Upload
eucae00
View
95
Download
6
Embed Size (px)
Citation preview
Industrial Networking IThe Technical Fundamentals
CB1e_1_General.831
1
The Certification courses Industrial Networking I and Industrial Networking II represent one Notes: unit. Industrial Networking I mainly deals with Ethernet in all its speeds and on all its media, hubs and switches, CSMA/CD, Spanning Tree and VLAN. In addition it contains network management. Industrial Networking II extends the knowledge of course CB1e with layers 3 and above, i.e. routing, TCP/IP.
Hirschmann Automation and Control GmbH This presentation, and the material here in, have been prepared for the purposes of education and training. These slides are the sole property of Hirschmann and its subsidiaries, and are not to be altered, duplicated or distributed in any way without express written permission by Hirschmann.
Agenda9:00 h Welcome and Introduction Check your knowledge Network structure and wiring Lunch Data Link Layer Layer 2 Discussion Redundancies on Layer 2 Traffic Control Part 1: QoS Lunch Traffic Control Part 2: VLANs Network management with SNMP Discussion2
1st day 2nd day
9:15 h 9:30 h 12:00 h 13:00 h 16:30 h 9:00 h 11:00 h 12:00 h 13:00 h 14:15 h 16:30 h
CB1e_1_General.831
Notes:
HiComCenter
The Hirschmann Competence Center
Innovative Value Added Services around the Network Technology firsthand!
Consulting Planning ProjectsCB1e_1_General.831
Basics Product Introduction Workshops
Commissioning Hotline Maintenance Concepts
Technology Know-how Product Know-how
3
Your Contact to Training Department: E-Mail: Web: Telefax: Telephone: [email protected] www.hicomcenter.com +49 71 27 14 - 15 51 +49 71 27 14 - 15 27
Notes:
List of LiteratureETHERNETR. Breyer, S. Riley: Switched, Fast, and Gigabit Ethernet. Macmillan Technical Publishing 1999. ISBN 1-57870-073-6 Saunders, S.: Gigabit Ethernet Handbook. McGraw-Hill 1998. ISBN 0-07-057971-7
NETWORK MANAGEMENTHarnedy, Sean: Total SNMP. Prentice-Hall 1998. ISBN 0-13-646994-9 Rose, M.T.: The Simple Book. Prentice-Hall 1991. ISBN 0-13-812611-9 Stallings, William: SNMP, SNMPv2, SNMPv3, and RMON1 and 2. AddisonWesley 1999. 3. edit. ISBN 0-201-48534-6 Zeltserman, David: A Practical Guide to SNMPv3 and Network Management. Prentice Hall 1999. ISBN 0-13-021453-1.
CB1e_1_General.831
4
Further literature Magazine: The Industrial Ethernet Book. GGH Marketing Communications. www.ggh.co.uk
Notes:
List of LiteratureINTERNETWORKINGSeifert, Rich: The Switch Book. Wiley 2000. ISBN 0-471-34586-5
TCP/IPStevens, W.R.: TCP/IP Illustrated, Vol.1: The Protocols. Addison-Wesley 1994. 85,71 EUR, ISBN 0-201-63346-9
www.ietf.org www.ieee.orgCB1e_1_General.831
5
Notes:
AcronymsAC AP AUI BC BFOC BPDU CRC CSMA/CA CSMA/CD DSAP DSCP DTE ELED FCS FDB FDX FLP F/O FTP GARP GVRP HDX IFG IP IPX LAN LC LD LED LLC Access Client Access Point Attachment Unit Interface Broadcast Bayonet Fiber Optical Connector Bridge Protocol Data Unit Cyclic Redundancy Check Carrier Sense Multiple Access Collision Avoidance Carrier Sense Multiple Access Collision Detection Destination Service Access Point Differentiated Services Code Point Data Terminal Equipment (end device) Edge-emitting LED Frame Check Sequence Forwarding Data Base Full Duplex Fast Link Pulse optical fiber Foiled Twisted Pair File Transfer Protocol Generic Attribute Registration Protocol GARP VLAN Registration Protocol Half Duplex - Halbduplex Inter Frame Gap (also: IPG) Internet Protocol Industrial Protection Internet Packet Exchange (Novell protocol, like IP) Local Area Network Lucent or Lampert Connector Laser Diode Light Emitting Diode Logical Link Control OSI OUI PoE POF QoS RJ RSTP SC SCADA SMF SNMP SSAP STP TOS TP UC UDP UTP VLAN WDS WFQ WLAN NIC NLP NMS OID OPC MAC MC MDI MIB MMF MTU Media Access Control Multicast Medium Dependent Interface Management Information Base Multimode Fiber Maximum Transmission Unit (max. packet size) Network Interface Card Normal Link Pulse Network Management Station Object Identifier Openness, Productivity Connectivity (former: OLE for Process Control) Open Systems Interconnection Organizationally Unique Identifier Power over Ethernet Polymer Optical Fiber Quality of Service Registered Jack Rapid Spanning Tree Protocol Subscriber Connector Supervisory Control And Data Acquisition Singlemode Fiber Simple NetworkNotes: Management Protocol Source Service Access Point Shielded Twisted Pair Spanning Tree Protocol Type of Service Twisted-Pair Unicast User Datagram Protocol Unshielded Twisted Pair Virtual LAN Wireless Distribution System Weighted Fair Queuing Wireless LAN
Layer 1: Physical
CB1e_2_Layer_1.831
1
Content: Standardization bodies ISO/OSI Reference model Media: F/O, TP, PoE Media converter Half duplex and Full duplex Ethernet: Access method Design of a collision domain Network structures Hub Repeater Starcoupler Ethernet: 10 Mbit/s 100 Mbit/s 1000 Mbit/s Autonegotiation
Notes:
Hirschmann Automation and Control GmbH This presentation, and the material here in, have been prepared for the purposes of education and training. These slides are the sole property of Hirschmann and its subsidiaries, and are not to be altered, duplicated or distributed in any way without express written permission by Hirschmann.
Standardization BodiesInstitute of Electrical and Electronics Engineers (IEEE) Internet Engineering Task Force (IETF) International Organization for Standardization (ISO) International Telecommunications Union (ITU) European Committee for Electrotechnical Standardization (CENELEC)
CB1e_2_Layer_1.831
2
IEEE, the Institute of Electrical and Electronics Engineers today is the most important organization regarding local data networks with its standard Ethernet. IETF, the Internet Engineering Task Force, creates the TCP/IP standards (Request For Comments RFC). http:// www.ietf.org/rfc ISO, the International Organization for Standardization developed the Open Systems Interconnection (OSI) reference model. Important for networks are the ISO standards for wiring. The approved Ethernet standards are not important anymore due to the international reputation of IEEE. International Telecommunications Union (ITU) is a global organization in which governments and telecoms corporations coordinate the construction and operation of telecommunications networks and services. CENELEC, the European Committee for Electrotechnical Standardization, is responsible for European standardization in the electrical engineering and electronics field. Important for industrial networks are the standards regarding wiring EN 50173, electrical safety EN 50174 and EMC EN 55022.
Notes:
ISO/OSI Reference Model7 Processing Application HTTP, FTP, TFTP SNMP, SNTP,
6
Presentation
Presentation
5
Comms. control
Session
4
Transport
Transport
TCP / UDP
3
Mediation
Network
IP
2
Frame&Protection Bit transfer
Data Link
Ethernet1 Physical
CB1e_2_Layer_1.831
3
The OSI (Open Systems Interconnection) reference model views communication independently of specific manufacturer implementations. Seven layers were defined to that end. Each layer provides services for the next-higher layer and utilizes services from the underlying layers. The services are accessed by way of Service Access Points (SAPs). Each layer offers functions which can be realized as hardware or software solutions, or a combination of the two. Physical Layer The Physical Layer (bit transfer layer) specifies the rules for physical transfer between two devices. It converts bits into signals for transmission, and incoming signals into bits. This layer specifies the connection media and their interfaces. On this layer hubs are operating. Data Link Layer The Data Link Layer (security layer) groups the data bits being transferred into a frame and adds control data (e.g. type or length, destination and source MAC address) and a checksum field for detection of errors in bit transfer. Layer 2 controls access to the physical transmission medium. Switches offer the functionality of L2.
Notes:
Network Layer The Network Layer (mediation layer) controls subnets. Its key task is to forward packets from the source to the destination by way of subnets (routing). These paths can be defined by static tables or dynamically by routing protocols. Layer 3 components are routers. Transport Layer In layers 1 to 3 the protocols only exist between two neighboring machines. The Transport Layer is the first end-to-end layer. Its task is to receive data from the communications control layer, break it down into small units as necessary, and by way of the Network Layer ensure that all parts arrive correctly at the end. The Transport Layer makes and breaks the connection, and monitors it. That means the packets are compiled in the right sequence and, depending on the protocol used, erroneous or lost data is rerequested. Session Layer The Session Layer (communication control layer) allows users to converge in different sessions. Sessions are used, for example, to transfer files between two computers (ftp) or to provide users with access to remote systems. Sessions offer additional services such as synchronization. Fixed points are inserted into the data stream so as to resume the transfer from the last such point if the link is broken at any time. Presentation Layer The Presentation Layer concerns itself with the composition and content significance of data. A typical service is converting data to make it readable for the recipient. Other information presentation services include data compression and cryptography (e.g. data encryption) to attain authenticity and security. Application Layer The Application Layer (processing layer) provides applicationoriented services for standard applications such as file transfer, email or databases, with corresponding data structures. Without them no data or messages can be sent. The computer would not know what to do with the information if it received it.
Notes:
Peer to Peer Communicationshttp://www.hirschmann.com
7 6 5 4 3 2 1
Application
Application
HTTPPresentation Presentation
Session
Session
TCPTransport Transport
IPNetwork Network
Data Link Physical
Ethernet
Data Link Physical
CB1e_2_Layer_1.831
5
This slide shows a general communication between two end devices. Communication takes place at several corresponding layers. Each layer is responsible for a specific task in the communication process: HTTP is used to exchange web site data. TCP is used to facilitate reliable end to end data transfer. IP is used to plot a path through various networks. Ethernet specifies the rules for physically transporting the data By splitting the functionality into different layers with specific responsibilities, it is easy to change between different physical media, transport protocols, etc. For example, changing from Ethernet to WLAN only requires amendments to the lower two layers.
Notes:
Exercise: True or false?The Physical Layer checks for errors.
The Data Link Layer controls access to the media.
The Transport Layer provides safe data traffic.
The Application Layer ensures security and encryption.
CB1e_2_Layer_1.831
6
Notes:
Multimode vs. Singlemode Fiber-Optic Cable
m
Primary coating 250 m
Cladding 125 m9 m 50 m Core 62.5 m ...
