SlideShare a Scribd company logo
1 of 16
Download to read offline
PO_SP01_E1 L2 Protocols
Course Objective:
 Master VLAN/PVLAN theory
 Understand STP principle
 Master Trunking technology
Reference:
 DSLAM Technique Manual
Contents
Chapter 1.........................................................................1
Layer 2 technology..........................................................1
VLAN.............................................................................. 1
VLAN Protocol ........................................................................1
PVLAN...................................................................................7
QinQ VLAN ............................................................................7
VLAN Stacking .......................................................................8
MVLAN..................................................................................8
Spanning-Tree Protocol .................................................... 9
Operating principle of the transparent bridge .............................9
STP Overview ........................................................................9
Operating Principle of STP .....................................................10
Status of STP port ................................................................11
Trunking....................................................................... 12
Confidential and Proprietary Information of ZTE CORPORATION 1
C h a p t e r 1
Layer 2 technology
VLAN
The VLAN (Virtual LAN) is a group of equipments on one or more
LANs, which are configured such through the management
software that they can communicate as if attached on one line.
However, they actually are located on different LAN segments.
The VLAN is based on the logical connection, rather than
physical connection, which makes it very flexible.
VLAN Protocol
Before you learn the VLAN, let us look at two concepts: Collision
domain and broadcast domain. The collision domain is the
network area occupied by a packet (regardless of its type
(unicast or broadcast)) sent from a host. While, the broadcast
domain is the network area occupied by a broadcast packet sent
from a host.
The VLAN is a logical broadcast domain, which may cross
multiple physical LAN segments. A VLAN can be created by
function, project group or application, regardless of the physical
location of the subscribers. The ports of a switch can only belong
to a VLAN. The ports of a VLAN can share broadcast, while ports
of different VLANs cannot share broadcast. This can improve the
performance and security of the network.
On the switching network, the VLAN provides “segmentation”
and “flexibility”. The VLAN technology allows you to put
subscribers (coordination personnel in a department, or product
group) into a group by putting the corresponding ports in a
group, to share some network application programs.
A VLAN may be on a separate switch or on multiple switches
interconnected. A VLAN can include all the sites in a building or
the sites in multiple buildings, or even sites crossing the WAN.
PO_SP01_E1 L2 Protocols
2 Confidential and Proprietary Information of ZTE CORPORATION
Operation of VLAN
Firstly, the switch operates similarly to a traditional “bridge”.
Each VLAN can perform address “learning”, data “forwarding”
and “filtering”. The switch is more advanced in that it has the
VLAN function, which can confine data forwarding to the ports on
the VLAN same as the port where the data is from. Such
stipulation applies to all packets, whether unicast, multicast, or
broadcast.
Division of VLAN
A VLAN is logical sub-net or network segment, while the
members on the network segment are defined by the subscriber.
The members of a VLAN are usually based on ports. However,
you can also divide VLANs by MAC addresses.
The most common method to divide VLANs is by geographic
location, known as local VLAN.
An End-to-End VLAN is a method to divide VLANs in the whole
switching area. This method allows a VLAN to cross several
switches or buildings. Such method is usually related to a work
group (for example, a department and a project team).
The following methods are available to divide VLAN members:
Static VLAN: It is the method to put ports into a VLAN, whose
members are divided based on ports.
Dynamic VLAN: It is the method to put a group of MAC
addresses into a VLAN through the NMS software. When an
equipment enters the network, the VLAN it belongs to is
determined based on its MAC address. This method is often
referred to as “MAC based” division. See FIGURE 1.
FIGURE 1 TYP ES O F VLANS
Chapter 1 Layer 2 technology
Confidential and Proprietary Information of ZTE CORPORATION 3
Characteristics of VLAN
FIGURE 2 FL AT NE TWO RK
As shown in FIGURE 2, there is a network with no VLAN divided
(referred to as a flat network). This network has the following
problems:
 If the HUB is used, the structure is in a collision domain,
where every device on the network can see the data
transmitted on the network. (1) If the switch is used, the
structure is in a broadcast domain, where every device on
the network can transmit data to each other.
 Security problem: In the layer 2 environment, there is not a
convenient means for providing security. Every PC can
access any other devices.
 Management of multiple paths: The layer 2 switching cannot
provide a redundant path to a destination. Therefore, it
cannot provide load sharing function.
