3com Switch 3824
3com Switch 3824
Implementation Guide
3C17401, 3C17400
http://www.3com.com/
2 OPTIMIZING BANDWIDTH
Port Features 17
Duplex 17
Flow Control 18
Auto-negotiation 18
Aggregated Links 19
How 802.3ad Link Aggregation Operates 19
Implementing 802.3ad Aggregated Links 20
Aggregated Links and Your Switch 21
Aggregated Link — Manual Configuration Example 24
C IP ADDRESSING
IP Addresses 83
Simple Overview 83
Advanced Overview 84
Subnets and Subnet Masks 86
Default Gateways 88
GLOSSARY
INDEX
ABOUT THIS GUIDE
This guide describes the features of the 3Com Switch 3812 (12-port,
Managed Gigabit) and 3Com Switch 3824 (24-port, Managed Gigabit). It
outlines how to use these features to optimize the performance of your
network.
The term Switch 3812 and Switch 3824 is used when referring to the
3Com Switch 3812 (12-port, Managed Gigabit) and 3824 (24-port,
Managed Gigabit).
If release notes are shipped with your product and the information there
differs from the information in this guide, follow the instructions in the
release notes.
Most user guides and release notes are available in Adobe Acrobat
Reader Portable Document Format (PDF) or HTML on the 3Com
World Wide Web site:
http://www.3com.com/
8 ABOUT THIS GUIDE
Conventions Table 1 and Table 2 list conventions that are used throughout this guide.
Table 1 Notice Icons
Related In addition to this guide, each Switch documentation set includes the
Documentation following:
■ Switch 3812 and Switch 3824 Getting Started Guide
This guide contains:
■ all the information you need to install and set up the Switch in its
default state
■ information on how to access the management software to begin
managing the Switch.
■ Switch 3812 and Switch 3824 Management Interface Reference
Guide
This guide provides detailed information about the Web interface and
Command Line Interface that enable you to manage the Switch. It is
supplied in HTML format on the CD-ROM that accompanies the
Switch.
■ Switch 3812 and Switch 3824 Management Quick Reference Guide
This guide contains:
■ a list of the features supported by the Switch.
■ a summary of the Web interface and Command Line Interface
commands for the Switch.
■ Release Notes
These notes provide information about the current software release,
including new features, modifications, and known problems.
There are other publications you may find useful, such as:
■ Documentation accompanying 3Com Network Supervisor. This is
supplied on the CD-ROM that accompanies the Switch.
Documentation Your suggestions are very important to us. They will help make our
Comments documentation more useful to you. Please e-mail comments about this
document to 3Com at:
Example:
■ Switch 3812 and Switch 3824 Implementation Guide
■ Part number: DUA1740-0BAA01
■ Page 25
Please note that we can only respond to comments and questions about
3Com product documentation at this e-mail address. Questions related to
technical support or sales should be directed in the first instance to your
network supplier.
Product You can now register your Switch on the 3Com Web site:
Registration http://www.3com.com/register/
You will need your product part number (3Cxxxxx), product serial number
and date and place of purchase to register your 3Com product.
Registering your product enables you to: process Repair Requests on-line,
check the status of your requests at anytime, provides you with important
warranty information as well as activating your entitlement to additional
service benefits and receive up-to-date information on your product.
1 SWITCH FEATURES OVERVIEW
What is Your Switch can operate in its default state. However, to make full use of
Management the features offered by the Switch, and to change and monitor the way it
Software? works, you have to access the management software that resides on the
Switch. This is known as managing the Switch.
Managing the Switch can help you to improve its efficiency and therefore
the overall performance of your network.
Switch Features The management software provides you with the capability to change the
Explained default state of some of the Switch features. This section provides a brief
overview of these features — their applications are explained in more
detail later in this guide.
For a list of the features supported by your Switch, please refer to the
Management Quick Reference Guide that accompanies your Switch.
12 CHAPTER 1: SWITCH FEATURES OVERVIEW
Automatic IP Your Switch can have its IP information automatically configured using a
Configuration DHCP server. Alternatively, you can manually configure the IP
information.
Port Security Your Switch supports the following port security modes, which you can
set for an individual port or a range of ports:
■ No Security
Port security is disabled and all network traffic is forwarded through
the port without any restrictions.
■ Secure
All currently learnt addresses on the port are made permanent. Any
packets containing a source address not learnt on the port will be
dropped.
Aggregated Links Aggregated links are connections that allow devices to communicate
using up to eight links in parallel. Aggregated links provide two benefits:
■ They can potentially increase the bandwidth of a connection.
■ They can provide redundancy — if one link is broken, the other links
share the traffic for that link.
Duplex
Full duplex mode allows packets to be transmitted and received
simultaneously and, in effect, doubles the potential throughput of a link.
Flow Control
All Switch ports support flow control, which is a mechanism that
minimizes packet loss during periods of congestion on the network.
Multicast Filtering Multicast filtering allows the Switch to forward multicast traffic to only
the endstations that are part of a predefined multicast group, rather than
broadcasting the traffic to the whole network.
Spanning Tree Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)
Protocol and Rapid are bridge-based systems that make your network more resilient to link
Spanning Tree failure and also provide protection from network loops — one of the
Protocol major causes of broadcast storms.
STP allows you to implement alternative paths for network traffic in the
event of path failure and uses a loop-detection process to:
■ Discover the efficiency of each path.
■ Enable the most efficient path.
14 CHAPTER 1: SWITCH FEATURES OVERVIEW
STP conforms to the IEEE Std 802.1D, 1998 Edition and RSTP conforms to
the IEEE Std 802.1w-2001.
For more information about STP and RSTP, see Chapter 4 “Using
Resilience Features”.
Switch Database The Switch Database is an integral part of the Switch and is used by the
Switch to determine if a packet should be forwarded, and which port
should transmit the packet if it is to be forwarded.
For more information about the Switch Database, see Chapter 5 “Using
the Switch Database”.
Traffic Prioritization Using the traffic prioritization capabilities of your Switch provides Quality
of Service (QoS) to your network through increased reliability of data
delivery. You can prioritize traffic on your network to ensure that high
priority data is transmitted with minimum delay.
For more information about RMON and Event Notification, see Chapter 7
“Status Monitoring and Statistics”.
Switch Features Explained 15
Broadcast Storm Broadcast Storm Control is a system that monitors the level of broadcast
Control traffic on that port. If the broadcast traffic level rises to a pre-defined
number of frames per second (threshold), the broadcast traffic on the port
is blocked until the broadcast traffic level drops below the threshold. This
system prevents the overwhelming broadcast traffic that can result from
network equipment which is faulty or configured incorrectly.
VLANs A Virtual LAN (VLAN) is a flexible group of devices that can be located
anywhere in a network, but which communicate as if they are on the
same physical segment. With VLANs, you can segment your network
without being restricted by physical connections — a limitation of
traditional network design. As an example, with VLANs you can segment
your network according to:
■ Departmental groups
■ Hierarchical groups
■ Usage groups
Configuration Save The Configuration Save and Restore feature allows the configuration of
and Restore your Switch to be saved as a file on a remote server, or to be restored
onto the Switch from a remote file. The configuration information is
stored in an readable ASCII text file.
You must have security management access level to be able to save and
restore the Switch configuration.
The password is stored in the backup file. If you want to restore the file
but don’t have the password you can delete the password from the file.
Important Considerations
■ 3Com recommends the Switch unit is reset to its factory default
settings before you restore a configuration onto it. You can reset the
Switch using the system control initialize CLI command or the
System > Control > Initialize Web interface operation.
