The information in this document is subject to change without notice. The statements, configurations, technical
data, and recommendations in this document are believed to be accurate and reliable, but are presented without
express or implied warranty. Users must take full responsibility for their applications of any products specified in this
document. The information in this document is proprietary to Nortel Networks.
The software described in this document is furnished under a license agreement and may be used only in accordance
with the terms of that license. The software license agreement is included in this document.
Trademarks
*Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
All other products or services may be trademarks, registered trademarks, service marks, or registered service marks
of their respective owners. The asterisk after a name denotes a trademarked item.
Restricted rights legend
Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.
Notwithstanding any other license agreement that may pertain to, or accompany the delivery of, this computer
software, the rights of the United States Government regarding its use, reproduction, and disclosure are as set forth
in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
Statement of conditions
In the interest of improving internal design, operational function, and/or reliability, Nortel Networks reserves the right
to make changes to the products described in this document without notice.
Nortel Networks does not assume any liability that may occur due to the use or application of the product(s) or
circuit layout(s) described herein.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensed only pursuant to a license agreement that
contains restrictions on use and disclosure (that may incorporate by reference certain limitations and notices
imposed by third parties).
Nortel Networks software license agreement
This Software License Agreement ("License Agreement") is between you, the end-user ("Customer") and Nortel
Networks Corporation and its subsidiaries and affiliates ("Nortel Networks"). PLEASE READ THE FOLLOWING
CAREFULLY. YOU MUST ACCEPT THESE LICENSE TERMS IN ORDER TO DOWNLOAD AND/OR USE THE
SOFTWARE. USE OF THE SOFTWARE CONSTITUTES YOUR ACCEPTANCE OF THIS LICENSE AGREEMENT.
If you do not accept these terms and conditions, return the Software, unused and in the original shipping container,
within 30 days of purchase to obtain a credit for the full purchase price.
"Software" is owned or licensed by Nortel Networks, its parent or one of its subsidiaries or affiliates, and is
copyrighted and licensed, not sold. Software consists of machine-readable instructions, its components, data,
audio-visual content (such as images, text, recordings or pictures) and related licensed materials including all whole
or partial copies. Nortel Networks grants you a license to use the Software only in the country where you acquired the
Software. You obtain no rights other than those granted to you under this License Agreement. Youare responsible for
the selection of the Software and for the installation of, use of, and results obtained from the Software.
Licensed Use of Software. Nortel Networks grants Customer a nonexclusive license to use a copy of the
1.
Software on only one machine at any one time or to the extent of the activation or authorized usage level,
whichever is applicable. To the extent Software is furnished for use with designated hardware or Customer
furnished equipment ("CFE"), Customer is granted a nonexclusive license to use Software only on such
hardware or CFE, as applicable. Software contains trade secrets and Customer agrees to treat Software as
confidential information using the same care and discretion Customer uses with its own similar information that it
does not wish to disclose, publish or disseminate. Customer will ensure that anyone who uses the Software
does so only in compliance with the terms of this Agreement. Customer shall not a) use, copy, modify, transfer or
distribute the Software except as expressly authorized; b) reverse assemble, reverse compile, reverse engineer
or otherwise translate the Software; c) create derivative works or modifications unless expressly authorized; or d)
sublicense, rent or lease the Software. Licensors of intellectual property to Nortel Networks are beneficiaries of
this provision. Upon termination or breach of the license by Customer or in the event designated hardware or
CFE is no longer in use, Customer will promptly return the Software to Nortel Networks or certify its destruction.
Nortel Networks may audit by remote polling or other reasonable means to determine Customer’s Software
activation or usage levels. If suppliers of third party software included in Software require Nortel Networks to
include additional or different terms, Customer agrees to abide by such terms provided by Nortel Networks
with respect to such third party software.
2.Warranty. Except as may be otherwise expressly agreed to in writing between Nortel Networks and Customer,
Software is provided "AS IS" without any warranties (conditions) of any kind. NORTEL NETWORKS DISCLAIMS
ALL WARRANTIES (CONDITIONS) FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABLITITY AND FITNESS FOR A
PARTICULAR PURPOSE AND ANY WARRANTY OF NON-INFRINGEMENT. Nortel Networks is not obligated
to provide support of any kind for the Software. Some jurisdictions do not allow exclusion of implied warranties,
and, in such event, the above exclusions may not apply.
