D-Link DES-3326S User Manual

Page 1
DES-3326S
Layer 3 Switch
User’s Guide
First Edition (June, 2001)
651E3326S015
RECYCLABLE
Page 2
Wichtige Sicherheitshinweise
1. Bitte lesen Sie sich diese Hinweise sorgfältig durch.
2. Heben Sie diese Anleitung für den spätern Gebrauch auf.
3. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen. Vervenden Sie keine Flüssig- oder Aerosolreiniger. Am besten dient ein angefeuchtetes Tuch zur Reinigung.
4. Um eine Beschädigung des Gerätes zu vermeiden sollten Sie nur Zubehörteile verwenden, die vom Hersteller zugelassen sind.
5. Das Gerät is vor Feuchtigkeit zu schützen.
6. Bei der Aufstellung des Gerätes ist auf sichern Stand zu achten. Ein Kippen oder Fallen könnte Verletzungen hervorrufen. Verwenden Sie nur sichere Standorte und beachten Sie die Aufstellhinweise des Herstellers.
7. Die Belüftungsöffnungen dienen zur Luftzirkulation die das Gerät vor Überhitzung schützt. Sorgen Sie dafür, daß diese Öffnungen nicht abgedeckt werden.
8. Beachten Sie beim Anschluß an das Stromnetz die Anschlußwerte.
9. Die Netzanschlußsteckdose muß aus Gründen der elektrischen Sicherheit einen Schutzleiterkontakt haben.
10. Verlegen Sie die Netzanschlußleitung so, daß niemand darüber fallen kann. Es sollete auch nichts auf der Leitung abgestellt werden.
11. Alle Hinweise und Warnungen die sich am Geräten befinden sind zu beachten.
12. Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten Sie es vom Stromnetz trennen. Somit wird im Falle einer Überspannung eine Beschädigung vermieden.
13. Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das Gerät gelangen. Dies könnte einen Brand bzw. Elektrischen Schlag auslösen.
14. Öffnen Sie niemals das Gerät. Das Gerät darf aus Gründen der elektrischen Sicherheit nur von authorisiertem Servicepersonal geöffnet werden.
15. Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz zu trennen und von einer qualifizierten Servicestelle zu überprüfen:
a – Netzkabel oder Netzstecker sint beschädigt. b – Flüssigkeit ist in das Gerät eingedrungen. c – Das Gerät war Feuchtigkeit ausgesetzt. d – Wenn das Gerät nicht der Bedienungsanleitung ensprechend funktioniert oder Sie
mit Hilfe dieser Anleitung keine Verbesserung erzielen. e – Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt. f – Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.
16. Bei Reparaturen dürfen nur Orginalersatzteile bzw. den Orginalteilen entsprechende Teile verwendet werden. Der Einsatz von ungeeigneten Ersatzteilen kann eine weitere Beschädigung hervorrufen.
17. Wenden Sie sich mit allen Fragen die Service und Repartur betreffen an Ihren Servicepartner. Somit stellen Sie die Betriebssicherheit des Gerätes sicher.
ii
Page 3
18. Zum Netzanschluß dieses Gerätes ist eine geprüfte Leitung zu verwenden, Für einen Nennstrom bis 6A und einem Gerätegewicht grőßer 3kg ist eine Leitung nicht leichter als H05VV-F, 3G, 0.75mm2 einzusetzen.
Page 4
WARRANTIES EXCLUSIVE
IF THE D-LINK PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, THE CUSTOMER'S SOLE REMEDY SHALL BE, AT D-LINK'S OPTION, REPAIR OR REPLACEMENT. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESSED OR IMPLIED, EITHER IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. D-LINK NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION MAINTENANCE OR USE OF D-LINK'S PRODUCTS D-LINK SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THAT THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY THE CUSTOMER'S OR ANY THIRD PERSON'S MISUSE, NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING OR OTHER HAZARD.
LIMITATION OF LIABILITY
IN NO EVENT WILL D-LINK BE LIABLE FOR ANY DAMAGES, INCLUDING LOSS OF DATA, LOSS OF PROFITS, COST OF COVER OR OTHER INCIDENTAL, CONSEQUENTIAL OR INDIRECT DAMAGES ARISING OUT THE INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE OR INTERRUPTION OF A D- LINK PRODUCT, HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY. THIS LIMITATION WILL APPLY EVEN IF D-LINK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. IF YOU PURCHASED A D-LINK PRODUCT IN THE UNITED STATES, SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
Limited Warranty
Hardware:
D-Link warrants each of its hardware products to be free from defects in workmanship and materials under normal use and service for a period commencing on the date of purchase from D-Link or its Authorized Reseller and extending for the length of time stipulated by the Authorized Reseller or D-Link Branch Office nearest to the place of purchase.
This Warranty applies on the condition that the product Registration Card is filled out and returned to a D-Link office within ninety (90) days of purchase. A list of D-Link offices is provided at the back of this manual, together with a copy of the Registration Card.
If the product proves defective within the applicable warranty period, D-Link will provide repair or replacement of the product. D-Link shall have the sole discretion whether to repair or replace, and replacement product may be new or reconditioned. Replacement product shall be of equivalent or better specifications, relative to the defective product, but need not be identical. Any product or part repaired by D-Link pursuant to this warranty shall have a warranty period of not less than 90 days, from date of such repair,
iv
Page 5
irrespective of any earlier expiration of original warranty period. When D-Link provides replacement, then the defective product becomes the property of D-Link.
Warranty service may be obtained by contacting a D-Link office within the applicable warranty period, and requesting a Return Material Authorization (RMA) number. If a Registration Card for the product in question has not been returned to D-Link, then a proof of purchase (such as a copy of the dated purchase invoice) must be provided. If Purchaser's circumstances require special handling of warranty correction, then at the time of requesting RMA number, Purchaser may also propose special procedure as may be suitable to the case.
After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. The package must be mailed or otherwise shipped to D-Link with all costs of mailing/shipping/insurance prepaid. D-Link shall never be responsible for any software, firmware, information, or memory data of Purchaser contained in, stored on, or integrated with any product returned to D-Link pursuant to this warranty.
Any package returned to D-Link without an RMA number will be rejected and shipped back to Purchaser at Purchaser's expense, and D-Link reserves the right in such a case to levy a reasonable handling charge in addition mailing or shipping costs.
Software:
Warranty service for software products may be obtained by contacting a D-Link office within the applicable warranty period. A list of D-Link offices is provided at the back of this manual, together with a copy of the Registration Card. If a Registration Card for the product in question has not been returned to a D-Link office, then a proof of purchase (such as a copy of the dated purchase invoice) must be provided when requesting warranty service. The term "purchase" in this software warranty refers to the purchase transaction and resulting license to use such software.
D-Link warrants that its software products will perform in substantial conformance with the applicable product documentation provided by D-Link with such software product, for a period of ninety (90) days from the date of purchase from D-Link or its Authorized Reseller. D-Link warrants the magnetic media, on which D-Link provides its software product, against failure during the same warranty period. This warranty applies to purchased software, and to replacement software provided by D-Link pursuant to this warranty, but shall not apply to any update or replacement which may be provided for download via the Internet, or to any update which may otherwise be provided free of charge.
D-Link's sole obligation under this software warranty shall be to replace any defective software product with product which substantially conforms to D-Link's applicable product documentation. Purchaser assumes responsibility for the selection of appropriate application and system/platform software and associated reference materials. D-Link makes no warranty that its software products will work in combination with any hardware, or any application or system/platform software product provided by any third party, excepting only such products as are expressly represented, in D-Link's applicable product documentation as being compatible. D-Link's obligation under this warranty shall be a reasonable effort to provide compatibility, but D-Link shall have no obligation to provide compatibility when there is fault in the third-party hardware or software. D-Link makes no warranty that operation of its software products will be uninterrupted or absolutely
Page 6
error-free, and no warranty that all defects in the software product, within or without the scope of D-Link's applicable product documentation, will be corrected.
vi
Page 7
D-Link Offices for Registration and Warranty Service
The product's Registration Card, provided at the back of this manual, must be sent to a D-Link office. To obtain an RMA number for warranty service as to a hardware product, or to obtain warranty service as to a software product, contact the D-Link office nearest you. An address/telephone/fax/e-mail/Web site list of D-Link offices is provided in the back of this manual.
Trademarks
Copyright 2001 D-Link Corporation. Contents subject to change without prior notice. D-Link is a registered trademark of D-Link Corporation/D-Link Systems, Inc. All other trademarks belong to their respective proprietors.
Copyright Statement
No part of this publication may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from D-Link Corporation/D-Link Systems Inc., as stipulated by the United States Copyright Act of 1976.
Page 8
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with this user’s guide, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
CE Mark Warning
This is a Class A product. In a domestic environment, this product may cause radio interference in which case the user may be required to take adequate measures.
VCCI Warning
BSMI Warning
viii
Page 9
Table of Contents
Introduction ..........................................................................13
Layer 3 Switching ............................................................... 13
The Functions of a Layer 3 Switch....................................15
Features ............................................................................. 16
Ports ................................................................................16
Performance Features......................................................... 16
Layer 2 Features ..............................................................16
Layer 3 Switch Features................................................... 18
Traffic Classification and Prioritization .............................19
Management ....................................................................19
Switch Stacking.................................................................. 21
Fast Ethernet Technology ................................................... 21
Gigabit Ethernet Technology............................................... 22
Unpacking and Setup............................................................ 23
Unpacking ..........................................................................23
Installation ......................................................................... 24
Desktop or Shelf Installation ............................................ 24
Rack Installation.............................................................. 25
Power on............................................................................. 26
Power Failure ...................................................................27
Identifying External Components ..........................................28
Front Panel.........................................................................28
Rear Panel .......................................................................... 29
Side Panels .........................................................................30
Optional Plug-in Modules ...................................................30
100BASE-FX Fiber Module (2Km/15Km) .........................31
1000BASE-T Module........................................................ 31
1000BASE-SX Fiber Module ............................................32
1000BASE-LX Fiber Module............................................. 33
GBIC Two-Port Module..................................................... 34
Stacking Module with GBIC Port ......................................34
ix
Page 10
Switch LED Indicators ........................................................ 37
Stacking Module LED Indicators.........................................37
Connecting The Switch.......................................................... 39
Switch to End Node ............................................................39
Switch to Hub or Switch .....................................................40
Switch Stack Connections ..................................................41
10BASE-T Device ............................................................. 42
100BASE-TX Device......................................................... 43
Switch Management and Operating Concepts ....................... 44
Local Console Management ................................................44
Diagnostic (console) port (RS-232 DCE)............................ 45
Managing Switch Stacks..................................................... 46
Switch IP Address............................................................... 49
Traps.................................................................................. 50
SNMP .................................................................................52
MIBs................................................................................... 55
Packet Forwarding ..............................................................56
Filtering.............................................................................. 57
Spanning Tree ....................................................................59
Link Aggregation.................................................................70
VLANs ................................................................................72
IP Addresses .......................................................................81
Internet Protocols ...............................................................90
Packet Headers................................................................... 97
The Domain Name System ................................................105
DHCP Servers ...................................................................106
IP Routing ........................................................................107
ARP .................................................................................. 109
Multicasting .....................................................................110
Multicast Routing Protocols .............................................. 119
Routing Protocols ............................................................. 120
Web-Based Switch Management.......................................... 167
Introduction .....................................................................167
Before You Start ...............................................................168
General Deployment Strategy......................................... 168
x
Page 11
VLAN Layout ..................................................................169
Assigning IP Network Addresses and Subnet Masks to
VLANs
............................................................................170
Defining Static Routes....................................................171
Getting Started ................................................................. 171
Management..................................................................... 171
Configuring the Switch .....................................................172
User Accounts Management........................................... 172
Saving Changes ................................................................ 175
Factory Reset....................................................................177
USING WEB-BASED MANAGEMENT ................................ 178
Advanced Setup................................................................208
Layer 3 IP Networking....................................................... 215
IP Multicasting .................................................................237
Port Mirroring................................................................... 251
Priority .............................................................................253
Filtering............................................................................ 256
Forwarding ....................................................................... 259
Spanning Tree ..................................................................268
Link Aggregation...............................................................274
Utilities.............................................................................277
Network Monitoring ..........................................................287
Technical Specifications ...................................................... 316
Understanding and Troubleshooting the Spanning Tree Protocol
...............................................................................319
Blocking State................................................................ 320
Listening State ............................................................... 322
Learning State................................................................ 324
Forwarding State............................................................ 326
Disabled State................................................................ 328
Troubleshooting STP......................................................... 330
Spanning Tree Protocol Failure ......................................330
Full/Half Duplex Mismatch............................................331
Unidirectional Link ........................................................332
Packet Corruption .......................................................... 334
Resource Errors .............................................................334
xi
Page 12
Identifying a Data Loop .................................................. 335
Avoiding Trouble ............................................................335
Brief Review of Bitwise Logical Operations........................... 342
Index................................................................................... 344
xii
Page 13
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
1
INTRODUCTION
This section describes the Layer 3 functionality and Layer 2 and Layer 3 features of the DES-3326S. Some background information about Ethernet/Fast Ethernet, Gigabit Ethernet, and switching technology is presented. This is intended for readers who may not be familiar with the concepts of layered switching and routing but is not intended to be a complete or in-depth discussion.