16 CHAPTER 1: SWITCH FEATURES OVERVIEW
■ The configuration can only be restored onto a device which has the
same physical connections and configuration, as when the
configuration was initially saved. The restore operation will be
unsuccessful if the physical configuration of the device is different.
■ The configuration of the Switch must only be restored or saved by a
single user at a time.
■ When using the Configuration Save and Restore feature, 3Com
recommends that aggregated links are configured as either:
■ Manual aggregations with Link Aggregation Configuration
Protocol (LACP) disabled on the ports that are to be manually
placed in the aggregated link.
or
■ LACP automatic aggregations — that is, LACP enabled on all ports
and the aggregated links created automatically. The aggregated
link should be enabled and Spanning Tree Protocol enabled.
Parameters such as VLANs and Fast Start may be set up as required.
Other combinations of port settings, however, are not recommended
as Configuration Restore will only perform a “best effort” restore of
the configuration. For example, LACP automatic aggregations with
manually defined ports are restored as manual aggregations with
manual ports. LACP automatic aggregations with automatic ports
where the aggregated link is disabled and Spanning Tree Protocol is
disabled are restored as manual aggregations with the aggregated link
disabled.
For further information about LACP, see Chapter 2 “Optimizing
Bandwidth”.
■ When restoring a configuration onto a unit over an aggregated link,
communication with that unit may be lost because the restore
operation disables the aggregated link ports. Communication over the
aggregated links is re-established when the restore operation has
been completed.
There are many ways you can optimize the bandwidth on your network
and improve network performance. If you utilize certain Switch features
you can provide the following benefits to your network and end users:
■ Increased bandwidth
■ Quicker connections
■ Faster transfer of data
■ Minimized data errors
■ Reduced network downtime
Port Features The default state for all the features detailed below provides the best
configuration for most users. In normal operation, you do not need to
alter the Switch from its default state. However, under certain conditions
you may wish to alter the default state of these ports, for example, if you
are connecting to old equipment that does not comply with the IEEE
802.3x standard.
Flow Control All Switch ports support flow control, which is a mechanism that prevents
packet loss during periods of congestion on the network. Packet loss is
caused by one or more devices sending traffic to an already overloaded
port on the Switch. Flow control prevents packet loss by inhibiting the
transmitting port from generating more packets until the period of
congestion ends.
You can modify the capabilities that a port “advertises” on a per port
basis, dependant on the type of port.
You can disable auto-negotiation for the whole Switch, or per port. You
can also modify the capabilities that a port “advertises” on a per port
basis, dependant on the type of port.
Aggregated Links Aggregated links are connections that allow devices to communicate
using up to eight member links in parallel. Aggregated links provide the
following benefits:
■ They can potentially increase the bandwidth of a connection. The
capacity of the multiple links is combined into one logical link.
■ They can provide redundancy — if one link is broken, the other links
share the traffic for that link.
How 802.3ad Link Your Switch supports IEEE Std 802.3-2002 (incorporating 802.3ad)
Aggregation aggregated links which use the Link Aggregation Control Protocol
Operates (LACP). LACP provides automatic, point-to-point redundancy between
two devices (switch-to-switch or switch-to-server) that have full duplex
connections operating at the same speed.
If a member link in an aggregated link fails, the traffic using that link is
dynamically reassigned to the remaining member links in the aggregated
link. Figure 2 shows the simplest case: two member links, that is the
physical links, form an aggregated link. In this example, if link 1 fails, the
data flow between X and B is remapped to physical link 2. The
re-mapping occurs as soon as the Switch detects that a member link has
20 CHAPTER 2: OPTIMIZING BANDWIDTH
Implementing LACP can be enabled or disabled on a per port basis. You can implement
802.3ad Aggregated 802.3ad aggregated links in two ways:
Links
■ Manual Aggregations — You can manually add and remove ports to
and from an aggregated link via Web commands. However, if a port
has LACP enabled, and if a more appropriate or correct automatic
membership is detected by LACP, it will override the manual
configuration.
For example, in Figure 3, if a port on Switch C is physically connected
to Switch B, but you manually configure the port on Switch C to be a
Aggregated Links 21
The Spanning Tree costs for a port running LACP is the cost assigned for
an aggregated link running at that speed. As required by the IEEE Std
802.3-2002 (incorporating 802.3ad), no changes in cost are made
according to the number of member links in the aggregated link.
Aggregated Links and ■ When any port is assigned to an aggregated link (either manually or
Your Switch via LACP) it will adopt the configuration settings of the aggregated
link. When a port leaves an aggregated link its original configuration
settings are restored.
■ A maximum of six active aggregations can be created. A maximum of
up to eight ports may be added manually to any individual
aggregation, or via LACP. There are however a few points to consider:
22 CHAPTER 2: OPTIMIZING BANDWIDTH
Switch H
X
Switch A
AL 1
AL 4
AL 2 AL 3
AL 5 Switch B
AL 6
Switch C
Switch D
Switch E
Switch F
Switch G
■ When multiple links of different speed connect two devices only the
highest speed links will be aggregated.
■ A LinkUp / LinkDown trap will only be sent for individual links. The
Traps will not be sent for an aggregation.
■ The member link ports can be mixed media, that is fiber and/or
twisted pair ports within the same aggregated link.
■ The member link ports must have the same configuration.
■ Member links must retain the same groupings at both ends of an
aggregated link. For example, the configuration in Figure 5 will not
work as Switch A has one aggregated link defined whose member
links are then split between two aggregated links defined on Switches
B and C. Note that this illegal configuration could not occur if LACP is
enabled.
To make this configuration work you need to have two aggregated links
defined on Switch A, one containing the member links for Switch B and
one containing the member links for Switch C.
■ Before removing an entire aggregated link, you must disable all the
aggregated link ports or disconnect all the links, except one — if you
do not, a loop may be created.
■ When manually creating an aggregated link between two devices, the
ports in the aggregated link must not be physically connected
together until the aggregated link has been correctly configured at
both ends of the link. Failure to configure the aggregated link at both
ends before physically connecting the ports can result in a number of
serious network issues such as lost packets and network loops.
Aggregated Link — The example shown in Figure 6 illustrates an 8 Gbps aggregated link
Manual between two Switch units, (that is, each port is operating at 1000 Mbps,
Configuration full duplex).
Example
Aggregated Links 25
Switch
Switch
Multicast Filtering Multicast filtering is the process that ensures that endstations only receive
multicast traffic if they register to join specific multicast groups. With
multicast filtering, network devices only forward multicast traffic to the
ports that are connected to registered endstations.
Multicast Filtering Your Switch provides automatic multicast filtering support using IGMP
and Your Switch (Internet Group Management Protocol) Snooping. It also supports IGMP
query mode.
Snooping Mode
Snooping Mode allows your Switch to forward multicast packets only to
the appropriate ports. The Switch “snoops” on exchanges between
endstations and an IGMP device, typically a router, to find out the ports
that wish to join a multicast group and then sets its filters accordingly
Query Mode
Query mode allows the Switch to function as the Querier if it has the
lowest IP address in the subnetwork to which it belongs.
IGMP querying is disabled by default on the Switch 3812 and
Switch 3824. This helps prevent interoperability issues with core products
that may not follow the lowest IP address election method.
You can enable or disable IGMP query mode for the Switch using the
Bridge > Multicast filter > IGMP > Querymode operation on the Web
Interface.
30 CHAPTER 3: USING MULTICAST FILTERING
You would enable query mode if you wish to run multicast sessions in a
network that does not contain any IGMP routers (or queriers). This
command will configure the Switch to automatically negotiate with
compatible devices on VLAN 1 to become the querier.