3.Limitation of Remedies. IN NO EVENT SHALL NORTEL NETWORKS OR ITS AGENTS OR SUPPLIERS BE
LIABLE FOR ANY OF THE FOLLOWING: a) DAMAGES BASED ON ANY THIRD PARTY CLAIM; b) LOSS
OF, OR DAMAGE TO, CUSTOMER’S RECORDS, FILES OR DATA; OR c) DIRECT, INDIRECT, SPECIAL,
INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS OR SAVINGS),
WHETHER IN CONTRACT, TORT OR OTHERWISE (INCLUDING NEGLIGENCE) ARISING OUT OF YOUR
USE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS, ITS AGENTS OR SUPPLIERS HAVE BEEN
ADVISED OF THEIR POSSIBILITY. The forgoing limitations of remedies also apply to any developer and/or
supplier of the Software. Such developer and/or supplier is an intended beneficiary of this Section. Some
jurisdictions do not allow these limitations or exclusions and, in such event, they may not apply.
4.General
a.If Customer is the United States Government, the following paragraph shall apply: All Nortel Networks
Software available under this License Agreement is commercial computer software and commercial
computer software documentation and, in the eventSoftware is licensed for or on behalf of the United States
Government, the respective rights to the software and software documentation are governed by Nortel
Networks standard commercial license in accordance with U.S. Federal Regulations at 48 C.F.R. Sections
b.Customer may terminate the license at any time. Nortel Networks may terminate the license if Customer
fails to comply with the terms and conditions of this license. In either event, upon termination, Customer
must either return the Software to Nortel Networks or certify its destruction.
c.Customer is responsible for payment of any taxes, including personal property taxes, resulting from
Customer’s use of the Software. Customer agrees to comply with all applicable laws including all applicable
export and import laws and regulations.
d.Neither party may bring an action, regardless of form, more than two years after the cause of the action
arose.
e.The terms and conditions of this License Agreement form the complete and exclusive agreement between
Customer and Nortel Networks.
f.This License Agreement is governed by the laws of the country in which Customer acquires the Software.
If the Software is acquired in the United States, then this License Agreement is governed by the laws of
the state of New York.
Revision History
VersionReason for revision
01.01
Updated software and document references for Release 3.7 software.
About this guide 11
Network management tools and interfaces11
Before you begin12
Text conventions12
Related publications13
Obtaining technical assistance 14
Chapter 1 Network monitoring15
System Log15
Port mirroring17
Port Statistics screen 25
7
System Log screen 15
Displaying most recent log entry first16
Port-based mirroring configuration18
Address-based mirroring configuration19
Port mirroring configuration rules 21
Port Mirroring Configuration screen 22
Chapter 2 Configuring network monitoring using CLI31
Setting the system event log 31
31
Enabling remote logging35
show logging 35
logging remote enable command36
no logging remote enable command 37
logging remote address command 37
no logging remote address command37
logging remote level command38
no logging remote level command 38
default logging remote level command 39
Using port mirroring39
show port-mirroring command 39
port-mirroring command 40
no port-mirroring command 41
show port-statistics command 42
clear-stats command 43
Chapter 3 Configuring network monitoring using Device
Manager45
System Log Settings tab45
Remote System Log tab47
Graphing chassis statistics 49
IP tab49
ICMP In tab 53
ICMP Out tab 54
Graphing port statistics 56
Interface tab for graphing ports 57
Ethernet Errors tab for graphing ports 59
Bridge tab for graphing ports 62
Chapter 4 Configuring network monitoring using Web-based
management65
Viewing the system log 65
Configuring port mirroring67
Viewing system statistics71
Viewing port statistics 71
Viewing all port errors74
Viewing interface statistics 76
Viewing Ethernet error statistics 77
Viewing transparent bridging statistics79
Monitoring MLT traffic81
Chapter 5 Configuring RMON using the CLI83
show rmon alarm 83
show rmon event 84
show rmon history 84
show rmon stats 85
rmon alarm 86
no rmon alarm87
rmon event 88
no rmon event 88
rmon history 88
no rmon history89
rmon stats 89
no rmon stats90
This guide provides information about system logging, displaying system
statistics, and configuring network monitoring on the Nortel Ethernet Switch
460 and Nortel Ethernet Switch 470.