However, the introduction of the VLAN provides a solution to
large scale layer 2 network.
All the members on a VLAN is in a broadcast domain. When a
workstation sends a broadcast packet, all the members of
the VLAN can receive the broadcast packet. However, the
broadcast packet will be filtered by those ports and
equipment not on the same VLAN.
PO_SP01_E1 L2 Protocols
4 Confidential and Proprietary Information of ZTE CORPORATION
FIGURE 3 A VLAN IS A BR O AD C AS T DOM AI N
Because a VLAN is defined with a broadcast domain, as shown in
FIGURE 3, many layer 2 problems can be solved:
 Efficient bandwidth utilization. The VLAN provides a solution
to the limitation of a large scale flat network in expansion.
By dividing the whole network into several broadcast
domains, that is, sub-nets, the VLAN confines all data,
including broadcast and multicast, within a sub-net. However,
to implement inter-VLAN interconnection, layer 3 routing
should be used.
 Security. The security function of layer 3 routing can be used
to implement access control between VLANs.
 Load balancing. The VLAN also uses the load balancing
function of layer 3 routing to implement load balancing
between VLANs.
 Fault isolation. Any other important reason that the VLAN is
used is that it enables fault isolation. On a large flat network,
the fault of an equipment may result in the breakdown or
fault of the whole network. A good solution to this problem is
to divide a flat network into several network segments by
routers, so that when fault occurs on a network segment, the
fault will be isolated by the routers, with other network
segments unaffected.
Chapter 1 Layer 2 technology
Confidential and Proprietary Information of ZTE CORPORATION 5
Link types of switches
FIGURE 4 LIN K TYP E
Access link: An access link is one that only belongs to a VLAN,
for example, the link between a PC and a switch.
Tagged link: An tagged link is one that can carry multiple
VLANs, for example, the link between two switches. (Certainly,
not all inter-switch links are tagged links.) Please note, the
packets transmitted on a tagged link are different from those on
an access link. The packets on a tagged link comply with the
IEEE 802.1Q protocol.
FIGURE 5 SCH EM ATI C DI AGR AM FO R LI NK S
PO_SP01_E1 L2 Protocols
6 Confidential and Proprietary Information of ZTE CORPORATION
IEEE 802.1Q protocol
FIGURE 6 IEEE 802.1Q PR O TO CO L
When frames are transmitted on the network, there should be a
means to identify the VLAN to which a frame belongs, so that
the switch can send the frame only to the VLAN it belongs to,
rather than to all ports as usual. The means is to add VLAN tags.
To add VLAN tags to the data when the switch receives data
from workstations to indicate the source of the data, the 802.1Q
protocol should be enabled.
The IEEE 802.1Q protocol provides a standard method for
bearing the data of multiple VLANs over one cable. In an IEEE
802.1Q packet, four bytes are added after the old address of an
ordinary Ethernet frame, which are:
 TPID (Tag protocol identifier): This part is 2 bytes, constantly
0x8100. The value indicates that the frame carries tag
information of 802.1Q.
 TCI (Tag control information): Including subscriber priority,
CFI and VLAN ID.
The 3-bit subscriber priority is in a scale of 8, where 0 is the
lowest and 7 the highest.
The 1-bit standard format indication indicates whether the
MAC address in the MAC data domain is a standard format,
where CFI=0 indicates standard format, while CFI=1
indicates non-standard formats.
The 12-bit VLAN ID is the VLAN ID. There can be up to
4095(212
-1) VLANs, and 0 indicates that there is no VLAN ID.
Chapter 1 Layer 2 technology
Confidential and Proprietary Information of ZTE CORPORATION 7
PVLAN
In the MAC+VLAN forwarding mode, a VLAN constitutes a
broadcast domain. Broadcast packets belongs to a VLAN and
unknown unicast packets will be broadcasted to all ports of this
VLAN. In general, VLAN division relates to IP address allocation
mode. To make efficient use of IP addresses, a divided VLAN is
expected to of certain size. However, from the viewpoint of user
access data flow and data security, the number of users in a
broadcast domain shall be minimal, or even each user has an
independent broadcast domain to ensure full isolation of users.
To achieve the above two objectives, a VLAN must have two
roles: Network side interface, located in the same broadcast
domain as all subscribers; subscriber side interface, only located
in the same broadcast domain as the network side interface and
isolated from other ports.
Private VLAN (PVLAN) has two types of ports: One is normal
VLAN port and the other is PVLAN port. A normal port can
interwork with all ports in the same VLAN, but a PVLAN port
cannot interwork with other PVLAN ports.
PVLAN port refers to the port that cannot interwork in the PVLAN
but can interwork with normal ports. In actual application, it is
often served as a subscriber side port. A normal port refers to
the port that can interwork with all other ports in the PVLAN. In
actual application, a normal port is often served as a uplink port.
QinQ VLAN
The feature of QinQ VLAN is to implement the directly
transparent transmission of VLAN service to the opposite. The
principle of QinQ VLAN is that L2 equipment receives the packet
with VLAN tag from the lower level network and assigns VLAN ID
of the public network to the packet, then, forwards it to the
