Академический Документы
Профессиональный Документы
Культура Документы
CT1e_04_Ethernet_Half_Duplex_07.0.00 1
Notes:
1
Media Converters
TP FO TP
CT1e_04_Ethernet_Half_Duplex_07.0.00 2
Media converters usually are used to bridge long distances by fiber- Notes:
optic cable.
Media converter regenerate the amplitude but dont offer the repeater
function.
2
Hubs Repeaters Star Couplers
CT1e_04_Ethernet_Half_Duplex_07.0.00 3
The advantages of a hub are its small latency and the simple
installation, usually plug-and-play.
3
CSMA/CD - IEEE 802.3 Access Method
No collision
Data correctly
transferred
CT1e_04_Ethernet_Half_Duplex_07.0.00 4
The jam signal usually consists of a 1-0 sequence, but may also
comprise any other bit sequences. The only important factor is that the
bus is occupied, thereby generating a send abort for the devices
involved in the collision.
4
Size of a Collision Domain at 10 MBit/s
Smax = 5120 m
CT1e_04_Ethernet_Half_Duplex_07.0.00 5
The sender must detect a collision before it has ended the send Notes:
operation.
Consequently, the standard stipulates the minimum size of an Ethernet
frame as 64 bytes or 512 bits.
5
Appendix
CT1e_04_Ethernet_Half_Duplex_07.0.00 6
Notes:
6
Ethernet 10 Mbit/s
10BASE2
BNC T piece
Terminator 50
Segment
min. 0.5 m
max. 185 m
10BASE5
Terminator 50
Segment
min. 2.5 m
max. 500 m
CT1e_04_Ethernet_Half_Duplex_07.0.00 7
Today coax and AUI are used in industry networks for completion. Notes:
7
Design of a Collision Domain Model 1: 5-4-3 Rule
Repeater
CT1e_04_Ethernet_Half_Duplex_07.0.00 8
8
Maximum Network Size, Fast ETHERNET
CT1e_04_Ethernet_Half_Duplex_07.0.00 9
9
Ethernet in Full Duplex
CT1e_05_Ethernet_Full_Duplex_07.0.00 1
Notes:
1
Autonegotiation
Autonegotiation Autonegotiation
FLP
FDX FDX
FLP
CT1e_05_Ethernet_Full_Duplex_07.0.00 2
Autonegotiation offers the devices to select the best possible data Notes:
throughput for the connection.
By upgrading the Normal Link Pulse (NLP), which tells the opposite
port of its existence, to Fast Link Pulses (FLPs), the best possible
transfer rate (10BASE-T, 100BASE-TX, 100BASE-T4) and the mode
(HDX, FDX) are negotiated. The FLPs are only transmitted at
connection setup, so as not to impair the connection performance.
Parallel detection
Status of autonegotiation when only one of the two connected
devices supports autonegotiation.
The autonegotiation device detects the speed of the opposite
party and configures itself to that speed and half-duplex mode
in order to detect collisions.
2
Duplex Mismatch
CT1e_05_Ethernet_Full_Duplex_07.0.00 3
3
Exercise: Autonegotiation
Auto Auto
Auto
100Mbit/s HDX
Auto
100Mbit/s FDX
Auto
100Mbit/s HDX
Auto
10Mbit/s HDX
CT1e_05_Ethernet_Full_Duplex_07.0.00 4
Some ports in the example above have fixed transfer rates and modes, Notes:
and others are set to autonegotiation (Auto). The switches support the
autocrossing function when autonegotiation is active.
Enter the transfer rate and mode for the ports set to autonegotiation.
Hub
Switch
4
Exercise: Duplex Mismatch
Late Duplex
Port CRC Fragmente Collision Duplex Mode?
Collision Mismatch?
1 0 0 15 0
2 32 18 0 0
3 0 0 115 85
4 60 44 0 0
5 2 0 0 0
6 0 0 64 53
CT1e_05_Ethernet_Full_Duplex_07.0.00 5
Determine which port has a duplex mismatch and in which duplex Notes:
mode (FDX or HDX) the port.