The Switch 3812 and Switch 3824 are compatible with any device that
conforms to the IGMP v2 protocol. The Switch does not support IGMP v3.
If you have an IGMP v3 network, you should disable IGMP snooping for
the Switch using the snoopMode command on the Web Interface .
IGMP Multicast IGMP is the system that all IP-supporting network devices use to register
Filtering endstations with multicast groups. It can be used on all LANs and VLANs
that contain a multicast capable IP router and on other network devices
that support IP.
This chapter explains the features supported by the Switch that provide
resilience for your network. It covers the following topics:
Resilience Feature Table 3 lists the key differences between each feature, so you can
Overview evaluate the benefits of each to determine which feature is most suitable
for your network.
3Com recommends that you use the Rapid Spanning Tree Protocol
feature (default enabled) to provide optimum performance for your
network and ease of use.
The Switch also supports aggregated links which increase bandwidth and
also provide resilience against individual link failure. Aggregated links will
operate with STP enabled. For more information, see Aggregated Links
on page 19.
Spanning Tree The Spanning Tree Protocol (STP) makes your network more resilient to
Protocol (STP) link failure and also provides a protection from loops — one of the major
causes of broadcast storms. STP is enabled by default on your Switch.
RSTP provides the same functionality as STP. For details on how the two
systems differ, see “How RSTP Differs to STP” on page 39.
The following sections explain more about STP and the protocol features
supported by your Switch. They cover the following topics:
■ What is STP?
■ How STP Works
■ Using STP on a Network with Multiple VLANs
What is STP? 35
The protocol is a part of the IEEE Std 802.1D, 1998 Edition bridge
specification. To explain STP more effectively, your Switch will be referred
to as a bridge.
Rapid Spanning Tree The Rapid Spanning Tree (RSTP) is an enhanced Spanning Tree feature.
Protocol (RSTP) RSTP implements the Spanning Tree Algorithm and Protocol, as defined in
the IEEE Std 802.1w-2001.
What is STP? STP (802.1D) is a bridge-based system that allows you to implement
parallel paths for network traffic and uses a loop-detection process to:
■ Find and disable the less efficient paths (that is, the paths that have a
lower bandwidth).
■ Enable one of the less efficient paths if the most efficient path fails.
RSTP provides the same functionality as STP. For details on how the two
systems differ, see “How RSTP Differs to STP” on page 39.
36 CHAPTER 4: USING RESILIENCE FEATURES
STP determines which is the most efficient path between each bridged
segment and a specifically assigned reference point on the network. Once
the most efficient path has been determined, all other paths are blocked.
Therefore, in Figure 8, Figure 9, and Figure 10, STP initially determined
that the path through Bridge C was the most efficient, and so blocked
the path through Bridge B. After the failure of Bridge C, STP re-evaluated
the situation and opened the path through Bridge B.
How STP Works When enabled, STP determines the most appropriate path for traffic
through a network. It does this as outlined in the sections below.
STP Requirements Before it can configure the network, the STP system requires:
■ Communication between all the bridges. This communication is
carried out using Bridge Protocol Data Units (BPDUs), which are
transmitted in packets with a known multicast address.
■ Each bridge to have a Bridge Identifier. This specifies which bridge acts
as the central reference point, or Root Bridge, for the STP system —
the lower the Bridge Identifier, the more likely the bridge is to become
the Root Bridge. The Bridge Identifier is calculated using the MAC
address of the bridge and a priority defined for the bridge. The default
priority of your Switch is 32768.
38 CHAPTER 4: USING RESILIENCE FEATURES
■ Each port to have a cost. This specifies the efficiency of each link,
usually determined by the bandwidth of the link — the higher the
cost, the less efficient the link. Table 4 shows the default port costs for
a Switch.
Table 4 Default port costs
STP Calculation The first stage in the STP process is the calculation stage. During this
stage, each bridge on the network transmits BPDUs that allow the system
to work out:
■ The identity of the bridge that is to be the Root Bridge. The Root
Bridge is the central reference point from which the network is
configured.
■ The Root Path Costs for each bridge — that is, the cost of the paths
from each bridge to the Root Bridge.
■ The identity of the port on each bridge that is to be the Root Port.
The Root Port is the one that is connected to the Root Bridge using
the most efficient path, that is, the one that has the lowest Root
Path Cost. Note that the Root Bridge does not have a Root Port.
■ The identity of the bridge that is to be the Designated Bridge of
each LAN segment. The Designated Bridge is the one that has the
lowest Root Path Cost from that segment. Note that if several
bridges have the same Root Path Cost, the one with the lowest
Bridge Identifier becomes the Designated Bridge.
All traffic destined to pass in the direction of the Root Bridge flows
through the Designated Bridge. The port on this bridge that connects
to the segment is called the Designated Bridge Port.
STP Configuration After all the bridges on the network have agreed on the identity of the
Root Bridge, and have established the other relevant parameters, each
How STP Works 39
bridge is configured to forward traffic only between its Root Port and the
Designated Bridge Ports for the respective network segments. All other
ports are blocked, which means that they are prevented from receiving or
forwarding traffic.
STP Reconfiguration Once the network topology is stable, all the bridges listen for Hello BPDUs
transmitted from the Root Bridge at regular intervals. If a bridge does not
receive a Hello BPDU after a certain interval (the Max Age time), the
bridge assumes that the Root Bridge, or a link between itself and the
Root Bridge, has gone down. The bridge then reconfigures the network
to cater for the change. If you have configured an SNMP trap destination,
when the topology of your network changes, the first bridge to detect
the change sends out an SNMP trap.
How RSTP Differs to RSTP works in a similar way to STP, but it includes additional information
STP in the BPDUs. This information allows each bridge to confirm that it has
taken action to prevent loops from forming when it wants to enable a
link to a neighbouring bridge. This allows adjacent bridges connected via
point-to-point links to enable a link without having to wait to ensure all
other bridges in the network have had time to react to the change.
STP Example Figure 11 shows a LAN that has STP enabled. The LAN has three
segments, and each segment is connected using two possible links.
40 CHAPTER 4: USING RESILIENCE FEATURES
■ Bridge A has the lowest Bridge Identifier in the network, and has
therefore been selected as the Root Bridge.
■ Because Bridge A is the Root Bridge, it is also the Designated Bridge
for LAN segment 1. Port 1 on Bridge A is therefore selected as the
Designated Bridge Port for LAN Segment 1.
■ Port 1 of Bridges B, C, X and Y have been defined as Root Ports
because they are the nearest to the Root Bridge and therefore have
the most efficient path.
■ Bridges B and X offer the same Root Path Cost for LAN segment 2,
however, Bridge B has been selected as the Designated Bridge for the
segment because it has a lower Bridge Identifier. Port 2 on Bridge B is
therefore selected as the Designated Bridge Port for LAN Segment 2.
How STP Works 41
■ Bridge C has been selected as the Designated Bridge for LAN segment
3, because it offers the lowest Root Path Cost for LAN Segment 3:
■ the route through Bridges C and B costs 200 (C to B=100, B to
A=100)
■ the route through Bridges Y and B costs 300 (Y to B=200, B to
A=100).
Port 2 on Bridge C is therefore selected as the Designated Bridge Port
for LAN Segment 3.
STP Configurations Figure 12 shows three possible STP configurations using SuperStack 3
Switch units.