upper level network. The packet is forwarded through the core
network of MAN. When the packet reaches to the other side of
the core network, the VLAN tag of public network is pelt off and
the packet is resumed. Then, the resumed packet is forwarded
to the user-side device. The packet forwarded in the core
network has two 802.1q tags: the public network tag and the
private network tag. In this way, the private VLAN can
transparently forwarded to the opposite directly. The VLAN ID
resource of the public network is greatly saved.
PO_SP01_E1 L2 Protocols
8 Confidential and Proprietary Information of ZTE CORPORATION
VLAN Stacking
VLAN Stacking meets the user demands of VLAN expansion and
dedicated line batch service. The dedicated line batch service
indicates that multiple ISPs probably exits in a Layer 2 switching
MAN. Users utilize the outer-layer VLAN of VLAN Stacking to
identify the user’s ISP. The VLAN Stacking principle is described
below. The system assigns an inner-layer tag (Customer VLAN)
to the port which wan to implement Stacking service for
identifying the user. Then, it tags the outer-layer VLAN (SP
VLAN) to the port. On the network, the service is forwarded
upon the outer-layer VLAN, which is pelted off when the service
reaches to BAS device. At the BAS device, the system identifies
the user upon the inner-layer tag. VLAN Stacking functions to
locate the port.
MVLAN
MVLAN has two meanings. MVLAN corresponds to the “basic”
VLAN for multicast service. In addition, MVLAN is a logical entity
under the management of DSLAM multicast. MVLAN contains
three management parameters: management group set,
multicast source port set and multicast receiver port set. The
proper configuration of the three parameters is fundamental for
a MVLAN to perform correct multicast management.
Management group set: The management group set is an IP
address list of a multicast group MVLAN manages. If the
requested multicast address is not in the management group set,
the user can not obtain the relevant services the multicast
address provides. The management group set of different
MVLANs can not be overlapped.
Multicast source port: A multicast source port is a port used for
uplink multicast router or for multicast service cascade in a
MVLAN. Essentially, the multicast source port is a special port
performing the above functions in the “basic” VLAN. One MVLAN
can have multiple multicast source ports and one source port
can belong to multiple MVLANs.
Multicast receiver port: A multicast receiver port is such a port
which authorizes a user port with the qualification of asking for
multicast service. If the user port is not the receiver port of one
MVLAN, any broadcast request of its will be refused. In addition,
the receiver port can be used for cascade. Therefore, MVLAN
enables DSLAM to supports two services: forwarding broadcast
service directly to DSLAM and DSLAM dynamically requesting
broadcast service from the uplink broadcast device.
Chapter 1 Layer 2 technology
Confidential and Proprietary Information of ZTE CORPORATION 9
Spanning-Tree Protocol
Before learning the spanning tree protocol, let us first look at the
operating principle of the transparent bridge.
Operating principle of the
transparent bridge
As its name implies, a transparent bridge is one that is
transparent to the equipment on the network, with no settings
needed on the terminal workstation. In a bridge environment
with no redundant links, the transparent bridge can operate
normally. However, once there is any redundant link, the
transparent bridge will have problem.
 The bridge does not change the frames to be forwarded.
 A bridge learns the MAC address by “listening” to the source
address of the equipment. IF a source MAC address appears
at a port, the bridge will assume that it can find the source
MAC address through the port. Therefore, the bridge will
create a table, to indicate the relation between the MAC
address and the port. A bridge is always “listening” and
“learning”.
 For broadcast, the bridge forwards the packets to all ports.
(except the port that receives the broadcast packets. }
 For a unknown destination address (also called unknown
unicast), the bridge will also forward the packets to all the
ports. (except the port that receives the packets. )
STP Overview
The Spanning-Tree Protocol is a protocol used to eliminate loops
on the network.
It ensures that only the path of one route is connected to the
ADSL port on the network and other bridge equipment (including
switches, bridges and routers) with other networks, for
connecting different networks. If any unnecessary path or loop is
detected, the corresponding ports will be blocked (prohibit data
transmission) to shield the unnecessary paths. However, if one
or more paths are damaged on the network topology, it will
select a good port from the ports blocked according to the
setting for data transmission, to ensure smoothness of the
network.
PO_SP01_E1 L2 Protocols
10 Confidential and Proprietary Information of ZTE CORPORATION
Operating Principle of STP
To detect and eliminate loops, the STP defines a tree crossing all
switches. The STP forcedly sets a redundant link as standby or
closed. When a network segment on the tree is unreachable, the
STP will recalculate the topology of the tree, and enable the
standby paths to set up connections again.
All interconnected switches with STP enabled will exchange some