5
Switches
A
B
Po 2
rt 1 o rt
P
Port 3 C
CT1e_05_Ethernet_Full_Duplex_07.0.00 6
The switch checks incoming framess for their destination and for any
errors. By means of an address table (Forwarding Database) the
switch learns during online operation which addresses (devices) are
connected to which port. This means frames are forwarded to specific
destinations and do not unnecessarily place load on segments in
which the frame's destination is not located. If the destination is not yet
known to the switch, however, the frame is sent to every segment.
This ensures that the destination receives the frame (termed
"flooding").
6
Forwarding Database and Aging Timer
3 00:08:74:D3:04:5D
4
old
tAging
CT1e_05_Ethernet_Full_Duplex_07.0.00 7
Each switch has a forwarding database where it stores which port, or Notes:
ports, conceal(s) which MAC address (or multiple addresses). This
enables the switch to forward frames directly to the destination without
placing data load on other network segments.
If a switch receives a frame from a sender not known to it, it enters the
MAC address dynamically in its table. MAC address entries may be
permanent (e.g. system or static addresses) or dynamic (learned).
7
Exercise: Address Table
A
B
Po 2
rt 1 o rt
P
Port 3 C
T1: 12:00 T2: 12:01 T3: 12:02 T4: 12:03
Aging Aging Aging Aging
Port Address Port Address Port Address Port Address
Timer Timer Timer Timer
1 1 1 1
2 2 2 2
3 3 3 3
CT1e_05_Ethernet_Full_Duplex_07.0.00 8
Below you see the data exchange between the three computers A, B
and C:
T1 (12:00): "A" sends a frame to "B
T2 (12:01): "B" answers "A
T3 (12:02): "B" sends a frame to "C
T4 (12:03): "C" answers "B"
For each point in time write the complete Forwarding Database of the
switch to the tables provided for the purpose. Think about which point
in time the switch learns which entry.
8
Ethernet Communication Frame Sequence
A
D
B
E
C
Sequence Sequence
Ingress Egress
2. from B to D
3. from C to E from C to E 2.
CT1e_05_Ethernet_Full_Duplex_07.0.00 9
If the the switch receives several frames at the same time, it forwards
them in parallel while the egress ports are different.
If the switch receives sevral frames at the same time while the egress
port is the same, the frames needs to wait in the memory of the switch
until it is their turn.
9
Packet Delays in switched Networks
1. Cabel
3. Switching Methods
CT1e_05_Ethernet_Full_Duplex_07.0.00 10
Cable Notes:
In worst case data is transmitted with 2/3 of light speed on a
copper or fiber cable. This will case a delay of 5 s per
kilometer.
Switching Methods
Next to the Latency of a switch, the biggest delay is caused by
the switching mechism Store and Forward. Using this
mechanism every received frame will be stored in the memory
of the switch until they are forwarded. This dealy based on
Bandwith of a switch port and the size of the Ethernet frame.
10
Switching: Store and Forward / Cut-Through
PA Ethernet Frame
Store and Forward
Frame is completely
read-in and
is checked
72-1526 byte
Cut-Through
Immediately after the
destination address the
frame is transported
14 byte
CT1e_05_Ethernet_Full_Duplex_07.0.00 11
11
Excersie: Frame Delays using Store and Forward
Frame size 10 Mbit/s 100 Mbit/s
64 Byte
500 Byte
1000 Byte
1522 Byte
Consider in your calculation the size of the IFG, Prembel and SFD with 20 Bytes.
CT1e_05_Ethernet_Full_Duplex_07.0.00 12
Calculate the delay of the switch to store a frame in the memory for the Notes:
different frame sizes.
12
Propagation Delays
1. Example (All connections using 100 Mbit/s FDX)
A B
Delay: ~ 184 s
From A to B
A B
C From C to B
CT1e_05_Ethernet_Full_Duplex_07.0.00 13
1. Example Notes:
A sends a frame with the size of 500 Bytes to device B. This is
the only frame in this network.
Each switch and each network interface card cause a delay of
41.6 s by using store and forward.
Because of the Latency of the switches there will be an
additional delay of 30 s (worst case) .
Result: 3* 41,6s + 2 * 30s = 184.8 s
2. Example
Now device C sends a frame with maximum size (1,518 Byte) in
derction to B. The switch receives this frame immideatly before
the frame from A.