Network management tools and interfaces
The following are the management tools and interfaces available with the
switch (for basic instructions on these tools, refer to the Nortel EthernetSwitch 460/470 Overview — System Configuration (NN47210-501)):
•
Console interface
The console interface (CI) allows you to configure and manage the
switch locally or remotely. Access the CI menu and screens locally
through a console terminal attached to your Ethernet Switch, remotely
through a dial-up modem connection, or in-band through a Telnet
session.
11
•
Web-based management
You can manage the network from the World Wide Web and can access
the Web-based Graphical User Interface (GUI) through the HTML-based
browser located on your network. The GUI allows you to configure,
monitor, and maintain your network through web browsers. You can also
download software using the web.
•
Java-based Device Manager
The Device Manager is a set of Java-based graphical network
management applications that is used to configure and manage
Ethernet Switches 460 and 470.
•Command Line Interface (CLI)
The CLI is used to automate general management and configuration
of the Ethernet Switches 460 and 470. Use the CLI through a Telnet
connection or through the serial port on the console.
•
Any generic SNMP-based network management software
You can use any generic SNMP-based network management software
to configure and manage Ethernet Switches 460 and 470.
•
Telnet
Telnet allows you to access the CLI and CI menu and screens locally
using an in-band Telnet session.
•
SSH
Secure Shell (SSH) is a client/server protocol that can provide a secure
remote login with encryption of data, user name, and password. For
details on SSH connections, refer to Nortel Ethernet Switch 460/470Security — Configuration (NN47210-500).
•Nortel Enterprise Policy Manager
The Nortel Enterprise Policy Manager (formerly Optivity Policy Services)
allows you to configure the Ethernet Switches 460 and 470 with a single
system.
Before you begin
This guide is intended for network administrators with the following
background:
•
Basic knowledge of networks, bridging, and IP
•
Familiarity with networking concepts and terminology
•
Basic knowledge of network topologies
Before using this guide, you must complete the installation procedures
discussed in Nortel Ethernet Switch 460-24T-PWR — Installation(NN47210-300) or Nortel Ethernet Switch 470 — Installation (NN47210-301)
.
Text conventions
angle brackets (< >)Indicate that you choose the text to enter based on
braces ({})Indicate required elements in syntax descriptions
the description inside the brackets. Do not type the
brackets when entering the command.
Example: If the command syntax is
ip default-gateway <XXX.XXX.XXX.XXX>,
you enter
ip default-gateway 192.32.10.12
where there is more than one option. You must choose
only one of the options. Do not type the braces when
entering the command.
Installing Gigabit Interface Converters and Small Form Factor Pluggable
Interface Converters (312865-B)
You can print selected technical manuals and release notes free, directly
from the Internet. Go to w
you need documentation. Then locate the specific category and model or
version for your hardware or software product. Use Adobe* Acrobat Reader*
to open the manuals and release notes, search for the sections you need,
and print them on most standard printers. Go to the Adobe Systems web
site to download a free copy of the Adobe Acrobat Reader.
Obtaining technical assistance
If you purchased a service contract for your Nortel product from a distributor
or authorized reseller, contact the technical support staff for that distributor
or reseller for assistance.
ww.nortel.com/support. Find the product for which
If you purchased a Nortel service program, contact one of the following
Nortel Technical Solutions Centers:
Technical Solutions Center
Europe, Middle East, and Africa(33) (4) 92-966-968
North America(800) 4NORTEL or (800) 466-7835
Asia Pacific(61) (2) 9927-8800
China(800) 810-5000
Telephone
Additional information about the Nortel Technical Solutions Centers is
available from www.nortel.com/callus.