Layer 3 Switching
Layer 3 switching is the integration of two proven technologies: switching and routing. In fact, Layer 3 switches are running the same routing routines and protocols as traditional routers. The main difference between traditional routing and Layer 3 switching is the addition of a group of Layer 2 switching domains and the execution of routing routines for most packets via an ASIC – in hardware instead of software.
Where a traditional router would have one, or at best a few, Fast Ethernet ports, the DES-3326S Layer 3 switch has 24 Fast Ethernet ports and optionally, 2 Gigabit Ethernet ports. Where a traditional router would have one or two high-speed serial WAN connections, the DES-3326S relies upon a Fast
13
Page 14
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Ethernet port to connect to a separate device, which in turn, connects the network to a WAN or the Internet.
The DES-3326S can be thought of as 24 Fast Ethernet Layer 2 switching domains with a wire-speed router between each domain. It can be deployed in a network between a traditional router and the intranetwork. The traditional router and its associated WAN interface would then handle routing between the intranetwork and the WAN (the Internet, for example) while the Layer 3 switch would handle routing within the LAN (between the Fast Ethernet Layer 2 domains). Any installed Layer 2 switches, and indeed the entire subnetting scheme, would remain in place.
The DES-3326S can also replace key traditional routers for data centers and server farms, routing between these locations and the rest of the network, and providing 24 ports of Layer 2 switching performance combined with wire-speed routing.
Backbone routers can also be replaced with DES-3326S and a series of DES-3326S could be linked via the optional Gigabit Ethernet ports. Routers that service WAN connections would remain in place, but would now be removed from the backbone and connected to the DES-3326S via an Ethernet/Fast Ethernet port. The backbone itself could be migrated to Gigabit Ethernet, or faster technologies as they become available.
The DES-3326S accomplishes two objectives. First as a tool to provide high-performance access to enterprise data servers and infrastructure, and second, to enhance the performance of network equipment already installed. Many network segments display poor performance, but the Ethernet wire is only carrying a fraction of its total traffic capacity. The problem is not necessarily the network, but the ability of the connected devices utilize the full capacity of the network. The DES­3326S can eliminate network bottlenecks to high-traffic areas,
14 Introduction
Page 15
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
and improve the utilization of the network’s installed bandwidth.
The Functions of a Layer 3 Switch
Traditional routers, once the core components of large networks, became an obstacle to the migration toward next­generation networks. Attempts to make software-based routers forward packets more quickly were inadequate.
A layer 3 switch does everything to a packet that a traditional router does:
Determines forwarding path based on Layer 3 information
Validates the integrity of the Layer 3 header via checksum
Verifies packet expiration and updates accordingly
Processes and responds to any optional information
Updates forwarding statistics in the Management
Information Base
A Layer 3 switch can be placed anywhere within a network core or backbone, easily and cost-effectively replacing the traditional collapsed backbone router. The DES-3326S Layer 3 switch communicates with a WAN router using a standard Ethernet/Fast Ethernet port. Multiple DES-3326S switches can be linked via the optional, 2-port Gigabit Ethernet module.
15
Page 16
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Features
The DES-3326S Switch was designed for easy installation and high performance in an environment where traffic on the network and the number of users increase continuously.
Switch features include:
Ports
24 high performance NWay ports all operating at 10/100 Mbps with Auto-MDIX function for connecting to end stations, servers and hubs.
All ports can auto-negotiate (NWay) between 10Mbps/ 100Mbps, half-duplex or full duplex and flow control for half-duplex ports.
One front panel slide-in module interface for a 2-port 1000BASE-SX, 1000BASE-LX, 1000BASE-T, 100BASE­FX, GBIC or 1-port GBIC & Stack module.
RS-232 DCE Diagnostic port (console port) for setting up and managing the Switch via a connection to a console terminal or PC using a terminal emulation program.
Performance Features
Layer 2 Features
8.8 Gbps switching fabric capacity
16 Introduction
Page 17
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Store and forward switching scheme.
Full and half-duplex for both 10Mbps and 100Mbps
connections. The front-port Gigabit Ethernet module operates at full-duplex only. Full-duplex allows the switch port to simultaneously transmit and receive data, and only works with connections to full-duplex capable end stations and switches. Connections to hubs must take place at half-duplex.
Supports IEEE 802.3x flow control for full-duplex mode ports.
Supports Back-pressure flow control for half-duplex mode ports.
Auto-polarity detection and correction of incorrect polarity on the transmit and receive twisted-pair at each port.
IEEE 802.3z compliant for all Gigabit ports (optional module).
IEEE 802.3x compliant Flow Control support for all Gigabit ports (optional module).
IEEE 802.3ab compliant for 1000BASE-T (Copper) Gigabit ports (optional module).
Data forwarding rate 14,880 pps per port at 100% of wire-speed for 10Mbps speed.
Data forwarding rate 148,800 pps per port at 100% of wire-speed for 100Mbps speed.
Data filtering rate eliminates all error packets, runts, etc. at 14,880 pps per port at 100% of wire-speed for 10Mbps speed.
17
Page 18
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Data filtering rate eliminates all error packets, runts, etc. at 148,800 pps per port at 100% of wire-speed for 100Mbps speed.
8K active MAC address entry table per device with automatic learning and aging (10 to 9999 seconds).
8 MB packet buffer per device.
Broadcast and Multicast storm filtering.
Supports Port Mirroring.
Supports Port Trunking – up to six trunk groups (each
consisting of up to eight ports) may be set up.
802.1D Spanning Tree support.
802.1Q Tagged VLAN support – up to 63 User-defined
VLANs per device (one VLAN is reserved for internal use).
GVRP – (GARP VLAN Registration Protocol) support for dynamic VLAN registration.
802.1p Priority support with 4 priority queues.
IGMP Snooping support.
Layer 3 Switch Features
Wire speed IP forwarding.
Hardware-based Layer 3 IP switching.
IP packet forwarding rate of 6.6 Mpps.
2K active IP address entry table per device.
18 Introduction
Page 19
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Supports RIP – (Routing Information Protocol) version I and II.
Supports OSPF (Open Shortest Path First)
Supports MD5 and Password OSPF Packet
Authentication
Supports IP version 4.
IGMP version 1 and 2 support (RFC 1112 and RFC
2236).
Supports PIM Dense Mode.
Supports DVMRP.
Supports IP multi-netting.
Supports IP packet de-fragmentation.
Supports 802.1D frame support.
Traffic Classification and Prioritization
Based on 802.1p priority bits
4 priority queues
Management
RS-232 console port for out-of-band network management via a console terminal or PC.
Spanning Tree Algorithm Protocol for creation of alternative backup paths and prevention of network loops.
19
Page 20
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
SNMP v.1 Agent.
Fully configurable either in-band or out-of-band control
via SNMP based software.
Flash memory for software upgrades. This can be done in-band via TFTP or out-of-band via the console.
Built-in SNMP management:
Bridge MIB (RFC 1493)
MIB-II (RFC 1213)
Mini-RMON MIB (RFC 1757) – 4 groups
CIDR MIB (RFC 2096), except IP Forwarding Table.
802.1p MIB (RFC 2674).
RIP MIB v2 (RFC 1724).
IF MIB (RFC 2233)
Ether-Like MIB (RFC 1643)
OSPF MIB (RFC 1850)
Supports Web-based management.
CLI management support
TFTP support.
BOOTP support.
BOOTP Relay Agent.
IP filtering on the management interface.
20 Introduction
Page 21
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
DCHP Client support.
DCHP Relay Agent.
DNS Relay Agent.
Password enabled.
Switch Stacking
The DES-3326 can be used as a standalone or stacked switch
using the optional stacking module. Up to 6 Switches may be
stacked and managed as a unit with a single IP address.
Management for the entire stack is done through the Master Switch.
You may add Switches later as needed.
Fast Ethernet Technology
100Mbps Fast Ethernet (or 100BASE-T) is a standard specified by the IEEE 802.3 LAN committee. It is an extension of the 10Mbps Ethernet standard with the ability to transmit and receive data at 100Mbps, while maintaining the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Ethernet protocol.
21
Page 22
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Gigabit Ethernet Technology
Gigabit Ethernet is an extension of IEEE 802.3 Ethernet utilizing the same packet structure, format, and support for CSMA/CD protocol, full duplex, flow control, and management objects, but with a tenfold increase in theoretical throughput over 100Mbps Fast Ethernet and a one hundred-fold increase over 10Mbps Ethernet. Since it is compatible with all 10Mbps and 100Mbps Ethernet environments, Gigabit Ethernet provides a straightforward upgrade without wasting a company’s existing investment in hardware, software, and trained personnel.
Gigabit Ethernet enables fast optical fiber connections and Unshielded Twisted Pair connections to support video conferencing, complex imaging, and similar data-intensive applications. Likewise, since data transfers occur 10 times faster than Fast Ethernet, servers outfitted with Gigabit Ethernet NIC’s are able to perform 10 times the number of operations in the same amount of time.
22 Introduction
Page 23
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
2
UNPACKING AND SETUP
This chapter provides unpacking and setup information for the Switch.
Unpacking
Open the shipping carton of the Switch and carefully unpack its contents. The carton should contain the following items:
One DES-3226 24-port Fast Ethernet Layer 3 Switch
Mounting kit: 2 mounting brackets and screws
Four rubber feet with adhesive backing
One AC power cord
This User’s Guide with Registration Card
If any item is found missing or damaged, please contact your local D-Link reseller for replacement.
23
Page 24
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Installation
Use the following guidelines when choosing a place to install the Switch:
The surface must support at least 3 kg.
The power outlet should be within 1.82 meters (6 feet) of
the device.
Visually inspect the power cord and see that it is secured
to the AC power connector.
Make sure that there is proper heat dissipation from and
adequate ventilation around the switch. Do not place heavy objects on the switch.
Desktop or Shelf Installation
When installing the Switch on a desktop or shelf, the rubber feet included with the device should first be attached. Attach these cushioning feet on the bottom at each corner of the device. Allow adequate space for ventilation between the device and the objects around it.
24 Unpacking and Setup
Page 25
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 2-1. Installing rubber feet for desktop installation
Rack Installation
The DES-3326S can be mounted in an EIA standard-sized, 19­inch rack, which can be placed in a wiring closet with other equipment. To install, attach the mounting brackets on the switch’s side panels (one on each side) and secure them with the screws provided.
