DrayTek VigorSwitch P1100 Service Manual

i
VigorSwitch P1100
PoE 8 + 2 Gigabit Port Web Smart
User’s Guide
Version: 1.4
Firmware Version: V2.1.0_RC1
Date: January 5, 2018
(For future update, please visit DrayTek web site for further information)
ii
VigorSwitch P1100 User’s Guide
Intellectual Property Rights (IPR) Information
Copyrights
Trademarks
© All rights reserved. This publication contains information that is protected by copyright. No part may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language without written permission from the copyright holders.
The following trademarks are used in this document:
Microsoft is a registered trademark of Microsoft Corp. Windows, Windows 95, 98, Me, NT, 2000, XP, 7 and Explorer are
trademarks of Microsoft Corp.
Apple and Mac OS are registered trademarks of Apple Inc. Other products may be trademarks or registered trademarks of their
respective manufacturers.
Caution and Electronic Emission Notices
Caution
Warranty
Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge.
To protect your device, always: Touch the metal chassis of your computer to ground the static electrical charge
before you pick up the circuit device.
Pick up the device by holding it on the left and right edges only. We warrant to the original end user (purchaser) that the device will be free from any
defects in workmanship or materials for a period of one (1) years from the date of purchase from the dealer. Please keep your purchase receipt in a safe place as it serves as proof of date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workman s hip and/or materials, we will, at our discretion, repair or replace the defective products or components, without charge for either parts or labor, to whatever extent we deem necessary tore-store the product to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be offered solely at our discretion. This warranty will not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. The warranty does not cover the bun dled or licensed software of other vendors. Defects which do not significantly affect the usability of the product will not be covered by the warranty. We reserve the right to revise the manual and online documentation and to make changes from time to time in the contents hereof without obligation to notify any person of such revision or changes.
Be a Registered Owner
Firmware & Tools Updates
Web registration is preferred. You can register your Vigor device via http://www.draytek.com.
Due to the continuous evolution of DrayTek technology, all devices will be regularly upgraded. Please consult the DrayTek web site for more information on newest firmware, tools and documents.
http://www.draytek.com
VigorSwitch P1100 User’s Guide
iii
European Community Declarations
Manufacturer: DrayTek Corp.
Address: No. 26, Fu Shing Road, HuKou township, HsinChu Industrial Park, Hsin-Chu, Taiwan 303
Product: VigorSwitch Series Device The product conforms to the requirements of Electro-Magnetic Compatibility (EMC) Directive 2004/108/EC by
complying with the requirements set forth in EN55022/Class A and EN55024/Class A. The product conforms to the requirements of Low Voltage (LVD) Directive 2006/95/EC by complying with the
requirements set forth in EN6095-1.
Federal Communications Commission (FCC) Statement
This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment.
All trade names and trademarks are the properties of their respective companies.
GPL Notice
This DrayTek product uses software partial ly or completely licensed under the terms of the GNU GENERAL PUBLIC LICENSE. The author of the software does not provide any warranty. A Limited Warranty is offered on DrayTek products. This Limited Warranty does not cover any software applications or programs.
To download source codes please visit: http://gplsource.draytek.com GNU GENERAL PUBLIC LICENSE: https://gnu.org/licenses/gpl-2.0 Version 2, June 1991 For any question, please feel free to contact DrayTek technical support at support@draytek.com for further
information.
iv
VigorSwitch P1100 User’s Guide
TTaabbllee ooff CCoonntteennttss
Chapter 1: Introduction.....................................................................................................1
1.1 Overview................................................................................................................................. 1
1.2 Features.................................................................................................................................. 1
1.3 Packing List............................................................................................................................. 2
1.4 LED Indicators and Connectors.............................................................................................. 3
1.5 Hardware Installation .............................................................................................................. 4
1.5.5 Configuring the Management Agent of Switch................................................................. 8
1.5.6 IP Address Assignment .................................................................................................... 9
1.6 Typical Applications............................................................................................................... 13
Chapter 2: Basic Concept and Management.................................................................15
2.1 What’s the Ethernet............................................................................................................... 15
2.2 Media Access Control (MAC)................................................................................................ 17
2.3 Flow Control.......................................................................................................................... 22
Chapter 3: Operation of Web-based Management........................................................25
3.1 Web Management Home Overview...................................................................................... 26
3.2 Status.................................................................................................................................... 27
3.2.1 System Information......................................................................................................... 27
3.2.2 Logging Message ...........................................................................................................28
3.2.3 Port .................................................................................................................................29
3.2.4 Link Aggregation............................................................................................................. 31
3.2.5 MAC Address Table........................................................................................................ 32
3.2.6 PoE Status...................................................................................................................... 32
3.2.7 LLDP Statistics ............................................................................................................... 33
3.2.8 IGMP Statistics............................................................................................................... 34
3.3 Network................................................................................................................................. 36
3.3.1 IP Address...................................................................................................................... 36
3.3.2 System Time................................................................................................................... 38
3.4 Switching............................................................................................................................... 40
3.4.1 Port Setting..................................................................................................................... 40
3.4.2 Link Aggregation............................................................................................................. 43
3.4.3 EEE................................................................................................................................. 49