■ Configuration 1 — Redundancy for Backbone Link
In this configuration, the Switches both have STP enabled and are
connected by two links. STP discovers a duplicate path and blocks one
of the links. If the enabled link breaks, the disabled link becomes
re-enabled, therefore maintaining connectivity.
■ Configuration 2 — Redundancy through Meshed Backbone
In this configuration, four Switch units are connected in a way that
creates multiple paths between each one. STP discovers the duplicate
paths and blocks two of the links. If an enabled link breaks, one of the
disabled links becomes re-enabled, therefore maintaining connectivity.
■ Configuration 3 — Redundancy for Cabling Error
In this configuration, a Switch has STP enabled and is accidentally
connected to a hub using two links. STP discovers a duplicate path
and blocks one of the links, therefore avoiding a loop.
42 CHAPTER 4: USING RESILIENCE FEATURES
Using STP on a The IEEE Std 802.1D, 1998 Edition does not take into account VLANs
Network with when it calculates STP information — the calculations are only performed
Multiple VLANs on the basis of physical connections. For this reason, some network
configurations can result in VLANs being subdivided into a number of
isolated sections by the STP system. Therefore, you must ensure that any
VLAN configuration on your network takes into account the expected STP
topology and alternative topologies that may result from link failures.
What is the Switch The Switch Database is used by the Switch to determine where a packet
Database? should be forwarded to, and which port should transmit the packet if it is
to be forwarded.
The database contains a list of entries — each entry contains three items:
How Switch Entries are added to the Switch Database in one of two ways:
Database Entries
Get Added ■ The Switch can learn entries. The Switch updates its database with the
source MAC address of the endstation that sent the packet, the VLAN
ID, and the port identifier on which the packet is received.
■ You can enter and update entries using the management interface via
the Bridge > Address Database Web interface operation, or an SNMP
Network Manager.
46 CHAPTER 5: USING THE SWITCH DATABASE
For a list of the features supported by your Switch, please refer to the
Management Quick Reference Guide that accompanies your Switch.
48 CHAPTER 6: USING TRAFFIC PRIORITIZATION
What is Traffic Today’s application traffic consists of three common types of data:
Prioritization? ■ Time critical data such as video and voice.
■ Business critical data such as database transactions and online
transactions.
■ Opportunistic data such as web browsing, email and file transfers.
When these different types of data compete for the same bandwidth, a
network can quickly become overloaded, resulting in slow response times
(long latency), and application time-outs. Traffic prioritization is a
mechanism that allows you to prioritize data so that time-sensitive and
system-critical data can be transferred smoothly and with minimal delay
over a network.
How Traffic Traffic prioritization uses the eight traffic queues that are present in your
Prioritization Works Switch to ensure that high priority traffic is forwarded on a different
queue from lower priority traffic. This is what provides Quality of Service
(QoS) to your network.
How Traffic Prioritization Works 49
Traffic Classification To determine the service level to be applied to each incoming traffic type,
each packet or frame must first be classified. Traffic classification is the
means of identifying which application, device or user generated the
traffic.
Traffic Marking After traffic has been identified through classification, it must be Marked
to ensure that other devices such as Layer 2 switches or routers on the
network know how to prioritize the application, device or user that
generated it. The Switch uses two of the industry-standard methods of
marking network traffic:
■ IEEE 802.1D — a layer 2 marking scheme.
■ Differentiated Services (DiffServ) — a layer 3 marking scheme.
The IEEE Std 802.1D, 1998 Edition priority marking scheme assigns each
frame with an IEEE 802.1p priority level between 0 and 7, which
How Traffic Prioritization Works 51
determines the level of service that type of traffic should receive. Refer to
Table 6 for an example of how different traffic types can be mapped to
the eight IEEE 802.1p priority levels.
The traffic marking and prioritization supported by the Switch using layer
2 information is compatible with the relevant sections of the IEEE Std
802.1D, 1998 Edition (incorporating IEEE 802.1p).
The IEEE 802.1D standard is the most widely used prioritization scheme in
the LAN environment, but it does however have some restrictions:
■ It requires an additional 4-byte tag in the frame, which is normally
optional in Ethernet networks. Without this tag, the scheme cannot
work.
■ The tag is part of the IEEE 802.1Q header, so to implement QoS at
layer 2, the entire network has to implement IEEE 802.1Q VLAN
tagging.
■ It is only supported on a LAN and not across routed WAN links,
because the IEEE 802.1Q tags are removed when the packets pass
through a router.
Traffic Re-Marking Traffic entering the Switch may get downgraded depending on the
network policies. If for example a traffic packet enters the Switch with a
priority marking higher than the Quality of Service (QoS) configuration
polices, the Switch will Re-Mark the packet with a different 802.1D
priority or new DSCP value.
Traffic Prioritization Your Switch supports Basic and Advanced Quality of Service (QoS) traffic
prioritization. Basic traffic prioritization classifies traffic based on layer 2
of the OSI 7 layer model, and the Switch will prioritize the received traffic
according to the priority information defined in the received packet.
Advanced traffic prioritization can classify traffic at layers 2, 3 and 4 of
the OSI 7 layer model.
appropriate egress port(s). When the packet reaches the head of its
queue and is about to be transmitted the device determines whether or
not the egress port is tagged for that VLAN. If it is, then the new 802.1p
tag is used in the extended 802.1D header.
The IEEE 802.1D standard specifies eight distinct levels of priority (0 to 7),
each of which relates to a particular type of traffic. The priority levels and
their traffic types are shown in Figure 14 in order of increasing priority.
The mapping from 802.1p level to traffic queue in the Switch is
proprietary and is slightly different to the recommended IEEE mapping.
Figure 14 IEEE 802.1p priority levels and recommended IEEE 802.1D traffic
types
Traffic Queues
Switch 3812 and Switch 3824
Queue 1 (Low Priority)
802.1p
Service Levels
Background 1 Queue 2
Spare 2
Traffic Queue 3
Best Effort 0
Classification
You cannot alter the mapping between the IEEE 802.1p priorities and the
traffic queues. These are calculated to be the most efficient, and are fixed
as illustrated in Figure 14.
54 CHAPTER 6: USING TRAFFIC PRIORITIZATION
The DSCP field in the IP packet header can be used to classify (identify)
traffic as well as carrying the priority markings, as shown in Figure 15.
How Traffic Prioritization Works 55
Mapping is predefined
and not configurable
Switch 3812 and Switch 3824
1 The packet received at the ingress port is checked for any of the
supported traffic classification methods (DSCP, Ethertype, Protocol) to
identify the traffic.
2 The classification in an incoming packet will be compared with the
predefined classifications in the Switch, and if there is a match, the
configured service level associated with the classified traffic will be
applied.
3 The service level associated with the classifier may cause the 802.1p tag
to be remarked, if the packet already has an 802.1p tag, and the DSCP
value in IP packets to be remarked.
4 The Switch will remark the 802.1p tag and DSCP field.
5 It is the priority associated with the packet that is used to direct it to the
appropriate queue. This is determined as follows:
■ If the packet matches a classifier with a configured service level
specifying that the DSCP or 802.1p tag should be re-marked, then the
packet is re-marked with the configured DSCP value and or the
802.1p priority.
56 CHAPTER 6: USING TRAFFIC PRIORITIZATION
■ Otherwise, if there are no other classifiers except the 802.1p tag, then
the packet will pass through the Switch with the original 802.1p
priority tag.
■ Otherwise, if the received packet does not have an 802.1p tag, then a
default 802.1p tag (which is usually 0) is assigned to it.