First the switch forwards the frame from C. The frame from A
needs to wait in the memory of the switch for 123.02 s
In addition the Latency nwe need to take care of the latency of
the switch like in example 1.
Result: 184.8 s (Result 1) + 123.02 s = 307.82 s
13
Appendix
CT1e_05_Ethernet_Full_Duplex_07.0.00 14
Notes:
14
Solution: Autonegotiation
Auto Auto
Crossover
100Mbit/s FDX 100Mbit/s FDX
Auto
Patch
100Mbit/s HDX
100Mbit/s HDX
Auto
Patch (or Corssover)
100Mbit/s HDX 100Mbit/s HDX
CT1e_05_Ethernet_Full_Duplex_07.0.00 15
Some ports in the example above have fixed transfer rates and modes, Notes:
and others are set to autonegotiation (Auto). The switches support the
autocrossing function when autonegotiation is active.
Enter the transfer rate and mode for the ports set to autonegotiation.
Hub
Switch
15
Solution: Duplex Mismatch
Late Duplex
Port CRC Fragmente Collision Duplex Mode?
Collision Mismatch?
1 0 0 15 0 No HDX
2 32 18 0 0 Yes FDX
3 0 0 115 85 Yes HDX
4 60 44 0 0 Yes FDX
5 2 0 0 0 No FDX
6 0 0 64 53 Yes HDX
CT1e_05_Ethernet_Full_Duplex_07.0.00 16
Determine which port has a duplex mismatch and in which duplex Notes:
mode (FDX or HDX) the port.
16
Solution: Address Table
A
B
Po 2
rt 1 o rt
P
Port 3 C
T1: 12:00 T2: 12:01 T3: 12:02 T4: 12:03
Aging Aging Aging Aging
Port Address Port Address Port Address Port Address
Timer Timer Timer Timer
1 A 5 min 1 A 4 min 1 A 3 min 1 A 2 min
3 3 3 3 C 5 min
CT1e_05_Ethernet_Full_Duplex_07.0.00 17
Below you see the data exchange between the three computers A, B
and C:
T1 (12:00): "A" sends a frame to "B
T2 (12:01): "B" answers "A
T3 (12:02): "B" sends a frame to "C
T4 (12:03): "C" answers "B"
For each point in time write the complete Forwarding Database of the
switch to the tables provided for the purpose. Think about which point
in time the switch learns which entry.
17
Solution: Frame Delays using Store and Forward
Frame size 10 Mbit/s 100 Mbit/s
64 Byte 67,2 s 6,72 s
Consider in your calculation the size of the IFG, Prembel and SFD with 20 Bytes.
CT1e_05_Ethernet_Full_Duplex_07.0.00 18
Calculate the delay of the switch to store a frame in the memory for the Notes:
different frame sizes.
18
Excersise: Propagation Delays
S1 S2 S3
100 Mbit/s 100 Mbit/s 1 Gbit/s 100 Mbit/s
A B
C D
CT1e_05_Ethernet_Full_Duplex_07.0.00 19
In this excersise the delay of the cables will not be included. The Notes:
Latency of each switch is 10 s. Consider in your calculation the size
of the IFG, Prembel and SFD with 20 Bytes.
________________________________
_________________________________
19
Solution: Propagation Delays
S1 S2 S3
100 Mbit/s 100 Mbit/s 1 Gbit/s 100 Mbit/s
A B
C D
CT1e_05_Ethernet_Full_Duplex_07.0.00 20
In this excersise the delay of the cables will not be included. The Notes:
Latency of each switch is 10 s. Consider in your calculation the size
of the IFG, Prembel and SFD with 20 Bytes.
1. Calculate the propagation delay of a frame from A to B with the size of
230 Bytes. Device C and D are not sending anything.
Delay per Switch (100 Mbit/s)
250 Byte * 8 / 100 Mbit/s = 20 s
Delay per Switch (1000 Mbit/s)
250 Byte * 8 / 1000 Mbit/s = 2 s
Delay of NIC B
250 Byte * 8 / 100 Mbit/s = 20 s
Propagation Delay:
20s + 20s + 20s + 2 s + 3 * 10s = 92s
20
Network Availability
CT1e_06_Network_Availability_07.0.00 1
Notes:
1
Network Topologies
Bus Ring
Star
Double line
Mesh
CT1ed_06_Network_Availability_07.0.00 2
The structure of the first networks to use Ethernet was a bus structure Notes:
using coaxial cables (see 10BASE5 and 10BASE2).