3.4.4 Jumbo Frame.................................................................................................................. 51
3.4.5 PoE................................................................................................................................. 52
3.4.6 VLAN Management ........................................................................................................ 55
3.4.7 Multicast.......................................................................................................................... 63
3.4.8 Spanning Tree................................................................................................................ 71
3.5 MAC Address Table............................................................................................................... 76
3.5.1 Dynamic Address............................................................................................................ 76
3.5.2 Static Address................................................................................................................. 77
3.6 Security ................................................................................................................................. 79
3.6.1 Access Control................................................................................................................ 79
3.6.2 Protected Port................................................................................................................. 80
3.6.3 Storm Control.................................................................................................................. 81
3.6.4 DoS................................................................................................................................. 83
VigorSwitch P1100 User’s Guide
v
3.7 QoS....................................................................................................................................... 88
3.7.1 General........................................................................................................................... 88
3.7.2 Rate Limit........................................................................................................................ 95
3.8 Management......................................................................................................................... 99
3.8.1 LLDP............................................................................................................................... 99
3.8.2 SNMP............................................................................................................................ 107
3.9 Diagnostics...........................................................................................................................111
3.9.1 Logging......................................................................................................................... 111
3.9.2 Mirroring........................................................................................................................ 113
3.9.3 Ping............................................................................................................................... 115
3.9.4 Copper Test.................................................................................................................. 116
3.10 Maintenance.......................................................................................................................116
3.10.1 User Account.............................................................................................................. 116
3.10.2 Firmware Upgrade/Backup......................................................................................... 117
3.10.3 Configuration .............................................................................................................. 119
3.10.4 Factory Default / System Reboot................................................................................ 121
Chapter 4: Trouble Shooting.........................................................................................123
4.1 Resolving No Link Condition............................................................................................... 123
4.2 Q & A................................................................................................................................... 123
vi
VigorSwitch P1100 User’s Guide
Chhaapptteerr 11:: IInnttrroodduuccttiioonn
C
11..11 OOvveerrvviieeww
PoE 8+2 Gigabit Ports Web Smart Switch is a standard switch that meets all IEEE
802.3/u/x/z Gigabit, Fast Ethernet specifications. The switch supports console, telnet, http and SNMP interface for switch management. The network administrator can logon the switch to monitor, configure and control each port’s activity. In addition, the switch implements the QoS (Quality of Service), VLAN, and Trunking. It is suitable for office application.
Others the switch increases support the Power saving for reduce the power consumption with "ActiPHY Power Management" and "PerfectReach Power Management" two techniques. It could efficient saving the switch power with auto detect the client idle and cable length to provide different power.
10/100/1000Mbps TP is a standard Ethernet port that meets all IEEE 802.3/u/x/z Gigabit, Fast Ethernet specifications. 1000Mbps SFP Fiber transceiver is a Gigabit Ethernet port that fully complies with all IEEE 802.3z and 1000Base-SX/LX standards.
Below shows key features of this device:
QQooSS
The switch offers powerful QoS function. This function supports 802.1p VLAN tag priority and DSCP on Layer 3 of network framework.
VVLLAANN
Support Port-based VLAN and IEEE802.1Q Tag VLAN. Support 24 active VLANs and VLAN ID 1~4094.
PPoorrtt TTrruunnkkiinngg
Allows one or more links to be aggregated together to form a Link Aggregation Group by the static setting.
PPoowweerr SSaavviinngg
The Power saving using the "ActiPHY Power Management" and "PerfectReach Power Management" two techniques to detect the client idle and cable length automatically and provides the different power. It could efficient to save the switch power and reduce the power consumption.
11..22 FFeeaattuurreess
The VigorSwitch P1100, a standalone off-the-shelf switch, provides the comprehensive features listed below for users to perform system network administration and efficiently and securely serve your network.
HHaarrddwwaarree
8 10/100/1000Mbps Auto-negotiation Gigabit Ethernet TP ports 512KB on-chip frame buffer
VigorSwitch P1100 User’s Guide
1
Jumbo frame support 9KB Programmable classifier for QoS (Layer 2/Layer 3) 8K MAC address and support VLAN ID(1~4094) Per-port shaping, policing, and Broadcast Storm Control Power Saving with "ActiPHY Power Management" and "Perfect Reach Power
Management" techniques.
IEEE802.1ad Q-in-Q nested VLAN support Full-duplex flow control (IEEE802.3x) and half-duplex backpressure Extensive front-panel diagnostic LEDs; System: Power, TP Port1-24: LINK/ACT,
10/100/1000Mbps
MMaannaaggeemmeenntt
Supports per port traffic monitoring counters Supports a snapshot of the system Information when you login Supports port mirror function Supports the static trunk function Supports 802.1Q VLAN Supports user management and limits three users to login Maximal packet length can be up to 9600 bytes for jumbo frame application Supports Broadcasting Suppression to avoid network suspended or crashed Supports to send the trap event while monitored events happened Supports default configuration which can be restored to overwrite the current
configuration which is working on via Web UI and Reset button of the switch
Supports on-line plug/unplug SFP modules Supports Quality of Service (QoS) for real time applications based on the
information taken from Layer 2 to Layer 3
Built-in web-based management and CLI management, providing a more
convenient UI for the user
11..33 PPaacckkiinngg LLiisstt
Before you start installing the switch, verify that the package contains the following:
VigorSwitch P1100 AC Quick Start Guide Rubber feet Rack mount kit
Please notify your sales representative immediately if any of the aforementioned items is missing or damaged.