Figure 2- 2A. Attaching the mounting brackets to the switch
25
Page 26
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Then, use the screws provided with the equipment rack to mount the switch on the rack.
Figure 2-2B. Installing the switch on an equipment rack
Power on
The DES-3326S switch can be used with AC power supply 100-240 VAC, 50 - 60 Hz. The power switch is located at the rear of the unit adjacent to the AC power connector and the system fan. The switch’s power supply will adjust to the local power source automatically and may be turned on without having any or all LAN segment cables connected.
After the power switch is turned on, the LED indicators should respond as follows:
26 Unpacking and Setup
Page 27
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
All LED indicators will momentarily blink. This blinking
of the LED indicators represents a reset of the system.
The power LED indicator is always on after the power is
turned ON.
The console LED indicator will blink while the Switch
loads onboard software and performs a self-test. will remain ON if there is a connection at the RS-232 port, otherwise this LED indicator is OFF.
The 100M LED indicator may remain ON or OFF
depending on the transmission speed.
Power Failure
As a precaution in the event of a power failure, unplug the switch. When power is resumed, plug the switch back in.
27
Page 28
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
3
IDENTIFYING EXTERNAL
COMPONENTS
This chapter describes the front panel, rear panel, optional plug-in modules, and LED indicators of the DES-3326S.
Front Panel
The front panel of the Switch consists of LED indicators, an RS-232 communication port, a slide-in module slot, and 24 (10/100 Mbps) Ethernet/Fast Ethernet ports.
Figure 3-1. Front panel view of the Switch
Comprehensive LED indicators display the status of the
switch and the network (see the LED Indicators section below).
An RS-232 DCE console port for setting up and managing
the switch via a connection to a console terminal or PC using a terminal emulation program.
28 Identifying External Components
Page 29
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
A front-panel slide-in module slot for Gigabit Ethernet
ports can accommodate a 2-port 1000BASE-T Gigabit Ethernet module, a 2-port 1000BASE-SX Gigabit Ethernet module, a 2-port 1000BASE-LX Gigabit Ethernet module, or a 2-port GBIC-based Gigabit Ethernet module.
Twenty-four high-performance, NWay Ethernet ports all
of which operate at 10/100 Mbps with Auto-MDIX function for connections to end stations, servers and hubs. All ports can auto-negotiate between 10Mbps or 100Mbps, full or half duplex, and flow control.
Rear Panel
The rear panel of the switch contains an AC power connector.
Figure 3-2. Rear panel view of the Switch
The AC power connector is a standard three-pronged
connector that supports the power cord. Plug-in the female connector of the provided power cord into this socket, and the male side of the cord into a power outlet. Supported input voltages range from 100 ~ 240 VAC at 50 ~ 60 Hz.
Identifying External Components 29
Page 30
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Side Panels
The right side panel of the Switch contains two system fans (see the top part of the diagram below). The left side panel contains heat vents.
Figure 3-4. Side panel views of the Switch
The system fans are used to dissipate heat. The sides of
the system also provide heat vents to serve the same purpose. Do not block these openings, and leave at least 6 inches of space at the rear and sides of the switch for proper ventilation. Be reminded that without proper heat dissipation and air circulation, system components might overheat, which could lead to system failure.
Optional Plug-in Modules
The DES-3326S 24-port Fast Ethernet Layer 3 Switch is able to accommodate a range of optional plug-in modules in order to increase functionality and performance. These modules must be purchased separately.
30 Identifying External Components
Page 31
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
100BASE-FX Fiber Module (2Km/15Km)
Figure 3-5. 100BASE-FX two-port module
Front-panel module.
Two 100BASE-FX (with SC type connector) Fiber ports.
Fully compliant with IEEE802.3u.
Support Full-duplex operation only.
IEEE 802.3x compliant Flow Control support for full-duplex.
1000BASE-T Module
Figure 3-6. 1000BASE-TX two-port module
Identifying External Components 31
Page 32
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Front-panel module.
Connects to 1000BASE-T devices.
Supports Category 5e UTP or STP cable connections of up
to 100 meters.
1000BASE-SX Fiber Module
Figure 3-7. 1000BASE-SX two-port module
Front-panel module.
Connects to 1000BASE-SX devices at full-duplex.
Allows connections using multi-mode fiber optic cable in the
following configurations:
Modal bandwidth
(min. overfilled launch)
Unit: MHz*km
Operating distance
Unit: meters
62.5µm 62.5µm 50µm 50µm
160 200 400 500
220 275 500 550
32 Identifying External Components
Page 33
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Channel insertion loss
Unit: dB
2.33 2.53 3.25 3.43
1000BASE-LX Fiber Module
Figure 3-8. 1000BASE-LX two-port module
Front-panel module.
Connects to 1000BASE-LX devices at full-duplex.
Supports multi-mode fiber-optic cable connections of up to
550 meters or 5 km single-mode fiber-optic cable connections.
Identifying External Components 33
Page 34
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
GBIC Two-Port Module
Figure 3-9. GBIC two-port module
Front-panel module.
Connects to GBIC devices at full duplex only.
Allows multi-mode fiber optic connections of up to 550 m
(SX and LX) and single-mode fiber optic connections of up to 5 km (LX only). GBIC modules are available in –SX and –LX fiber optic media.
IEEE 802.3x compliant Flow Control for full-duplex.
Stacking Module with GBIC Port
Figure 3-10. Stacking Module with one GBIC port
34 Identifying External Components
Page 35
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide

GBIC Port

Front-panel module.
One Stacking port and one GBIC fiber port
Connects to GBIC devices at full duplex only.
Allows multi-mode fiber optic connections of up to 550 m
(SX and LX) and single-mode fiber optic connections of up to 5 km (LX only). GBIC modules are available in –SX and –LX fiber optic media.
IEEE 802.3x compliant Flow Control for full-duplex.

Stacking Port

One transmitting port and one receiving port.
Use the connector of IEEE 1394b.
Data rate up to 1250 Mbps
7-segment LED display to indicate switch ID number within
the switch stack.
The optional Stacking Module allows up to 6 DES-3326S Switches to be interconnected via their individual Stacking Modules. This forms a 6 switch stack that can then be managed and configured as thought the entire stack were a single switch. The switch stack is then accessed through a single IP address or alternatively, through the master switch’s serial port (via the management station’s console and the switch’s Command Line Interface).
Identifying External Components 35
Page 36
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 3-11. Up to 6 Switches in a Switch Stack
The stacking ports are marked IN and OUT. The IEEE 1394 compliant cable must be connected from an IN port on one switch to an OUT port on the next switch in the stack. The last two switches (at the top and bottom of the stack) must also be connected from the IN port on one switch to the OUT port on the other switch. In this way, a loop is made such that all of the switches in the switch stack have the IN stacking port connected to another switch’s OUT stacking port.
The Stacking Module’s LED indicators are described below.
36 Identifying External Components
Page 37
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Switch LED Indicators
The LED indicators of the Switch include Power, Console, and Link/Act. The following shows the LED indicators for the Switch along with an explanation of each indicator.
Figure 3-12. The LED Indicators
Power This indicator on the front panel should be lit
during the Power-On Self Test (POST). It will light green approximately 2 seconds after the switch is powered on to indicate the ready state of the device.
Console This indicator is lit green when the switch is
being managed via out-of-band/local console management through the RS-232 console port using a straight-through serial cable.
Act/Link These indicators are located to the left and right of each
port. They are lit when there is a secure connection (or link) to a device at any of the ports. The LEDs blink whenever there is reception or transmission (i.e. Activity--Act) of data occurring at a port.
Stacking Module LED Indicators
The switch’s current order in the switch stack is also displayed on the Stacking Module’s front panel under the STACK NO. heading:
Identifying External Components 37
Page 38
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 3-13. Stacking Module LED Indicators
The Link and Act LEDs have the same function as the corresponding LEDs for the switch’s Ethernet ports. The Link LED lights to confirm a valid link, while the ACT LED blinks to indicate activity on the link.
The Stack No. seven-segment LED displays the Unit number assigned to the switch. A 0 (a zero) in the display indicates that the stacking module is in the process of determining the stack status and has not yet resolved the switch’s Unit number.
The stacking order can be automatically configured using the switch’s MAC address the lower the numerical value of a given switch’s MAC address, the lower the number in the stacking order the switch will be assigned. The switch with the lowest MAC address, will then become the Master Switch. This is the Stacking Module’s default mode.
Alternatively, the stacking order can be manually assigned using the console’s Command Line Interface (CLI).
38 Identifying External Components
Page 39
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
4
CONNECTING THE
SWITCH
This chapter describes how to connect the DES 3226 to your Fast Ethernet network.
Switch to End Node
End nodes include PCs outfitted with a 10, 100 or 10/100 Mbps RJ-45 Ethernet/Fast Ethernet Network Interface Card (NIC) and most routers. The RJ-45 UTP ports on NICs and most routers are MDI-II. When using a normal straight-through cable, an MDI-II port must connect to an MDI-X port.
An end node can be connected to the Switch via a two-pair Category 3, 4, 5 UTP/STP straight cable (be sure to use Category 5e UTP or STP cabling for 100 Mbps Fast Ethernet connections). The end node should be connected to any of the twenty-four ports (2x - 24x) of the DES-3226 or to either of the two 100BASE-TX ports on the front-panel module that came preinstalled on the switch.
Connecting The Switch 39
Page 40
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 4-1. Switch connected to an End Node
The LED indicators for the port the end node is connected to are lit according to the capabilities of the NIC. If LED indicators are not illuminated after making a proper connection, check the PC’s LAN card, the cable, switch conditions, and connections.
The following LED indicator states are possible for an end node to switch connection:
1. The 100 LED indicator comes ON for a 100 Mbps and stays OFF for 10 Mbps.
2. The Link/Act LED indicator lights up upon hooking up a PC that is powered on.
Switch to Hub or Switch
These connections can be accomplished at any port in either straight-through cable or a crossover cable because the switch supports Auto-MDIX function.
A 10BASE-T hub or switch can be connected to the
Switch via a two-pair Category 3, 4 or 5 UTP/STP cable.
A 100BASE-TX hub or switch can be connected to the
Switch via a two-pair Category 5e UTP/STP cable.
40 Connecting The Switch
Page 41
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Switch Stack Connections
Up to 6 DES-3326S switches can be stacked, using the optional stacking module, into a switch stack that can then be configured and managed as a single unit. The Web-based Management agent of the Master Switch can configure and manage all of the switches in a switch stack using a single IP address (the IP address of the Master Switch).
The Command Line Interface (CLI) can be also be used to manage and configure all of the switches in a switch stack from the serial port on the master switch.
The CLI can also be used to configure and manage the switch stack via the TELNET protocol using a single IP address (the IP address of the Master Switch).
The stacking ports are marked IN and OUT. The IEEE 1394 compliant cable must be connected from an IN port on one switch to an OUT port on the next switch in the stack. The last two switches (at the top and bottom of the stack) must also be connected from the IN port on one switch to the OUT port on the other switch. In this way, a loop is made such that all of the switches in the switch stack have the IN stacking port connected to another switch’s OUT stacking port.
An example stacking port interconnection is shown below:
Connecting The Switch 41
Page 42
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 4-. Switch Stack connections between optional stacking
modules
10BASE-T Device
For a 10BASE-T device, the Switch’s LED indicators should display the following:
100 LED speed indicator is OFF.
Link/Act indicator is ON.
42 Connecting The Switch
Page 43
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
100BASE-TX Device
For a 100BASE-TX device, the Switch’s LED indicators should display the following:
100 LED speed indicator is ON.
Link/Act is ON.