Traffic Queues It is the multiple traffic queues within the Switch hardware that allow
packet prioritization to occur. Higher priority traffic can pass through the
Switch without being delayed by lower priority traffic. As each packet
arrives in the Switch, it passes through any ingress processing (which
includes classification or marking/remarking), and is then sorted into the
appropriate queue. The Switch then forwards packets from each queue.
It is worth noting that each egress port has its own set of queues, so that
if one port is congested it does not interfere with the queue operation of
other ports.
The Switch uses the Weighted Round Robin (WRR) queuing mechanism.
This method services all the traffic queues, giving priority to the higher
priority queues. Under most circumstances, this method gives high
priority precedence over low-priority, but in the event that high-priority
traffic exceeds the link capacity, lower priority traffic is not blocked.
Important QoS Before implementing QoS on your network you need to consider the
Considerations following points:
■ Your Switch:
■ Has a predefined Classifier for NBX traffic, which is DSCP service
level 46. If the profile assigned to the port on which the NBX traffic
is received has an NBX classifier in it such as the default profile
does, the Switch will automatically detect NBX telephone voice
traffic and prioritize accordingly. The Switch also has an NBX
classifier for Ethernet Type 0x8868, which is the layer 2 NBX traffic
identifier. NBX is layer 2 out of the box and has to be configured by
the user to be layer 3, so the DSCP 46 classifier may in fact be used
in fewer NBX installations than the Ethernet Type 0x8868.
■ Can map between IEEE 802.1D and DSCP to support legacy
devices in the network that only support IEEE 802.1D.
Important QoS Considerations 57
■ Has eight traffic queues, but it is important to note that not all
Switches have the same number of priority queues.
■ QoS is about providing a consistent, predictable data delivery service.
It should not be used as an alternative to deploying sufficient
bandwidth. The recommended configuration for most networks is
10/100 Mbps switching to the desktop, Gigabit connections for
servers, and non-blocking Gigabit backbones.
■ QoS requires the support of every network device from end-to-end.
All devices in the network should support QoS. If there is just one
section in the data path that does not support QoS, it can produce
bottlenecks and slowdowns, although a performance improvement
will be noticed over the parts of the network that do support QoS.
■ Ensure that all QoS devices are configured the same way. Mismatches
will cause the same traffic to be prioritized in one section and not in
another.
■ Only use Switches or hardware-based routers in the LAN. Hubs cannot
prioritize traffic, and software-based routers can cause bottlenecks.
■ Use Switches and hardware-based routers that understand both the
IEEE 802.1D (incorporating IEEE 802.1p) and DSCP marking schemes.
■ Classify traffic as soon as it enters the network. If traffic is not
classified until it gets to the WAN router or firewall, end-to-end
prioritization cannot be guaranteed. The ideal place for traffic
classification is within the Switch.
■ Traffic Marking is performed as a result of classification, and so you
should aim to perform the marking only once to reduce the additional
requirements that QoS places upon the capabilities of your network
infrastructure.
■ As DSCP uses a field in the IP header, it is only possible to use the
DSCP in IP packets. It does not apply, for example, to AppleTalk, IPX or
NetBEUI.
■ Because DSCP is a redefinition of the use of the TOS byte in the IP
header, there are some issues with interaction with IP TOS based
networks.
58 CHAPTER 6: USING TRAFFIC PRIORITIZATION
RMON Using the RMON capabilities of a Switch allows you to improve your
network efficiency and reduce the load on your network.
This section explains more about RMON. It covers the following topics:
■ What is RMON?
■ Benefits of RMON
■ RMON and the Switch
What is RMON? RMON is a system defined by the IETF (Internet Engineering Task Force)
that allows you to monitor the traffic of LANs or VLANs.
The RMON Groups The IETF define groups of Ethernet RMON statistics. This section describes
the four groups supported by the Switch, and details how you can use
them.
60 CHAPTER 7: STATUS MONITORING AND STATISTICS
Statistics
The Statistics group provides traffic and error statistics showing packets,
bytes, broadcasts, multicasts and errors on a LAN segment or VLAN.
History
The History group provides historical views of network performance by
taking periodic samples of the counters supplied by the Statistics group.
The group is useful for analyzing the traffic patterns and trends on a LAN
segment or VLAN, and for establishing the normal operating parameters
of your network.
Alarms
The Alarms group provides a mechanism for setting thresholds and
sampling intervals to generate events on any RMON variable.
Events
The Events group provides you with the ability to create entries in an
event log and send SNMP traps to the management workstation. Events
are the action that can result from an RMON alarm. In addition to the
standard five traps required by SNMP (link up, link down, warm start, cold
start, and authentication failure), RMON adds two more: rising threshold
and falling threshold.
Effective use of the Events group saves you time; rather than having to
watch real-time graphs for important occurrences, you can depend on
the Event group for notification. Through the SNMP traps, events can
trigger other actions, therefore providing a way to automatically respond
to certain occurrences.
Benefits of RMON 61
Benefits of RMON Using the RMON features of your Switch has three main advantages:
■ It improves your efficiency
Using RMON allows you to remain at one workstation and collect
information from widely dispersed LAN segments or VLANs. This
means that the time taken to reach a problem site, set up equipment,
and begin collecting information is largely eliminated.
■ It allows you to manage your network in a more proactive
manner
If configured correctly, RMON can deliver information before problems
occur. This means that you can take action before they affect users. In
addition, probes record the behavior of your network, so that you can
analyze the causes of problems.
■ It reduces the load on the network and the management
workstation
Traditional network management involves a management workstation
polling network devices at regular intervals to gather statistics and
identify problems or trends. As network sizes and traffic levels grow,
this approach places a strain on the management workstation and
also generates large amounts of traffic.
RMON, however, autonomously looks at the network on behalf of the
management workstation without affecting the characteristics and
performance of the network. RMON reports by exception, which
means that it only informs the management workstation when the
network has entered an abnormal state.
RMON and the The RMON support provided by your Switch 3812 and Switch 3824 is
Switch detailed in Table 8.
Table 8 RMON support supplied by the Switch
When using the RMON features of the Switch, note the following:
■ After the default sessions are created, they have no special status. You
can delete or change them as required.
■ The greater the number of RMON sessions, the greater the burden on
the management resources of the Switch. If you have many RMON
sessions, the forwarding performance of the Switch is not affected but
you may experience slow response times from the Web interface.
Alarm Events You can define alarms for the Switch. The events that you can define for
each alarm and their resulting actions are listed in Table 9.
Event Action
No action
Notify only Send Trap.
Notify and filter port Send Trap. Block broadcast and multicast
traffic on the port. Recovers with the unfilter
port event.
Notify and disable port Send Trap. Turn port off.
Notify and enable port Send Trap. Turn port on.
Disable port Turn port off.
Enable port Turn port on.
Notify and switch resilient port Send Trap. If port is the main port of a
resilient link pair then move to standby.
Notify and unfilter port Send Trap. Stop blocking broadcast and
multicast traffic on the port.
System started
8 SETTING UP VIRTUAL LANS
This chapter explains more about the concept of VLANs and explains how
they can be implemented on your Switch. It covers the following topics:
■ What are VLANs?
■ Benefits of VLANs
■ VLANs and Your Switch
■ VLAN Configuration Examples
What are VLANs? A VLAN is a flexible group of devices that can be located anywhere in a
network, but which communicate as if they are on the same physical
segment. With VLANs, you can segment your network without being
restricted by physical connections — a limitation of traditional network
design. As an example, with VLANs you can segment your network
according to:
■ Departmental groups — For example, you can have one VLAN for
the Marketing department, another for the Finance department, and
another for the Development department.