Power Cord
2
VigorSwitch P1100 User’s Guide
11..44 LLEEDD IInnddiiccaattoorrss aanndd CCoonnnneeccttoorrss
Before you use the Vigor device, please get acquainted with the LED indicators and connectors first.
There are 8 Ethernet ports on the front panel of the switch. LED display area, locating on the front panel, contains an ACT, Power LED and 8 ports working status of the switch.
LLEEDD EExxppllaannaattiioonn
LED Color Explanation
PWR
SYS
ACT (Port 1~10)
On (Green) The device is powered on. Off The device is powered off. On (Green) The switch finishes system booting. Blinking
(Green) Off On (Green) Port is connected at 1000 Mps.
Off Blinking
(Green) On (Green) A Power Device is connected. PoE Off No Power Device is connected.
The switch is powered on and starts system booting.
The power is off or the system is not ready / malfunctioning.
LAN is disconnected. Data is transmitting (sending/receiving).
CCoonnnneeccttoorr EExxppllaannaattiioonn
Interface Description
Power inlet for AC input (100~240V/AC, 50/60Hz).
1/0 (ON/OFF) - Power switch.
Power Output -- IEEE 802.3af Max. 15.4W Output Supported; IEEE 802.3at Max. 30W Output Supported
PoE Power Budget -- 130 Watts (Max)
VigorSwitch P1100 User’s Guide
3
UUsseerr IInntteerrffaacceess oonn tthhee RReeaarr PPaanneell
8-PORT GBE WEB SMART SWITCH
11..55 HHaarrddwwaarree IInnssttaallllaattiioonn
Case 1: All switch ports are in the same local area network.
Every port can access each other. (*The switch image is sample only.)
(
If VLAN is enabled and configured, each node in the network that can communicate each other directly is bounded in the same VLAN area.
Here VLAN area is defined by what VLAN you are using. The switch supports both port-based VLAN and tag-based VLAN. They are different in practical deployment, especially in physical location. The following diagram shows how it works and what the difference they are.
4
VigorSwitch P1100 User’s Guide
Case 2: Port-based VLAN -1 (*The switch image is sample only.)
The same VLAN members could not be in different switches. Every VLAN members could not access VLAN members each other. The switch manager has to assign different names for each VLAN groups at one
switch.
Case 3: Port-based VLAN - 2
VLAN1 members could not access VLAN2, VLAN3 and VLAN4 members. VLAN2 members could not access VLAN1 and VLAN3 members, but they could
access VLAN4 members.
VLAN3 members could not access VLAN1, VLAN2 and VLAN4. VLAN4 members could not access VLAN1 and VLAN3 members, but they could
access VLAN2 members.
VigorSwitch P1100 User’s Guide
5
Case 4: The same VLAN members can be at different switches with the same VID
DDeesskkttoopp IInnssttaallllaattiioonn
1. Install the switch on a level surface that can support the weight of the unit and the
relevant components.
2. Plug the switch with the female end of the provided power cord and plug the male
end to the power outlet.
RRaacckk--mmoouunntt IInnssttaallllaattiioonn
The switch may be standalone, or mounted in a rack. Rack mounting facilitate to an orderly installation when you are going to install series of networking devices.
Procedures to Rack-mount the switch:
1. Disconnect all the cables from the switch before continuing.
2. Place the unit the right way up on a hard, flat surface with the front facing you.
3. Locate a mounting bracket over the mounting holes on one side of the unit.
4. Insert the screws and fully tighten with a suitable screwdriver.
5. Repeat the two previous steps for the other side of the unit.
6. Insert the unit into the rack and secure with suitable screws.
7. Reconnect all the cables.
6
VigorSwitch P1100 User’s Guide
IInnssttaalllliinngg NNeettwwoorrkk CCaabblleess
Crossover or straight-through cable: All the ports on the switch support Auto-MDI/MDI-X functionality. Both straight-through or crossover cables can be used as the media to connect the switch with PCs as well as other devices like switches, hubs or router.
Category 3, 4, 5 or 5e, 6 UTP/STP cable: To make a valid connection and obtain the
optimal performance, an appropriate cable that corresponds to different transmitting/receiving speed is required. To choose a suitable cable, please refer to the following table.
Media Speed Wiring
10 Mbps Category 3,4,5 UTP/STP
10/100/1000
Mbps copper
100Mbps Category 5 UTP/STP 1000 Mbps Category 5e, 6 UTP/STP
VigorSwitch P1100 User’s Guide
7
11..55..55 CCoonnffiigguurriinngg tthhee MMaannaaggeemmeenntt AAggeenntt ooff SSwwiittcchh
Users can monitor and configure the switch through the following procedures. Configuring the Management Agent of VigorSwitch P1100 through the Ethernet Port. There are two ways to configure and monitor the switch through the switch’s Ethernet port.
They are Web browser and SNMP manager. We just introduce the first type of management interface. Web-based UI for the switch is an interface in a highly friendly way.