Connecting The Switch 43
Page 44
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
5
SWITCH MANAGEMENT
AND OPERATING
CONCEPTS
This chapter discusses many of the concepts and features used to manage the switch, as well as the concepts necessary for the user to understand the functioning of the switch. Further, this chapter explains many important points regarding these features.
Configuring the switch to implement these concepts and make use of its many features is discussed in detail in the next chapters.
Local Console Management
A local console is a terminal or a workstation running a terminal emulation program that is connected directly to the switch via the RS-232 console port on the front of the switch. A console connection is referred to as an ‘Out-of-Band’ connection, meaning that console is connected to the switch using a different circuit than that used for normal network communications. So, the console can be used to set up and manage the switch even if the network is down.
44 Switch Management and Operating Concepts
Page 45
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Local console management uses the terminal connection to operate the console program built-in to the switch (see Chapter 6 – Using the Console Interface). A network administrator can manage, control and monitor the switch from the console program.
The DES-3326S contains a CPU, memory for data storage, flash memory for configuration data, operational programs, and SNMP agent firmware. These components allow the switch to be actively managed and monitored from either the console port or the network itself (out-of-band, or in-band).
Diagnostic (console) port (RS-232 DCE)
Out-of-band management requires connecting a terminal, such as a VT-100 or a PC running a terminal emulation program (such as HyperTerminal, which is automatically installed with Microsoft Windows) a to the RS-232 DCE console port of the Switch. Switch management using the RS-232 DCE console port is called Local Console Management to differentiate it from management performed via management platforms, such as D­View, HP OpenView, etc. Web-based Management describes management of the switch performed over the network (in-band) using the switch’s built-in Web-based management program (see Chapter 7 – Web-based Network Management). The operations to be performed and the facilities provided by these two built-in programs are identical.
The console port is set at the factory for the following configuration:
Baud rate: 9,600
Data width: 8 bits
Parity: none
Stop bits: 1
Flow Control None
Switch Management and Operating Concepts 45
Page 46
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Make sure the terminal or PC you are using to make this connection is configured to match these settings.
If you are having problems making this connection on a PC, make sure the emulation is set to VT-100. If you still don’t see anything, try hitting <Ctrl> + r to refresh the screen.
Managing Switch Stacks
The Switch is designed to be stacked in stacks of up to six Switches, all managed as a single unit with a single IP address. The stack order is hardware-determined, that is, the unique MAC address of each Switch determines where the Switch stands in the stack order. This fact can be taken into account when you are placing the Switches in the equipment rack. Administrators may find it convenient to place the Switches in the rack in the same order they appear logically in the Switch stack. However, you also may prefer to override the auto-detect stack order feature if for example, you add Switches to a stack that is already in place. Regardless of the method used to determine Switch stack order, remember some important points:
All management of all the Switches in the stack is done through the Master Switch.
It is recommended that the Master Switch be used to uplink to the Ethernet backbone.
If any Switch in the stack fails, all Switches will need to be rebooted upon correcting the failure.
If a new Master is elected, all Switches in the stack must rebooted. This includes situations where the new Master is determined by MAC address, for example, if the original Master is removed from the stack.
46 Switch Management and Operating Concepts
Page 47
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
The Master Switch can be chosen automatically. Switch software auto-detects the MAC address of each Switch in the stack. The Switch with the lowest value MAC address is elected to function as the Master. The remaining Switches are ordered according to the relative value of their respective MAC addresses (see the following example).
Determining the Switch Stack Order
Using the auto stacking mode, five MAC addresses appear in the order listed in the table below:
Stack Order MAC Address
1(Master)
2
3 001122334453 4 001122334454 5 001122334455 6 Not in use
Table 5-1. Switch Stack Order First
001122334451
001122334452
Now let us suppose you wish to add another Switch to this stack. The new Switch has a MAC address 001122334450. After rebooting all the Switches in the stack, the newly added Switch becomes the Master Switch. The new automatically determined stack order becomes
Switch Management and Operating Concepts 47
:
Page 48
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Stack Order MAC Address
1(added Switch)
2(original Master)
001122334450
001122334451
3 001122334452 4 001122334453 5 001122334454 6 001122334455
Table 5-2. Switch Stack Order Second
You can override the automatic stack order selection to use the original Master Switch as the Master of the new stack (read Switch Stacking Information in Chapter 6 for information on how to override the stack order auto-detect function).
To override the automatic selection of the stack order you must attach the serial cable to the newly added Switch (MAC address
001122334450). Now you can reconfigure the stack to place the original Master Switch (MAC address 001122334451) again into the number 1 position and the newly added Switch into the number 6 position.
After reconfiguration and restarting the Switches, the new stack order becomes:
Stack Order MAC Address
1(original Master)
2
001122334451
001122334452
3 001122334453 4 001122334454 5 001122334455
6 (added Switch) 001122334450
Table 5-3. Switch Stack Order Final
48 Switch Management and Operating Concepts
Page 49
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Switch IP Address
Each Switch must be assigned its own IP Address, which is used for communication with an SNMP network manager or other TCP/IP application (for example BOOTP, TFTP). The switch’s default IP address is 10.90.90.90. You can change the default Switch IP Address to meet the specification of your networking address scheme.
The switch is also assigned a unique MAC address by the factory. This MAC address cannot be changed, and can be found from the initial boot console screen – shown below.
Figure 5-1. Console Boot Screen
The switch’s MAC address can also be found from the console program under the Switch Information menu item, as shown below.
Switch Management and Operating Concepts 49
Page 50
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Setting an IP Address
The IP address for the switch must be set before it can be managed with the web-based manager. The switch IP address may be automatically set using BOOTP or DHCP protocols, in which case the actual address assigned to the switch must be known.
The IP address may alternatively be set using the Command Line Interface (CLI) over the console serial port as follows:
1. Starting at the command line prompt DES3326S4#
enter the commands config ipif System ipaddress xxx.xxx.xxx.xxx/yyy.yyy.yyy.yyy.
Where the x’s represent the IP address to be assigned to the IP interface named System and the
y’s represent the corresponding subnet mask.
2. Alternatively, you can enter DES3326S4# enter the commands config ipif system ipaddress xxx.xxx.xxx.xxx/z. Where the x’s represent the IP
address to be assigned to the IP interface named System and the z represents the corresponding number of subnets in CIDR notation.
Using this method, the switch can be assigned an IP address and subnet mask which can then be used to connect a management station to the switch’s web-based management agent.
Traps
Traps are messages that alert you of events that occur on the Switch. The events can be as serious as a reboot (someone
50 Switch Management and Operating Concepts
Page 51
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
accidentally turned OFF the Switch), or less serious like a port status change. The Switch generates traps and sends them to the network manager (trap recipient).
Trap recipients are special users of the network who are given certain rights and access in overseeing the maintenance of the network. Trap recipients will receive traps sent from the Switch; they must immediately take certain actions to avoid future failure or breakdown of the network.
You can also specify which network managers may receive traps from the Switch by entering a list of the IP addresses of authorized network managers. Up to four trap recipient IP addresses, and four corresponding SNMP community strings can be entered.
SNMP community strings function like passwords in that the community string entered for a given IP address must be used in the management station software, or a trap will be sent.
The following are trap types the switch can send to a trap recipient:
Cold Start This trap signifies that the Switch has been powered up and initialized such that software settings are reconfigured and hardware systems are rebooted. A cold start is different from a factory reset in that configuration settings saved to non-volatile RAM used to reconfigure the switch.
Warm Start This trap signifies that the Switch has been rebooted, however the POST (Power On Self-Test) is skipped.
Authentication Failure This trap signifies that someone has tried to logon to the switch using an invalid SNMP community string. The switch automatically stores the source IP address of the unauthorized user.
Switch Management and Operating Concepts 51
Page 52
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
New Root This trap indicates that the Switch has become the new root of the Spanning Tree, the trap is sent by the switch soon after its election as the new root. This implies that upon expiration of the Topology Change Timer the new root trap is sent out immediately after the Switch’s election as the new root.
Topology Change (STP) A Topology Change trap is sent by the Switch when any of its configured ports transitions from the Learning state to the Forwarding state, or from the Forwarding state to the Blocking state. The trap is not sent if a new root trap is sent for the same transition.
Link Up This trap is sent whenever the link of a port changes from link down to link up.
Link Down This trap is sent whenever the link of a port changes from link up to link down.
SNMP
The Simple Network Management Protocol (SNMP) is an OSI layer 7 (the application layer) protocol for remotely monitoring and configuring network devices. SNMP enables network management stations to read and modify the settings of gateways, routers, switches, and other network devices. SNMP can be used to perform many of the same functions as a directly connected console, or can be used within an integrated network management software package such as DView.
SNMP performs the following functions:
52 Switch Management and Operating Concepts
Page 53
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Sending and receiving SNMP packets through the IP protocol.
Collecting information about the status and current configuration of network devices.
Modifying the configuration of network devices.
The DES-3326S has a software program called an ‘agent’ that processes SNMP requests, but the user program that makes the requests and collects the responses runs on a management station (a designated computer on the network). The SNMP agent and the user program both use the UDP/IP protocol to exchange packets.
Authentication
The authentication protocol ensures that both the router SNMP agent and the remote user SNMP application program discard packets from unauthorized users. Authentication is accomplished using ‘community strings’, which function like passwords. The remote user SNMP application and the router SNMP must use the same community string. SNMP community strings of up to 20 characters may be entered under the Remote Management Setup menu of the console program.
Traps
Traps are messages that alert network personnel of events that occur on the Switch. The events can be as serious as a reboot (someone accidentally turned OFF the Switch), or less serious like a port status change. The Switch generates traps and sends them to the trap recipient (or network manager).
Trap recipients are special users of the network who are given certain rights and access in overseeing the maintenance of the network. Trap recipients will receive traps sent from the Switch;
Switch Management and Operating Concepts 53
Page 54
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
they must immediately take certain actions to avoid future failure or breakdown of the network.
You can also specify which network managers may receive traps from the Switch by entering a list of the IP addresses of authorized network managers. Up to four trap recipient IP addresses, and four corresponding SNMP community strings can be entered.
SNMP community strings function like passwords in that the community string entered for a given IP address must be used in the management station software, or a trap will be sent.
The following are trap types the switch can send to a trap recipient:
Cold Start This trap signifies that the Switch has been powered up and initialized such that software settings are reconfigured and hardware systems are rebooted. A cold start is different from a factory reset in that configuration settings saved to non-volatile RAM used to reconfigure the switch.
Warm Start This trap signifies that the Switch has been rebooted, however the POST (Power On Self-Test) is skipped.
Authentication Failure This trap signifies that someone has tried to logon to the switch using an invalid SNMP community string. The switch automatically stores the source IP address of the unauthorized user.
Topology Change A Topology Change trap is sent by the Switch when any of its configured ports transitions from the Learning state to the Forwarding state, or from the Forwarding state to the Blocking state. The trap is not
54 Switch Management and Operating Concepts
Page 55
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
sent if a new root trap is sent for the same transition.
Link Change Event This trap is sent whenever the link of a port changes from link up to link down or from link down to link up.
Port Partition This trap is sent whenever the port state enters the partition mode (or automatic partitioning, port disable) when more than thirty-two collisions occur while transmitting at 10Mbps or more than sixty­four collisions occur while transmitting at 100Mbps.
Broadcast\Multicast Storm This trap is sent whenever the port reaches the threshold (in packets per second) set globally for the switch. Counters are maintained for each port, and separate counters are maintained for broadcast and multicast packets. The switch’s default setting is 128 kpps for both broadcast and multicast packets.