CB1e_2_Layer_1.831
7
Fiber-optic cables have advantages over copper: Immune to electromagnetic interference Long distances Fiber-optic cables are made from: Silica for long distances or high speeds Plastic cheap, only for short distances, low speeds Silica core + plastic sheath: HCS, PCS only field buses 2 fiber types: Multimode fiber (MMF), used for short distances Singlemode fiber (SMF), used for long distances There are 3 types of light source: LEDs low-cost, only for multimode fibers ELEDs value, for SMF, cheaper than LDs, no laser protection measures required Laser, laser diode LD for SMF over long distances
Notes:
F/O ConnectorsBFOC (ST)BFOC
DSCDSC
LC Industry connectors for IP 67M12 for F/O DSC or LC with sleeve nut
LC
CB1e_2_Layer_1.831
8
The BFOC connector is standardized at 10 Mbit/s Ethernet, DuplexSC (DSC) at Fast and Gigabit Ethernet. Additionally at Gigabit Ethernet the LC connector is used if a small form factor is needed, especially with modular transceivers, so called SFPs. The BFOC sometimes is also used in industrial Fast Ethernet devices. In the past other connectors were used, like F-SMA at 10 Mbit/s and still today MTRJ at 100 Mbit/s.
Notes:
Twisted PairRJ45
M122 wires twisted as a pair 1 foil screen around each pair = PIMF (Pair In Metal Foil) 1 cable screen of wire mesh Halogen free and flame retardant cable outer sheath
CB1e_2_Layer_1.831
9
A Twisted Pair (TP) cable consists of 8 wires, grouped into pairs. The wire pairs are twisted together. Categorization of TP cable: Cat. 3: min. transmission frequency 20 MHz Minimum quality for 10 Mbit Ethernet Cat. 5: min. transmission frequency 125 MHz Minimum quality for Fast and Gigabit Ethernet Cat. 6: min. transmission frequency 250 MHz Cat. 7: min. transmission frequency 600 MHz Connectors in industry require mechanical stability and should be viibration-proof. Sometimes IP protection (IP64 or IP67) is demanded. For this only proprietary solutions exist: M12: Proposed by IAONA for Ethernet, known in the field bus sector VS-RJ45 from Phoenix Contact: Modified RJ45 RJ45 connector with coupling nut from Woodhead:
Notes:
Pin Assignment, RJ45 Connector
CB1e_2_Layer_1.831
10
Medium Dependent Interface (MDI) Terminal devices such as PCs, PLCs, servers and routers have an MDI interface. The transmission path is located at pins 1-2, and the reception path at pins 3-6. Medium Dependent Interface - Crossover (MDI-X) System components such as hubs and switches have an MDIX interface. The transmission path is located at pins 3-6, and the reception path at pins 1-2. There are two standards for the color coding of wires: T568A specified by TIA/EIA T568B specified by AT&T
Notes:
Patch and Crossover Cables
Patch cable 1:1PIN PIN PIN
Crossover cablePIN
1 2 3 6 4 5 7 8
1 2 3 6 4 5 7 8
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
CB1e_2_Layer_1.831
11
To interconnect two devices with different ports (MDI and MDI-X) a straight Twisted-Pair cable (patch cable) is used. To interconnect two devices with the same port (MDI and MDI / MIDX and MDI-X) a crossed Twisted-Pair cable (crossover cable) is needed. Caution: There are also part-crossover cables on the market: 1-2/3-6 crossover, 4-5/7-8 1:1. They will not necessarily work with Gigabit Ethernet!
Notes:
PoE - Power over Ethernet (IEEE 802.3af)Power Supply via TP cable Advantages:only one cable necessary and central operation of UPS possible
Power insertion athub / switch / router or patch field (Midspan Insertion)
CB1e_2_Layer_1.831
12
Standardized under IEEE 802.3af:2003 Devices are supplied by power over the TP cable. Connector: RJ45 Voltage: 48 at 3 km Singlemode (1310 nm): up to 30 km (not standardized) Singlemode (1550 nm): up to 100 km (not standardized)
Notes:
Gigabit Ethernet: 1000BASE-T1st wire pairRX TX RX TX
2nd wire pairRX TX RX TX
3rd wire pairRX TX RX TX
4th wire pairRX TX RX TX
CB1e_2_Layer_1.831
22
Gigabit Ethernet multiplies the data rate of Fast Ethernet by ten. HDX is standardized, but there are no hubs available, so only FDX is in operation. To be able to also use existing copper cabling for a 1000 Mbit/s transfer rate, all four wire pairs of a Twisted Pair cable are used. Parallel processing distributes the data across all the wire pairs. So-called echo cancellation enables data to be transmitted and received over a single wire pair simultaneously. 1000BASE-T Transmission medium: 100 (Twisted Pair) Maximum length: 100 m (90m + 2 * 5m Patch cable)
Notes:
Gigabit via Fiber: 1000BASE-SX, 1000BASE-LX
G62.5/125 G50/125 Multimode G62.5 Multimode G50 Singlemode 275 m 550 m 5000 m
CB1e_2_Layer_1.831
23
Transmission medium: Duplex fiber-optic cable 1000BASE-SX (850 nm) range Multimode G62.5/125: Multimode G50/125: 1000BASE-LX (1300 nm) Multimode G62.5/125: Multimode G50/125: Singlemode E10/125: Proprietary solutions (1550 nm) not standardized but wide available Singlemode E10/125: up to 120 km 550 m 550 m at least 5000 m 275 m 550 m
Notes:
Autonegotiation:Autonegotiation FLP Autonegotiation
FDXFLP
FDX
Fixed to FDX FLP
Autonegotiation
FDX
HDX
Fixed to HDX FLP
Autonegotiation
HDX
HDX
CB1e_2_Layer_1.831
24
Autonegotiation offers the devices to select the best possible data Notes: throughput for the connection. By upgrading the Normal Link Pulse (NLP), which tells the opposite port of its existence, to Fast Link Pulses (FLPs), the best possible transfer rate (10BASE-T, 100BASE-TX, 100BASE-T4) and the mode (HDX, FDX) are negotiated. The FLPs are only transmitted at connection setup, so as not to impair the connection performance. With Autocrossing a port can automatically configured to MDI or MDI-X. This then makes the distinction between patch and crossover cables irrelevant. This feature is often only usable if a port is configured for autonegotiation. Parallel detection Status of autonegotiation when only one of the two connected devices supports autonegotiation. The autonegotiation device detects the speed of the opposite party and configures itself to that speed and half-duplex mode in order to detect collisions. Media converters cannot forward autonegotiation signals, because a fiber-optic port does not support FLPs or NLPs. Workaround: Set both devices permanently to FDX.
Exercise: AutonegotiationAuto Auto
Auto 100Mbit/s HDX Auto 100Mbit/s FDX Auto 100Mbit/s HDX
Auto 10Mbit/s HDX
CB1e_2_Layer_1.831
25
Some ports in the example above have fixed transfer rates and modes, and others are set to autonegotiation (Auto). The switches support the autocrossing function when autonegotiation is active. Enter the transfer rate and mode for the ports set to autonegotiation. Define the cable to use (patch/crossover). Hub Switch
Notes:
Appendix
CB1e_2_Layer_1.831
26
Notes:
Solution: Interfaces and CablesMDI Crossover MDI
MDI-X
Patch
MDI
MDI-X
Crossover MDI-X Patch
MDI-X
MDI
MDI-X
Crossover
MDI-X
CB1e_2_Layer_1.831
27
Define the interfaces (MDI / MDI-X) of the individual components and the required cable (patch/crossover). Hub Switch
Notes:
Solution: AutonegotiationAuto 100Mbit/s FDX Crossover Auto 100Mbit/s FDX Auto 100Mbit/s HDX
Patch 100Mbit/s HDX Auto 100Mbit/s HDX Crossover (or Patch)
100Mbit/s FDX Auto 100Mbit/s HDX
Patch (or Corssover) 100Mbit/s HDX
Auto 10Mbit/s HDX
Crossover (or Patch) 10Mbit/s HDX
CB1e_2_Layer_1.831
28
Some ports in the example above have fixed transfer rates and modes, and others are set to autonegotiation (Auto). The switches support the autocrossing function when autonegotiation is active. Enter the transfer rate and mode for the ports set to autonegotiation. Define the cable to use (patch/crossover). Hub Switch
Notes:
ETHERNET in OSI Reference ModelOSI Reference Model Referenz Model APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICALPMA PHYSICAL MEDIUM ATTACH. MAU MDI
LAN CSMA/CD HIGHER LAYERSLLC LOGICAL LINK CONTROL MAC MEDIA ACCESS CONTROL PLS PHYSICAL SIGNALING DTE DTE AUI
MEDIUMTransceiver = MAU
CB1e_2_Layer_1.831
29
Ethernet is standardized under IEEE 802.3. Ethernet offers several speeds: 10 Mbit/s 100 Mbit/s Fast Ethernet 1 Gbit/s Gigabit Ethernet 10 Gigabit Ethernet and coming soon 100 Gigabit Ethernet (development of standard just started) Ethernet was developed further from a shared net with CSMA/CD access method (HDX) to switch based nets in FDX mode. Currently in industry the trend is Gigabit Ethernet, due to its smaller packet delay in switches compared to Fast Ethernet. The higher speed/bandwidth has only a subordinate role. Ethernet supports different media: Fiber optics: multimode and singlemode fiber Twisted pair and at 10 Mbit/s coax as well as AUI.
Notes:
Ethernet 10 Mbit/s10BASE2 BNC T piece
Segment max. 185 m
Terminator 50 min. 0.5 m
10BASE5Transceiver Transceiver cable max. 50 m
Segment max. 500 mCB1e_2_Layer_1.831
Terminator 50 min. 2.5 m 30
Today coax and AUI are used in industry networks for completion. 10BASE2 - Cheapernet or Thinwire Maximum 185 m segment length Maximum 30 user ports Transceivers are integrated into the Network Interface Card (NIC) At least 0.5 m distance between two ports Transmission medium: 50 Ohm coax HDX Repeaters can be used to connect additional segments (10BASE2 or 10BASE5). The maximum length of a Cheapernet is 925 m. 10BASE5 - Yellow cable Transmission medium: 50 Ohm coax HDX Maximum 500 m segment length At least 2.5 m distance between 2 transceivers Maximum 100 transceivers (user ports) Maximum 50 m AUI cable from transceiver to user A maximum of 3 additional segments may be connected to one segment by repeaters.