Managing VigorSwitch P1100 through Ethernet Port
Before start using the switch, the IP address setting of the switch should be done, then perform the following steps:
1. Set up a physical path between the configured the switch and a PC by a qualified UTP
Cat. 5 cable with RJ-45 connector.
Note: If PC directly connects to the switch, you have to setup the same subnet mask between them. But, subnet mask may be different for the PC in the remote site. Please refer to the above figure about the 24-Port GbE Web Smart Switch default IP address information.
2. Run web browser and follow the menu. Please refer to Chapter 3.
8
VigorSwitch P1100 User’s Guide
11..55..66 IIPP AAddddrreessss AAssssiiggnnmmeenntt
For IP address configuration, there are three parameters needed to be filled in. They are IP address, Subnet Mask, Default Gateway and DNS.
IP address:
The address of the network device in the network is used for internetworking communication. Its address structure looks is shown below. It is “classful” because it is split into predefined address classes or categories.
Each class has its own network range between the network identifier and host identifier in the 32 bits address. Each IP address comprises two parts: network identifier (address) and host identifier (address). The former indicates the network where the addressed host resides, and the latter indicates the individual host in the network which the address of host refers to. And the host identifier must be unique in the same LAN. Here the term of IP address we used is version 4, known as IPv4.
Network identifier Host identifier
32 bits
With the classful addressing, it divides IP address into three classes, class A, class B and class C. The rest of IP addresses are for multicast and broadcast. The bit length of the network prefix is the same as that of the subnet mask and is denoted as IP address/X, for example, 192.168.1.0/24. Each class has its address range described below.
Class A:
Address is less than 126.255.255.255. There are a total of 126 networks can be defined because the address 0.0.0.0 is reserved for default route and 127.0.0.0/8 is reserved for loopback function.
Class B:
VigorSwitch P1100 User’s Guide
9
IP address range between 128.0.0.0 and 191.255.255.255. Each class B network has a 16-bit network prefix followed 16-bit host address. There are 16,384 (2^14)/16 networks able to be defined with a maximum of 65534 (2^16 –2) hosts per network.
Class C:
IP address range between 192.0.0.0 and 223.255.255.255. Each class C network has a 24-bit network prefix followed 8-bit host address. There are 2,097,152 (2^21)/24 networks able to be defined with a maximum of 254 (2^8 –2) hosts per network.
Class D and E:
Class D is a class with first 4 MSB (Most significance bit) set to 1-1-1-0 and is used for IP Multicast. See also RFC 1112. Class E is a class with first 4 MSB set to 1-1-1-1 and is used for IP broadcast.
According to IANA (Internet Assigned Numbers Authority), there are three specific IP address blocks reserved and able to be used for extending internal network. We call it Private IP address and list below:
Class A 10.0.0.0 --- 10.255.255.255 Class B 172.16.0.0 --- 172.31.255.255 Class C 192.168.0.0 --- 192.168.255.255
Please refer to RFC 1597 and RFC 1466 for more information.
Subnet mask:
It means the sub-division of a class-based network or a CIDR block. The subnet is used to determine how to split an IP address to the network prefix and the host address in bitwise basis. It is designed to utilize IP address more efficiently and ease to manage IP network.
For a class B network, 128.1.2.3, it may have a subnet mask 255.255.0.0 in default, in which the first two bytes is with all 1s. This means more than 60 thousands of nodes in flat IP address will be at the same network. It’s too large to manage practically. Now if we divide it into smaller network by extending network prefix from 16 bits to, say 24 bits, that’s using its third byte to subnet this class B network. Now it has a subnet mask
255.255.255.0, in which each bit of the first three bytes is 1. It’s now clear that the first two bytes is used to identify the class B network, the third byte is used to identify the subnet within this class B network and, of course, the last byte is the host number.
Not all IP address is available in the sub-netted network. Two special addresses are reserved. They are the addresses with all zero’s and all one’s host number. For example, an IP address 128.1.2.128, what IP address reserved will be looked like? All 0s mean the network itself, and all 1s mean IP broadcast.
10
VigorSwitch P1100 User’s Guide
In this diagram, you can see the subnet mask with 25-bit long, 255.255.255.128, contains 126 members in the sub-netted network. Another is that the length of network prefix equals the number of the bit with 1s in that subnet mask. With this, you can easily count the number of IP addresses matched. The following table shows the result.
Prefix Length No. of IP matched No. of Addressable IP
/32 1 ­/31 2 ­/30 4 2 /29 8 6 /28 16 14 /27 32 30 /26 64 62 /25 128 126 /24 256 254 /23 512 510 /22 1024 1022 /21 2048 2046 /20 4096 4094 /19 8192 8190 /18 16384 16382 /17 32768 32766 /16 65536 65534
According to the scheme above, a subnet mask 255.255.255.0 will partition a network with the class C. It means there will have a maximum of 254 effective nodes existed in this sub-netted network and is considered a physical network in an autonomous network. So it owns a network IP address which may looks like 168.1.2.0.
With the subnet mask, a bigger network can be cut into small pieces of network. If we want to have more than two independent networks in a worknet, a partition to the network must be performed. In this case, subnet mask must be applied.
For different network applications, the subnet mask may look like 255.255.255.240. This means it is a small network accommodating a maximum of 15 nodes in the network.