data information with other switches. Such data information is
called BPDU (bridge protocol data units).
Exchange of BPDU is used for:
 Election of the root switch
 Election of the DS (Designated Switch) for each segment
 Setting the ports of redundant paths to the standby status,
to eliminate loops.
BPDU is sent from all ports once every two seconds, to ensure
firm and stable network topology and free from loops.
The root is the reference point used by all switches on the
network to determine loops. When a switch boots, it takes itself
as the root, and sets the root ID as the bridge ID. To create a
spanning tree free from loops, the first step is electing the root.
The bridge ID is composed of two parts:
 2-byte priority. By default, this value of every switch is set to
a same value.
 6-byte MAC address. It is the MAC address of the switch.
These two parts combine to determine who is the root. The
smaller the number, the more probable the root. By exchanging
BPDU, it can determine who is the root. If all the switches have
the same priority, who’s the root depends on the MAC address.
The switch with the smallest MAC address will become the root.
After the root is elected, every switch will establish relation with
the root. The switch does this by listening to the BPDU from the
ports (all ports).
To select the port for forwarding data and the port to be closed,
a switch should view the following two parts in the BPDU:
 path cost
 port priority
The switch first views the path cost, to select the port with the
smallest cost. This value is calculated based on the rate of the
line and the number of the lines. The port with the smallest cost
Chapter 1 Layer 2 technology
Confidential and Proprietary Information of ZTE CORPORATION 11
will be set to the forwarding status, while all other ports will be
set to the blocking status.
If one or more ports have the same path cost, the switch will
evaluate the port priority. The port with the smallest port ID will
be set to the forwarding status, while all other ports will be set
to the blocking status.
Thus, by election of the root and determination of the forwarding
port, the STP determines a tree crossing all switches, forcedly
setting a redundant line to standby or closed status to eliminate
loops.
Status of STP port
The spanning tree changes the ports among different statuses.
They are:
 Blocking: The initial statuses of all the ports are “blocking”,
for preventing loops. If the spanning tree determines that
there is a better path, all these ports will be at “blocking”
status.
 Listening: The listening status is changed from the blocking
status. During this period, a port tries to learn whether any
better route is available to reach the root. At this status, the
port can hear data frames but cannot receive or transmit
data. In addition, the port is not allowed to put any
information heard to the address table of the switch. The
listening status is actually used to indicate that a port is
preparing to transmit data, but it still has to wait for a while,
to ensure that there is no loop. This while, or the “listening”
period, is called “forward delay”.
 Learning: The learning status is very similar to the listening
status, with the only difference that the port at the learning
status will add the address information learned into the
address table of the switch. However, it still cannot receive
or transmit data. The duration of this status is also called
“forward delay”.
 Forwarding: At the forwarding status, the port starts to
receive/transmit data. A port will not be set to forwarding
status, unless there is no redundant link, or the port itself is
on the best path.
 Disable: The port is not connected or is disabled by the
administrator.
Among all statuses, listening and learning are temporary.
Ultimately, they will be changed to blocking or forwarding
status.
PO_SP01_E1 L2 Protocols
12 Confidential and Proprietary Information of ZTE CORPORATION
Trunking
The trunking function is the Link Aggregation technology. It
makes one or more connections form a link aggregation set
through aggregation. For MAC Client at the upper layer, link
aggregation is a logical link, but the communication capacity of
this link increases a lot. The trunking technology is used to
connect two switches. If there is no fault, the bandwidth
between two switches may increase as the physical links in the
trunk increase, but the information flows are evenly distributed
to the physical links in the trunk. When a physical link fails, it
will automatically be disabled and transmission of information to
it will be stopped. In addition, the switch will no longer allocate
information flows to the port connected with this failed link. The
failure of one or more physical links in the trunk does not affect
the connectivity between two switches, but link bandwidth will
decrease as disabled links increase. Therefore, the trunking
technology can effectively improve network bandwidth and error
tolerance. The trunking technology complies with the 802.3ad
protocol.
When link aggregation is used, pay attention to the following:
 Before setting the port trunking, please remove the network
connection cables of the ports to be set. Otherwise, loops will
be generated.
 When disabling aggregation of a port in the aggregated ports,
please first remove the network connection cable, so that the
data transmission at this port can be automatically taken
over by another port, to avoid data loss.