Notes:
Design of a Collision Domain Model 1: 5-4-3 Rule
Repeater
CB1e_2_Layer_1.831
31
Model 1 to IEEE 802.3 section 13 The 5-4-3 rule: A maximum of 5 segments may be connected to 4 repeaters, but devices may only be connected to 3 segments. This does not bring a network up to its limit. The 5-4-3 rule was introduced to simplify the complex computations necessary to calculate the maximum number of hubs/repeaters within a collision domain.
Notes:
Design of a Collision Domain: Model 2: Runtime Equivalent & Path Variability Value5 4 3 2
10 Mbit/s
8
7
6
1
0
10 Mbit/s
8
7
6
5
4
3
2
1
0
Runtime delay
CB1e_2_Layer_1.831
32
To reach the limit of a collision domain, two calculations as per 802.3 section 13 are required. Propagation equivalent The delay of a signal due to a component in the data path is converted into a distance. The overall length of permissible cable, after deducting all the delays due to active components, results as 5120 meters. Hub delay: 150m - 300m NIC delay: 100m - 140m Path variability value Another delay occurs because a repeater extends the preamble of an incoming packet by a number of bits. This is the path variability value, and is given in bit times (BT). The maximum number of bit times in a collision domain is 49. As no value is usually obtainable for terminal devices, 40 BT should be assumed as the limit for the rest of the data path.
Notes:
Exercise: Maximum Network Size, Fast ETHERNET100 m DTEDTE via TP 412 m DTEDTE via optical fiber
200 m over repeater class I via TP 260 m over class I repeater via TP+optical fiber 272 m over class I repeater via optical fiber 200 m over 1 class II repeater via TP 320 m over 1 class II repeater via optical fiber
205 m over 2 class II repeaters via TP 228 m over 2 class II repeaters via optical fiber
CB1e_2_Layer_1.831
33
Repeater classification for Fast Ethernet: Class I repeater Within a collision domain only one repeater of this class may be used. Class II repeater Within a collision domain two repeaters of this class, with short internal delays, may be used. Calculate the theoretical maximum network size of the collision domain at a transfer rate of 100 Mbit/s:
Notes:
Solution: 64 byte = 512 bit 10 ns/bit 2.56 s * 200,000 km/s = 512 m
Slottime = 2.56 s;
AcronymsAUI BFOC BT CSMA/CD DSC DTE ELED EMC EN FDX FLP F/O FTP HCS HDX IEEE IETF IFG IP IPG ISO Attachment Unit Interface Bayonet Fiber Optical Connector = ST Bit Time Carrier Sense Multiple Access Collision Detection Duplex Subscriber Connector Data Terminal Equipment Edge-emitting LED Electro-magnetic Compatibility European standard Full duplex Fast Link Pulse Fiber Optics File Transfer Protocol Hard polymer Cladded Silica F/O half-duplex Institute of Electrical and Electronics Engineers Internet Engineering Task Force Inter Frame Gap (also IPG) Internet Protocol, Industry Protection Inter Packet Gap International Organization for Standardization LAN LD MAC MAU MDI MMF NIC NLP OSI PiMF PCS PVV RJ SAP SMF TP UPS WDS WLAN Local Area Network Laser diode Media Access Control Medium Attachment Unit Medium Dependent Interface Multimode Fiber Network Interface Card Normal Link Pulse Open Systems Interconnection Pair in Metal Foil Polymer cladded silica; s. HCS Path Variability Value Registered Jack Service Access Points Singlemode Fiber Twisted Pair Uninterruptible Power Supply Wireless Distribution System Wireless LAN
CB1e_2_Layer_1.831
34
Notes:
Layer 1: Physical
CB1e_2_Layer_1.831
1
Content: Standardization bodies ISO/OSI Reference model Media: F/O, TP, PoE Media converter Half duplex and Full duplex Ethernet: Access method Design of a collision domain Network structures Hub Repeater Starcoupler Ethernet: 10 Mbit/s 100 Mbit/s 1000 Mbit/s Autonegotiation
Notes:
Hirschmann Automation and Control GmbH This presentation, and the material here in, have been prepared for the purposes of education and training. These slides are the sole property of Hirschmann and its subsidiaries, and are not to be altered, duplicated or distributed in any way without express written permission by Hirschmann.
Standardization Bodies
Institute of Electrical and Electronics Engineers (IEEE) Internet Engineering Task Force (IETF) International Organization for Standardization (ISO) International Telecommunications Union (ITU) European Committee for Electrotechnical Standardization (CENELEC)
CB1e_2_Layer_1.831
2
IEEE, the Institute of Electrical and Electronics Engineers today is the most important organization regarding local data networks with its standard Ethernet. IETF, the Internet Engineering Task Force, creates the TCP/IP standards (Request For Comments RFC). http:// www.ietf.org/rfc ISO, the International Organization for Standardization developed the Open Systems Interconnection (OSI) reference model. Important for networks are the ISO standards for wiring. The approved Ethernet standards are not important anymore due to the international reputation of IEEE. International Telecommunications Union (ITU) is a global organization in which governments and telecoms corporations coordinate the construction and operation of telecommunications networks and services. CENELEC, the European Committee for Electrotechnical Standardization, is responsible for European standardization in the electrical engineering and electronics field. Important for industrial networks are the standards regarding wiring EN 50173, electrical safety EN 50174 and EMC EN 55022.
Notes:
communication ?!?
Igel
EAGLE
CB1e_2_Layer_1.831
Connection is not communication 3
Notes:
7 layer modell
http://www.hirschmann.com
7 6 5 4 3 2 1
Application
Application
HTTPPresentation Presentation
Session
Session
TCPTransport Transport
IPNetwork Network
Data link Physical
Ethernet
Data link Physical
CB1e_2_Layer_1.831
4
The OSI (Open Systems Interconnection) reference model views communication independently of specific manufacturer implementations. Seven layers were defined to that end. Each layer provides services for the nexthigher layer and utilizes services from the underlying layers. The services are accessed by way of Service Access Points (SAPs). Each layer offers functions which can be realized as hardware or software solutions, or a combination of the two.
Notes:
Physical Layer The Physical Layer (bit transfer layer) specifies the rules for physical transfer between two devices. It converts bits into signals for transmission, and incoming signals into bits. This layer specifies the connection media and their interfaces. On this layer hubs are operating. Network Layer The Network Layer (mediation layer) controls subnets. Its key task is to forward packets from the source to the destination by way of subnets (routing). These paths can be defined by static tables or dynamically by routing protocols. Layer 3 components are routers. Transport Layer In layers 1 to 3 the protocols only exist between two neighboring machines. The Transport Layer is the first end-toend layer. Its task is to receive data from the communications control layer, break it down into small units as necessary, and by way of the Network Layer ensure that all parts arrive correctly at the end. The Transport Layer makes and breaks the connection, and monitors it. That means the packets are compiled in the right sequence and, depending on the protocol used, erroneous or lost data is re-requested. Session Layer The Session Layer (communication control layer) allows users to converge in different sessions. Sessions are used, for example, to transfer files between two computers (ftp) or to provide users with access to remote systems. Sessions offer additional services such as synchronization. Fixed points are inserted into the data stream so as to resume the transfer from the last such point if the link is broken at any time. Presentation Layer The Presentation Layer concerns itself with the composition and content significance of data. A typical service is converting data to make it readable for the recipient. Other information presentation services include data compression and cryptography (e.g. data encryption) to attain authenticity and security. Application Layer The Application Layer (processing layer) provides application-oriented services for standard applications such as file transfer, e-mail or databases, with corresponding data structures. Without them no data or messages can be sent. The computer would not know what to do with the information if it received it.
Data Link Layer The Data Link Layer (security layer) groups the data bits being transferred into a frame and adds control data (e.g. type or length, destination and source MAC address) and a checksum field for detection of errors in bit transfer. Layer 2 controls access to the physical transmission medium. Switches offer the functionality of L2.
Example of 3-layer-modell
Philosoph 1 living in: India language: Telugu
Philosoph 2 living in: Kenia language: Kisuaheli
translater
translater
bearer
bearer
CB1e_2_Layer_1.831
5
Notes:
Peer to Peer Communications
http://www.hirschmann.com
7 6 5 4 3 2 1
Application
Application
Presentation
HTTP
Presentation
Session Transport
Session
TCP IP
Transport
Network
Network
Data Link Physical
Ethernet
Data Link Physical
CB1e_2_Layer_1.831
6
This slide shows a general communication between two end devices. Communication takes place at several corresponding layers. Each layer is responsible for a specific task in the communication process: HTTP is used to exchange web site data. TCP is used to facilitate reliable end to end data transfer. IP is used to plot a path through various networks. Ethernet specifies the rules for physically transporting the data By splitting the functionality into different layers with specific responsibilities, it is easy to change between different physical media, transport protocols, etc. For example, changing from Ethernet to WLAN only requires amendments to the lower two layers.
Notes:
Exercise: True or false?
The Physical Layer checks for errors.
The Data Link Layer controls access to the media.
The Transport Layer provides safe data traffic.
The Application Layer ensures security and encryption.
CB1e_2_Layer_1.831
7
Notes:
Multimode vs. SinglemodeFiber-Optic Cable mRodent protection and Strain relief made of strain relief aramide fiber Filler Supporting element (GFRP)
PE sheath
PE intermediate sheath Single/multiple fiber with water repelling filler
Glass fibers with primary coating with single fiber or multiple fibers
Primary coating 250 m
Cladding 125 m 10 m 50 m Core 62.5 m ...
CB1e_2_Layer_1.831
8
Fiber-optic cables have advantages over copper: Immune to electromagnetic interference Long distances Fiber-optic cables are made from: Silica for long distances or high speeds Plastic cheap, only for short distances, low speeds Silica core + plastic sheath: HCS, PCS only field buses 2 fiber types: Multimode fiber (MMF), used for short distances Singlemode fiber (SMF), used for long distances There are 3 types of light source: LEDs low-cost, only for multimode fibers ELEDs value, for SMF, cheaper than LDs, no laser protection measures required Laser, laser diode LD for SMF over long distances
Notes:
F/O ConnectorsBFOC
BFOC (ST) DSCDSC
LCLC
Industry connectors for IP 67M12 for F/O DSC or LC with sleeve nut
CB1e_2_Layer_1.831
9
The BFOC connector is standardized at 10 Mbit/s Ethernet, DuplexSC (DSC) at Fast and Gigabit Ethernet. Additionally at Gigabit Ethernet the LC connector is used if a small form factor is needed, especially with modular transceivers, so called SFPs. The BFOC sometimes is also used in industrial Fast Ethernet devices. In the past other connectors were used, like F-SMA at 10 Mbit/s and still today MTRJ at 100 Mbit/s.