An Express Routing Code (ERC) is available for many Nortel products and
services. When you use an ERC, your call is routed to a technical support
person who specializes in supporting that product or service. To locate an
ERC for your product or service, go to w
The Ethernet Switches 460 and 470 provide features that allow you to
monitor your network, display switch statistics, and log system events.
This chapter discusses the following topics:
•
"System Log" (page 15)
•"Port mirroring" (page 17)
•
"Port Statistics screen" (page 25)
System Log
System Log messages operate as follows:
•
Non-volatile memory messages are retrievable after a system reset.
•Messages can be viewed while the system is operational.
15
•
All non-volatile and dynamic memory messages are time stamped.
•
When you restart your system after a reset, the dynamic memory
messages are deleted.
•
After a reset, all messages stored in non-volatile memory are copied to
dynamic memory. The messages copied to dynamic memory are time
stamped to zero (0).
•
Starting with Release 3.6 software, Ethernet Switches460 and 470 save
the last 100 commands entered to a command history log in NVRAM.
This history is periodically copied from NVRAM to the remote syslog
server. For details, refer to Nortel Ethernet Switch 460/470 Security— Configuration (NN47210-500).
System Log screen
In the Console Interface, the System Log screen (Figure 1 "System Log
screen" (page 16)) displays or clears messages obtained from system
non-volatile memory or dynamic memory.
To open the System Log screen:
è Choose Display System Log (or type y) from the main menu.
Figure 1
System Log screen
Displaying most recent log entry first
This option allows you to view the system log with the most recent entry
displayed first; the rest of the log entries are listed in reverse chronological
order.
Table 1 "System Log screen fields" (page 16) describes the System Log
screen fields.
Table 1
System Log screen fields
FieldDescription
Display Messages FromThis field allows you to select the memory source your messages
are obtained from. Choose Non Volatile, Volatile, or Volatile + Non
Volatile. Use the spacebar to toggle between the options.
Clear Messages FromThis field allows you to clear the information messages from dynamic
This field allows you to determine whether the configuration
information received from non-volatile or dynamic memory
(depending on what is selected in the Display Messages From field)
is complete. Use the spacebar to toggle between the options.
Default No
Range No, Yes
or non-volatile memory or both. If you clear dynamic messages,
existing non-volatile messages are copied into dynamic memory.
After a system reset, all existing non-volatile messages are copied to
dynamic memory. Use the spacebar to toggle between the options.
Default None
Range None, Non Volatile, Volatile + Non Volatile
Port mirroring
You can designate one of your switch ports to monitor traffic on any two
specified switch ports (port-based) or to monitor traffic to or from any two
specified addresses that the switch has learned (address-based).
The following sections provide sample configurations using the Console
Interface for both monitoring modes available with the port mirroring feature:
•
Port-based mirroring
•
Address-based mirroring
A sample Port Mirroring Configuration screen accompanies each network
configuration example. Notethat the examples do not show all of the screen
prompts that precede some actions.
Note: Use the CI menus, the CLI, or the Web-based management
system to configure port mirroring.
For example, when you configure a switch for port mirroring or when you
modify an existing port mirroring configuration, the new configuration does
not take effect until you respond [Yes] to the following screen prompt:
Figure 2 "Port-based mirroring configuration example" (page 18) shows an
example of a port-based mirroring configuration where port 23 is designated
as the monitor port for ports 24 and 25 of Switch S1. Although this example
shows ports 24 and 25 monitored by the monitor port (port 23), any of the
trunk members of T1 and T2 can also be monitored.
In this example, port X and port Y are members of Trunk T1 and Trunk
T2. Port X and port Y are not required to always be members of Trunk
T1 and Trunk T2.
Note: Trunks cannot be monitored and trunk members cannot be
configured as monitor ports (see Nortel Ethernet Switch 460/470
Configuration — VLANs, Spanning Tree, and Multilink Trunking
(NN47210-505) for details).
Figure 2 "Port-based mirroring configuration example" (page 18) shows the
Port Mirroring Configuration screen setup for this example.
Figure 2
Port-based mirroring configuration example
In the configuration example shown in Figure 2 "Port-based mirroring
configuration example" (page 18), the designated monitor port (port 23) can
be set to monitor traffic in any of the following modes:
•
Monitor all traffic received by port X.