MIBs
Management and counter information are stored in the Switch in the Management Information Base (MIB). The Switch uses the standard MIB-II Management Information Base module. Consequently, values for MIB objects can be retrieved from any SNMP-based network management software. In addition to the standard MIB-II, the Switch also supports its own proprietary enterprise MIB as an extended Management Information Base. These MIBs may also be retrieved by specifying the MIB’s
Switch Management and Operating Concepts 55
Page 56
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Object-Identity (OID) at the network manager. MIB values can be either read-only or read-write.
Read-only MIBs variables can be either constants that are programmed into the Switch, or variables that change while the Switch is in operation. Examples of read-only constants are the number of port and type of ports. Examples of read-only variables are the statistics counters such as the number of errors that have occurred, or how many kilobytes of data have been received and forwarded through a port.
Read-write MIBs are variables usually related to user­customized configurations. Examples of these are the Switch’s IP Address, Spanning Tree Algorithm parameters, and port status.
If you use a third-party vendors’ SNMP software to manage the Switch, a diskette listing the Switch’s propriety enterprise MIBs can be obtained by request. If your software provides functions to browse or modify MIBs, you can also get the MIB values and change them (if the MIBs’ attributes permit the write operation). This process however can be quite involved, since you must know the MIB OIDs and retrieve them one by one.
Packet Forwarding
The Switch enters the relationship between destination MAC or IP addresses and the Ethernet port or gateway router the destination resides on into its forwarding table. This information is then used to forward packets. This reduces the traffic congestion on the network, because packets, instead of being transmitted to all ports, are transmitted to the destination port only. Example: if Port 1 receives a packet destined for a station on Port 2, the Switch transmits that packet through Port 2 only, and transmits nothing through the
56 Switch Management and Operating Concepts
Page 57
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
other ports. This process is referred to as ‘learning’ the network topology.
MAC Address Aging Time
The Aging Time affects the learning process of the Switch. Dynamic forwarding table entries, which are made up of the source MAC addresses and their associated port numbers, are deleted from the table if they are not accessed within the aging time.
The aging time can be from 10 to 1,000,000 seconds with a default value of 300 seconds. A very long aging time can result in dynamic forwarding table entries that are out-of-date or no longer exist. This may cause incorrect packet forwarding decisions by the switch.
If the Aging Time is too short however, many entries may be aged out too soon. This will result in a high percentage of received packets whose source addresses cannot be found in the forwarding table, in which case the switch will broadcast the packet to all ports, negating many of the benefits of having a switch.
Static forwarding entries are not affected by the aging time.
Filtering
The switch uses a filtering database to segment the network and control communication between segments. It can also filter packets off the network for intrusion control. Static filtering entries can be made by MAC Address or IP Address filtering.
Each port on the switch is a unique collision domain and the switch filters (discards) packets whose destination lies on the
Switch Management and Operating Concepts 57
Page 58
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
same port as where it originated. This keeps local packets from disrupting communications on other parts of the network.
For intrusion control, whenever a switch encounters a packet originating from or destined to a MAC address or an IP Address entered into the filter table, the switch will discard the packet.
Some filtering is done automatically by the switch:
Dynamic filtering – automatic learning and aging of MAC addresses and their location on the network. Filtering occurs to keep local traffic confined to its segment.
Filtering done by the Spanning Tree Protocol, which can filter packets based on topology, making sure that signal loops don’t occur.
Filtering done for VLAN integrity. Packets from a member of a VLAN (VLAN 2, for example) destined for a device on another VLAN (VLAN 3) will be filtered.
Some filtering requires the manual entry of information into a filtering table:
MAC address filtering – the manual entry of specific MAC addresses to be filtered from the network. Packets sent from one manually entered MAC address can be filtered from the network. The entry may be specified as either a source, a destination, or both.
IP address filtering – the manual entry of specific IP addresses to be filtered from the network (switch must be in IP Routing mode). Packets sent from one manually entered IP address to another can be filtered from the network. The entry may specified as either a source, a destination, or both (switch must be in IP Routing mode).
58 Switch Management and Operating Concepts
Page 59
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Spanning Tree
The IEEE 802.1D Spanning Tree Protocol allows for the blocking of links between switches that form loops within the network. When multiple links between switches are detected, a primary link is established. Duplicated links are blocked from use and become standby links. The protocol allows for the duplicate links to be used in the event of a failure of the primary link. Once the Spanning Tree Protocol is configured and enabled, primary links are established and duplicated links are blocked automatically. The reactivation of the blocked links (at the time of a primary link failure) is also accomplished automatically – without operator intervention.
The DES-3326S STP allows two levels of spanning trees to be configured. The first level constructs a spanning tree on the links between switches. This is referred to as the Switch or Global level. The second level is on a port group basis. Groups of ports are configured as being members of a spanning tree and the algorithm and protocol are applied to the group of ports. This is referred to as the Port or VLAN level.
On the switch level, STP calculates the Bridge Identifier for each switch and then sets the Root Bridge and the Designated Bridges.
On the port level, STP sets the Root Port and the Designated Ports.
The following are the user-configurable STP parameters for the switch level:
Parameter Description Default
Value
Switch Management and Operating Concepts 59
Page 60
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
g
Bridge Identifier
(Not user­configurable except by setting priority below)
Priority A relative priority for each
Hello Time The length of time between
Maximum Age Timer
Forward Delay Timer
A combination of the User­set priority and the switch’s MAC address. The Bridge Identifier consists of two parts: a 16-bit priority and a 48-bit Ethernet MAC address
switch – lower numbers give a higher priority and a greater chance of a given switch being elected as the root bridge
broadcasts of the hello message by the switch
Measures the age of a received BPDU for a port and ensures that the BPDU is discarded when its age exceeds the value of the maximum age timer.
The amount time spent by a port in the learning and listening states waiting for a BPDU that may return the port to the blocking state.
32768 + MAC
32768
2 seconds
20 seconds
15 seconds
Table 5-4. STP Parameters – Switch Level
The following are the user-configurable STP parameters for the port or port group level:
Variable Description Default
Value
Port Priority A relative priority for each
port – lower numbers give a
her priority and a greater
hi
128
60 Switch Management and Operating Concepts
Page 61
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
chance of a given port being elected as the root port
Port Cost A value used by STP to
evaluate paths – STP calculates path costs and selects the path with the minimum cost as the active path.
19 – 100Mbps Fast Ethernet ports
10 – 1000Mbps Gigabit Ethernet ports
Table 5-5. STP Parameters – Port Group Level
Bridge Protocol Data Units
For STP to arrive at a stable network topology, the following information is used:
The unique switch identifier
The path cost to the root associated with each switch
port
The port identifier
STP communicates between switches on the network using Bridge Protocol Data Units (BPDUs). Each BPDU contains the following information:
The unique identifier of the switch that the transmitting switch currently believes is the root switch
The path cost to the root from the transmitting port
The port identifier of the transmitting port
The switch sends BPDUs to communicate and construct the spanning-tree topology. All switches connected to the LAN on
Switch Management and Operating Concepts 61
Page 62
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
which the packet is transmitted will receive the BPDU. BPDUs are not directly forwarded by the switch, but the receiving switch uses the information in the frame to calculate a BPDU, and, if the topology changes, initiates a BPDU transmission.
The communication between switches via BPDUs results in the following:
One switch is elected as the root switch
The shortest distance to the root switch is calculated for
each switch
A designated switch is selected. This is the switch closest to the root switch through which packets will be forwarded to the root.
A port for each switch is selected. This is the port providing the best path from the switch to the root switch.
Ports included in the STP are selected.
Creating a Stable STP Topology
If all switches have STP enabled with default settings, the switch with the lowest MAC address in the network will become the root switch. By increasing the priority (lowering the priority number) of the best switch, STP can be forced to select the best switch as the root switch.
When STP is enabled using the default parameters, the path between source and destination stations in a switched network might not be ideal. For instance, connecting higher-speed links to a port that has a higher number than the current root port can cause a root-port change. The goal is to make the fastest link the root port.
62 Switch Management and Operating Concepts
Page 63
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
STP Port States
The BPDUs take some time to pass through a network. This propagation delay can result in topology changes where a port that transitioned directly from a Blocking state to a Forwarding state could create temporary data loops. Ports must wait for new network topology information to propagate throughout the network before starting to forward packets. They must also wait for the packet lifetime to expire for BPDU packets that were forwarded based on the old topology. The forward delay timer is used to allow the network topology to stabilize after a topology change.
In addition, STP specifies a series of states a port must transition through to further ensure that a stable network topology is created after a topology change.
Each port on a switch using STP exists is in one of the following five states:
Blocking – the port is blocked from forwarding or receiving packets
Listening – the port is waiting to receive BPDU packets that may tell the port to go back to the blocking state
Learning – the port is adding addresses to its forwarding database, but not yet forwarding packets
Forwarding – the port is forwarding packets
Disabled – the port only responds to network
management messages and must return to the blocking state first
A port transitions from one state to another as follows:
Switch Management and Operating Concepts 63
Page 64
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
From initialization (switch boot) to blocking
From blocking to listening or to disabled
From listening to learning or to disabled
From learning to forwarding or to disabled
From forwarding to disabled
From disabled to blocking
Figure 5-2. STP Port State Transitions
64 Switch Management and Operating Concepts
Page 65
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
When STP is enabled, every port on every switch in the network goes through the blocking state and then transitions through the states of listening and learning at power up. If properly configured, each port stabilizes to the forwarding or blocking state.
No packets (except BPDUs) are forwarded from, or received by, STP enabled ports until the forwarding state is enabled for that port.
Default Spanning-Tree Configuration
Feature Default Value
Enable state STP enabled for all ports
Port priority 128
Port cost 19
Bridge Priority 32,768
Table 5-7. Default STP Parameters
User-Changeable STA Parameters
The factory default setting should cover the majority of installations. However, it is advisable to keep the default settings as set at the factory; unless, it is absolutely necessary. The user changeable parameters in the Switch are as follows:
Priority A Priority for the switch can be set from 0 to 65535. 0 is equal to the highest Priority.
Hello Time The Hello Time can be from 1 to 10 seconds. This is the interval between two
Switch Management and Operating Concepts 65
Page 66
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
transmissions of BPDU packets sent by the Root Bridge to tell all other Switches that it is indeed the Root Bridge. If you set a Hello Time for your Switch, and it is not the Root Bridge, the set Hello Time will be used if and when your Switch becomes the Root Bridge.
Note: The Hello Time cannot be longer than the Max. Age. Otherwise, a configuration error will occur.
Max. Age The Max. Age can be from 6 to 40 seconds. At the end of the Max. Age, if a BPDU has still not been received from the Root Bridge, your Switch will start sending its own BPDU to all other Switches for permission to become the Root Bridge. If it turns out that your Switch has the lowest Bridge Identifier, it will become the Root Bridge.
Forward Delay Timer The Forward Delay can be from 4 to 30 seconds. This is the time any port on the Switch spends in the listening state while moving from the blocking state to the forwarding state.
Note: Observe the following formulas when setting the above parameters:
Max. Age 2 x (Forward Delay - 1 second)
Max. Age 2 x (Hello Time + 1 second)
Port Priority A Port Priority can be from 0 to 255. The lower the number, the greater the probability the port will be chosen as the Root Port.
Port Cost A Port Cost can be set from 1 to 65535. The lower the number, the greater the probability the port will be chosen to forward packets.
66 Switch Management and Operating Concepts
Page 67
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Illustration of STP
A simple illustration of three Bridges (or three switches) connected in a loop is depicted below. In this example, you can anticipate some major network problems if the STP assistance is not applied. If Bridge A broadcasts a packet to Bridge B, Bridge B will broadcast it to Bridge C, and Bridge C will broadcast it to back to Bridge A ... and so on. The broadcast packet will be passed indefinitely in a loop, potentially causing a network failure.