2
Two Stages of Redundancy
Whichever redundancy method is used, there are two stages
Re-establish the physical connection
Re-establish the logical connection
CT1ed_06_Network_Availability_07.0.00 3
Notes:
3
Re-establishing Physical Communication
A
PC1
B E
C D PC2
CT1ed_06_Network_Availability_07.0.00 4
The link failure between the devices B and C needs to detected and Notes:
theprevious redundant connection between A and E needs to be
enabled in order to guarantee the communication between the devices
PC1 and PC2.
4
Re-establishing Logical Communication
A
PC1
Learned Address Table
Switch D
Device Path
B E
PC1 Port 1
PC1 Port 2
rt 2
C Po D PC2
Port 1
CT1ed_06_Network_Availability_07.0.00 5
Due to the link down of a coonection tha active tiopology of the Notes:
network has been changed. This cause now a problem to the learned
address table of the switches. The current relation of the port numbers
of the to the MAC addresses of the connected devices is not correct.
The result can be, that the switches will forward frames at the wrong
ports.
5
Spanning Tree Algorithm (STA)
CT1ed_06_Network_Availability_07.0.00 6
6
STA and RSTP: Bridge ID and Port ID
80:00 00:80:63:04:05:06
Root Bridge
Port1 Port 2 Port 3
Designated Port
Root-Port
Port 4 Port 5
Port 4
Bridge
80:00 00:80:63:55:55:55
Bridge
80:00 00:80:63:99:99:99
Port1 Port 2 Port 3
Port1 Port 2 Port 3
CT1ed_06_Network_Availability_07.0.00 7
Each switch is uniquely described by its Bridge ID. This ID is 8 bytes Notes:
long, and consists of a priority (2 bytes) and the MAC address (6
bytes). To map multiple STAs onto VLANs, the 2 bytes of priority were
divided into 4 bits (MSB) of priority and 12 bits of system ID. Thus the
granularity of the priority is 4096.
The switch with the lowest bridge ID is termed the Root.
The Port ID is 2 bytes long and consists of the priority (1 byte) and the
port number (1byte). The port with the lowest ID has the highest
priority.
This port ID split has since been changed. The new split entails a 4-bit
priority and a 12-bit port number.
The port of a switch having the lowest path costs to the root becomes
the root port. The root port is connected to the designated port.
7
STA and RSTP: Path Costs
CT1ed_06_Network_Availability_07.0.00 8
Any connection between two switches incurs path costs. The aim of Notes:
STA is that every switch (not root) should reach the root with the
lowest possible path costs.
If there are multiple paths from a switch to the root with identical path
costs, the lower bridge ID of the connected switches is the tie-breaker.
If both ports are on the same switch between the root and the switch,
the port ID decides which port is used.
8
Bridge Protocol Data Unit (BPDU)
CT1ed_06_Network_Availability_07.0.00 9
RSTP uses BPDUs (Bridge Protocol Data Units) to propagate all Notes:
neccessary information calculating the active totpology and changing
the topology.
9
Excersise: RSTP
You receive BPDU with the Message Age = 3. How many switches are
between your PC and the root?
__________
You receive a BPDU with the Root Path Costs of 460,000. If the default
path costs are used, how many links are between the switch you are
connected to and the Root and what is the current Message Age?
CT1ed_06_Network_Availability_07.0.00 10
Notes:
10
Rapid Spanning Tree: Port States
DISCARDING
FORWARDING LEARNING
CT1ed_06_Network_Availability_07.0.00 11
The Rapid Spanning Tree standard (IEEE 802.1D-2004) was adopted Notes:
in June 2004. This new standard incorporated the former 802.1w
standard. The reason for revising the Spanning Trees was the long
switchover time of at least 30 seconds (default configuration) and
more.