•
Monitor all traffic transmitted by port X.
•
Monitor all traffic received and transmitted by port X.
an example of an address-based mirroring configuration where port 23,
the designated monitor port for Switch S1, is monitoring traffic occurring
between address A and address B.
Note: The screen data displayed at the bottom of the screen changes
to show the new currently active port mirroring configuration after you
press Enter.
The Monitoring Mode field [ Address A - > Address B ] indicates that all
traffic transmitted by address A to address B is monitored by the StackProbe
attached to Monitor Port 23.
Note: When you enter MAC addresses in this screen, they are also
displayed in the MAC Address Table screen EAPOL.
Figure 5
Port Mirroring Configuration address-based screen example
Port mirroring21
Port mirroring configuration rules
The following configuration rules apply to any port mirroring configuration:
•
You cannot configure a monitor port as a trunk member or IGMP
member.
•
A monitor port cannot be used for normal switch functions.
•
When you configure a port as a monitor port, the port is automatically
disabled from participating in the spanning tree. When you reconfigure
the port as a standard switch port (no longer a monitor port), the port is
enabled for spanning tree participation.
•
When you create a port-based port mirroring configuration, be sure
that the monitor port and both of the mirrored ports, port X and port Y,
have the same configuration. Use the VLAN Configuration screen to
configure the VLAN EAPOL.
VLAN configuration settings for any ports configured for port-based
mirroring cannot be changed. Use the Port Mirroring Configuration
screen to disable port mirroring (or reconfigure the port mirroring ports),
then change the VLAN configuration settings.
•
For port-based monitoring of traffic, use one of the following modes for
monitoring broadcast, IP Multicast, or unknown DA frames:
— Monitor all traffic received by port X.
— Monitor all traffic transmitted by port X.
— Monitor all traffic received and transmitted by port X.
Appendix "Quick steps for port mirroring" (page 123) also provides
configuration flowcharts that can help you use this feature.
Port Mirroring Configuration screen
The Port Mirroring Configuration screen allows you to configure a specific
switch port to monitor up to two specified ports or two MAC addresses. You
can specify port-based monitoring or address-based monitoring.
Figure 6 "Port Mirror Configuration screen" (page 22) shows an example of
a Port Mirroring Configuration screen.
To open the Port Mirroring Configuration screen:
è Choose Port Mirroring Configuration (or type i) from the Switch
Allows a user to select any one of six port-based monitoring modes
or any one of five address-based monitoring modes (see Table
3 "Monitoring modes" (page 24)). Selecting any one of the six
port-based modes activates the port X and port Y screen fields,
where a user can choose up to two ports to monitor. Selecting any
one of the five address-based modes activates the Address A and
Address B screen fields, where a user can specify MAC addresses
to monitor.
Default Value:Disabled
Range:See Table 3 "Monitoring modes" (page 24)
Indicates the port number (of the specified unit) that is designated
as the monitor port.
Default Value:Zero-length string
Range:1 to 8 or 1 to 26 (depending on model type)
Indicates one of the ports (of the specified unit) that is monitored by
the designated port monitor when one of the port-based monitoring
modes is selected.
This port is monitored according to the value of Port X in the
Monitoring Mode field (see Table 3 "Monitoring modes" (page 24)).
Default Value:Zero-length string
Range:1 to 8 or 1 to 26 (depending on model type)
Unit/Port Y
Indicates one of the ports (of the specified unit) that is monitored by
the designated port monitor when one of the port-based monitoring
modes is selected. When installed as a stand-alone switch, the
screen does not display the (Unit/) field designation. This port is
monitored according to the value of Port Y in the Monitoring Mode
field (see Table 3 "Monitoring modes" (page 24)).
Default Value:Zero-length string
Range:1 to 8 or 1 to 26 (depending on model type)
Indicates the MAC addresses that is monitored by the designated
port monitor when one of the address-based monitoring modes is
selected. This port is monitored according to the value of Address
A in the selected Monitoring Mode field (see Table 3 "Monitoring
modes" (page 24)).