■ Hierarchical groups — For example, you can have one VLAN for
directors, another for managers, and another for general staff.
■ Usage groups — For example, you can have one VLAN for users of
e-mail, and another for users of multimedia.
64 CHAPTER 8: SETTING UP VIRTUAL LANS
Switch A Switch B
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Development Department
VLAN 3
Benefits of VLANs The main benefit of VLANs is that they provide a network segmentation
system that is far more flexible than any traditional network. Using VLANs
also provides you with three other benefits:
■ VLANs ease the movement of devices on networks
With traditional networks, network administrators spend much of
their time dealing with moves and changes. If users move to a
different subnetwork, the addresses of each endstation must be
updated manually.
With a VLAN setup, if an endstation in VLAN Marketing for example is
moved to a port in another part of the network, and retains its original
subnet membership, you only need to specify that the new port is in
VLAN Marketing. You do not need to carry out any re-cabling.
■ VLANs provide extra security
Devices within each VLAN can only communicate with other devices in
the same VLAN. If a device in VLAN Marketing needs to communicate
with devices in VLAN Finance, the traffic must pass through a routing
device or Layer 3 Switch.
VLANs and Your Switch 65
VLANs and Your Your Switch provides support for VLANs using the IEEE Std 802.1Q-1998.
Switch This standard allows traffic from multiple VLANs to be carried across one
physical link.
The IEEE Std 802.1Q-1998 allows each port on your Switch to be placed
in:
The standard requires that you define the following information about
each VLAN on your Switch before the Switch can use it to forward traffic:
■ VLAN Name — This is a descriptive name for the VLAN (for example,
Marketing or Management).
■ 802.1Q VLAN ID — This is used to identify the VLAN if you use
802.1Q tagging across your network.
The Default VLAN A new or initialized Switch contains a single VLAN, the Default VLAN.
This VLAN has the following definition:
■ VLAN Name — Default VLAN
■ 802.1Q VLAN ID — 1 (if tagging required)
All the ports are initially placed in this VLAN, and it is the only VLAN that
allows you to access the management software of the Switch over the
network.
Creating New VLANs If you want to move a port from the Default VLAN to another VLAN, you
must first define information about the new VLAN on your Switch.
VLANs: Tagged and Your Switch supports 802.1Q VLAN tagging, a system that allows traffic
Untagged for multiple VLANs to be carried on a single physical (backbone) link.
Membership
When setting up VLANs you need to understand when to use untagged
and tagged membership of VLANs. Quite simply, if a port is in a single
VLAN it can be an untagged member, but if the port needs to be a
member of multiple VLANs, tagged membership must be defined.
Typically endstations (for example, clients) will be untagged members of
one VLAN, while inter-Switch connections will be tagged members of all
VLANs.
The IEEE Std 802.1Q-1998 defines how VLANs operate within an open
packet-switched network. An 802.1Q compliant packet carries additional
information that allows a Switch to determine to which VLAN the port
belongs. If a frame is carrying the additional information, it is known as
tagged.
Using Untagged The simplest VLAN operates in a small network using a single switch. In
Connections this network there is no requirement to pass traffic for multiple VLANs
across a link. All traffic is handled by the single Switch and therefore
untagged connections can be used.
The example shown in Figure 18 illustrates a single Switch connected to
endstations and servers using untagged connections. Ports 1, 2 and 3 of
the Switch belong to VLAN 1, ports 10, 11 and 12 belong to VLAN 2.
VLANs 1 and 2 are completely separate and cannot communicate with
each other. This provides additional security for your network.
You can use the Switch Web Interface to change VLAN conguration.
VLAN configuration can be found at Bridge > VLAN.
Using 802.1Q Tagged In a network where the VLANs are distributed amongst more than one
Connections Switch, you must use 802.1Q tagged connections so that all VLAN traffic
can be passed along the links between the Switches. 802.1Q tagging can
only be used if the devices at both ends of a link support IEEE 802.1Q.
The example shown in Figure 19 illustrates two Switch units. Each Switch
has endstations and a server in VLAN 1 and VLAN 2. All endstations in
VLAN 1 need to be able to connect to the server in VLAN1 which is
attached to Switch 1 and all endstations in VLAN 2 need to connect to
the server in VLAN2 which is attached to Switch 2.
The VLANs are now configured and operational and the endstations in
both VLANs can communicate with their relevant servers.
70 CHAPTER 8: SETTING UP VIRTUAL LANS
9 USING AUTOMATIC IP
CONFIGURATION
This chapter explains more about IP addresses and how the automatic
configuration option works. It covers the following topics:
■ How Your Switch Obtains IP Information
■ How Automatic IP Configuration Works
■ Important Considerations
How Your Switch Your Switch has two ways to obtain its IP address information:
Obtains IP
Information ■ Automatic IP Configuration (default) — the Switch attempts to
configure itself by communicating with a DHCP server on the
network.
■ Manual IP Configuration — you can manually input the IP
information (IP address, subnet mask, and default gateway).
How Automatic IP When your Switch is powered up for the first time the IP configuration
Configuration setting is set to auto — this is the default setting.
Works
If your Switch has been powered up before, whichever of the three
options for IP configuration (manual, auto, none) was last
configured is activated when the Switch powers up again.
You can switch to manual IP configuration at any time using a serial port
connection to set up the IP information. For more information see the
Getting Started Guide that accompanies your Switch.
Automatic Process To detect its IP information using the automatic configuration process,
the Switch continually attempt to contact a DHCP server on the network
requesting IP information from the server.
Important This section contains some important points to note when using the
Considerations automatic IP configuration feature.
Important Considerations 73
Server Support Your Switch has been tested to interoperate with DHCP servers that use
the following operating systems:
■ Microsoft Windows 2000 Server
■ Microsoft Windows NT4 Server
■ Sun Solaris v2.5.1
Event Log Entries An event log will be generated and an SNMP trap will be sent if the IP
and Traps address configuration is changed manually.
74 CHAPTER 9: USING AUTOMATIC IP CONFIGURATION
A CONFIGURATION RULES
The different types of Gigabit Ethernet media and their specifications are
detailed in Table 10.
MM = Multimode SM = Single-mode
76 APPENDIX A: CONFIGURATION RULES
Configuration Rules The topology rules for 100 Mbps Fast Ethernet are slightly different to
for Fast Ethernet those for 10 Mbps Ethernet. Figure 20 illustrates the key topology rules
and provides examples of how they allow for large-scale Fast Ethernet
networks.
■ Maximum UTP cable length is 100 m (328 ft) over Category 5 cable.
■ A 412 m (1352 ft) fiber link is allowed for connecting
switch-to-switch, or endstation-to-switch, using half-duplex
100BASE-FX.
Configuration Rules for Fast Ethernet 77
Configuration Rules The Switch provides full duplex support for all its ports, including
with Full Duplex Expansion Module ports. Full duplex allows packets to be transmitted and
received simultaneously and, in effect, doubles the potential throughput
of a link.
With full duplex, the Ethernet topology rules are the same, but the Fast
Ethernet rules are:
■ Maximum UTP cable length is 100 m (328 ft) over Category 5 cable.
■ A 2 km (6562 ft) fiber link is allowed for connecting switch-to-switch,
or endstation-to-switch.
78 APPENDIX A: CONFIGURATION RULES
B NETWORK CONFIGURATION
EXAMPLES
Simple Network The following illustrations show some simple examples of how the
Configuration Switch 3812 and Switch 3824 can be used in your network.