The number of port states for RST was reduced to three: Discarding,
Learning and Forwarding. The Learning state is only assumed in
exceptional cases (in combined operation with Spanning Tree).
Rapid Spanning Tree was designed so that a port can switch from
Discarding to Forwarding in less than a second. A new Root can
switch more rapidly to Forwarding and with an acknowledgement
mechanism between the switches designated ports can rapidly switch
to Forwarding mode. Frame duplications and a change in the frame
sequence may occur in the process, however.
11
STA and RSTP: Port States
Is Port Included
STA (802.1D) RSTP (802.1w) Is Port Learning
In Active
Port State Port State MAC Addresses?
Topology?
Disabled Discarding No No
Blocking Discarding No No
CT1ed_06_Network_Availability_07.0.00 12
12
Rapid Spanning Tree: Port Roles
Root
D D
R R
A B
D
CT1ed_06_Network_Availability_07.0.00 13
In Rapid Spanning Tree each switch port is assigned one of the Notes:
following port roles: Root Port (R), Designated Port (D), Alternate Port
or Backup Port.
The Root port of a switch is the port which receives frames with the
lowest costs to the root. If there are multiple paths with the same
costs, the port ID decides.
The Designated port is the port which by way of itself offers the most
cost-effective path to the root for the connected LAN. If there are
multiple paths to the root with the same costs, the switch with the
lowest bridge ID is the winner. If there are multiple ports at one switch
with paths having the same costs, the port ID decides.
The Backup port offers a backup path when two ports of the switch in
question are connected to one LAN segment.
13
Exercise: Rapid Spanning Tree
Switch 1
1 2 3
Switch 2
1 2 3
32768 00-80-63-04-05-01
32768 00-80-63-04-05-02
4 5 6
4 5 6
Switch 5
1 2 3 Switch 3
1 2 3
12288 00-80-63-04-05-05
32768 00-80-63-04-05-03
4 5 6
4 5 6
Switch 4
1 2 3
1 Gbit/s
32768 00-80-63-04-05-04
100 Mbit/s
4 5 6
CT1ed_06_Network_Availability_07.0.00 14
Define the Root Ports (RP) and the Designated Ports (DP) and mark
the redundant links.
_______________________________________________________
_______________________________________________________
_______________________________________________________
14
Rapid Transition To Forwarding
Edge Ports
Connected directly to end devices
Cannot create loops
An Edge Port which receives a BDPU immediately loses its Edge Port
status
Link Type
Point to point links operates in full duplex
This can be overridden
CT1ed_06_Network_Availability_07.0.00 15
Notes:
15
RSTP: Changing Topology New Link
Root
X
X
A
B C D
CT1ed_06_Network_Availability_07.0.00 16
Both ports of the new link are put into immediately into discarding state
to prevent a loop.
16
RSTP: Changing Topology Sync
Root
X
X
A
X
X
B C D
CT1ed_06_Network_Availability_07.0.00 17
As soon as the switch A receives a BPDU from the root, it blocks all Notes:
its non-edge designated Ports. This operation is called sync.
17
RSTP: Changing Topology - Negotiation
Root
A
X
X
B C D
CT1ed_06_Network_Availability_07.0.00 18
18
RSTP: Changing Topology Travel down the tree
Root
B C X D
CT1ed_06_Network_Availability_07.0.00 19
Based on the new information in the BPDU of the root, the same Notes:
process will be repeated between the switches B and A and the
switches C and A till the topology change is finished.
The final result is, that the link between the switches C and D will
be blocked.
19
Link Aggregation (Trunking) IEEE 802.3ad
CT1ed_06_Network_Availability_07.0.00 20
The links must be operated in full-duplex mode and with the same
transfer speed. Different media can be aggregated.
20
MRP - Media Redundancy Protocol (IEC 62439-2)
Redundancy Manager
MRP_Test Frames
CT1ed_06_Network_Availability_07.0.00 21
By using VLANs and prioritization all ring frames will have the priority
value 7.
21
PRP Parallel Redundancy Protocol (IEC 62439-3)
DANP DANP
LAN A LAN B
RedBox RedBox
CT1ed_06_Network_Availability_07.0.00 22
A source DANP or RedBox sends the same frame over both LANs
and a destination DANP or RedBox receives it from both LANs within
a certain time, consumes the first frame and discards the duplicate.