Notes:
Optical characteristics fiber cable
CB1e_2_Layer_1.831
10
Notes:
Optical characteristics Data sheet switches
CB1e_2_Layer_1.831
11
Notes:
Optical characteristics Data sheet switches
CB1e_2_Layer_1.831
12
Notes:
measurement
1.)
Reference test lead
Result of the reference measurement.
660 nm 850 nm 1300 nm
- 15,0 dBm
P0 =
dBm850nm
Sender
Leistungspegelmesser
2.)
Result of the level measurement Link to be tested
P1 =660 nm 850 nm 1300 nm
dBm850nm
- 17,0 dBm
attenuation A = P0 - P1
SenderLeistungspegelmesser
example: A = 2 dB
CB1e_2_Layer_1.831
13
Notes:
Measurement - OTDR
OTDR
Launching fiber
Link to be tested
End faser
screen
attenuation length
CB1e_2_Layer_1.831
14
Notes:
Twisted Pair
RJ45
M122 wires twisted as a pair 1 foil screen around each pair = PIMF (Pair In Metal Foil) 1 cable screen of wire mesh Halogen free and flame retardant cable outer sheath
CB1e_2_Layer_1.831
15
A Twisted Pair (TP) cable consists of 8 wires, grouped into pairs. The wire pairs are twisted together. Categorization of TP cable: Cat. 3: min. transmission frequency 20 MHz Minimum quality for 10 Mbit Ethernet Cat. 5: min. transmission frequency 125 MHz Minimum quality for Fast and Gigabit Ethernet Cat. 6: min. transmission frequency 250 MHz Cat. 7: min. transmission frequency 600 MHz Connectors in industry require mechanical stability and should be viibration-proof. Sometimes IP protection (IP64 or IP67) is demanded. For this only proprietary solutions exist: M12: Proposed by IAONA for Ethernet, known in the field bus sector VS-RJ45 from Phoenix Contact: Modified RJ45 RJ45 connector with coupling nut from Woodhead:
Notes:
Twisted Pair - types of connectors
IAONA Planning & Installation Guide (Version 4.0)
Installation Guideline PROFInet (Version 1.8)
Ethernet/IP Media Planning and Installation Manual (Draft 2.0)
D - Code
CB1e_2_Layer_1.831
16
Notes:
Twisted Pair -
RJ45
Whatever housing concept is used, RJ 45 connectors do not reach the demands of industrial applications:
Left: RJ45 connector socket damaged by corrosion Middle/right: X-ray of an RJ45 engaged contact set. Note the very small contact area and the effect of mechanical vibration on the Plug / socket contacts wearing away gold flashingCB1e_2_Layer_1.831
17
Notes:
Pin Assignment, RJ45 Connector
MDI (EIA/TIA T568A)
MDI-X
CB1e_2_Layer_1.831
18
Medium Dependent Interface (MDI) Terminal devices such as PCs, PLCs, servers and routers have an MDI interface. The transmission path is located at pins 1-2, and the reception path at pins 3-6. Medium Dependent Interface - Crossover (MDI-X) System components such as hubs and switches have an MDIX interface. The transmission path is located at pins 3-6, and the reception path at pins 1-2. There are two standards for the color coding of wires: T568A specified by TIA/EIA T568B specified by AT&T
Notes:
Patch and Crossover Cables
Patch cable 1:1PIN
Crossover cablePIN
1 2 3 6 4 5 7 8
1 2 3 6 4 5 7 8
PIN
1 2 3 4 5 6 7 8
PIN
1 2 3 4 5 6 7 8
CB1e_2_Layer_1.831
19
To interconnect two devices with different ports (MDI and MDI-X) a straight Twisted-Pair cable (patch cable) is used. To interconnect two devices with the same port (MDI and MDI / MIDX and MDI-X) a crossed Twisted-Pair cable (crossover cable) is needed. Caution: There are also part-crossover cables on the market: 1-2/3-6 crossover, 4-5/7-8 1:1. They will not necessarily work with Gigabit Ethernet!
Notes:
Exercise: Interfaces and Cables
CB1e_2_Layer_1.831
20
Define the interfaces (MDI / MDI-X) of the individual components and the required cable (patch/crossover). Hub Switch
Notes:
Half-duplex and Full-duplex
Half duplexTx Rx
orRx Tx
Full duplexTx Rx
andRx Tx
CB1e_2_Layer_1.831
21
For data transmission there are two communication modes: Half duplex - HDX Either send or receive possible, never simultaneously. A conductor pair or an optical fiber is used as the data path for communication. If there are two paths, one is used for each direction. Full duplex - FDX Send and receive possible simultaneously. Two separate data paths, i.e. 2 TP pairs or 2 F/O fibers, are needed. Also over a single conductor pair, using special techniques, such as echo cancellation (see 1000BASE-T).
Notes:
Exercise: Autonegotiation
Auto
Auto
Auto 100Mbit/s HDX Auto 100Mbit/s FDX Auto 100Mbit/s HDX Auto 10Mbit/s HDX
CB1e_2_Layer_1.831
22
Some ports in the example above have fixed transfer rates and modes, and others are set to autonegotiation (Auto). The switches support the autocrossing function when autonegotiation is active. Enter the transfer rate and mode for the ports set to autonegotiation. Define the cable to use (patch/crossover). Hub Switch
Notes:
PoE - Power over Ethernet (IEEE 802.3af)
Power Supply via TP cable Advantages:only one cable necessary and central operation of UPS possible
Power insertion athub / switch / router or patch field (Midspan Insertion)
CB1e_2_Layer_1.831
23
Standardized under IEEE 802.3af:2003 Devices are supplied by power over the TP cable. Connector: RJ45 Voltage: 48 at to 10Mbps, in a periode of 51.2 s. CSMA/CD Die Kollision kann von der ST1 nur festgestellt werden, wenn die Nachricht gerade bertragen wird. Dann wird die ST1 von der ST2 ber die Kollision informiert . => the transmission time of a packet have to be not longer than: T = 51,2s / 2 = 25,6s Speed propagation of signals V = Propagationscoeffizient x light speed => V = 0.66 x 300000km/s = 20.0000 km/s Max Length of a network (collision domain) S=VxT S = 20.0000 km/s x 25,6s = 5120 meter
Notes:
CSMA/CD
access method in hub technologyJ M A
Hub
Hub
Hub
Hub
1collision
2
3
4
Switch
A
B
C
Network A
CB1e_2_Layer_1.831
30
Notes:
Size of a Collision Domain at 10 MBit/s
Smax = 5120 mCB1e_2_Layer_1.831
31
The sender must detect a collision before it has ended the send operation. Consequently, the standard stipulates the minimum size of an Ethernet frame as 64 bytes or 512 bits. To send 512 bits, at a transfer rate of 10 Mbit/s a repeater or a network card takes 51.2 s. To send half an Ethernet frame it takes 25.6 s. This time is termed the slot time. After this time the packet must have reached the most distant device, so that a collision can be detected reliably. The signal propagation rate of the data over a copper or fiber-optic cable is assumed to be two thirds the speed of light (approx. 200,000 km/s). This results in a maximum distance between any two points ("diameter") of: 25.6 s * 200,000 km/s = 5,120 m In practice the delays of hubs and of both Ethernet controllers of the end devices must be subtracted. This limitation is valid only in HDX operation!
Notes:
Network Topologies
Bus
Ring
Star
Double line Mesh
CB1e_2_Layer_1.831
32
The structure of the first networks to use Ethernet was a bus structure using coaxial cables (see 10BASE5 and 10BASE2). Based on its centralized distributor technique, and the use of network components such as hubs and switches, the star structure is becoming more prevalent today. Although the use of a ring structure or meshed structure for Ethernet is not permitted, redundancy mechanisms such as Rapid Spanning Tree or HIPER Ring do allow such networks to be constructed. In this, additional connections are established between two switches as standby links, which are activated in case of error. In process control networks one often find a double redundant line structure. With special protocols the systems provide a fast switch-over to the redundant line in case of a link or whole line failure. Example: VNET/IP
Notes:
Hubs Repeaters Star Couplers
CB1e_2_Layer_1.831
33
Hubs offer the functions of OSI layer 1. The repeater/hub sends the data it receives at one port to all other ports. The data signal is regenerated in the process. The ports of a repeater/hub work in half-duplex mode. In that mode collisions of data packets can occur. Networks operated in halfduplex mode are termed collision domains. Repeaters/hubs connect devices to a collision domain, or interconnect multiple collision domains. The access to the network is carried out according the principle while one is talking all others have to listen, thus the bandwidth statistically seen is shared. The advantages of a hub are its small latency and the simple installation, usually plug-and-play. The disadvantage is that the more participants are transmitting, the more often collisions occur and the less bandwidth could be used. Rule of thumb: in industry automation ca. 8 % are usable, else ca. 40 %. The maximum distance of a collision domain at Ethernet is limited by its access method. Thus larger networks are based on switches, which due to FDX transmission have no limits.
Notes:
Ethernet 10 Mbit/s Point to Point Star Structure
10BASE-T
10BASE-FL
CB1e_2_Layer_1.831
34
Today for building networks twisted pair and fiber optics are used. Due to the point-to-point structure a faulty end device cannot paralyze the whole segment. In addition a high quality cable can also used at the faster releases. 10BASE-T Transmission medium: 100 (Twisted Pair) Maximum length: 100 m (90m + 2 * 5m Patch cable) Maximum 1024 terminals 10BASE-FL Optical cabling offers a high degree of data security based on its insensitivity to radiated interference and its high transfer rate. The use of multimode cables enables a minimum segment length of 2000 meters to be attained. Using singlemode fiber, distances of up to 40 km can be bridged.