More Related Content

Similar to 03 PO_SP2001_E01_0 L2 Technology_VLAN.pdf

Similar to 03 PO_SP2001_E01_0 L2 Technology_VLAN.pdf (20)

VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
Vlan Types
Vlan TypesVlan Types
Vlan Types
 
Openstack Neutron Insights
Openstack Neutron InsightsOpenstack Neutron Insights
Openstack Neutron Insights
 
Vlan final
Vlan finalVlan final
Vlan final
 
Virtual local area network
Virtual local area networkVirtual local area network
Virtual local area network
 
Inter vlan routing plus configuration
Inter vlan routing plus configurationInter vlan routing plus configuration
Inter vlan routing plus configuration
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
Chapter 8 .vlan.pdf
Chapter 8 .vlan.pdfChapter 8 .vlan.pdf
Chapter 8 .vlan.pdf
 
Switching
SwitchingSwitching
Switching
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdfW3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
W3-Presentation-VLANs-AMA COMPUTER COLLEGE.pdf
 
Vlan
VlanVlan
Vlan
 
3.1 Overview Of VLANs Definition
3.1 Overview Of VLANs Definition3.1 Overview Of VLANs Definition
3.1 Overview Of VLANs Definition
 
Ccna 9
Ccna  9Ccna  9
Ccna 9
 
Vlan
VlanVlan
Vlan
 
03 ft48923 en02gla0_general topics_
03 ft48923 en02gla0_general topics_03 ft48923 en02gla0_general topics_
03 ft48923 en02gla0_general topics_
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 
Presentation on ccna
Presentation on ccnaPresentation on ccna
Presentation on ccna
 

More from NguynTy5

02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdfNguynTy5
 
01 PO_BT1002_E01_0 GPON Principle.pdf
01 PO_BT1002_E01_0 GPON Principle.pdf01 PO_BT1002_E01_0 GPON Principle.pdf
01 PO_BT1002_E01_0 GPON Principle.pdfNguynTy5
 
3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isam3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isamNguynTy5
 
3 fl00276 wb ed01 p07 7302 isam r2.x
3 fl00276 wb ed01 p07 7302 isam r2.x3 fl00276 wb ed01 p07 7302 isam r2.x
3 fl00276 wb ed01 p07 7302 isam r2.xNguynTy5
 
3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.x3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.xNguynTy5
 
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinhCau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinhNguynTy5
 
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinhCau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinhNguynTy5
 
Cau truc bai bao nghien cuu
Cau truc bai bao nghien cuuCau truc bai bao nghien cuu
Cau truc bai bao nghien cuuNguynTy5
 
Viet thu tieng anh
Viet thu tieng anhViet thu tieng anh
Viet thu tieng anhNguynTy5
 
Vai tro chinh phu kinh te thi truong
Vai tro chinh phu   kinh te thi truongVai tro chinh phu   kinh te thi truong
Vai tro chinh phu kinh te thi truongNguynTy5
 
Baiso1 wang, lo, hui 2003 - the antecedents of service quality and product ...
Baiso1 wang, lo, hui   2003 - the antecedents of service quality and product ...Baiso1 wang, lo, hui   2003 - the antecedents of service quality and product ...
Baiso1 wang, lo, hui 2003 - the antecedents of service quality and product ...NguynTy5
 
Baiso2 the servicescape as an antecedent to service quality and behavioral in...
Baiso2 the servicescape as an antecedent to service quality and behavioral in...Baiso2 the servicescape as an antecedent to service quality and behavioral in...
Baiso2 the servicescape as an antecedent to service quality and behavioral in...NguynTy5
 

More from NguynTy5 (14)

02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
02 PO_BT1005_C01_0 TCPIP Basis (2).pdf
 
01 PO_BT1002_E01_0 GPON Principle.pdf
01 PO_BT1002_E01_0 GPON Principle.pdf01 PO_BT1002_E01_0 GPON Principle.pdf
01 PO_BT1002_E01_0 GPON Principle.pdf
 
3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isam3 fl00276 wb_ed01_p012_7302-isam
3 fl00276 wb_ed01_p012_7302-isam
 
3 fl00276 wb ed01 p07 7302 isam r2.x
3 fl00276 wb ed01 p07 7302 isam r2.x3 fl00276 wb ed01 p07 7302 isam r2.x
3 fl00276 wb ed01 p07 7302 isam r2.x
 
3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.x3 fl00276 wb ed01 p01 7302 isam r2.x
3 fl00276 wb ed01 p01 7302 isam r2.x
 
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinhCau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinh
 
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinhCau truc bai bao quoc te    mon chuoi cung ung xanh - tran ngoc hinh
Cau truc bai bao quoc te mon chuoi cung ung xanh - tran ngoc hinh
 
Cau truc bai bao nghien cuu
Cau truc bai bao nghien cuuCau truc bai bao nghien cuu
Cau truc bai bao nghien cuu
 
Viet thu tieng anh
Viet thu tieng anhViet thu tieng anh
Viet thu tieng anh
 
Vai tro chinh phu kinh te thi truong
Vai tro chinh phu   kinh te thi truongVai tro chinh phu   kinh te thi truong
Vai tro chinh phu kinh te thi truong
 
Baiso1 wang, lo, hui 2003 - the antecedents of service quality and product ...
Baiso1 wang, lo, hui   2003 - the antecedents of service quality and product ...Baiso1 wang, lo, hui   2003 - the antecedents of service quality and product ...
Baiso1 wang, lo, hui 2003 - the antecedents of service quality and product ...
 
Baiso2 the servicescape as an antecedent to service quality and behavioral in...
Baiso2 the servicescape as an antecedent to service quality and behavioral in...Baiso2 the servicescape as an antecedent to service quality and behavioral in...
Baiso2 the servicescape as an antecedent to service quality and behavioral in...
 