The result is a zero recovery time.
22
HSR High-availability Seamless Redundancy (IEC 62439-3)
DANH DANH
RedBox RedBox
CT1ed_06_Network_Availability_07.0.00 23
Compared to PRP, HSR needs roughly half of the network structure to Notes:
achieve a zero recovery time with the result, that the available
bandwidth for the network traffic is roughly halved. HSR base on ring
network structure. The nodes within the ring are restricted to be HSR-
capable switching end nodes.
23
Appendix
CT1e_06_Network_Availability_07.0.00 24
Notes:
24
Solution: RSTP
You receive BPDU with the Message Age = 3. How many switches are
between your PC and the root?
You receive a BPDU with the Root Path Costs of 460,000. If the default
path costs are used, how many links are between the switch you are
connected to and the Root and what is the current Message Age?
CT1ed_06_Network_Availability_07.0.00 25
Notes:
25
Exercise: Spanning Tree
Switch 1 DP
1 2 3
Switch 2 RP
1 2 3
32768 00-80-63-04-05-01
32768 00-80-63-04-05-02
4 5 6
RP DP 4 5 6
Switch 5 DP
1 2 3 Switch 3
1 2 3
12288 00-80-63-04-05-05
32768 00-80-63-04-05-03
4 5 6
4 5 6
RP
Switch 4 RP DP
1 2 3
CT1ed_06_Network_Availability_07.0.00 26
Determine the Root Ports (RP) and the Designated Ports (DP) and
mark the redundant links.
The port with the lowest overall path costs to the Root (Root Path
Cost) becomes Root Port (RP).
Switch 1: Port 4 = Root Port
Switch 2: Port 2 = Root Port
Switch 3: Port 4 = Root Port
Switch 4: Port 2 = Root Port
26
Sub Ring
The Sub-Ring concept enables you to easily couple new network Notes:
segments to suitable devices in existing redundancy rings (primary
rings). The devices of the primary ring to which the new Sub-Ring is
being coupled are referred to as Sub-Ring Managers (SRMs).
The following devices support the Sub-Ring Manager function:
RSR20/RSR30
MACH 1000
MACH 1040
MACH 4000
PowerMICE
The SRM-capable devices support up to 4 SRM instances and can
thus be the Sub-Ring manager for up to 4 Sub-Rings at the same time.
In a Sub-Ring, you can integrate as participants the devices that
support MRP - the Sub-Ring Manager function is not required.
Each Sub Ring may consist of up to 200 participants. The SRMs
themselves and the switches placed in the Base Ring between the
SRMs do not count. here.
As an MRP-Ring, the switching times of the Sub-Ring in redundancy
cases are typically < 100 ms.
27
Notes:
Note: Connect Sub-Rings only to existing primary rings. Do not
cascade Sub-Rings (i.e., a new Sub-Ring must not be connected to
an existing Sub- Ring).
Note: Configure all the devices in the Sub-Ring before you close the
redundant line. In this way, you prevent loops during the
configuration phase.
Notes:
28
Redundant Ring Coupling One Switch
1: Backbone
2: Ring
3: Partner coupling port
4: Coupling port
5: Main Line
6: Redundant Line
CT1ed_06_Network_Availability_07.0.00 29
If the main line no longer functions, the device opens the redundant
line immediately. If the main line functions again, the redundant line is
again blocked for normal data traffic and the main line is used again.
The ring coupling detects and handles an error within 500 ms.
29
Redundant Ring Coupling Two Switch
1: Backbone
2: Ring
3: Main line
4: Redundant line
CT1ed_06_Network_Availability_07.0.00 30
The device in the redundant line and the device in the main line use
control framess to inform each other about their operating states, via
the Ethernet or the control line.
The redundant line is again blocked for normal data traffic and the
main line is used again.
30
Traffic Control
at Layer 2
CT1e_07_Traffic_Control_07.0.00 1
Notes:
1
What is Bandwidth?