Notes:
Fast Ethernet: 100 Mbit/s
100BASE-FX
100BASE-TX
CB1e_2_Layer_1.831
35
Fast Ethernet Transfer rate: 100 Mbit/s Operating mode: Half-duplex and Full-duplex 100BASE-TX Transmission medium: 100 ( Twisted Pair Maximum length: 100 m (90m + 2 * 5m Patch cable) 100BASE-FX Transmission medium: 2* fiber-optic cable Ranges Multimode (1300 nm): > 3 km Singlemode (1310 nm): up to 30 km (not standardized) Singlemode (1550 nm): up to 100 km (not standardized)
Notes:
Gigabit Ethernet: 1000BASE-TRX TX
1st wire pair
RX TX
2nd wire pairRX TX
RX TX
3rd wire pairRX TX
RX TX
4th wire pairRX TX
RX TX
CB1e_2_Layer_1.831
36
Gigabit Ethernet multiplies the data rate of Fast Ethernet by ten. HDX is standardized, but there are no hubs available, so only FDX is in operation. To be able to also use existing copper cabling for a 1000 Mbit/s transfer rate, all four wire pairs of a Twisted Pair cable are used. Parallel processing distributes the data across all the wire pairs. So-called echo cancellation enables data to be transmitted and received over a single wire pair simultaneously. 1000BASE-T Transmission medium: 100 (Twisted Pair) Maximum length: 100 m (90m + 2 * 5m Patch cable)
Notes:
Gigabit via Fiber: 1000BASE-SX, 1000BASE-LX
G62.5/125 G50/125 Multimode G62.5 Multimode G50 Singlemode 275 m 550 m 5000 m
CB1e_2_Layer_1.831
37
Transmission medium: Duplex fiber-optic cable 1000BASE-SX (850 nm) range Multimode G62.5/125: Multimode G50/125: 1000BASE-LX (1300 nm) Multimode G62.5/125: Multimode G50/125: Singlemode E10/125: Proprietary solutions (1550 nm) not standardized but wide available Singlemode E10/125: up to 120 km 550 m 550 m at least 5000 m 275 m 550 m
Notes:
Autonegotiation:
Autonegotiation FLP
Autonegotiation
FDXFLP Fixed to FDX FLP
FDX
Autonegotiation
FDX
HDX
Fixed to HDX FLP
Autonegotiation
HDX
HDX
CB1e_2_Layer_1.831
38
Autonegotiation offers the devices to select the best possible data Notes: throughput for the connection. By upgrading the Normal Link Pulse (NLP), which tells the opposite port of its existence, to Fast Link Pulses (FLPs), the best possible transfer rate (10BASE-T, 100BASE-TX, 100BASE-T4) and the mode (HDX, FDX) are negotiated. The FLPs are only transmitted at connection setup, so as not to impair the connection performance. With Autocrossing a port can automatically configured to MDI or MDI-X. This then makes the distinction between patch and crossover cables irrelevant. This feature is often only usable if a port is configured for autonegotiation. Parallel detection Status of autonegotiation when only one of the two connected devices supports autonegotiation. The autonegotiation device detects the speed of the opposite party and configures itself to that speed and half-duplex mode in order to detect collisions. Media converters cannot forward autonegotiation signals, because a fiber-optic port does not support FLPs or NLPs. Workaround: Set both devices permanently to FDX.
Appendix
CB1e_2_Layer_1.831
39
Notes:
Solution: Interfaces and Cables
MDI
Crossover
MDI
MDI-X
Patch
MDI
MDI-X
Crossover
MDI-X
MDI-X
Patch
MDI
MDI-X
Crossover
MDI-X
CB1e_2_Layer_1.831
40
Define the interfaces (MDI / MDI-X) of the individual components and the required cable (patch/crossover). Hub Switch
Notes:
Solution: AutonegotiationAuto 100Mbit/s FDX Crossover Auto 100Mbit/s FDX Auto 100Mbit/s HDX
Patch 100Mbit/s HDX Auto 100Mbit/s HDX Crossover (or Patch)
100Mbit/s FDX Auto 100Mbit/s HDX
Patch (or Corssover) 100Mbit/s HDX Auto 10Mbit/s HDX
Crossover (or Patch) 10Mbit/s HDX
CB1e_2_Layer_1.831
41
Some ports in the example above have fixed transfer rates and modes, and others are set to autonegotiation (Auto). The switches support the autocrossing function when autonegotiation is active. Enter the transfer rate and mode for the ports set to autonegotiation. Define the cable to use (patch/crossover). Hub Switch
Notes:
ETHERNET in OSI Reference Model
OSI Reference Model Referenz Model APPLICATION PRESENTATION SESSION TRANSPORT NETWORK DATA LINK PHYSICAL
LAN CSMA/CD HIGHER LAYERSLLC LOGICAL LINK CONTROL MAC MEDIA ACCESS CONTROL PLS PHYSICAL SIGNALING DTE DTE AUI PMA PHYSICAL MEDIUM ATTACH. MAU MDI
MEDIUMTransceiver = MAU
CB1e_2_Layer_1.831
42
Ethernet is standardized under IEEE 802.3. Ethernet offers several speeds: 10 Mbit/s 100 Mbit/s Fast Ethernet 1 Gbit/s Gigabit Ethernet 10 Gigabit Ethernet and coming soon 100 Gigabit Ethernet (development of standard just started) Ethernet was developed further from a shared net with CSMA/CD access method (HDX) to switch based nets in FDX mode. Currently in industry the trend is Gigabit Ethernet, due to its smaller packet delay in switches compared to Fast Ethernet. The higher speed/bandwidth has only a subordinate role. Ethernet supports different media: Fiber optics: multimode and singlemode fiber Twisted pair and at 10 Mbit/s coax as well as AUI.
Notes:
Ethernet 10 Mbit/s
10BASE2
BNC T piece
Segment max. 185 m
Terminator 50 min. 0.5 m
10BASE5Transceiver Transceiver cable max. 50 m
Segment max. 500 mCB1e_2_Layer_1.831
Terminator 50 min. 2.5 m 43
Today coax and AUI are used in industry networks for completion. 10BASE2 - Cheapernet or Thinwire Maximum 185 m segment length Maximum 30 user ports Transceivers are integrated into the Network Interface Card (NIC) At least 0.5 m distance between two ports Transmission medium: 50 Ohm coax HDX Repeaters can be used to connect additional segments (10BASE2 or 10BASE5). The maximum length of a Cheapernet is 925 m. 10BASE5 - Yellow cable Transmission medium: 50 Ohm coax HDX Maximum 500 m segment length At least 2.5 m distance between 2 transceivers Maximum 100 transceivers (user ports) Maximum 50 m AUI cable from transceiver to user A maximum of 3 additional segments may be connected to one segment by repeaters.
Notes:
Design of a Collision Domain Model 1: 5-4-3 Rule
Repeater
CB1e_2_Layer_1.831
44
Model 1 to IEEE 802.3 section 13 The 5-4-3 rule: A maximum of 5 segments may be connected to 4 repeaters, but devices may only be connected to 3 segments. This does not bring a network up to its limit. The 5-4-3 rule was introduced to simplify the complex computations necessary to calculate the maximum number of hubs/repeaters within a collision domain.
Notes:
Design of a Collision Domain: Model 2: Runtime Equivalent & Path Variability Value
5 8 7 6
4
3 1
2 0
10 Mbit/s
10 Mbit/s
8
7
6
5
4
3
2
1
0
Runtime delay
CB1e_2_Layer_1.831
45
To reach the limit of a collision domain, two calculations as per 802.3 section 13 are required. Propagation equivalent The delay of a signal due to a component in the data path is converted into a distance. The overall length of permissible cable, after deducting all the delays due to active components, results as 5120 meters. Hub delay: 150m - 300m NIC delay: 100m - 140m Path variability value Another delay occurs because a repeater extends the preamble of an incoming packet by a number of bits. This is the path variability value, and is given in bit times (BT). The maximum number of bit times in a collision domain is 49. As no value is usually obtainable for terminal devices, 40 BT should be assumed as the limit for the rest of the data path.
Notes:
Exercise: Maximum Network Size, Fast ETHERNET
100 m DTEDTE via TP 412 m DTEDTE via optical fiber
200 m over repeater class I via TP 260 m over class I repeater via TP+optical fiber 272 m over class I repeater via optical fiber 200 m over 1 class II repeater via TP 320 m over 1 class II repeater via optical fiber
205 m over 2 class II repeaters via TP 228 m over 2 class II repeaters via optical fiber
CB1e_2_Layer_1.831
46
Repeater classification for Fast Ethernet: Class I repeater Within a collision domain only one repeater of this class may be used. Class II repeater Within a collision domain two repeaters of this class, with short internal delays, may be used. Calculate the theoretical maximum network size of the collision domain at a transfer rate of 100 Mbit/s:
Notes:
Solution: 64 byte = 512 bit 10 ns/bit 2.56 s * 200,000 km/s = 512 m
Slottime = 2.56 s;
Acronyms
AUI BFOC BT CSMA/CD DSC DTE ELED EMC EN FDX FLP F/O FTP HCS HDX IEEE IETF IFG IP IPG ISO
Attachment Unit Interface Bayonet Fiber Optical Connector = ST Bit Time Carrier Sense Multiple Access Collision Detection Duplex Subscriber Connector Data Terminal Equipment Edge-emitting LED Electro-magnetic Compatibility European standard Full duplex Fast Link Pulse Fiber Optics File Transfer Protocol Hard polymer Cladded Silica F/O half-duplex Institute of Electrical and Electronics Engineers Internet Engineering Task Force Inter Frame Gap (also IPG) Internet Protocol, Industry Protection Inter Packet Gap International Organization for Standardization
LAN LD MAC MAU MDI MMF NIC NLP OSI PiMF PCS PVV RJ SAP SMF TP UPS WDS WLAN
Local Area Network Laser diode Media Access Control Medium Attachment Unit Medium Dependent Interface Multimode Fiber Network Interface Card Normal Link Pulse Open Systems Interconnection Pair in Metal Foil Polymer cladded silica; s. HCS Path Variability Value Registered Jack Service Access Points Singlemode Fiber Twisted Pair Uninterruptible Power Supply Wireless Distribution System Wireless LAN
CB1e_2_Layer_1.831
47
Notes:
Data Link Layer
CB1e_3_Layer_2.831
1
Content: MAC and LLC Layer Packet types: Ethernet II and IEEE 802.3 Address Types MAC Address Switches: Forwarding Database and Aging Timer Switching: Store and Forward / Cut-Through, Latency time Packet Filters Excursion into layer 3: IP address and netmask
Notes:
Hirschmann Automation and Control GmbH This presentation, and the material here in, have been prepared for the purposes of education and training. These slides are the sole property of Hirschmann and its subsidiaries, and are not to be altered, duplicated or distributed in any way without express written permission by Hirschmann.