Ppnc5
Ppnc5Ppnc5
Ppnc5
 
Ppnc8
Ppnc8Ppnc8
Ppnc8
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

03 PO_SP2001_E01_0 L2 Technology_VLAN.pdf

  • 1. PO_SP01_E1 L2 Protocols Course Objective:  Master VLAN/PVLAN theory  Understand STP principle  Master Trunking technology Reference:  DSLAM Technique Manual
  • 2.
  • 3. Contents Chapter 1.........................................................................1 Layer 2 technology..........................................................1 VLAN.............................................................................. 1 VLAN Protocol ........................................................................1 PVLAN...................................................................................7 QinQ VLAN ............................................................................7 VLAN Stacking .......................................................................8 MVLAN..................................................................................8 Spanning-Tree Protocol .................................................... 9 Operating principle of the transparent bridge .............................9 STP Overview ........................................................................9 Operating Principle of STP .....................................................10 Status of STP port ................................................................11 Trunking....................................................................... 12
  • 4.
  • 5. Confidential and Proprietary Information of ZTE CORPORATION 1 C h a p t e r 1 Layer 2 technology VLAN The VLAN (Virtual LAN) is a group of equipments on one or more LANs, which are configured such through the management software that they can communicate as if attached on one line. However, they actually are located on different LAN segments. The VLAN is based on the logical connection, rather than physical connection, which makes it very flexible. VLAN Protocol Before you learn the VLAN, let us look at two concepts: Collision domain and broadcast domain. The collision domain is the network area occupied by a packet (regardless of its type (unicast or broadcast)) sent from a host. While, the broadcast domain is the network area occupied by a broadcast packet sent from a host. The VLAN is a logical broadcast domain, which may cross multiple physical LAN segments. A VLAN can be created by function, project group or application, regardless of the physical location of the subscribers. The ports of a switch can only belong to a VLAN. The ports of a VLAN can share broadcast, while ports of different VLANs cannot share broadcast. This can improve the performance and security of the network. On the switching network, the VLAN provides “segmentation” and “flexibility”. The VLAN technology allows you to put subscribers (coordination personnel in a department, or product group) into a group by putting the corresponding ports in a group, to share some network application programs. A VLAN may be on a separate switch or on multiple switches interconnected. A VLAN can include all the sites in a building or the sites in multiple buildings, or even sites crossing the WAN.
  • 6. PO_SP01_E1 L2 Protocols 2 Confidential and Proprietary Information of ZTE CORPORATION Operation of VLAN Firstly, the switch operates similarly to a traditional “bridge”. Each VLAN can perform address “learning”, data “forwarding” and “filtering”. The switch is more advanced in that it has the VLAN function, which can confine data forwarding to the ports on the VLAN same as the port where the data is from. Such stipulation applies to all packets, whether unicast, multicast, or broadcast. Division of VLAN A VLAN is logical sub-net or network segment, while the members on the network segment are defined by the subscriber. The members of a VLAN are usually based on ports. However, you can also divide VLANs by MAC addresses. The most common method to divide VLANs is by geographic location, known as local VLAN. An End-to-End VLAN is a method to divide VLANs in the whole switching area. This method allows a VLAN to cross several switches or buildings. Such method is usually related to a work group (for example, a department and a project team). The following methods are available to divide VLAN members: Static VLAN: It is the method to put ports into a VLAN, whose members are divided based on ports. Dynamic VLAN: It is the method to put a group of MAC addresses into a VLAN through the NMS software. When an equipment enters the network, the VLAN it belongs to is determined based on its MAC address. This method is often referred to as “MAC based” division. See FIGURE 1. FIGURE 1 TYP ES O F VLANS
  • 7. Chapter 1 Layer 2 technology Confidential and Proprietary Information of ZTE CORPORATION 3 Characteristics of VLAN FIGURE 2 FL AT NE TWO RK As shown in FIGURE 2, there is a network with no VLAN divided (referred to as a flat network). This network has the following problems:  If the HUB is used, the structure is in a collision domain, where every device on the network can see the data transmitted on the network. (1) If the switch is used, the structure is in a broadcast domain, where every device on the network can transmit data to each other.  Security problem: In the layer 2 environment, there is not a convenient means for providing security. Every PC can access any other devices.  Management of multiple paths: The layer 2 switching cannot provide a redundant path to a destination. Therefore, it cannot provide load sharing function. However, the introduction of the VLAN provides a solution to large scale layer 2 network. All the members on a VLAN is in a broadcast domain. When a workstation sends a broadcast packet, all the members of the VLAN can receive the broadcast packet. However, the broadcast packet will be filtered by those ports and equipment not on the same VLAN.