STP can be applied as shown in Figure 2-4. In this example, STP breaks the loop by blocking the connection between Bridge B and C. The decision to block a particular connection is based on the STP calculation of the most current Bridge and Port settings. Now, if Bridge A broadcasts a packet to Bridge C, then Bridge C will drop the packet at port 2 and the broadcast will end there.
Setting-up STP using values other than the defaults, can be complex. Therefore, you are advised to keep the default factory settings and STP will automatically assign root bridges/ports and block loop connections. Influencing STP to choose a particular switch as the root bridge using the Priority setting, or influencing STP to choose a particular port to block using the Port Priority and Port Cost settings is, however, relatively straight forward.
Switch Management and Operating Concepts 67
Page 68
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 5-3. Before Applying the STA Rules
In this example, only the default STP values are used.
68 Switch Management and Operating Concepts
Page 69
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 5-4. After Applying the STA Rules
The switch with the lowest Bridge ID (switch C) was elected the root bridge, and the ports were selected to give a high port cost between switches B and C. The two (optional) Gigabit ports (default port cost = 10) on switch A are connected to one (optional) Gigabit port on both switch B and C. The redundant link between switch B and C is deliberately chosen as a 100 Mbps Fast Ethernet link (default port cost = 19). Gigabit ports could be used, but the port cost should be increased from the default to ensure that the link between switch B and switch C is the blocked link.
Switch Management and Operating Concepts 69
Page 70
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Link Aggregation
Link aggregation is used to combine a number of ports together to make a single high-bandwidth data pipeline. The participating parts are called members of a link aggregation group, with one port designated as the master port of the group. Since all members of the link aggregation group must be configured to operate in the same manner, the configuration of the master port is applied to all members of the link aggregation group. Thus, when configuring the ports in a link aggregation group, you only need to configure the master port.
The DES-3326S supports link aggregation groups, which may include from 2 to 8 switch ports each, except for a Gigabit link aggregation group which consists of the 2 (optional) Gigabit Ethernet ports of the front panel. These ports are the two 1000BASE-SX, -LX –TX or GBIC ports contained in a front­panel mounted module.
70 Switch Management and Operating Concepts
Page 71
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 5-5. Link Aggregation Group
Data transmitted to a specific host (destination address) will always be transmitted over the same port in a link aggregation group. This allows packets in a data stream to arrive in the same order they were sent. A aggregated link connection can be made with any other switch that maintains host-to-host data streams over a single link aggregate port. Switches that use a load-balancing scheme that sends the packets of a host-to-host data stream over multiple link aggregation ports cannot have a aggregated connection with the DES-3326S switch.
Switch Management and Operating Concepts 71
Page 72
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
VLANs
A VLAN is a collection of end nodes grouped by logic rather than physical location. End nodes that frequently communicate with each other are assigned to the same VLAN, regardless of where they are located physically on the network. Logically, a VLAN can be equated to a broadcast domain, because broadcast packets are forwarded only to members of the VLAN on which the broadcast was initiated.
Notes About VLANs on the DES-3326S
1. The DES-3326S supports IEEE 802.1Q VLANs. The port untagging function can be used to remove the 802.1Q tag from packet headers to maintain compatibility with devices that are tag­unaware (that is, network devices that do not support IEEE 802.1Q VLANs or tagging).
2. The switch’s default - in both Layer 2 Only mode and IP Routing mode - is to assign all ports to a single 802.1Q VLAN named DEFAULT_VLAN.
3. The switch allows the assignment of an IP interface to each VLAN, in IP Routing mode. The VLANs must be configured before setting up the IP interfaces
4. A VLAN that is not assigned an IP interface will behave as a layer 2 VLAN – and IP routing, by the switch, will not be possible to this VLAN regardless of the switch’s operating mode.
72 Switch Management and Operating Concepts
Page 73
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
IEEE 802.1Q VLANs
Some relevant terms:
Tagging - The act of putting 802.1Q VLAN information into the header of a packet.
Untagging - The act of stripping 802.1Q VLAN information out of the packet header.
Ingress port - A port on a switch where packets are flowing into the switch and VLAN decisions must be made.
Egress port - A port on a switch where packets are flowing out of the switch, either to another switch or to an end station, and tagging decisions must be made.
IEEE 802.1Q (tagged) VLANs are implemented on the DES­3326S Layer 3 switch. 802.1Q VLANs require tagging, which enables the VLANs to span an entire network (assuming all switches on the network are IEEE 802.1Q-compliant).
Any port can be configured as either tagging or untagging. The untagging feature of IEEE 802.1Q VLANs allow VLANs to work with legacy switches that don’t recognize VLAN tags in packet headers. The tagging feature allows VLANs to span multiple
802.1Q-compliant switches through a single physical connection and allows Spanning Tree to be enabled on all ports and work normally.
802.1Q VLAN Packet Forwarding
Packet forwarding decisions are made based upon the following three types of rules:
Ingress rules – rules relevant to the classification of received frames belonging to a VLAN.
Switch Management and Operating Concepts 73
Page 74
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Forwarding rules between ports – decides filter or forward the packet
Egress rules – determines if the packet must be sent tagged or untagged.
Figure 5-6. IEEE 802.1Q Packet Forwarding
802.1Q VLAN Tags
The figure below shows the 802.1Q VLAN tag. There are four additional octets inserted after the source MAC address. Their presence is indicated by a value of 0x8100 in the EtherType field. When a packet’s EtherType field is equal to 0x8100, the packet carries the IEEE 802.1Q/802.1p tag. The tag is contained in the following two octets and consists of 3 bits or user priority, 1 bit of Canonical Format Identifier (CFI – used for encapsulating Token Ring packets so they can be carried
74 Switch Management and Operating Concepts
Page 75
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
across Ethernet backbones) and 12 bits of VLAN ID (VID). The 3 bits of user priority are used by 802.1p. The VID is the VLAN identifier and is used by the 802.1Q standard. Because the VID is 12 bits long, 4094 unique VLANs can be identified.
The tag is inserted into the packet header making the entire packet longer by 4 octets. All of the information contained in the packet originally is retained.
Figure 5-7. IEEE 802.1Q Tag
The EtherType and VLAN ID are inserted after the MAC source address, but before the original EtherType/Length or Logical Link Control. Because the packet is now a bit longer than it was originally, the Cyclic Redundancy Check (CRC) must be recalculated.
Switch Management and Operating Concepts 75
Page 76
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 5-8. Adding an IEEE 802.1Q Tag
Port VLAN ID
Packets that are tagged (are carrying the 802.1Q VID information) can be transmitted from one 802.1Q compliant network device to another with the VLAN information intact. This allows 802.1Q VLANs to span network devices (and indeed, the entire network – if all network devices are 802.1Q compliant).
Unfortunately, not all network devices are 802.1Q compliant. These devices are referred to as tag-unaware. 802.1Q devices are referred to as tag-aware.
Prior to the adoption 802.1Q VLANs, port-based and MAC­based VLANs were in common use. These VLANs relied upon a Port VLAN ID (PVID) to forward packets. A packet received on a given port would be assigned that port’s PVID and then be forwarded to the port that corresponded to the packet’s destination address (found in the switch’s forwarding table). If the PVID of the port that received the packet is different from the PVID of the port that is to transmit the packet, the switch will drop the packet.
76 Switch Management and Operating Concepts
Page 77
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Within the switch, different PVIDs mean different VLANs. (remember that two VLANs cannot communicate without an external router). So, VLAN identification based upon the PVIDs cannot create VLANs that extend outside a given switch (or switch stack).
Every physical port on a switch has a PVID. 802.1Q ports are also assigned a PVID, for use within the switch. If no VLANs are defined on the switch, all ports are then assigned to a default VLAN with a PVID equal to 1. Untagged packets are assigned the PVID of the port on which they were received. Forwarding decisions are based upon this PVID, in so far as VLANs are concerned. Tagged packets are forwarded according to the VID contained within the tag. Tagged packets are also assigned a PVID, but the PVID is not used to make packet forwarding decisions, the VID is.
Tag-aware switches must keep a table to relate PVIDs within the switch to VIDs on the network. The switch will compare the VID of a packet to be transmitted to the VID of the port that is to transmit the packet. If the two VIDs are different, the switch will drop the packet. Because of the existence of the PVID for untagged packets and the VID for tagged packets, tag­aware and tag-unaware network devices can coexist on the same network.
A switch port can have only one PVID, but can have as many VIDs as the switch has memory in its VLAN table to store them.
Because some devices on a network may be tag-unaware, a decision must be made at each port on a tag-aware device before packets are transmitted – should the packet to be transmitted have a tag or not? If the transmitting port is connected to a tag-unaware device, the packet should be untagged. If the transmitting port is connected to a tag-aware device, the packet should be tagged.
Switch Management and Operating Concepts 77
Page 78
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Tagging and Untagging
Every port on an 802.1Q compliant switch can be configured as tagging or untagging.
Ports with tagging enabled will put the VID number, priority and other VLAN information into the header of all packets that flow into and out of it. If a packet has previously been tagged, the port will not alter the packet, thus keeping the VLAN information intact. The VLAN information in the tag can then be used by other 802.1Q compliant devices on the network to make packet forwarding decisions.
Ports with untagging enabled will strip the 802.1Q tag from all packets that flow into and out of those ports. If the packet doesn’t have an 802.1Q VLAN tag, the port will not alter the packet. Thus, all packets received by and forwarded by an untagging port will have no 802.1Q VLAN information. (Remember that the PVID is only used internally within the switch). Untagging is used to send packets from an 802.1Q­compliant network device to a non-compliant network device.
Ingress Filtering
A port on a switch where packets are flowing into the switch and VLAN decisions must be made is referred to as an ingress port. If ingress filtering is enabled for a port, the switch will examine the VLAN information in the packet header (if present) and decide whether or not to forward the packet.
If the packet is tagged with VLAN information, the ingress port will first determine if the ingress port itself is a member of the tagged VLAN. If it is not, the packet will be dropped. If the ingress port is a member of the 802.1Q VLAN, the switch then determines if the destination port is a member of the 802.1Q VLAN. If it is not, the packet is dropped. If the destination port is a member of the 802.1Q VLAN, the packet is forwarded
78 Switch Management and Operating Concepts
Page 79
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
and the destination port transmits it to its attached network segment.
If the packet is not tagged with VLAN information, the ingress port will tag the packet with its own PVID as a VID (if the port is a tagging port). The switch then determines if the destination port is a member of the same VLAN (has the same VID) as the ingress port. If it does not, the packet is dropped. If it has the same VID, the packet is forwarded and the destination port transmits it on its attached network segment.
This process is referred to as ingress filtering and is used to conserve bandwidth within the switch by dropping packets that are not on the same VLAN as the ingress port at the point of reception. This eliminates the subsequent processing of packets that will just be dropped by the destination port.
VLANs in Layer 2 Only Mode
The switch initially configures one VLAN, VID = 1, called the DEFAULT_VLAN. The factory default setting assigns all ports on the switch to the DEFAULT_VLAN.
Packets cannot cross VLANs if the switch is in Layer 2 Only mode. If a member of one VLAN wants to connect to another VLAN, the link must be through an external router.
When the switch is in Layer 2 Only mode, 802.1Q VLANs are supported.
If no VLANs are configured on the switch and the switch is in Layer 2 Only mode, then all packets will be forwarded to any destination port. Packets with unknown source addresses will be flooded to all ports. Broadcast and multicast packets will also be flooded to all ports.
Switch Management and Operating Concepts 79
Page 80
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
A VLAN that does not have a corresponding IP interface defined for it, will function as a Layer 2 Only VLAN – regardless of the Switch Operation mode.
Layer 3-Based VLANs
Layer 3-based VLANs use network-layer addresses (subnet address for TCP/IP) to determine VLAN membership. These VLANs are based on layer 3 information, but this does not constitute a ‘routing’ function.