MAC and LLC Layer7 Application
6
Presentation
5
Session
4
Transport
3
Network LLC 2b
2
Data Link MAC 2a
1
Physical
CB1e_3_Layer_2.831
2
The Data link layer is split into the two sub layers MAC and LLC: 2b: Logical Link Control (LLC) Link make and break, packet traffic control, packet sequencing, packet acknowledgement LLC offers link control independent of medium. 2a: Medium Access Control (MAC) Functions in send direction: Receive the data from the LLC layer Create an Ethernet frame Determine the inter-packet gap Media Access Control (CSMA/CD) Creating Frame Check Sequence Number Receive bit stream from layer 1 Check length Reject invalid frames Check the frame for bit errors Check the Frame Check Sequence Number Forward data to the upper layer (LLC)
Notes:
Functions in receive direction
Ethernet FrameEthernet-V2.0 FramePreamble SFD Destination Source address address Type field: Value > 1.536
Type
PDU
FCS
IFG
Preamble
IEEE-802.3 framePreamble SFD Destination Source address address
Length field: Value < 1.536
Length
LLC
PDU
FCS
IFG
Preamble
LLC field: Value = FF FF FFh
Length: 64 bytes - 1518 bytes7 bytes 1 byte 6 bytes 6 bytes 2 bytes min. 46 bytes / max. 1500 bytes 4 bytes
CB1e_3_Layer_2.831
3
Preamble: The preamble is a sequence of 7 bytes with a "10101010" bit sequence (1010101010) for synchronization of the recipient. SFD - Start of Frame Delimiter: The "Start of Frame Delimiter" with a "10101011" bit sequence marks the start of the Ethernet frame. Destination and source address: The physical address of the recipient/sender is shown here. Type: The type only occurs in Ethernet-V2.0 frames, and refers to the protocol (e.g. IP) to which the useful data of the frame belong. Length: This field indicates the length of the data field, and is only given in Ethernet frames to IEEE 802.3. PDU - Protocol Data Unit Here the data to be transported by Ethernet is shown (e.g. packet of Internet Protocol). FCS - Frame Checking Sequence The "Frame Checking Sequence" is a 4-byte checksum of the Ethernet frame. Only error detection is offered, but with a very low probability of error. The IEEE 802.3 packet is used rarely beside the functions RSTP, GMRP and GVRP. IFG -Interframe Gap Minimum gap between two frames - 96 Bit Times (12 bytes)
Notes:
Jumbo FramesDefinition: Packet with oversize usually ca. 9000 byte Standard: max. length untagged = 1,518 byte MTU size Most of available chip sets cannot process jumbo frames and can enter a dead-lock state. Small overhead Increase of jitter of other applications Bit errors generate higher load and larger interferences
CB1e_3_Layer_2.831
4
Standards care for compatibility of devices and ease planning and installation of a network. If a user later adds devices not capable of jumbos interferences can appear. The overhead part of the bandwidth is reduced from 2.3 to 0.4 %, thats an improvement of 1.9 %. For calculation jumbo frames of 9,180 byte, i.e. 6 regular packets, were assumed. A bit error (BER0) at ring ports then the ring ports of all switches must belong to the same VLAN and forward frames untagged (egress table).
work with
CB1e_4_L2-Redundancies.831
20
Notes:
Rail Operating voltage
Redundant operating voltage Sense contactThis alarm contact can be used to trigger an external device
CB1e_4_L2-Redundancies.831
21
Notes:
HIPER ring
-----
MRP0 1
Line structure
2 3 4 5 6 7 8 9
ring structureredundant link
FDX, Autonegotiation offCB1e_4_L2-Redundancies.831
22
Notes:
Lets start with four areas of a typical industrial Ethernet network.
0 Production line 3 Process control 1 2 3 4 5 6 7 8 9
Production line 2 Production line 1CB1e_4_L2-Redundancies.831
23
Notes:
Is this network secure enough ?
ATTENTION If only one of the three backbone connections fails, at least one area will be disconnected.0 1 2 3 4 5 6 7 8 9
Production line 3
Process control
Production line 2 Production line 1CB1e_4_L2-Redundancies.831
24
Notes:
Creating a redundant ring prevents loss of communication if one connection fails.
Production line 3
Process control
0 1 2 3 4 5 6 7 8 9
Production line 2 Production line 1CB1e_4_L2-Redundancies.831
25
Notes:
Permanent monitoring by watchdog packetsThe Ring Manager sends out watchdog packets (every 20ms) Production the to test the integrity ofline 3ring.Process control
0 1 2 3 4 5 6 7 8 Ring Manager 9
Production line 2 Production line 1CB1e_4_L2-Redundancies.831
26
Notes:
Permanent monitoring by watchdog packetsIn normal conditions, when no error has occured, no data packet is transmitted over the redundant connection. Production line 3 Only watchdog packets are forwarded.Process control 0 1 2 3 4 5 6 7 Ring Manager 8 9
Production line 2 Production line 1CB1e_4_L2-Redundancies.831
27
Notes:
Permanent monitoring by watchdog packetsIf the Ring Manager doesnt receive the watchdog packets, it immediately Production line 3 activates the redundant connection to establish the communication. If more than 10 packets are lost.
0 1 2 Process control 3 4 5 6 7 link activ in 30ms Ring Manager ACTIVE 8 9
Production line 2 Production line 1CB1e_4_L2-Redundancies.831
28
Notes:
Permanent monitoring by watchdog packetsThe Ring Manager send now also the information to all attached switches, Production should canceled that they line 3 their MAC-address list at once!
0 1 Process control 2 3 4 5 6 Ring Manager ACTIVE 7 8 9
Production line 2 Production line 1CB1e_4_L2-Redundancies.831
29
Notes:
Functionality of a switch
MAC Address-list Port 1 Port 2 Port 3 Port 4 Port 5 PC 1 RC 11 PLC 2 MC 20 PLC 1 RC 12 RC 13From PC 1
To PLC 2
P3 P1 P2From PC 1
PC 1
P5 P4
To PLC 2
PLC 2 PLC 1 MC 20 RC 11 RC 12 RC 13
CB1e_4_L2-Redundancies.831
30
Notes:
Hirschmann - HIPER-Ring structure0
Hirschmann HiPER-Ring Structure
1 2 3 4 5 6 7 8 9
Optimized interaction of all product families Ring Manager inside Fast learning in a ring is guaranteed by sending of clear address table messages Reconfiguration time typ. 200 ms/ 10 ms Reduction of machine downtimes cost saving Exchange of devices and network extension is possible during operation Simple and clear topology Up to 100 switches in a ring Plug & Work (without management)
CB1e_4_L2-Redundancies.831
31
Notes:
Redundant Ring CouplingObjectivesConnection of HIPER Ring networks with fast recovery Connection of a HIPER Ring to other networks with slower recovery
HIRSCHMANN
HIRSCHMANN
HIRSCHMANN
HIRSCHMANN
CB1e_4_L2-Redundancies.831
32
Notes:
Redundant Ring CouplingAdvantagesPredictable recovery timesAverage 250ms
Simple to implement Compensates for two faults in a HIPER Ring
DisadvantagesProprietary
CB1e_4_L2-Redundancies.831
33
Notes:
Subringsintegrated in MACH1000- and RSR - family
OverviewRM SRM
Basis-Ring
Sub-Ring
SRM
2 Sub-Ring Manager (SRM) per Sub-RingSRM observes only the associated Sub-Ring MRP supported in Sub-Ring
CB1e_4_L2-Redundancies.831
34
Notes:
Topology
RM
SRM1
Basis-RingSRM2
Sub-Ring 1SRM2
SRM1
Sub-Ring 2
CB1e_4_L2-Redundancies.831
35
Notes:
TopologySubRing SubRingRM
SRM
Basis-RingSubRing
Sub-Ring
SRM
SubRing
SubRing
CB1e_4_L2-Redundancies.831
36
Notes:
Topology
RM
SRM
Basis RingSRM SRM
Sub Ring
SRM
Sub Ring
CB1e_4_L2-Redundancies.831
37
Notes:
TopologyRM SRM SRM
Basis-RingSRM SRM
CB1e_4_L2-Redundancies.831
38
Notes:
TopologyRM
Basis-RingSRM SRM
CB1e_4_L2-Redundancies.831
39
Notes:
Restriction
Max. SRM instances:
4
Devices:05.0.00 RSR, MACH1000 05.1.00 MACH1000GE, MACH4002xgL3P 06.0.00 PowerMICE, MACH4002CB1e_4_L2-Redundancies.831
40
Notes:
Fast HIPER RingObjectiveCreation of resilient ring structure
CB1e_4_L2-Redundancies.831
41
Notes:
Fast HIPER RingAdvantagesPredictable recovery times10ms with 10 switches 40ms with 100 switches 60ms with 200 switches
Theoretical limit of 20,460 switches in a ring
DisadvantagesProprietary Only tolerates a single fault
CB1e_4_L2-Redundancies.831
42
Notes:
Exercise: Redundancies
Redundancies
Backup port IEEE 802.3ad Logical link
Physical link
Bridge ID
Designated port 802.1D RSTP Port states Trunking
Root path costs
Root port Forwarding DiscardingCB1e_4_L2-Redundancies.831
Alternate port
43
Assign the following terms to logically related groups.
Notes:
Solution: see annex of this presentation
Appendix
CB1e_4_L2-Redundancies.831
44
Notes:
Exercise: Spanning TreeSwitch 11 2
DP3
Switch 21
RP2 3
32768 00-80-63-04-05-014 5 6
32768 00-80-63-04-05-02
RPSwitch 51 2
DPSwitch 31
4
5
6
DP
3
2
3
00000 00-80-63-04-05-054 5 6 4
32768 00-80-63-04-05-03
Switch 41 2
RP DP3
RP
5
6
32768 00-80-63-04-05-044 CB1e_4_L2-Redundancies.831 5 6
100 Mbit/s 10 Mbit/s
45
First define the Root Bridge. The switch with the lowest Bridge ID becomes Root. For manual configuration the Bridge Priority can be changed. At switch 5 the priority was set to 0, thus its Bridge ID is the lowest and it becomes Root. Backup Root is switch 1. Determine the Root Ports (RP) and the Designated Ports (DP) and mark the redundant links. The port with the lowest overall path costs to the Root (Root Path Cost) becomes Root Port (RP). Switch 1: Port 4 = Root Port Switch 2: Port 2 = Root Port Switch 3: Port 4 = Root Port Switch 4: Port 2 = Root Port
Notes:
Exercise solution: RedundanciesRedundancies
RSTP 802.1D Port states Root port Designated port Alternate port Backup portCB1e_4_L2-Redundancies.831
Trunking IEEE 802.3ad Forwarding Discarding Physical link Logical link
Bridge ID Root path costs
46
Assign the following terms to logically related groups.
Notes:
Traffic Control at Layer 2
CB1e_5_L2-TrafficControl.831
1
Content: Restricting Broadcasts Flow Control Quality of Service (IEEE 802.1D and Q) Prioritization Virtual LANs (VLAN)
Notes:
Hirschmann Automation and Control GmbH This presentation, and the material here in, have been prepared for the purposes of education and training. These slides are the sole property of Hirschmann and its subsidiaries, and are not to be altered, duplicated or distributed in any way without express written permission by Hirschmann.