  • 8. PO_SP01_E1 L2 Protocols 4 Confidential and Proprietary Information of ZTE CORPORATION FIGURE 3 A VLAN IS A BR O AD C AS T DOM AI N Because a VLAN is defined with a broadcast domain, as shown in FIGURE 3, many layer 2 problems can be solved:  Efficient bandwidth utilization. The VLAN provides a solution to the limitation of a large scale flat network in expansion. By dividing the whole network into several broadcast domains, that is, sub-nets, the VLAN confines all data, including broadcast and multicast, within a sub-net. However, to implement inter-VLAN interconnection, layer 3 routing should be used.  Security. The security function of layer 3 routing can be used to implement access control between VLANs.  Load balancing. The VLAN also uses the load balancing function of layer 3 routing to implement load balancing between VLANs.  Fault isolation. Any other important reason that the VLAN is used is that it enables fault isolation. On a large flat network, the fault of an equipment may result in the breakdown or fault of the whole network. A good solution to this problem is to divide a flat network into several network segments by routers, so that when fault occurs on a network segment, the fault will be isolated by the routers, with other network segments unaffected.
  • 9. Chapter 1 Layer 2 technology Confidential and Proprietary Information of ZTE CORPORATION 5 Link types of switches FIGURE 4 LIN K TYP E Access link: An access link is one that only belongs to a VLAN, for example, the link between a PC and a switch. Tagged link: An tagged link is one that can carry multiple VLANs, for example, the link between two switches. (Certainly, not all inter-switch links are tagged links.) Please note, the packets transmitted on a tagged link are different from those on an access link. The packets on a tagged link comply with the IEEE 802.1Q protocol. FIGURE 5 SCH EM ATI C DI AGR AM FO R LI NK S
  • 10. PO_SP01_E1 L2 Protocols 6 Confidential and Proprietary Information of ZTE CORPORATION IEEE 802.1Q protocol FIGURE 6 IEEE 802.1Q PR O TO CO L When frames are transmitted on the network, there should be a means to identify the VLAN to which a frame belongs, so that the switch can send the frame only to the VLAN it belongs to, rather than to all ports as usual. The means is to add VLAN tags. To add VLAN tags to the data when the switch receives data from workstations to indicate the source of the data, the 802.1Q protocol should be enabled. The IEEE 802.1Q protocol provides a standard method for bearing the data of multiple VLANs over one cable. In an IEEE 802.1Q packet, four bytes are added after the old address of an ordinary Ethernet frame, which are:  TPID (Tag protocol identifier): This part is 2 bytes, constantly 0x8100. The value indicates that the frame carries tag information of 802.1Q.  TCI (Tag control information): Including subscriber priority, CFI and VLAN ID. The 3-bit subscriber priority is in a scale of 8, where 0 is the lowest and 7 the highest. The 1-bit standard format indication indicates whether the MAC address in the MAC data domain is a standard format, where CFI=0 indicates standard format, while CFI=1 indicates non-standard formats. The 12-bit VLAN ID is the VLAN ID. There can be up to 4095(212 -1) VLANs, and 0 indicates that there is no VLAN ID.
  • 11. Chapter 1 Layer 2 technology Confidential and Proprietary Information of ZTE CORPORATION 7 PVLAN In the MAC+VLAN forwarding mode, a VLAN constitutes a broadcast domain. Broadcast packets belongs to a VLAN and unknown unicast packets will be broadcasted to all ports of this VLAN. In general, VLAN division relates to IP address allocation mode. To make efficient use of IP addresses, a divided VLAN is expected to of certain size. However, from the viewpoint of user access data flow and data security, the number of users in a broadcast domain shall be minimal, or even each user has an independent broadcast domain to ensure full isolation of users. To achieve the above two objectives, a VLAN must have two roles: Network side interface, located in the same broadcast domain as all subscribers; subscriber side interface, only located in the same broadcast domain as the network side interface and isolated from other ports. Private VLAN (PVLAN) has two types of ports: One is normal VLAN port and the other is PVLAN port. A normal port can interwork with all ports in the same VLAN, but a PVLAN port cannot interwork with other PVLAN ports. PVLAN port refers to the port that cannot interwork in the PVLAN but can interwork with normal ports. In actual application, it is often served as a subscriber side port. A normal port refers to the port that can interwork with all other ports in the PVLAN. In actual application, a normal port is often served as a uplink port. QinQ VLAN The feature of QinQ VLAN is to implement the directly transparent transmission of VLAN service to the opposite. The principle of QinQ VLAN is that L2 equipment receives the packet with VLAN tag from the lower level network and assigns VLAN ID of the public network to the packet, then, forwards it to the upper level network. The packet is forwarded through the core network of MAN. When the packet reaches to the other side of the core network, the VLAN tag of public network is pelt off and the packet is resumed. Then, the resumed packet is forwarded to the user-side device. The packet forwarded in the core network has two 802.1q tags: the public network tag and the private network tag. In this way, the private VLAN can transparently forwarded to the opposite directly. The VLAN ID resource of the public network is greatly saved.