Default Value:00-00-00-00-00-00 (no MAC address assigned)
Range:00-00-00-00-00-00 to FF-FF-FF-FF-FF-FF
Address B
Indicates the MAC addresses that is monitored by the designated
port monitor when one of the address-based monitoring modes is
selected. This port is monitored according to the value of Address
B in the selected Monitoring Mode field (see Table 3 "Monitoring
modes" (page 24)).
Default Value:00-00-00-00-00-00 (no MAC address assigned)
Range:00-00-00-00-00-00 to FF-FF-FF-FF-FF-FF
Table 3 "Monitoring modes" (page 24) describes the various monitoring
modes available from the Port Mirroring Configuration screen.
Table 3
Monitoring modes
FieldDescription
Port-based:
DisabledDefault value for this feature.
-> Port XMonitor all traffic received by Port X.
Port X ->Monitor all traffic transmitted by Port X.
<-> Port XMonitor all traffic received and transmitted by Port X.
-> Port X or Port Y ->Monitor all traffic received by Port X or transmitted by
Port Y.
Note: Do not use this mode for broadcast or multicast
traffic.
-> Port X and Port Y ->Monitor all traffic received by Port X (destined to Port Y)
and then transmitted by Port Y.
Note: Do not use this mode for broadcast or multicast
traffic
<-> Port X and Port Y <->Monitor all traffic received/transmitted by Port X and
received/transmitted by Port Y.
Note: Do not use this mode for broadcast or multicast
traffic
Address-based:
DisabledDefault value for this feature.
Address A -> any AddressMonitor all traffic transmitted from Address A to any
address.
any Address -> Address AMonitor all traffic received by Address A from any address.
<-> Address AMonitor all traffic received by or transmitted by Address A.
Address A -> Address BMonitor all traffic transmitted by Address A to Address B.
Address A <-> Address BMonitor all traffic between Address A and Address B
(conversation between the two stations).
Port Statistics screen
The Port Statistics screen, as displayed in Figure 7 "Port statistics screen"
(page 26), allows you to view detailed information about any switch or port
in a configuration. The screen is divided into two sections (Received and
Transmitted) so that you can compare and evaluate throughput or other port
parameters. All screen data is updated approximately every 2 seconds.
You can use the Port Statistics screen to clear (reset to zero) port counters
for a specific switch or port. Alternatively, you can use the Clear All Port
Statistics option to clear port counters for all switches or ports.
To open the Port Statistics screen:
Choose Display Port Statistics (or type d) from the Switch Configuration
512-1023 bytesReceived column: Indicates the total number of 512-byte to
1023-byte packets received on this port.
Transmitted column: Indicates the total number of 512-byte to
1023-byte packets transmitted successfully on this port.
1024-1518 bytesReceived column: Indicates the total number of 1024-byte to
1518-byte packets received on this port.
Transmitted column: Indicates the total number of 1024-byte to
1518-byte packets transmitted successfully on this port.
Frame ErrorsIndicates the total number of valid-size packets received but
discarded because of CRC errors and improper framing.
Undersized PacketsIndicates the total number of packets received on this port with
fewer than 64 bytes and with proper CRC and framing (also known
as short frames or runts).
Oversized PacketsIndicates the total number of packets received on this port with more
than 1518 bytes and with proper CRC and framing (also known as
oversized frames).
Filtered PacketsIndicates the number of packets filtered (not forwarded) by this port.
Flooded PacketsIndicates the total number of packets flooded (forwarded) through
this port because the destination address was not in the address
database.
FCS ErrorsIndicates the total number of valid-size packets received with proper
framing but discarded because of cyclic redundancy check (CRC)
errors.
CollisionsIndicates the total number of collisions detected on this port.
Single CollisionsIndicates the total number of packets transmitted successfully on
this port after a single collision.
Multiple CollisionsIndicates the total number of packets transmitted successfully on
this port after more than one collision.
Excessive CollisionsIndicates the total number of packets lost on this port due to
excessive collisions.
Deferred PacketsIndicates the total number of frames delayed on the first transmission
attempt, but that never incurred a collision.
Late CollisionsIndicates the total number of packet collisions that occurred
after a total length of time that exceeded 512 bit-times of packet