Examples
Desktop Switch The example in Figure 21 shows how a Switch 3812 and Switch 3824
Example can be used for a group of users that require dedicated 10 Mbps 100
Mbps or 1000 Mbps connections to the desktop.
Figure 21 Using the Switch 3812 and Switch 3824 in a desktop environment
Switch 3824
Endstations on
10 Mbps/100 Mbps connections
Servers on a
Switch 3824 1000 Mbps
connection
Advanced Network Configuration Examples 81
Advanced Network This section shows some network examples that illustrate how you can
Configuration set up your network for optimum performance using some of the
Examples features supported by your Switch.
Improving the Figure 22 shows how you can set up your network to improve its
Resilience of Your resilience using Spanning Tree Protocol (STP) and aggregated links also
Network Aggregated links increase bandwidth available and also provide extra
resilience.
Server on
1000 Mbps connection
with resilient links set up
Switch 3824
Endstations on
10/100 Mbps connections
Server on
1000 Mbps connection
with resilient links set up
Servers on
1000 Mbps connections
Core Switch 1000 Mbps with resilient links set up
82 APPENDIX B: NETWORK CONFIGURATION EXAMPLES
Enhancing the Figure 23 shows how you can set your network up to enhance its
Performance of Your performance.
Network
All ports are auto-negotiating and will therefore pass data across the
network at the optimum available speed and duplex mode. Flow control
will help avoid packet loss during periods of network congestion. A
Gigabit Ethernet backbone is set up between the Switch 3824 and each
Switch in the workgroups to increase the bandwidth, and therefore the
overall network performance.
Production Workgroups
Administrative Workgroups
1000 Mbps with
aggregated links
set up
100 Mbps
IP addressing is a vast topic and there are white papers on the World
Wide Web and publications available if you wish to learn more about IP
addressing.
Simple Overview To operate correctly, each device on your network must have a unique IP
address. IP addresses have the format n.n.n.n where n is a decimal
number between 0 and 255. An example IP address is ‘192.168.100.8’.
■ The first part, called the network part, (‘192.168’ in the example)
identifies the network on which the device resides.
■ The second part, called the host part, (‘100.8’ in the example)
identifies the device within the network.
If your network is internal to your organization only, you may use any
arbitrary IP address. 3Com suggests you use addresses in the series
84 APPENDIX C: IP ADDRESSING
Advanced Overview IP addresses are 32-bit addresses that consist of a network part (the
address of the network where the host is located) and a host part (the
address of the host on that network).
IP Address 32 bits
network host
Network Portion
The location of the boundary between the network part and the host
part depends on the class that the central agency assigns to your
network. The three primary classes of IP addresses are as follows:
■ Class A address — Uses 8 bits for the network part and 24 bits for
the host part. Although only a few Class A networks can be created,
each can contain a very large number of hosts.
■ Class B address — Uses 16 bits for the network part and 16 bits for
the host part.
■ Class C address — Uses 24 bits for the network part and 8 bits for
the host part. Each Class C network can contain only 254 hosts, but
many such networks can be created.
The high-order bits of the network part of the address designate the IP
network class. See Table 11.
Address Number
Address Class High-order Bits (Decimal)
A 0nnnnnnn 0-127
B 10nnnnnn 128-191
C 11nnnnnn 192-254
86 APPENDIX C: IP ADDRESSING
Subnets and Subnet You can divide your IP network into sub-networks also known as subnets.
Masks Support for subnets is important because the number of bits assigned to
the device part of an IP address limits the number of devices that may be
addressed on any given network. For example, a Class C address is
restricted to 254 devices.
The IP address can also contain a subnetwork part at the beginning of the
host part of the IP address. Thus, you can divide a single Class A, B, or C
network internally, allowing the network to appear as a single network to
other external networks. The subnetwork part of the IP address is visible
only to hosts and gateways on the subnetwork.
Subnet mask 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0
Network
networ Subnet
subn Host
Subnet mask 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0
Network
networ Subnet
subn Host
The number that includes both the Class B natural network mask
(255.255) and the subnet mask (255.240) is sometimes called the
extended network prefix.
Continuing with the previous example, the subnetwork part of the mask
uses 12 bits, and the host part uses the remaining 4 bits. Because the
octets are actually binary numbers, the number of subnetworks that are
possible with this mask is 4,096 (212), and the number of hosts that are
possible in each subnetwork is 16 (24).
This hop-by-hop process continues until the IP packets reach the remote
destination.
3Com Network The 3Com network management application used to manage 3Com’s
Supervisor networking solutions.
100BASE-FX The IEEE specification for 100 Mbps Fast Ethernet over fiber-optic cable.
100BASE-TX The IEEE specification for 100 Mbps Fast Ethernet over Category 5
twisted-pair cable.
1000BASE-T The IEEE specification for 1000 Mbps Gigabit Ethernet over four-pair
Category 5 twisted-pair cable.
1000BASE-SX The IEEE specification for 1000 Mbps Gigabit Ethernet over fiber-optic
cable.
aging The automatic removal of dynamic entries from the Switch Database
which have timed-out and are no longer valid.
Aggregated Links Aggregated links allow a user to increase the bandwidth and resilience
between switches by using a group of ports to carry traffic between
the switches.
auto-negotiation A feature on twisted pair ports that allows them to advertise their
capabilities for speed, duplex and flow control. When connected to a
port that also supports auto-negotiation, the link can automatically
configure itself to the optimum setup.
backbone The part of a network used as a primary path for transporting traffic
between network segments.
bandwidth The information capacity, measured in bits per second, that a channel
can transmit. The bandwidth of Ethernet is 10 Mbps, the bandwidth of
90 GLOSSARY
baud The signalling rate of a line, that is, the number of transitions (voltage
or frequency changes) made per second. Also known as line speed.
broadcast storm Multiple simultaneous broadcasts that typically absorb all the available
network bandwidth and can cause a network to fail. Broadcast storms
can be due to faulty network devices.
cache Stores copies of frequently accessed objects locally to users and serves
them to users when requested.
DHCP Dynamic Host Control Protocol. A protocol that lets you centrally
manage and automate the assignment of Internet Protocol (IP)
addresses in an organization's network.
DNS Domain Name System. This system maps a numerical Internet Protocol
(IP) address to a more meaningful and easy-to-remember name. When
you need to access another device on your network, you enter the
name of the device, instead of its IP address.
91
flow control A mechanism that prevents packet loss during periods of congestion on
the network. Packet loss is caused when devices send traffic to an
already overloaded port on a Switch. Flow control prevents packet loss
by inhibiting devices from generating more traffic until the period of
congestion ends.
FTP File Transfer Protocol. A protocol based on TCP/IP for reliable file
transfer.
full duplex A system that allows packets to be transmitted and received at the
same time and, in effect, doubles the potential throughput of a link.
Gigabit Ethernet IEEE standard 802.3z for 1000 Mbps Ethernet; it is compatible with
existing 10/100 Mbps Ethernet standards.
half duplex A system that allows packets to transmitted and received, but not at
the same time. Contrast with full duplex.
hub A device that regenerates LAN traffic so that the transmission distance
of that signal can be extended. Hubs are similar to repeaters, in that
they connect LANs of the same type; however they connect more LANs
than a repeater and are generally more sophisticated.
92 GLOSSARY
HTTP Hypertext Transfer Protocol. This is a set of rules for exchanging files
(text, graphic images, sound, video, and other multimedia files) on the
World Wide Web.
IEEE Std 802.1D, 1998 A standard that defines the behavior of bridges in an Ethernet network.
Edition
IEEE Std 802.1p A standard that defines traffic prioritization. 802.1p is now
incorporated into the relevant sections of the IEEE Std 802.1D, 1998
Edition.