VigorSwitch P1100 User’s Guide
11
Default gateway:
For the routed packet, if the destination is not in the routing table, all the traffic is put into the device with the designated IP address, known as default router. Basically, it is a routing policy. The gateway setting is used for Trap Events Host only in the switch.
For assigning an IP address to the switch, you just have to check what the IP address of the network will be connected with the switch. Use the same network address and append your host address to it.
First, IP Address: as shown above, enter “192.168.1.224”, for instance. For sure, an IP address such as 192.168.1.x must be set on your PC.
Second, Subnet Mask: as shown above, enter “255.255.255.0”. Any subnet mask such as
255.255.255.x is allowable in this case.
: The DHCP Setting is enabled in default.
Note
12
VigorSwitch P1100 User’s Guide
11..66 TTyyppiiccaall AApppplliiccaattiioonnss
The VigorSwitch implements 8 Gigabit Ethernet TP ports with auto MDIX and two slots for the removable module supporting comprehensive fiber types of connection including LC and BiDi-LC SFP modules. The switch is suitable for the following applications.
Central Site/Remote site application is used in carrier or ISP
VigorSwitch P1100 User’s Guide
13
It is a system wide basic reference connection diagram. This diagram demonstrates how the switch connects with other network devices and hosts.
Peer-to-peer application is used in two remote offices
Office network
14
VigorSwitch P1100 User’s Guide
Chhaapptteerr 22::
C
Maannaaggee
M
This chapter will tell you the basic concept of features to manage this switch and how they work.
22..11 WWhhaatt’’ss tthhee EEtthheerrnneett
Ethernet originated and was implemented at Xerox in Palo Alto, CA in 1973 and was successfully commercialized by Digital Equipment Corporation (DEC), Intel and Xerox (DIX) in 1980. In 1992, Grand Junction Networks unveiled a new high speed Ethernet with the same characteristic of the original Ethernet but operated at 100Mbps, called Fast Ethernet now. This means Fast Ethernet inherits the same frame format, CSMA/CD, software interface. In 1998, Gigabit Ethernet was rolled out and provided 1000Mbps. Now 10G/s Ethernet is under approving. Although these Ethernet have different speed, they still use the same basic functions. So they are compatible in software and can connect each other almost without limitation. The transmission media may be the only problem.
Baassiicc
B
meenntt
m
Coonncceepptt aanndd
C
In the above figure, we can see that Ethernet locates at the Data Link layer and Physical layer and comprises three portions, including logical link control (LLC), media access control (MAC), and physical layer. The first two comprises Data link layer, which performs splitting data into frame for transmitting, receiving acknowledge frame, error checking and re-transmitting when not received correctly as well as provides an error-free channel upward to network layer.
VigorSwitch P1100 User’s Guide
15
This above diagram shows the Ethernet architecture, LLC sub-layer and MAC sub-layer, which are responded to the Data Link layer, and transceivers, which are responded to the Physical layer in OSI model. In this section, we are mainly describing the MAC sub-layer.
LLooggiiccaall LLiinnkk CCoonnttrrooll ((LLLLCC))
Data link layer is composed of both the sub-layers of MAC and MAC-client. Here MAC client may be logical link control or bridge relay entity.
Logical link control supports the interface between the Ethernet MAC and upper layers in the protocol stack, usually Network layer, which is nothing to do with the nature of the LAN. So it can operate over other different LAN technology such as Token Ring, FDDI and so on. Likewise, for the interface to the MAC layer, LLC defines the services with the interface independent of the medium access technology and with some of the nature of the medium itself.
The table above is the format of LLC PDU. It comprises four fields, DSAP, SSAP, Control and Information. The DSAP address field identifies the one or more service access points, in which the I/G bit indicates it is individual or group address. If all bit of DSAP is 1s, it’s a global address. The SSAP address field identifies the specific services indicated by C/R bit
16
VigorSwitch P1100 User’s Guide
(command or response). The DSAP and SSAP pair with some reserved values indicates some well-known services listed in the table below.
LLC type 1 connectionless service, LLC type 2 connection-oriented service and LLC type 3 acknowledge connectionless service are three types of LLC frame for all classes of service. In Fig 3-2, it shows the format of Service Access Point (SAP). Please refer to IEEE802.2 for more details.
22..22 MMeeddiiaa AAcccceessss CCoonnttrrooll ((MMAACC)
MMAACC AAddddrreessssiinngg
Because LAN is composed of many nodes, for the data exchanged among these nodes, each node must have its own unique address to identify who should send the data or should receive the data. In OSI model, each layer provides its own mean to identify the unique address in some form, for example, IP address in network layer.
VigorSwitch P1100 User’s Guide
17
)
The MAC is belonged to Data Link Layer (Layer 2), the address is defined to be a 48-bit long and locally unique address. Since this type of address is applied only to the Ethernet LAN media access control (MAC), they are referred to as MAC addresses.
The first three bytes are Organizational Unique Identifier (OUI) code assigned by IEEE. The last three bytes are the serial number assigned by the vendor of the network device. All these six bytes are stored in a non-volatile memory in the device. Their format is as the following table and normally written in the form as aa-bb-cc-dd-ee-ff, a 12 hexadecimal digits separated by hyphens, in which the aa-bb-cc is the OUI code and the dd-ee-ff is the serial number assigned by manufacturer.