The DES-3326S allows an IP subnet to be configured for each
802.1Q VLAN that exists on the switch.
Even though a switch inspects a packet’s IP address to determine VLAN membership, no route calculation is performed, the RIP protocol is not employed, and packets traversing the switch are bridged using the Spanning Tree algorithm.
A switch that implements layer 3 (or ‘subnet’) VLANs without performing any routing function between these VLANs is referred to as performing ‘IP Switching’.
IP Addressing and Subnetting
This section gives basic information needed to configure your Layer 3 switch for IP routing. The information includes how IP addresses are broken down and how subnetting works. You will learn how to assign each interface on the router an IP address with a unique subnet.
Definitions
IP Address – the unique number ID assigned to each host or interface on a network. IP addresses have the form xxx.xxx.xxx.xxx.
80 Switch Management and Operating Concepts
Page 81
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Subnet – a portion of a network sharing a particular network address.
Subnet mask – a 32-bit number used to describe which portion of a Network Address refers to the subnet and which portion refers to the host. Subnet masks have the form xxx.xxx.xxx.xxx.
Interface – a network connection
IP Interface – another name for subnet.
Network Address – the resulting 32-bit number from a
bitwise logical AND operation performed between an IP address and a subnet mask.
Subnet Address – another name for network address.
IP Addresses
The Internet Protocol (IP) was designed for routing data between network sites. Later, it was adapted for routing between networks (referred to as “subnets”) within a site. The IP defines a way of generating a unique number that can be assigned each network in the internet and each of the computers on each of those networks. This number is called the IP address.
IP addresses use a “dotted decimal” notation. Here are some examples of IP addresses written in this format:
1. 210.202.204.205
2. 189.21.241.56
3. 125.87.0.1
This allows IP address to be written in a string of 4 decimal (base 10) numbers. Computers can only understand binary (base 2) numbers, and these binary numbers are usually
Switch Management and Operating Concepts 81
Page 82
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
grouped together in bytes, or eight bits. (A bit is a binary digit – either a “1” or a “0”). The dots (periods) simply make the IP address easier to read. A computer sees an IP address not as four decimal numbers, but as a long string of binary digits (32 binary digits or 32 bits, IP addresses are 32-bit addresses).
The three IP addresses in the example above, written in binary form are:
1. 11010010.11001010.11001100.11001101
2. 10111101.00010101.11110001.00111000
3. 01111101.01010111.00000000.00000001
The dots are included to make the numbers easier to read.
Eight binary bits are called a ‘byte’ or an ‘octet’. An octet can represent any decimal value between ‘0’ (00000000) and ‘255’ (11111111). IP addresses, represented in decimal form, are four numbers whose value is between ‘0’ to ‘255’. The total range of IP addresses are then:
Lowest possible IP address - 0.0.0.0 Highest possible IP address - 255.255.255.255
To convert decimal numbers to 8-bit binary numbers (and vice­versa), you can use the following chart:
7
Binary Octet Digit 2
262524232221 2
0
Decimal Equivalent 128 64 32 16 8 4 2 1
Binary Number
1 1 1 1 1 1 1 1
128+64+32+16+8+4+2+1=
255
Table 5-8. Binary to Decimal Conversion
82 Switch Management and Operating Concepts
Page 83
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Each digit in an 8-bit binary number (an octet) represents a power of two. The left-most digit represents 2 raised to the 7
th
power (2x2x2x2x2x2x2=128) while the right-most digit represents 2 raised to the 0
th
0
power is equal to one, by definition).
th
power (any number raised to the
IP addresses actually consist of two parts, one identifying the network and one identifying the destination (node) within the network.
The IP address discussed above is one part and a second number called the Subnet mask is the other part. To make this a bit more confusing, the subnet mask has the same numerical form as an IP address.
Address Classes
Address classes refer to the range of numbers in the subnet mask. Grouping the subnet masks into classes makes the task of dividing a network into subnets a bit easier.
There are 5 address classes. The first 4 bits in the IP address determine which class the IP address falls in.
Class A addresses begin with 0xxx, or 1 to 126 decimal.
Class B addresses begin with 10xx, or 128 to 191 decimal.
Class C addresses begin with 110x, or 192 to 223 decimal.
Class D addresses begin with 1110, or 224 to 239 decimal.
Class E addresses begin with 1111, or 240 to 254 decimal.
Addresses beginning with 01111111, or 127 decimal, are reserved. They are used for internal testing on a local machine (called loopback). The address 127.0.0.1 can always be pinged from a local node because it forms a loopback and points back to the same node.
Class D addresses are reserved for multicasting.
Switch Management and Operating Concepts 83
Page 84
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Class E Addresses are reserved for future use. They are not used for node addresses.
The part of the IP address that belongs to the network is the part that is ‘hidden’ by the ‘1’s in the subnet mask. This can be seen below:
Class A NETWORK.node.node.node
Class B NETWORK.NETWORK.node.node
Class C NETWORK.NETWORK.NETWORK.node
For example, the IP address 10.42.73.210 is a Class A address, so the Network part of the address (called the Network Address) is the first octet (10.x.x.x). The node part of the address is the last three octets (x.42.73.210).
To specify the network address for a given IP address, the node part is set to all “0”s. In our example, 10.0.0.0 specifies the network address for 10.42.73.210. When the node part is set to all “1”s, the address specifies a broadcast address. So,
10.255.255.255 is the broadcast address for the network
10.0.0.0.
Subnet Masking
A subnet mask can be applied to an IP address to identify the network and the node parts of the address. A bitwise logical AND operation between the IP address and the subnet mask results in the Network Address.
For example:
00001010.00101010.01001001.11010010 10.42.73.210 Class A IP address
11111111.00000000.00000000.00000000 255.0.0.0 Class A Subnet Mask
00001010.00000000.00000000.00000000 10.0.0.0 Network Address
84 Switch Management and Operating Concepts
Page 85
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
The Default subnet masks are:
Class A – 11111111.00000000.00000000.00000000
255.0.0.0
Class B – 11111111.11111111.00000000.00000000
255.255.0.0
Class C – 1111111.11111111.11111111.00000000
255.255.255.0
Additional bits can be added to the default subnet mask for a given Class to further subnet a network. When a bitwise logical AND operation is performed between the subnet mask and the IP address, the result defines the Subnet Address.
Some restrictions apply to subnet addresses. Addresses of all “0”s and all “1”s are reserved for the local network (when a host does not know it’s network address) and for all hosts on the network (the broadcast address). This also applies to subnets. A subnet address cannot be all “0”s or all “1”s. A 1-bit subnet mask is also not allowed.
Calculating the Number of Subnets and Nodes
To calculate the number of subnets and nodes, use the formula
n
(2
– 2) where n = the number of bits in either the subnet mask or the node portion of the IP address. Multiplying the number of subnets by the number of nodes available per subnet gives the total number of nodes for the entire network.
Example
00001010.00101010.01001001.11010010 10.42.73.210 Class A IP address
11111111.11100000.00000000.00000000 255.224.0.0 Subnet Mask
00001010.00100000.00000000.00000000 10.32.0.0 Network Address
00001010.00101010.11111111.11111111 10.32.255.255 Broadcast Address
Switch Management and Operating Concepts 85
Page 86
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
This example uses an 11-bit subnet mask. (There are 3 additional bits added to the default Class A subnet mask). So the number of subnets is:
3
2
– 2 = 8 – 2 = 6
Subnets of all “0”s and all “1”s are not allowed, so 2 subnets are subtracted from the total.
The number of bits used in the node part of the address is 24 – 3 = 21 bits, so the total number of nodes is:
2
21
– 2 = 2,097,152 – 2 = 2,097,150
Multiplying the number of subnets times the number of nodes gives 12,582,900 possible nodes.
Note that this is less than the 16,777,214 possible nodes that an unsubnetted class A network would have.
Subnetting reduces the number of possible nodes for a given network, but increases the segmentation of the network.
Classless InterDomain Routing – CIDR
Under CIDR, the subnet mask notation is reduced to a simplified shorthand. Instead of specifying all of the bits of the subnet mask, it is simply listed as the number of contiguous “1”s (bits) in the network portion of the address. Look at the subnet mask of the above example in binary -
11111111.11100000.00000000.00000000 – and you can see that there are 11 “1”s or 11 bits used to mask the network address from the node address. Written in CIDR notation this becomes:
10.32.0.0/11
86 Switch Management and Operating Concepts
Page 87
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
# of
Subnet Mask CID
Bits
2 255.192.0.0 /10 2 4194302 8388604
3 255.224.0.0 /11 6 2097150 12582900
4 255.240.0.0 /12 14 1048574 14680036
5 255.248.0.0 /13 30 524286 15728580 6 255.252.0.0 /14 62 262142 16252804 7 255.254.0.0 /15 126 131070 16514820 8 255.255.0.0 /16 254 65534 16645636 9 255.255.128.0 /17 510 32766 16710660 10 255.255.192.0 /18 1022 16382 16742404 11 255.255.224.0 /19 2046 8190 16756740 12 255.255.240.0 /20 4094 4094 16760836 13 255.255.248.0 /21 8190 2046 16756740 14 255.255.252.0 /22 16382 1022 16742404 15 255.255.254.0 /23 32766 510 16710660 16 255.255.255.0 /24 65534 254 16645636 17 255.255.255.1
28
18 255.255.255.1
92
19 255.255.255.2
24
20 255.255.255.2
40
21 255.255.255.2
48
22 255.255.255.2
52
# of
R
Subnets Nota tion
/25 131070 126 16514820
/26 262142 62 16252804
/27 525286 30 15728580
/28 1048574 14 14680036
/29 2097150 6 12582900
/30 4194302 2 8388604
# of Hosts
Total Hosts
Table 5-9. Class A Subnet Masks
# of
Subnet Mask CIDR Bits 2 255.255.192 /18 2 16382 32764 3 255.255.224.0 /19 6 8190 49140 4 255.255.240.0 /20 14 4094 57316 5 255.255.248.0 /21 30 2046 61380 6 255.255.252.0 /22 62 1022 63364 7 255.255.254.0 /23 126 510 64260
Switch Management and Operating Concepts 87
Notation
# of Subnets
# of Hosts
Total Hosts
Page 88
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
8 255.255.255.0 /24 254 254 64516 9 255.255.255.128 /25 510 126 64260 10 255.255.255.192 /26 1022 62 63364 11 255.255.255.224 /27 2046 30 61380 12 255.255.255.240 /28 4094 14 57316 13 255.255.255.248 /29 8190 6 49140 14 255.255.255.252 /30 16382 2 32764
Table 5-10. Class B Subnet Masks
# of
Subnet Mask CIDR
Bits 2 255.255.255.192 /26 2 62 124 3 255.255.255.224 /27 6 30 180 4 255.255.255.240 /28 14 14 196 5 255.255.255.248 /29 30 6 180 6 255.255.255.252 /30 62 2 124
Notation
# of Subnets
# of Hosts
Total Hosts
Table 5-11. Class C Subnet Masks
Setting up IP Interfaces
The Layer 3 switch allows ranges of IP addresses (OSI layer 3) to be assigned to VLANs (OSI layer 2). Each VLAN must be configured prior to setting up the corresponding IP interface. An IP addressing scheme must then be established, and implemented when the IP interfaces are set up on the switch.
An example is presented below:
VLAN Name VID Switch Ports
System (default) 1 5, 6, 7, 8, 21, 22, 23, 24
Engineering 2 9, 10, 11, 12
Marketing 3 13, 14, 15, 16
Finance 4 17, 18, 19, 20
Sales 5 1, 2, 3, 4
88 Switch Management and Operating Concepts
Page 89
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Backbone 6 25, 26
Table 5-12. VLAN Example – Assigned Ports
In this case, 6 IP interfaces are required, so a CIDR notation of
10.32.0.0/11 (or a 11-bit) addressing scheme will work. This addressing scheme will give a subnet mask of
11111111.11100000.00000000.00000000 (binary) or
255.224.0.0 (decimal).