IEEE Std 802.3ad A standard that defines link aggregation. 802.3ad is now incorporated
into the relevant sections of the IEEE Std 802.3-2002.
IEEE Std 802.3x A standard that defines a system of flow control for ports that operate
in full duplex. 802.3x is now incorporated into the relevant sections of
the IEEE Std 802.3-2002.
IEEE Std 802.1w-2001 A standard that defines Rapid Spanning Tree Protocol (RSTP) behavior.
IEEE Std 802.1X-2001 A standard that defines port-based network access control behavior.
Internet Group Internet Group Management Protocol (IGMP) is a protocol that runs
Management between hosts and their immediate neighboring multicast routers. The
Protocol protocol allows a host to inform its local router that it wishes to receive
transmissions addressed to a specific multicast group. Based on group
membership information learned from the IGMP, a router is able to
93
LLC Logical Link Control. A sublayer of the IEEE data link layer that is
located above the MAC sublayer. The LLC sublayer is responsible for
MAC sublayer addressing, flow control, error control, and framing.
latency The delay between the time a device receives a packet and the time the
packet is forwarded out of the destination port.
loop An event that occurs when two network devices are connected by
more than one path, thereby causing packets to repeatedly cycle
around the network and not reach their destination.
MAC Media Access Control. A protocol specified by the IEEE for determining
which devices have access to a network at any one time.
94 GLOSSARY
MAC address Media Access Control address; also called hardware or physical address.
A layer 2 address associated with a particular network device. Most
devices that connect to a LAN have a MAC address assigned to them
as they are used to identify other devices in a network. MAC addresses
are 6 bytes long.
main port The port in a resilient link that carries data traffic in normal operating
conditions.
multicast filtering A system that allows a network device to only forward multicast traffic
to an endstation if it has registered that it would like to receive that
traffic.
POST Power On Self Test. An internal test that a Switch carries out when it is
powered-up.
Rapid Spanning Tree An enhanced version of the Spanning Tree Protocol that allows faster
Protocol determination of Spanning Tree topology throughout the bridged
network.
repeater A simple device that regenerates LAN traffic so that the transmission
distance of that signal can be extended. Repeaters are used to connect
two LANs of the same network type.
resilient link A pair of ports that can be configured so that one takes over data
transmission should the other fail. See also main port and standby port.
RMON IETF Remote Monitoring MIB. A MIB that allows you to remotely
monitor LANs by addressing up to nine different groups of information.
SAP Service Access Point. A well-defined location that identifies the user of
services of a protocol entity.
segment A section of a LAN that is connected to the rest of the network using a
switch or bridge.
SMTP Simple Mail Transfer Protocol. An IETF standard protocol used for
transferring mail across a network reliably and efficiently (as defined in
RFC 821).
Spanning Tree A bridge-based system for providing fault tolerance on networks. STP
Protocol (STP) works by allowing you to implement parallel paths for network traffic,
and ensure that redundant paths are disabled when the main paths are
operational and enabled if the main paths fail.
standby port The port in a resilient link that takes over data transmission if the main
port in the link fails.
96 GLOSSARY
subnet mask A subnet mask is used to divide the device part of the IP address into two
further parts. The first part identifies the subnet number. The second part
identifies the device on that subnet.
switch A device that interconnects several LANs to form a single logical LAN
that comprises of several LAN segments. Switches are similar to
bridges, in that they connect LANs of a different type; however they
connect more LANs than a bridge and are generally more sophisticated.
TFTP Trivial File Transfer Protocol. Allows you to transfer files (such as
software upgrades) from a remote device using the local management
capabilities of the Switch.
traffic prioritization A system which allows data that has been assigned a high priority to
be forwarded through a switch without being obstructed by other data.
VLAN tagging A system that allows traffic for multiple VLANs to be carried on a single
link.
97
INDEX E
event notification 14
Events (RMON group) 60, 61
extended network prefix 87
F
Fast Ethernet configuration rules 76
Filter (RMON group) 60, 61
A flow control 18
addresses full duplex configuration rules 77
classes 85
IP 83
aggregated links 12, 19 G
aging time, definition 46 Gigabit Ethernet configuration rules 75
alarm events 62 glossary 89
Alarms (RMON group) 60, 61
automatic IP configuration 72
auto-negotiation 12, 18 H
Hello BPDUs 39
History (RMON group) 60, 61
B Hosts (RMON group) 61
Backup 15 Hosts Top N (RMON group) 61
bandwidth 17
BPDUs. See Bridge Protocol Data Units
Bridge Identifier 37 I
Bridge Protocol Data Units 37 IEEE Std 802.1Q-1998 65
Broadcast Storm Control 15 IEEE Std 802.3-2002 flow control 13, 18
IGMP
default setting 29
C query mode 29
cable snooping mode 29
maximum length 76, 77 IGMP multicast filtering 30
Capture (RMON group) 61 Internet
Configuration addresses 83
Restore 15 InterNIC 84
Save 15 IP (Internet Protocol)
Contents 3 addresses 84
conventions IP address 72, 83
notice icons, About This Guide 8 classes of 85
text, About This Guide 8 defined 84
derivation 84
division of network and host 84
D example 86
default gateway 88 obtaining 84
Default VLAN 65 subnet mask 86
Designated Bridge 38 subnetwork portion 86
Designated Bridge Port 38 IP multicast
addressing 27
IP routing
address classes 85
100 INDEX
L R
learned SDB entries 46 Rapid Spanning Tree Protocol (RSTP) 13, 35
registered IP address, obtaining 84
Remote Monitoring. See RMON
M Restore 15
MAC (Media Access Control) RMON 14
addresses alarm events 62
IP address 84 benefits 61
manual configuration 72 groups 59
masks Root Bridge 37
subnet 86 Root Path Cost 38
Matrix (RMON group) 61 Root Port 38
Max Age 39
multicast filtering 27
IGMP 30 S
multicasts, description 27 Save 15
SDB. See Switch Database
segment, maximum length 76
N Spanning Tree Protocol (STP) 13
network Spanning Tree Protocol, see STP 34
addresses 83 Statistics (RMON group) 60, 61
network configuration examples 80, 81 STP 34
non-aging learned SDB entries 46 avoiding the subdivision of VLANs 43
Bridge Identifier 37
Bridge Protocol Data Units 37
O default port costs 38
obtaining default priority 37
registered IP address 84 Designated Bridge 38
Designated Bridge Port 38
example 39
P Hello BPDUs 39
path costs. See port costs Max Age 39
permanent SDB entries 46 priority 37
port costs, default 38 Root Bridge 37
port security 12 Root Path Cost 38
port trunks Root Port 38
example 24 using on a network with multiple VLANs 43
priority in STP 37 subnet mask 86
defined 86
example 86
Q numbering 87
QoS (see Quality of Service) 14, 47 subnets 86
Quality of Service 14, 47 subnetworking
defined 86
subnet mask 86
sub-networks. See subnets
Switch Database 45
INDEX 101
T
topology rules for Fast Ethernet 76
topology rules with full duplex 77
traffic prioritization 14, 47, 48
advanced 54
basic 52
classification 49
default configurations 58
differentiated services 50, 51
DiffServ Code Point (DSCP) 51
IEEE Std 802.1D, 1998 Edition 50
marking 50
queues 56
re-marking 52
rules, application-based 47
rules, device-based 47
traffic queues 48
V
VLANs 63
benefits 64
Default 65
defining the information for 66
IEEE Std 802.1Q-1998 65
102 INDEX