0 sek 1 sek t
0 sek 1 sek t
0 sek 1 sek t
CT1e_07_Traffic_Control_07.0.00 2
Over all these bits are not only application data, for example a file
which will be exchanged between two devices using FTP. The bits on
the cable contains:
20 Byte Inter Frame Gap, Preamble, Start of Frame Delimiter
18 Byte (22 Byte with Tag) Header of an Ethernet frame
Header IP, UDP or TCP
Header FTP, HTTP etc.
2
Port Memory Usage
A
B D
Discarded
C
Discarded
From C to D
From A to D
CT1e_07_Traffic_Control_07.0.00 3
Each switch has a memory for each port to store frames. The size of Notes:
this memory depends on the manufacterer. Typically the frames will
not be stored at the ingress port. They will be stored at the egress
ports.
If the switch receives sevral frames at the same time while the egress
port is the same, the frames needs to wait in the port memory (egress)
of the switch until it is their turn.
If the port memory is not sufficient, the switch will discards incoming
valid frames.
3
Flow Control (IEEE 802.3)
A
B D
Pause Frame
C
From C to D Waits in the end device till the end of the pause time.
From B to D
CT1e_07_Traffic_Control_07.0.00 4
The Flow Control mechanism according IEEE 802.3 (former .3x) Notes:
prevents the overload of a port memory. As soon as the port memory
reaches a specifiy threshold, the switch triggers the devices
connected to the other ports, not to send any frames in its direction.
The switch do this by
sendeing a Pause frame, if the port is runnning full duplex.
Causing a collision, if the port is running in half duplex.
This problem is not dependend to the network load over one second. It
depends on the time (synchronism) the frames are received by the
switch and the numer and size of the frames.
4
Excerise: Port Memory
What are the benefits of Flow Control?
_________________
_________________
_________________
_________________
CT1e_07_Traffic_Control_07.0.00 5
Notes:
5
Ethernet Frame With Tag
TPID TCI
Tag Protocol ID User CFI VLAN ID
Priority
16 bit 3 bit 1 bit 12 bit
CT1e_07_Traffic_Control_07.0.00 6
With the success of Ethernet in local networks, data volumes in those Notes:
networks have also increased substantially. As a result, two functions
have been added to Ethernet. Firstly, the frames can be assigned a
priority; and secondly, a local network can now be subdivided into
separate virtual networks.
The first two bytes contain the Tag Protocol Identifier ETPID (81-00
hex). The recipient signals that the Ethernet frame has been extended
by the tag field.
The next two bytes are termed Tag Control Information (TCI).
Priority (3 bit): 8 priority classes
CFI (1 bit): Canonical Format Indicator CFI signals whether the
addresses are transmitted in canonical (=1; e.g. Token ring) or
non-canonical (=0; e.g. Ethernet) format.
VLAN-ID (12 bit): marks definite the assigned VLAN;
max. 4094
0 = no VLAN defined
4095 = reserved for future use
6
Quality of Service (IEEE 802.1D and Q)
Attention:
Priority 0 is higher than priority 1 and 2!
CT1e_07_Traffic_Control_07.0.00 7
As a result of the tag field being added to the Ethernet frame, the Notes:
frames can be assigned one of 8 priority levels. In this, high-priority
data should be prioritized ahead of low-priority data. For this the
switches must have at least two so-called queues. Depending on
priority, the frames received at a port are distributed across different
queues.
The names of the priorities are pre-defined by the standard. This gives
a hint what should be how prioritized.
7
QoS: Assigning Priority to Queue (Mapping)
Default configuration in practice:
Avail. queues
user_prio 2 4 8
1 0
0
2 1
0
0 (default) 2
1
3 3
4 4
2
5 5
1
6 6
3
7 7 high
CT1e_07_Traffic_Control_07.0.00 8
Queues are named as Traffic Classes by the standard. The smaller Notes:
the ID of a queue the lower the priority of it.