Restricting BroadcastsBroadcasts
Broadcasts
Broadcasts
CB1e_5_L2-TrafficControl.831
2
A switch operating on Physical and Data Link Layer only is transparent for higher-level protocols of the Network Layer (e.g. IP, IPX). Thus a broadcast generated by a Network Layer protocol is also sent as an Ethernet broadcast to all the stations in the LAN. To relieve the load on the LAN, there are a range of ways to restrict these broadcasts. The Broadcast Limiter enables the switch to send only a defined number of broadcasts per second at an output port. The remaining broadcasts are discarded. The local network can be subdivided into so-called virtual LANs (VLANs). By this technique a broadcast is no longer distributed across the entire LAN, but only in the virtual LAN in which the broadcast was generated. The use of routers enables a local network to be split into multiple local networks. Alongside routing, the function of a router is also to forward no broadcasts to another network. The router will generate a new broadcast in a connected network as required. At each router port there is a so-called broadcast domain.
Notes:
Flow ControlA90 %
to
D
130% to D
B80%
20% to Dto D
% 20
C
D
A
85 %
to
D
130% to D
B40%
5% to DD
5%
to
C
D
CB1e_5_L2-TrafficControl.831
3
If data is sent from multiple stations to one port, the port may be overloaded. As a consequence, data packets may be lost. The flow control mechanism in IEEE 802.3 (former .3x) prevents this by telling the next transmitting device (switch, hub, or the generating end device) in a line to wait for a certain time. In half-duplex mode this is activated by simulation of a collision. Caution: "Wandering backpressure" phenomenon which causes an undesirable affect to communications between nodes B and C.
Notes:
Ethernet Frame With Tag
Destination Source Address Address
ET PID
TCI
Type / Length
Data
FCS
CB1e_5_L2-TrafficControl.831
4
With the success of Ethernet in local networks, data volumes in those networks have also increased substantially. As a result, two functions have been added to Ethernet. Firstly, the data packets can be assigned a priority; and secondly, a local network can now be subdivided into separate virtual networks. To accommodate the relevant information in the Ethernet frame, the frame was extended by 4 bytes by inserting the tag field between the source address and the type or length field. This causes the Ethernet frame to grow to a maximum size of 1522 bytes. The first two bytes contain the Tag Protocol Identifier ETPID (81-00 hex). The recipient signals that the Ethernet frame has been extended by the tag field. The next two bytes are termed Tag Control Information (TCI). Priority (3 bit): 8 priority classes CFI (1 bit): Canonical Format Indicator CFI signals whether the addresses are transmitted in canonical (=1; e.g. Token ring) or non-canonical (=0; e.g. Ethernet) format. VLAN-ID (12 bit): marks definite the assigned VLAN; max. 4094 0 = no VLAN defined 4095 = reserved for future use
Notes:
Quality of Service (IEEE 802.1D and Q)Type of Traffic Background free Best-Effort Excellent-Effort Controlled-Load Video Voice Network control Acr BK BE EE CL VI VO NC user_prio 1 2 0 (default) 3 4 5 6 7
high
Attention:Priority 0 is higher than priority 1 and 2!CB1e_5_L2-TrafficControl.831
5
As a result of the tag field being added to the Ethernet frame, the frames can be assigned one of 8 priority levels. In this, high-priority data should be prioritized ahead of low-priority data. For this the switches must have at least two so-called queues. Depending on priority, the frames received at a port are distributed across different queues. By special access methods the queues are worked through according to the priorities. The names of the priorities are pre-defined by the standard. This gives a hint what should be how prioritized. Please note that the priority 0 is sorted in between 2 and 3. Thus a frame is already treated with a certain priority by default (0).
Notes:
QoS: Assigning Priority to QueueDefault configuration in practice:Avail. queues user_prio 1 2 0 (default) 3 4 5 6 7 2 4 8 0 1 2 3 4 5 6 7
0 0 1 2 1 3
high
CB1e_5_L2-TrafficControl.831
6
Queues are named as Traffic Classes by the standard. The smaller the ID of a queue the lower the priority of it. In practice either no. 2, 4 or 8 queues are available, while the standard offers the possibility to implement e.g. 5. Example: A packet with priority 3 joins queue 1 of 4 available queues
Notes:
QoS: Concepts to arbitrate QueuesPriority-Scheduling (Starve or Strict) Round-Robin-Scheduling Weighted-Fair-Queuing WFQMaintenance Voice Supervision
Control
Control Supervision Voice MaintenanceCB1e_5_L2-TrafficControl.831
Priority 6 5 3 1
7
Priority-Scheduling (Starve or Strict) Queues arbitrated according to priority Disadvantage: high-priority queues can block low-prioritized ones, no transmission guarantee possible Round-Robin-Scheduling Frequency of access (bandwidth) respective of priority, e.g.: Prio 7: 50 %, Prio 6: 20 %, Prio 5: 10 %, ... Weighted-Fair-Queuing WFQ bandwidth division with additional consideration of frame length
Notes:
ExerciseUsing an analyser, you capture a frame with the Tag value: 81:00:a0:36 (Hex-Code) What does this Tag mean? ______________________________ ______________________________ ______________________________
CB1e_5_L2-TrafficControl.831
8
Notes:
Solution: Prio 5, VLAN 54
Physical LAN
CB1e_5_L2-TrafficControl.831
9
Notes:
Virtual LANs
CB1e_5_L2-TrafficControl.831
10
Definition of a VLAN Connection of data terminal equipment to closed, logical LANs within a physical infrastructure with the aim of broadcasts limitation Nowadays VLANs are more used for security aims than for broadcast limitation. Nevertheless can be broadcast limitation a point of industry networks. To make it absolutly clear: VLANs offer only low security, also with proprietary solutions such as Ciscos private VLAN. If overlapping groups are used - what this is youll see later - then this might be an advantage for end devices, but not for centrally connected servers and other components, because these receive (have to) the broadcasts of all the groups. VLANs are defined in the standards IEEE 802.1D (Bridging), .1Q (port based) and .1v (Layer 3 protocol based).
Notes:
Multiple VLANs per SwitchHIRSCHMANN HIRSCHMANN
CB1e_5_L2-TrafficControl.831
11
Notes:
Management VLANHIRSCHMANN HIRSCHMANN
CB1e_5_L2-TrafficControl.831
12
Notes:
Different VLANsVLANs layer 1: port-based (IEEE 802.1Q) VLANs layer 3: protocol based (IEEE 802.1v)
CB1e_5_L2-TrafficControl.831
13
Today's switches usually offer port-based VLANs according to standard. L3 VLANs - even with a standard - are rarely used, because routing is more attractive after its now reasonably priced. L3 VLANs protocol based distinguish between the protocols, e.g. IP, IPX, ... and limit each to its VLAN L2 (MAC address based) and L4 VLANs - even interesting by their idea - are not demanded. Combined VLANs are not used anymore due to their complexity in programming and troubleshooting. Therefore you learn now about L1 VLANs. Information about the others youll find in the appendix.
Notes:
11
VLANs Layer 1 (Port Based)
CB1e_5_L2-TrafficControl.831
14
Advantages: very easy to configure protocol independent best performance low cost solution
Notes:
VLANs Layer 1 (Port Based)
CB1e_5_L2-TrafficControl.831
15
By tagging the next switch can assign the packets to the respective VLANs (ports). Without tagging one needs for every VLAN a specific connection between the switches.
Notes:
VLANs: Tagging1 2 3 4 5 6
A
B
C
D
VLAN2 Switch 1 Ingress Station A B C D Uplink Port 1 2 3 4 5 6 PVID 2 2 N/A 3 3 N/A
VLAN3 Switch 1 Egress VID Port 1 2 3 4 5 6 2 U U M 3 U U M
CB1e_5_L2-TrafficControl.831
16
Port based VLANs are standardized to IEEE 802.1Q. The configuration needed for this is restricted to the switches used. To divide a LAN into virtual LANs, two tables are needed: the Ingress and Egress tables. The Ingress table specifies what VLAN ID the frames arriving at a port are assigned. The Egress table specifies at which port frames can be sent with what VLAN ID (VID). The Egress table also specifies whether an Ethernet frame is to be sent with a tag field (M = tagged) or without (U = Untagged) at the port in question.
Notes:
VLANs: Tagging1 2 3 4 5 6 1 2 3 4 5
A
B
C
D
E
F
G
H
VLAN2
VLAN3
VLAN2
VLAN3
Switch 2 Ingress Station Port PVID Uplink 1 N/A E 2 2 F 3 2 G 4 3 H 5 3CB1e_5_L2-TrafficControl.831
Switch 2 Egress VID Port 1 2 3 4 5 2 M U U 3 M U U
17
Notes:
VLANs: Overlapping1 2 3 4 5 6
A
B VLAN4
C
D
VLAN2
VLAN3 Switch 1
Switch 1 Ingress Station A B Server C D Uplink Port 1 2 3 4 5 6 PVID 2 2 4 3 3 N/A
Egress VID Port 1 2 2 U U 3 4 U U
3 4 5 6 U U U U U U U
CB1e_5_L2-TrafficControl.831
18
Shall devices from two VLANs have access to a server, you get mathematically spoken - a cut set like its shown in the slide. The device of the cut set belongs not to two VLANs! The cut set itself is a separate VLAN. This process is explained in the annex B1.3 of IEEE 802.1Q Below the mechanism is explained: 1. A packet of station A is received at port 1 and thus is marked by tag according to the ingress rules with Port-VLAN-ID 2. 2. The packet - now belonging to VLAN 2 - is forwarded according to the egress rules. Of course an entry in the FDB is taken into account before the final transmission at a port.
Notes:
GARP VLAN Registration Protocol
Switch 1 1 2 3 4 5 6
Switch 2 1 2 3 1 2
Switch 3 3 4 5
A
B
C
D
E
F
G
H
VLAN2
VLAN3
VLAN2
VLAN3
CB1e_5_L2-TrafficControl.831
19
The GARP VLAN Registration Protocol, GVRP, is standardized in IEEE 802.1Q. GVRP transmits the VLAN information via the uplink port to automatically configure attached switches per multicast address 01:80:c2:00:00:21 The Generic Attribute Registration Protocol GARP is as general protocol standardized in IEEE 802.1D to propagate parameters between switches. Parameter (time values in centi-seconds): Join Time (default: 20 = 0,2 s) Leave Time (default: 60 = 0,6 s) LeaveAll Time (default: 1.000 = 10 s) Each parameter should be identical on all components of a network, to prevent oscillating effects. Situation: GVRP enabled at all switches 1. Switch 1 transmits at all ports a packet informing that it has connected ports in VLANs 2, and 3. 2. Switch 2 learns, configures port 1 to uplink and VLANs 2 and 3 in ingress/egress rules. 3. Switch 3 informs like switch 1 thus configuring port 3 of switch 2. A F (forbidden) in the Egress Table of a VLAN prevents that this VLAN is learned at that port, meaning that packets with this Tag are transmitted at the port.