Bit 47 Bit 0
st
byte 2nd byte 3rd byte 4th byte 5th byte 6th byte
1
OUI code Serial number
The first bit of the first byte in the Destination address (DA) determines the address to be a Unicast (0) or Multicast frame (1), known as I/G bit indicating individual (0) or group (1). So the 48-bit address space is divided into two portions, Unicast and Multicast. The second bit is for global-unique (0) or locally-unique address. The former is assigned by the device manufacturer, and the later is usually assigned by the administrator. In practice, global-unique addresses are always applied.
A unicast address is identified with a single network interface. With this nature of MAC address, a frame transmitted can exactly be received by the target an interface the destination MAC points to.
A multicast address is identified with a group of network devices or network interfaces. In Ethernet, a many-to-many connectivity in the LANs is provided. It provides a mean to send a frame to many network devices at a time. When all bit of DA is 1s, it is a broadcast, which means all network device except the sender itself can receive the frame and response.
EEtthheerrnneett FFrraammee FFoorrmmaatt
There are two major forms of Ethernet frame, type encapsulation and length encapsulation, both of which are categorized as four frame formats 802.3/802.2 SNAP, 802.3/802.2, Ethernet II and Netware 802.3 RAW. We will introduce the basic Ethernet frame format defined by the IEEE 802.3 standard required for all MAC implementations. It contains seven fields explained below.
PRE SFD DA SA Type/Length Data Pad bit if any FCS
7 7 6 6 2 46-1500 4
Preamble (PRE) - The PRE is 7-byte long with alternating pattern of ones and zeros used to tell the receiving node that a frame is coming, and to synchronize the physical receiver with the incoming bit stream. The preamble pattern is:
10101010 10101010 10101010 10101010 10101 010 10101010 10101010
Start-of-frame delimiter (SFD) - The SFD is one-byte long with alternating pattern of ones and zeros, ending with two consecutive 1-bits. It immediately follows the preamble and uses the last two consecutive 1s bit to indicate that the next bit is the start of the data packet and the left-most bit in the left-most byte of the destination address. The SFD pattern is 10101011.
Destination address (DA) - The DA field is used to identify which network device(s) should receive the packet. It is a unique address. Please see the section of MAC addressing.
18
VigorSwitch P1100 User’s Guide
Source addresses (SA) - The SA field indicates the source node. The SA is always an individual address and the left-most bit in the SA field is always 0.
Length/Type - This field indicates either the number of the data bytes contained in the data field of the frame, or the Ethernet type of data. If the value of first two bytes is less than or equal to 1500 in decimal, the number of bytes in the data field is equal to the Length/Type value, i.e. this field acts as Length indicator at this moment. When this field acts as Length, the frame has optional fields for 802.3/802.2 SNAP encapsulation, 802.3/802.2 encapsulation and Netware 802.3 RAW encapsulation. Each of them has different fields following the Length field.
If the Length/Type value is greater than 1500, it means the Length/Type acts as Type. Different type value means the frames with different protocols running over Ethernet being sent or received.
For example,
0x0800 IP datagram 0x0806 ARP 0x0835 RARP 0x8137 IPX datagram 0x86DD IPv6
Data - Less than or equal to 1500 bytes and greater or equal to 46 bytes. If data is less than 46 bytes, the MAC will automatically extend the padding bits and have the payload be equal to 46 bytes. The length of data field must equal the value of the Length field when the Length/Type acts as Length.
Frame check sequence (FCS) - This field contains a 32-bit cyclic redundancy check (CRC) value, and is a check sum computed with DA, SA, through the end of the data field with the following polynomial.
It is created by the sending MAC and recalculated by the receiving MAC to check if the packet is damaged or not.
HHooww ddooeess aa MMAACC wwoorrkk??
The MAC sub-layer has two primary jobs to do:
1. Receiving and transmitting data. When receiving data, it parses frame to detect error;
when transmitting data, it performs frame assembly.
2. Performing Media access control. It prepares the initiation jobs for a frame
transmission and makes recovery from transmission failure.
FFrraammee ttrraannssmmiissssiioonn
As Ethernet adopted Carrier Sense Multiple Access with Collision Detect (CSMA/CD), it detects if there is any carrier signal from another network device running over the physical medium when a frame is ready for transmission. This is referred to as sensing carrier, also “Listen”. If there is signal on the medium, the MAC defers the traffic to avoid a transmission collision and waits for a random period of time, called backoff time, then sends the traffic again.
After the frame is assembled, when transmitting the frame, the preamble (PRE) bytes are inserted and sent first, then the next, Start of frame Delimiter (SFD), DA, SA and through
VigorSwitch P1100 User’s Guide
19
the data field and FCS field in turn. The followings summarize what a MAC does before transmitting a frame.
1. MAC will assemble the frame. First, the preamble and Start-of-Frame delimiter will be
put in the fields of PRE and SFD, followed DA, SA, tag ID if tagged VLAN is applied, Ethertype or the value of the data length, and payload data field, and finally put the FCS data in order into the responded fields.
