to send link-state updates

Better convergence

Better load balancing

Allows for routing authentication

Page 21: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

BGP

Border Gateway Protocol is an interautonomous system routing protocol.

The attributes that BGP uses in the route selection process include: Weight Local preference Multi-exit discriminator Origin AS_Path Next hop Community

Page 22: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Virtual IP Addressing (VIPA)

Page 23: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Internet Addressing and Network Address Format

Page 24: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Internet Addressing: Broadcast, Multicast, and Subnetwork

TCP/IP uses IP broadcasting to send datagrams to all the TCP/IP host on a network or subnetwork

Multicasting also sends datagrams, but you will only receive the datagrams if the host is signed up to listen for the particular IP multicast address; otherwise it is discarded

The subnetwork capability of TCP/IP divides a single network into multiple logical networks

Page 25: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Networking Device Options

Page 26: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

ESCON(Enterprise System Connectivity)

The high-speed fiber optic architecture first available on ES/9000 and many other peripherals

Originally used LEDs and worked at 10MBps over 3 km stretches

A laser version announced in 1991 is capable of working at greater distances

Was replaced by FICON in 1998, though still available

Page 27: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

FICON (Fibre Connections)

Page 28: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

FICON CTC

Page 29: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Parallel Sysplex Cluster Technology

The zSeries Parallel Sysplex cluster contains innovative multi-system data sharing technology.

This allows direct, concurrent read/write access to shared data from all processing modes in the configuration without sacrificing performance or data integrity.

The Parallel Sysplex manages this multi-system environment, providing these benefits:

Continuous availability Dynamic workload balancing Application compatibility

Page 30: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Parallel Sysplex Cluster Technology continued

Within a Parallel Sysplex cluster it is possible to construct a parallel processing environment with no single point of failure.

The features of the Parallel Sysplex solution that contribute to increased availability and also help eliminate some system management tasks are:

Workload manager

Sysplex failure manager

Automatic restart manager

Cloning

Page 31: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Queued Direct I/O (QDIO)

Page 32: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Open System Adapters

Page 33: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

OSA-2

An integrated hardware feature that allows a zSeries 900 to provide industry-standard connectivity directly to clients on local area networks.

The clients on the attached LAN can use the TCP/IP or the SNA/APPN protocol, or both.

Ethernet, Fast Ethernet, and ATM LAN attachment to the z900 is supported by OSA-Express, but not by OSA-2.

Page 34: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

OSA-Express Characteristics

Page 35: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Virtual IP Addressing

Page 36: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

What Are HiperSockets and What Benefits Do They Provide?

They provide very fast TCP/IP communications between servers running in different LPARs on a zSeries CEC.

HiperSockets uses internal Queued Input/Output (iQDIO) at memory speeds to pass traffic between the virtual servers.

Important aspects of HiperSockets include: They can be used to communicate among consolidated servers

in a single processor They can be customized to accommodate varying traffic sizes Since there is no server-to-service traffic outside the zSeries

CEC, they provide a much higher level of network availability, security, simplicity, performance, and cost effectiveness

Page 37: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

How Do HiperSockets Work?

Page 38: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

HiperSockets Usage Example

Page 39: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

HiperSockets Microcode Functions

HiperSockets implementation is based on the OSA-Express QDIO protocol, hence HiperSockets is also called internal iQDIO.

TCP/IP stacks are addressed by inbound data queue addresses instead of MAC addresses.

The microcode maintains a lookup table of IP addresses for each HiperSockets.

The controlling operating system that performs I/O processing is identical to OSA-Express in QDIO mode.

Page 40: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

z/VM Before Guest LANs

Page 41: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

z/VM Guest LAN

Page 42: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

z/VM’s Virtual Switch

z./VM Virtual Switch is an extension of the Guest LAN simulated networking function.

VSWITCH operates almost exactly the same as a z/VM 4.3 QDIO Guest LAN, with two important exceptions:

Direct external network access via OSA Express

IEEE 802.1Q VLAN Support

Page 43: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Network Consolidation Using the Virtual Switch

A Virtual Switch is capable of bridging a z/VM Guest LAN to an associated real LAN connected by an OSA-Express adapter.

Virtual Switch operates as part of the z/VM CP and is not a separate guest machine.

Virtual Switch support is also used to manage the z/VM VLAN environment.

Page 44: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

The Overall TCP/IP Setup

Page 45: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Monitoring the TCP/IP Network - NETSTAT

Page 46: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Monitoring the TCP/IP Network – NETSTAT continued

Page 47: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Monitoring the TCP/IP Network – NETSTAT continued

Page 48: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Monitoring the TCP/IP Network – NETSTAT continued

Page 49: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

NETSTAT Examples

Page 50: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

RPCINFO Command

Page 51: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

PING Command

Page 52: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

TRACERTE Command

Page 53: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

TRACERTE Command Usage Notes

To use the TRACERTE command, you must be a privileged TCP/IP user.

The range of port numbers that the TRACERTE command uses is normally invalid; however you can change the starting port number for this range if the target host is using a nonstandard UPD port.

The TRACERTE function will give unpredictable results if the TCP/IP stack is configured to use equal-cost multi-path support.

Page 54: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Conclusion

Important topics discussed in this module:

TCP/IP Protocols and Functions

– Link Protocols– Networking Protocols– Transport Protocols– Application Protocols

Routing capabilitiesInternet Addressing

– Networking address format– Broadcast address format– Multicast address format– Subnetwork address format

Important devices discussed in this module:

ESCONFICON and FICON CTCParallel SysplexQueued Direct I/OOSA-Express and OSA-2Virtual IP AddressingHiperSocketsGuest LANs

Commands that are used to monitor the networking devices are:

NETSTATRPCINFOPINGTRACERTE

Page 55: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Glossary

Channel-to-channel Adapter (CTCA) – an adapter that cross-connect a pair of channels between systems to allow for point-to-point communications between two systems.

Domain Name Server (DNS) -- the distributed data system (directory) used to map domain names to IP addresses.

ESCON – Enterprise System Connection; a set of IBM products and services that provide a dynamically connected environment within an enterprise based upon fiber connections.

FICON – Fiber Connectivity; a high-speed I/O interface for mainframe computer connections to storage devices. This new architecture is about eight times as efficient as ESCON.

File Transfer Protocol (FTP): -- generally used for file transfers from TCP/IP systems, it originated on the internet.

Page 56: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

Glossary

Network File System (NFS): – a set of UNIX protocols for file sharing across a LAN; built on top of Ethernet and TCP/IP. Has became a standard in the UNIX environment.

NFS Client – New to z/VM, NFS Client is integrated into both CMS and the priced, optional TCP/IP feature of z/VM.

Socket – an end point provided by the transport service of a network for communications between processes or application programs.

Secure Socket Layer (SSL): – a security protocol that provides communication privacy; SSL enables client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery.

Virtual Private Network (VPN): – a network comprised of one or more secure IP tunnels connecting two or more networks.

Page 57: © 2004 IBM Corporation IBM ^ z/VM Module 11: Networking.

© 2004 IBM Corporation

IBM ^

References

IBM eserver zSeries 900: OSA-Express Overview. October 2001.

TCP/IP Solutions for VM/ESA. 1999.

White, Bill, Rama Ayyar, and Velibor Uskokovic. IBM Redbook: zSeries HiperSockets. May 2002