Using a 10.xxx.xxx.xxx IP address notation, the above example would give 6 network addresses and 6 subnets.
Any IP address from the allowed range of IP addresses for each subnet can be chosen as an IP address for an IP interface on the switch.
For this example, we have chosen the next IP address above the network address:
VLAN Name VID Network Address IP Address
System (default) 1 10.32.0.0 10.32.0.1
Engineering 2 10.64.0.0 10.64.0.1
Marketing 3 10.96.0.0 10.96.0.1
Finance 4 10.128.0.0 10.128.0.1
Sales 5 10.160.0.0 10.160.0.1
Backbone 6 10.192.0.0 10.192.0.1
Table 5-13. VLAN Example – Assigned IP Addresses
Switch Management and Operating Concepts 89
Page 90
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
The 6 IP interfaces, each with an IP address (listed in the table above), and a subnet mask of 255.224.0.0 can be entered into the Setup IP Interface menu.
Layer 3-Based VLANs
Layer 3-based VLANs use network-layer addresses (subnet address for TCP/IP) to determine VLAN membership. These VLANs are based on layer 3 information, but this does not constitute a ‘routing’ function.
The DES-3326S allows an IP subnet to be configured for each
802.1Q VLAN that exists on the switch.
Even though a switch inspects a packet’s IP address to determine VLAN membership, no route calculation is performed, the RIP protocol is not employed, and packets traversing the switch are bridged using the Spanning Tree algorithm.
A switch that implements layer 3 (or ‘subnet’) VLANs without performing any routing function between these VLANs is referred to as performing ‘IP Switching’.
Internet Protocols
This is a brief introduction to the suite of Internet Protocols frequently referred to as TCP/IP. It is intended to give the reader a reasonable understanding of the available facilities and some familiarity with terminology. It is not intended to be a complete description.
90 Switch Management and Operating Concepts
Page 91
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Protocol Layering
The Internet Protocol (IP) divides the tasks necessary to route and forward packets across networks by using a layered approach. Each layer has clearly defined tasks, protocol, and interfaces for communicating with adjacent layers, but the exact way these tasks are accomplished is left to individual software designers. The Open Systems Interconnect (OSI) seven-layer model has been adopted as the reference for the description of modern networking, including the Internet.
A diagram of the OSI model is shown below (note that this is not a complete listing of the protocols contained within each layer of the model):
Figure 5-8. OSI Seven Layer Network Model
Each layer is a distinct set of programs executing a distinct set of protocols designed to accomplish some necessary tasks. They are separated from the other layers within the same
Switch Management and Operating Concepts 91
Page 92
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
system or network, but must communicate and interoperate. This requires very well-defined and well-known methods for transferring messages and data. This is accomplished through the protocol stack.
Protocol layering as simply a tool for visualizing the organization of the necessary software and hardware in a network. In this view, Layer 2 represents switching and Layer 3 represents routing. Protocol layering is actually a set of guidelines used in writing programs and designing hardware that delegate network functions and allow the layers to communicate. How these layers communicate within a stack (for example, within a given computer) is left to the operating system programmers.
Figure 5-9. The Protocol Stack
92 Switch Management and Operating Concepts
Page 93
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Between two protocol stacks, members of the same layer are known as peers and communicate by well-known (open and published) protocols. Within a protocol stack, adjacent
layers communicate by an internal interface. This interface is usually not publicly documented and is frequently proprietary. It has some of the same characteristics of a protocol and two stacks from the same software vendor may communicate in the same way. Two stacks from different software vendors (or different products from the same vendor) may communicate in completely different ways. As long as peers can communicate and interoperate, this has no impact on the functioning of the network.
The communication between layers within a given protocol stack can be both different from a second stack and proprietary, but communication between peers on the same OSI layer is open and consistent.
A brief description of the most commonly used functional layers is helpful to understand the scope of how protocol layering works.
Layer 1
This is referred to as the physical layer. It handles the electrical connections and signaling required to make a physical link from one point in the network to another. It is on this layer that the unique Media Access Control (MAC) address is defined.
Layer 2
This layer, commonly called the switching layer, allows end station addressing and the establishment of connections between them.
Switch Management and Operating Concepts 93
Page 94
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Layer 2 switching forwards packets based on the unique MAC address of each end station and offers high-performance, dedicated-bandwidth of Fast or Gigibit Ethernet within the network.
Layer 2 does not ordinarily extend beyond the intranet. To connect to the Internet usually requires a router and a modem or other device to connect to an Internet Service Provider’s WAN. These are Layer 3 functions.
Layer 3
Commonly referred to as the routing layer, this layer provides logical partitioning of networks (subnetting), scalability, security, and Quality of Service (QoS).
The backbone of the Internet is built using Layer 3 functions. IP is the premier Layer 3 protocol.
IP is itself, only one protocol in the IP protocol suite. More extensive capabilities are found in the other protocols of the IP suite. For example; the Domain Name System (DNS) associates IP addresses with text names, the Dynamic Host Configuration Protocol (DCHP) eases the administration of IP addresses, and routing protocols such as the Routing Information Protocol (RIP), the Open Shortest Path First (OSPF), and the Border Gateway Protocol (BGP) enable Layer 3 devices to direct data traffic to the intended destination. IP security allows for authentication and encryption. IP not only allows for user-to­user communication, but also for transmission from point-to­multipoint (known as IP multicasting).
Layer 4
This layer, known as the transport layer, establishes the communication path between user applications and the network infrastructure and defines the method of
94 Switch Management and Operating Concepts
Page 95
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
communicating. TCP and UDP are well-known protocols in the transport layer. TCP is a “connection-oriented” protocol, and requires the establishment of parameters for transmission prior to the exchange of data. Web technology is based on TCP. UDP is “connectionless” and requires no connection setup. This is important for multicast traffic, which cannot tolerate the overhead and latency of TCP. TCP and UDP also differ in the amount of error recovery provided and whether or not it is visible to the user application. Both TCP and UDP are layered on IP, which has minimal error recovery and detection. TCP forces retransmission of data that was lost by the lower layers, UDP does not.
Layer 7
This layer, known as the application layer, provides access to either the end user application software such as a database. Users communicate with the application, which in turn delivers data to the transport layer. Applications do not usually communicate directly with lower layers They are written to use a specific communication library, like the popular WinSock library.
Software developers must decide what type of transport mechanism is necessary. For example, Web access requires reliable, error-free access and would demand TCP, Multimedia, on the other hand, requires low overhead and latency and commonly uses UDP.
TCP/IP
The TCP/IP protocol suite is a set of protocols that allow computers to share resources across a network. TCP and IP are only two of the Internet suite of protocols, but they are the best known and it has become common to refer the entire family of Internet protocols as TCP/IP.
Switch Management and Operating Concepts 95
Page 96
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
TCP/IP is a layered set of protocols. An example, such as sending e-mail, can illustrate this. There is first a protocol for sending and receiving e-mail. This protocol defines a set of commands to identify the sender, the recipient, and the content of the e-mail. The e-mail protocol will not handle the actual communication between the two computers, this is done by TCP/IP. TCP/IP handles the actual sending and receiving of the packets that make up the e-mail exchange.
TCP makes sure the e-mail commands and messages are received by the appropriate computers. It keeps track of what is sent and what is received, and retransmits any packets that are lost or dropped. TCP also handles the division of large messages into several Ethernet packets, and makes sure these packets are received and reassembled in the correct order.
Because these functions are required by a large number of applications, they are grouped into a single protocol, rather than being the part of the specifications for just sending e-mail. TCP is then a library of routines that application software can use when reliable network communications are required.
IP is also a library of routines, but with a more general set of functions. IP handles the routing of packets from the source to the destination. This may require the packets to traverse many different networks. IP can route packets through the necessary gateways and provides the functions required for any user on one network to communicate with any user on another connected network.
The communication interface between TCP and IP is relatively simple. When IP received a packet, it does not know how this packet is related to others it has sent (or received) or even which connection the packet is part of. IP only knows the address of the source and the destination of the packet, and it makes its best effort to deliver the packet to its destination.
96 Switch Management and Operating Concepts
Page 97
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
The information required for IP to do its job is contained in a series of octets added to the beginning of the packet called headers. A header contains a few octets of data added to the packet by the protocol in order to keep track of it.
Other protocols on other network devices can add and extract their own headers to and from packets as they cross networks. This is analogous to putting data into an envelope and sending the envelope to a higher-level protocol, and having the higher­level protocol put the entire envelope into it’s own, larger envelope. This process is referred to as encapsulation.
Many levels of encapsulation are required for a packet to cross the Internet.
Packet Headers
TCP
Most data transmissions are much longer that a single packet. The data must then be divided up among a series of packets. These packets must be transmitted, received and then reassembled into the original data. TCP handles these functions.
TCP must know how large a packet the network can process. To do this, the TCP protocols at each end of a connection state how large a packet they can handle and the smaller of the two is selected.
The TCP header contains at least 20 octets. The source and destination TCP port numbers are the most important fields. These specify the connection between two TCP protocols on two network devices.
Switch Management and Operating Concepts 97
Page 98
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
The header also contains a sequence number that is used to ensure the packets are received in the correct order. The packets are not numbered, but rather the octets the packets contain are. If there are 100 octets of data in each packet, the first packet is numbered 0, the second 100, the third 200, etc.
To insure that the data in a packet is received uncorrupted, TCP adds the binary value of all the octets in the packet and writes the sum in the checksum field. The receiving TCP recalculates the checksum and if the numbers are different, the packet is dropped.
Figure 5-10. TCP Packet Header
When packets have been successfully received, TCP sends an acknowledgement. This is simply a packet that has the acknowledgement number field filled in.
An acknowledgement number of 1000 indicates that all of the data up to octet 1000 has been received. If the transmitting TCP does not receive an acknowledgement in a reasonable amount of time, the data is resent.
98 Switch Management and Operating Concepts
Page 99
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
The window field controls the amount of data being sent at any one time. It would require too much time and overhead to acknowledge each packet received. Each end of the TCP connection declares how much data it is able to receive at any one time by writing this number of octets in the window field.
The transmitting TCP decrements the number in the window field and when it reaches zero, the transmitting TCP stops sending data. When the receiving TCP can accept more data, it increases the number in the window field. In practice, a single packet can acknowledge the receipt of data and give permission for more data to be sent.
IP
TCP sends its packets to IP with the source and destination IP addresses. IP is only concerned with these IP addresses. It is not concerned with the contents of the packet or the TCP header.
IP finds a route for the packet to get to the other end of the TCP connection. IP adds its own header to the packet to accomplish this.
The IP header contains the source and destination addresses, the protocol number, and another checksum.
The protocol number tells the receiving IP which protocol to give the packet to. Although most IP traffic uses TCP, other protocols can be used (such as UDP).
The checksum is used by the receiving IP in the same way as the TCP checksum.
Switch Management and Operating Concepts 99
Page 100
DES-3326S Layer 3 Fast Ethernet Switch User’s Guide
Figure 5-11. IP Packet Header
The flags and fragment offset are used to keep track of packets that must be divided among several smaller packets to cross networks for which they are too large.
The Time-to-Live (TTL) is the number of gateways the packet is allowed to cross between the source and destination. This number is decremented by one when the packet crosses a gateway and when the TTL reaches zero, the packet is dropped. This helps reduce network traffic if a loop develops.
Ethernet
Every active Ethernet device has its own Ethernet address (commonly called the MAC address) assigned to it by the manufacturer. Ethernet uses 48 bit addresses.
The Ethernet header is 14 octets that include the source and destination MAC address and a type code.
100 Switch Management and Operating Concepts
Loading...