Notes:
Exercise: VLANSwitch 1 3 4 5
1
2
6
VLAN 3 VLAN 2 Switch 2 3 4 5
1
2
6
VLAN 2CB1e_5_L2-TrafficControl.831
VLAN 4
20
Construct the Ingress and Egress tables for the two switches in the above example.
Notes:
Appendix
CB1e_5_L2-TrafficControl.831
21
Notes:
Solution VLAN ExerciseSwitch 1 3 4 5
1
2
6
VLAN 3 VLAN 2 Switch 2 3 4 5
1
2
6
VLAN 2CB1e_5_L2-TrafficControl.831
VLAN 4
22
Construct the Ingress and Egress tables for the two switches in the above example. Switch 1: Ingress Port 1 2 3 4 5 6 VLAN ID 2 2 2 arbitrary 3 3 Egress VLAN ID 1 2 3 4 1 U 2 U 3 U 4 M M M 5 U 6 U -
Notes:
Switch 2: Port 1 2 3 4 5 6 VLAN ID arbitrary" 2 2 1 4 4 VLAN ID 1 2 3 4 1 M M M 2 U 3 U 4 5 U 6 U
Example Tagging
Printscreen with NetXRay:8100 = ET-PID 2 = Prio 1 aab = VLAN 2731 2dez = 0010 001 = Prio 0 = Canonical Form.I.
CB1e_5_L2-TrafficControl.831
23
Notes:
Network Management
CB1e_6_NM.831
1
Content: Exercise: Network Management What can you do with Network Management? Managers and Agents SNMP Messages Traps Relieve Network and Management Station Capacity Network Management Classification to ISP MIB Events in the network OPC
Notes:
Hirschmann Automation and Control GmbH This presentation, and the material here in, have been prepared for the purposes of education and training. These slides are the sole property of Hirschmann and its subsidiaries, and are not to be altered, duplicated or distributed in any way without express written permission by Hirschmann.
Communication: Manager and AgentsNMSAGENT MANAGER
MIB
MIB MIB
MP SNMIB
AGENT
AGENT
Workstation
AGENTMIB
RouterAGENT
Hub
Switch
MIB Management Information Base NMS Network Management Station SNMP Simple Network Management ProtocolCB1e_6_NM.831
2
A network management system consists of 3 main components: Agent in network device collects data about status, performance and faults and provides this data to Network Management Station configures device Network Management Station NMS collects data from all agents using Polling receives alarm messages from agents central control and visualization of device states central configuration Simple Network Management Protocol SNMP for communication between Agents and NMS SNMPv1 does not use encryption and for example transmits the community (like password) in plain text SNMPv3 offers authentication. To access data of the agents the NMS needs to know their functionality, i.e. existing parameters and the way to address them. The parameters and their implementation are listed in the respective Management Information Base MIB. A NMS must know the MIBs of the agents. Usually an agent has several MIBs, some standardized, some private, which access a specific agent type of a manufacturer.
Notes:
6
SNMP Operations AgentGET REQUEST GET NEXT REQUEST SET REQUEST
GET RESPONSE GET RESPONSE SNMPv1 GET RESPONSE TRAP
GET Bulk REQUEST
RESPONSE Inform REQUEST Report3
RESPONSE ReportCB1e_6_NM.831
additionally at SNMPv2c
SNMP belongs to the TCP/IP protocol family and uses the connectionless protocol UDP. SNMP sends frames to the agents UDP port 161 and traps to the managers port 162. Information is regularly requested from the Agents by the Manager. This is done with Get Requests and is called Polling. If in the meantime a critical situation occurs the Agent can send an alarm message called Trap to the Manager. A GET REQUEST asks for a single parameter of an agent. With the GET NEXT REQUEST further information the next parameter value can be requested. A SET REQUEST of the manager changes a parameter value of the agent. The agent acknowledges it. Response is the answer of the agent to a request or a set command. (v1 till v3) In SNMPv1 this is called a Get Response. SNMPv2c provides an expanded command set: With the GET Bulk REQUEST multiple items of information can be requested in one packet. The Inform REQUEST is used to exchange information between two network management stations or as an acknowledged trap. The Report allows SNMP-compatible devices to communi-cate with each other. E.g. a station can transmit that during processing an incoming message an error occurred.
Notes:
Traps Relieve Network and Management Station Capacity
Load
Without traps: Time
Load
Traps
Special polling After trap
Regular polling
With traps: Time
Load
With gauges:Traps
TimeCB1e_6_NM.831
4
Without traps All defined attributes of each agent must be regularly and frequently polled. With traps: The agent signals events immediately by alarms. ( Reduces polling to a minimum) Traps are sent to the management stations UDP port 162. With gauges: The agent itself monitors custom-configured threshold values. (No polling data, only traps) Please note: SNMP uses the connection-less transport protocol UDP. There is no supervision of the connection. Because a trap is not acknowledged information can get lost by interferences.
Notes:
Network Management Classification to ISO
Configuration management Performance management Error management Security management
$
Accounting management
CB1e_6_NM.831
5
Some functions cannot be sorted into one of these classes, thus additional classes are generated in practise or they are assigned to one of the mentioned ones.
Notes:
Solution: Detect and optimize net structures, detect and find bottlenecks, avoid interference and failures, manage investments right, shorten trouble-shooting, reduce costs and thus save money!
CB1e_6_NM.831
Name the key points for which network management is important.
Exercise: Network Management
6
Notes:
MIB 2 branch1 iso 3 org 6 dod 1 internet 2 mgmt 1 system 2 interfaces 3 at 4 ip 5 icmp 10 transmission 7 Ethernet like ... 15 fddi 16 rmonCB1e_6_NM.831
1 mib II
1 statistics 2 history7
A lot functions are standardized and thus offered by public MIBs. The MIB 2 is the most important public MIB offering RMON for Remote MONitoring, i.e. troubleshooting by analyzing received packets. Manufacturer specific functions are defined in private MIBs. A MIB is noted in ASN.1 (Abstract Syntax Notation.One) and thus readable in plain text. Usually each MIB object offers also a detailed description. Each managed object has as address for access: the Object ID OID and the Object Description, a reversibly unambiguous name.
Notes:
RMON MIB RFC 1757Group1 statistics 2 history 3 alarm 4 host 5 host TopN 6 matrix 7 filter 8 packetcap 9 event
MeaningNetwork statistics counter time interval monitoring threshold monitoring Host supervising Top N of Host table traffic relations defined frames trigger event store defined frames triggering and logging of defined events
CB1e_6_NM.831
8
9 RMON groups exist For network components the groups 1-3 and 9 are important, the others are for analyzer Some devices support only RMON 1 or RMON 1 and 2. Thus they dont support alarms! Group 3 needs group 9 and vice-versa.
Notes:
RMON Statistics CountersetherStatsDropEvents etherStatsOctets: counted bytes etherStatsPkts: counted packets etherStatsBroadcastPkts: counted broadcasts etherStatsMulticastPkts: counted multicasts etherStatsCRCAlignErrors: counted CRC and alignment faults etherStatsUndersizePkts: packets smaller than 64 bytes etherStatsOversizePkts: packets larger than 1518 bytes etherStatsFragments: short frames with ALE/FCS error, etherStatsJabbers, etherStatsCollisions, etherStatsPkts64Octets, etherStatsPkts65to127Octets, etherStatsPkts128to255Octets, etherStatsPkts256to511Octets, etherStatsPkts512to1023Octets, etherStatsPkts1024to1518OctetsCB1e_6_NM.831
9
The name of managed objects must be unique. The consequence is a cryptic naming on first sight. DropEvents: number of events in which packets were dropped by the probe (agent or analyzer) due to lack of resources Attention: not number of packets dropped! Octets: all bytes received - of bad and good frames
Notes:
Question: How about counted unicasts? RMON statistics only include received values.
Answer: packets - BCs - MCs = UCs
Frame and Error on Layers 1 and 2
PA7 5.6
SFD1 0.8 0
DA6 4.8 4.8
SA6 4.8 9.6
T/L2 1.6 11.2
Data46 - 1500 36.8 - 1200
FCS4 3.2 48 1211.2 Oct. s
51.2 - s 1214.4
SP
SHEV
RNT 8 - 56 s SF < 64 oct. after SFD IFG < 4.7 s
FRG
LC
0.7 - 8 s 0.02 - 0.7 s - 24 bits PL
56 - 1220 s > 1,229 ms
FCS
PF
CB1e_6_NM.831
10
The time values given in the slide are based on 10 Mbit/s. At 100 Mbit/s the dot must be moved one digit to the left. If an event is registered counted as spike (SP), short event (SHEV), runt (RNT), fragment (FRG) or long carrier (LC) only depends on its length and that its not detected as a damaged frame. Between two packets there must be a gap Inter Frame Gap or Inter Packet Gap of 12 byte.
Notes:
LLDP Link Layer Discovery Protocol (IEEE 802.1AB)
CB1e_6_NM.831
11
LLDP is a protocol on LLC layer (2b). Information exchange among neighbors and NMS Chassis ID Port ID TTL Optional information elements Optional for end devices, switches, etc. Each device transmits every 30 s its info on all its LLDP enabled ports. A LLDP packet is labeled by its type field info 88:CC and multicast destination address 01:80:C2:00:00:0E.
Notes:
Exercise Network Management 2 (optional)Check the statistics of your computer with DOS command netstat-es. Configure the switch port your computer is connected to FDX. What will happen? Your computer: _____________________________________ Switch port: ________________________________________ Produce network load and afterwards check the event counters! What do you recognize? __________________________________________ __________________________________________
CB1e_6_NM.831
12
Notes:
Solutions: a) netstat s displays statistics of the TCP/IP-Stacks, but not the one of Ethernet. b) End device (autonegotiation) configures itself automatically to HDX and to the same speed like the switch port. At high network load at the FDX port CRC errors occur while at the HDX device Late Collisions will be detected.
SNMP and OPC
SNMP Management (HiVision) SNMP SNMP SNMP
SNMP
SNMP/OPC OPC OPC Gateway Server (HiControl)
Visualization System (SCADA) OPC Client OPC OPC
SNMP SNMP SNMP Agent Agent Agent (RS20) (MACH) (...)
OPC OPC Server Server (Actuator) (Sensor)
CB1e_6_NM.831
13
In the area of fieldbusses the communication between systems and control room with its SCADA system usually is done by OPC. Openness Productivity and Connectivity, former named OLE for Process Control, offers a simple possibility to embed parameters of devices into software. The difficulty doing this is that OPC is based on OLE (DCOM) and thus on the Microsoft world. Many controllers and SCADA systems, based on LINUX or UNIX therefore offer own solutions. OPC server