2. Listen if there is any traffic running over the medium. If yes, wait.
3. If the medium is quiet, and no longer senses any carrier, the MAC waits for a period of
time, i.e. inter-frame gap time to have the MAC ready with enough time and then start transmitting the frame.
4. During the transmission, MAC keeps monitoring the status of the medium. If no
collision happens until the end of the frame, it transmits successfully. If there is a collision happened, the MAC will send the patterned jamming bit to guarantee the collision event propagated to all involved network devices, then wait for a random period of time, i.e. backoff time. When backoff time expires, the MAC goes back to the beginning state and attempts to transmit again. After a collision happens, MAC increases the transmission attempts. If the count of the transmission attempt reaches 16 times, the frame in MAC’s queue will be discarded.
Ethernet MAC transmits frames in half-duplex and full-duplex ways. In halfduplex operation mode, the MAC can either transmit or receive frame at a moment, but cannot do both jobs at the same time.
As the transmission of a MAC frame with the half-duplex operation exists only in the same collision domain, the carrier signal needs to spend time to travel to reach the targeted device. For two most-distant devices in the same collision domain, when one sends the frame first, and the second sends the frame, in worstcase, just before the frame from the first device arrives. The collision happens and will be detected by the second device immediately. Because of the medium delay, this corrupted signal needs to spend some time to propagate back to the first device. The maximum time to detect a collision is approximately twice the signal propagation time between the two most-distant devices. This maximum time is traded-off by the collision recovery time and the diameter of the LAN.
In the original 802.3 specification, Ethernet operates in half duplex only. Under this condition, when in 10Mbps LAN, it’s 2500 meters, in 100Mbps LAN, it’s approximately 200 meters and in 1000Mbps, 200 meters. According to the theory, it should be 20 meters. But it’s not practical, so the LAN diameter is kept by using to increase the minimum frame size with a variable-length non-data extension bit field which is removed at the receiving MAC. The following tables are the frame format suitable for 10M, 100M and 1000M Ethernet, and some parameter values that shall be applied to all of these three types of Ethernet.
Actually, the practice Gigabit Ethernet chips do not feature this so far. They all have their chips supported full-duplex mode only, as well as all network vendors’ devices. So this criterion should not exist at the present time and in the future. The switch’s Gigabit module supports only full-duplex mode.
20
VigorSwitch P1100 User’s Guide
Parameter value/LAN
Max. collision domain DTE to DTE
Max. collision domain with repeater
Slot time Interframe Gap AttemptLimit BackoffLimit JamSize MaxFrameSize MinFrameSize BurstLimit
10Base 100Base 1000Base
100 meters 100 meters for
UTP 412 meters for
fiber
100 meters for UTP
316 meters for fiber
2500 meters 205 meters 200 meters
512 bit times 512 bit times 512 bit times
9.6us 0.96us 0.096us 16 16 16 10 10 10 32 bits 32 bits 32 bits 1518 1518 1518 64 64 64 Not applicable Not applicable 65536 bits
In full-duplex operation mode, both transmitting and receiving frames are processed simultaneously. This doubles the total bandwidth. Full duplex is much easier than half duplex because it does not involve media contention, collision, retransmission schedule, padding bits for short frame. The rest functions follow the specification of IEEE802.3. For example, it must meet the requirement of minimum inter-frame gap between successive frames and frame format the same as that in the half-duplex operation.
Because no collision will happen in full-duplex operation, for sure, there is no mechanism to tell all the involved devices. What will it be if receiving device is busy and a frame is coming at the same time? Can it use “backpressure” to tell the source device? A function flow control is introduced in the full-duplex operation.
VigorSwitch P1100 User’s Guide
21
22..33 FFllooww CCoonnttrrooll
Flow control is a mechanism to tell the source device stopping sending frame for a specified period of time designated by target device until the PAUSE time expires. This is accomplished by sending a PAUSE frame from target device to source device. When the target is not busy and the PAUSE time is expired, it will send another PAUSE frame with zero time-to-wait to source device. After the source device receives the PAUSE frame, it will again transmit frames immediately. PAUSE frame is identical in the form of the MAC frame with a pause-time value and with a special destination MAC address 01-80-C2-00-00-01. As per the specification, PAUSE operation can not be used to inhibit the transmission of MAC control frame.
Normally, in 10Mbps and 100Mbps Ethernet, only symmetric flow control is supported. However, some switches (e.g. 24-Port GbE Web Smart Switch) support not only symmetric but asymmetric flow controls for the special application. In Gigabit Ethernet, both symmetric flow control and asymmetric flow control are supported. Asymmetric flow control only allows transmitting PAUSE frame in one way from one side, the other side is not but receipt-and-discard the flow control information. Symmetric flow control allows both two ports to transmit PASUE frames each other simultaneously.
IInntteerr--ffrraammee GGaapp ttiimmee
After the end of a transmission, if a network node is ready to transmit data out and if there is no carrier signal on the medium at that time, the device will wait for a period of time known as an inter-frame gap time to have the medium clear and stabilized as well as to have the jobs ready, such as adjusting buffer counter, updating counter and so on, in the receiver site. Once the inter-frame gap time expires after the de-assertion of carrier sense, the MAC transmits data. In IEEE802.3 specification, this is 96-bit time or more.