Example:
A frame with priority 3 joins queue 1 of 4 available queues
8
QoS: Concepts to arbitrate Queues
Priority Scheduling (Starve or Strict)
Round Robin Scheduling
Weighted Fair Queuing (WFQ)
Mainte-
nance
Voice
Super-
vision
Con-
trol
Control Priority
6
Supervision 5
Voice 3
Maintenance 1
CT1e_07_Traffic_Control_07.0.00 9
9
Exercise: Tag
Using an analyser, you capture a frame with the Tag value:
81:00:a0:36 (Hex-Code)
CT1e_07_Traffic_Control_07.0.00 10
Notes:
10
Physical LAN
CT1e_07_Traffic_Control_07.0.00 11
Notes:
11
Virtual LANs
CT1e_07_Traffic_Control_07.0.00 12
Definition Notes:
Connection of data terminal equipment to closed, logical LANs
within a physical infrastructure with the aim of broadcasts
limitation.
Nowadays VLANs are more used for security aims than for broadcast
limitation. Nevertheless can be broadcast limitation a point of industry
networks. To make it absolutely clear: VLANs offer only low security,
also with proprietary solutions such as Ciscos private VLAN.
12
Multiple VLANs per Switch
HIRSCHMANN HIRSCHMANN
CT1e_07_Traffic_Control_07.0.00 13
Notes:
13
Management VLAN
HIRSCHMANN HIRSCHMANN
CT1e_07_Traffic_Control_07.0.00 14
Notes:
14
Port based VLANs: Implementation
1 2 3 4 5 1 2 3 4 5
A B C D E F G H
CT1e_07_Traffic_Control_07.0.00 15
The Egress table specifies at which port frames can be sent with
what VLAN ID (VID). The Egress table also specifies whether an
Ethernet frame has to be sent
with a tag field (T = tagged) or
without a tag field (U = Untagged).
Ethernet frames are typically sent tagged via uplink ports in direction
to the next switch or in direction to end devices if they supports VLANs
and are configured to use them. In all other cases the switch should
forward the frames untagged.
There are still end devices in use, which doesnt support VLAN tagging
and delete received tagged frames.
15
GARP VLAN Registration Protocol
1 2 3 4 5 6 1 2 3 1 2 3 4 5
A B C D E F G H
CT1e_07_Traffic_Control_07.0.00 16
16
Exercise: VLAN
Switch 1
1 2 3 4 5 6
VLAN 3
VLAN 2
Switch 2
1 2 3 4 5 6
VLAN 4
VLAN 2
CT1e_07_Traffic_Control_07.0.00 17
Construct the Ingress and Egress tables for the two switches in the Notes:
above example.
17
Appendix
CT1e_07_Traffic_Control_07.0.00 18
Notes:
18
VLANs: Overlapping Groups
VLAN 2 VLAN 3
Server
VLAN 4
CT1e_07_Traffic_Control_07.0.00 19
Shall devices from two VLANs (e.g. VLAN 2 and 3) have access to a Notes:
central device (e.g. a server), you get an intersection like its shown in
the picture.
19
VLANs: Overlapping Groups - Implementation
1 2 3 4 5 6
A B C D
Ingress Egress
Station Port PVID VID Port
A 1 2 1 2 3 4 5 6
B 2 2 2 U U U
Server 3 4 3 U U U
C 4 3 4 U U U U U
D 5 3
Uplink 6 N/A
CT1e_07_Traffic_Control_07.0.00 20
Notes:
20
Solution: Port Memory
What are the benefits of Flow Control?
No lost frames
CT1e_07_Traffic_Control_07.0.00 21
Notes:
21
Solution: VLAN
Switch 1
1 2 3 4 5 6
VLAN 3
VLAN 2
Switch 2
1 2 3 4 5 6
VLAN 4
VLAN 2
CT1e_07_Traffic_Control_07.0.00 22
Construct the Ingress and Egress tables for the two switches in the Notes:
above example.
Switch 1
Ingress Egress
Port VLAN ID VLAN ID 1 2 3 4 5 6
1 2 1 - - - - - -
2 2 2 U U U T - -
3 2 3 - - - T U U
4 arbitrary 4 - - - T - -
5 3
6 3
Switch 2
Ingress Egress
Port VLAN ID VLAN ID 1 2 3 4 5 6
1 arbitrary 1 - - - - - -
2 2 2 T U U - - -
3 2 3 T - - - - -
4 1 4 T - - - U U
5 4
6 4
22