CCoolllliissiioonn
Collision happens only in half-duplex operation. When two or more network nodes transmit frames at approximately the same time, a collision always occurs and interferes with each other. This results the carrier signal distorted and undiscriminated. MAC can afford detecting, through the physical layer, the distortion of the carrier signal. When a collision is detected during a frame transmission, the transmission will not stop immediately but, instead, continues transmitting until the rest bits specified by jamSize are completely transmitted. This guarantees the duration of collision is enough to have all involved devices able to detect the collision. This is referred to as Jamming. After jamming pattern is sent, MAC stops transmitting the rest data queued in the buffer and waits for a random period of time, known as backoff time with the following formula. When backoff time expires, the device goes back to the state of attempting to transmit frame. The backoff time is determined by the formula below. When the times of collision is increased, the backoff time is getting long until the collision times excess 16. If this happens, the frame will be discarded and backoff time will also be reset.
22
VigorSwitch P1100 User’s Guide
FFrraammee RReecceeppttiioonn
In essence, the frame reception is the same in both operations of half duplex and full duplex, except that full-duplex operation uses two buffers to transmit and receive the frame independently. The receiving node always “listens” if there is traffic running over the medium when it is not receiving a frame. When a frame destined for the target device comes, the receiver of the target device begins receiving the bit stream, and looks for the PRE (Preamble) pattern and Start-of-Frame Delimiter (SFD) that indicates the next bit is the starting point of the MAC frame until all bit of the frame is received.
For a received frame, the MAC will check:
1. If it is less than one slotTime in length, i.e. short packet, and if yes, it will be discarded
by MAC because, by definition, the valid frame must be longer than the slotTime. If the length of the frame is less than one slotTime, it means there may be a collision happened somewhere or an interface malfunctioned in the LAN. When detecting the case, the MAC drops the packet and goes back to the ready state.
2. If the DA of the received frame exactly matches the physical address that the receiving
MAC owns or the multicast address designated to recognize. If not, discards it and the MAC passes the frame to its client and goes back to the ready state.
3. If the frame is too long. If yes, throws it away and reports frame Too Long.
4. If the FCS of the received frame is valid. If not, for 10M and 100M Ethernet, discards
the frame. For Gigabit Ethernet or higher speed Ethernet, MAC has to check one more field, i.e. extra bit field, if FCS is invalid. If there is any extra bits existed, which must meet the specification of IEEE802.3. When both FCS and extra bits are valid, the received frame will be accepted, otherwise discards the received frame and reports frameCheckError if no extra bits appended or alignmentError if extra bits appended.
5. If the length/type is valid. If not, discards the packet and reports lengthError.
6. If all five procedures above are ok, then the MAC treats the frame as good and
de-assembles the frame.
WWhhaatt iiff aa VVLLAANN ttaaggggiinngg iiss aapppplliieedd??
VLAN tagging is a 4-byte long data immediately following the MAC source address. When tagged VLAN is applied, the Ethernet frame structure will have a little change shown as follows.
Only two fields, VLAN ID and Tag control information are different in comparison with the basic Ethernet frame. The rest fields are the same.
The first two bytes is VLAN type ID with the value of 0x8100 indicating the received frame is tagged VLAN and the next two bytes are Tag Control Information (TCI) used to provide user priority and VLAN ID, which are explained respectively in the following table.
Bits 15-13 Bit 12
User Priority 7-0, 0 is lowest priority CFI (Canonical Format Indicator)
1: RIF field is present in the tag header
VigorSwitch P1100 User’s Guide
0: No RIF field is present
23
Bits 11-0
VID (VLAN Identifier) 0x000: Null VID. No VID is present and only user priority is
present. 0x001: Default VID 0xFFF: Reserved
Note: RIF is used in Token Ring network to provide source routing and comprises two fields, Routing Control and Route Descriptor.
When MAC parses the received frame and finds a reserved special value 0x8100 at the location of the Length/Type field of the normal non-VLAN frame, it will interpret the received frame as a tagged VLAN frame. If this happens in a switch, the MAC will forward it, according to its priority and egress rule, to all the ports that is associated with that VID. If it happens in a network interface card, MAC will deprive of the tag header and process it in the same way as a basic normal frame. For a VLAN-enabled LAN, all involved devices must be equipped with VLAN optional function.
At operating speeds above 100 Mbps, the slotTime employed at slower speeds is inadequate to accommodate network topologies of the desired physical extent. Carrier Extension provides a means by which the slotTime can be increased to a sufficient value for the desired topologies, without increasing the minFrameSize parameter, as this would have deleterious effects. Nondata bits, referred to as extension bits, are appended to frames that are less than slotTime bits in length so that the resulting transmission is at least one slotTime in duration. Carrier Extension can be performed only if the underlying physical layer is capable of sending and receiving symbols that are readily distinguished from data symbols, as is the case in most physical layers that use a block encoding/decoding scheme.
The maximum length of the extension is equal to the quantity (slotTime - minFrameSize). The MAC continues to monitor the medium for collisions while it is transmitting extension bits, and it will treat any collision that occurs after the threshold (slotTime) as a late collision.
24
VigorSwitch P1100 User’s Guide
Loading...
+ 99 hidden pages