  • 12. PO_SP01_E1 L2 Protocols 8 Confidential and Proprietary Information of ZTE CORPORATION VLAN Stacking VLAN Stacking meets the user demands of VLAN expansion and dedicated line batch service. The dedicated line batch service indicates that multiple ISPs probably exits in a Layer 2 switching MAN. Users utilize the outer-layer VLAN of VLAN Stacking to identify the user’s ISP. The VLAN Stacking principle is described below. The system assigns an inner-layer tag (Customer VLAN) to the port which wan to implement Stacking service for identifying the user. Then, it tags the outer-layer VLAN (SP VLAN) to the port. On the network, the service is forwarded upon the outer-layer VLAN, which is pelted off when the service reaches to BAS device. At the BAS device, the system identifies the user upon the inner-layer tag. VLAN Stacking functions to locate the port. MVLAN MVLAN has two meanings. MVLAN corresponds to the “basic” VLAN for multicast service. In addition, MVLAN is a logical entity under the management of DSLAM multicast. MVLAN contains three management parameters: management group set, multicast source port set and multicast receiver port set. The proper configuration of the three parameters is fundamental for a MVLAN to perform correct multicast management. Management group set: The management group set is an IP address list of a multicast group MVLAN manages. If the requested multicast address is not in the management group set, the user can not obtain the relevant services the multicast address provides. The management group set of different MVLANs can not be overlapped. Multicast source port: A multicast source port is a port used for uplink multicast router or for multicast service cascade in a MVLAN. Essentially, the multicast source port is a special port performing the above functions in the “basic” VLAN. One MVLAN can have multiple multicast source ports and one source port can belong to multiple MVLANs. Multicast receiver port: A multicast receiver port is such a port which authorizes a user port with the qualification of asking for multicast service. If the user port is not the receiver port of one MVLAN, any broadcast request of its will be refused. In addition, the receiver port can be used for cascade. Therefore, MVLAN enables DSLAM to supports two services: forwarding broadcast service directly to DSLAM and DSLAM dynamically requesting broadcast service from the uplink broadcast device.
  • 13. Chapter 1 Layer 2 technology Confidential and Proprietary Information of ZTE CORPORATION 9 Spanning-Tree Protocol Before learning the spanning tree protocol, let us first look at the operating principle of the transparent bridge. Operating principle of the transparent bridge As its name implies, a transparent bridge is one that is transparent to the equipment on the network, with no settings needed on the terminal workstation. In a bridge environment with no redundant links, the transparent bridge can operate normally. However, once there is any redundant link, the transparent bridge will have problem.  The bridge does not change the frames to be forwarded.  A bridge learns the MAC address by “listening” to the source address of the equipment. IF a source MAC address appears at a port, the bridge will assume that it can find the source MAC address through the port. Therefore, the bridge will create a table, to indicate the relation between the MAC address and the port. A bridge is always “listening” and “learning”.  For broadcast, the bridge forwards the packets to all ports. (except the port that receives the broadcast packets. }  For a unknown destination address (also called unknown unicast), the bridge will also forward the packets to all the ports. (except the port that receives the packets. ) STP Overview The Spanning-Tree Protocol is a protocol used to eliminate loops on the network. It ensures that only the path of one route is connected to the ADSL port on the network and other bridge equipment (including switches, bridges and routers) with other networks, for connecting different networks. If any unnecessary path or loop is detected, the corresponding ports will be blocked (prohibit data transmission) to shield the unnecessary paths. However, if one or more paths are damaged on the network topology, it will select a good port from the ports blocked according to the setting for data transmission, to ensure smoothness of the network.
  • 14. PO_SP01_E1 L2 Protocols 10 Confidential and Proprietary Information of ZTE CORPORATION Operating Principle of STP To detect and eliminate loops, the STP defines a tree crossing all switches. The STP forcedly sets a redundant link as standby or closed. When a network segment on the tree is unreachable, the STP will recalculate the topology of the tree, and enable the standby paths to set up connections again. All interconnected switches with STP enabled will exchange some data information with other switches. Such data information is called BPDU (bridge protocol data units). Exchange of BPDU is used for:  Election of the root switch  Election of the DS (Designated Switch) for each segment  Setting the ports of redundant paths to the standby status, to eliminate loops. BPDU is sent from all ports once every two seconds, to ensure firm and stable network topology and free from loops. The root is the reference point used by all switches on the network to determine loops. When a switch boots, it takes itself as the root, and sets the root ID as the bridge ID. To create a spanning tree free from loops, the first step is electing the root. The bridge ID is composed of two parts:  2-byte priority. By default, this value of every switch is set to a same value.  6-byte MAC address. It is the MAC address of the switch. These two parts combine to determine who is the root. The smaller the number, the more probable the root. By exchanging BPDU, it can determine who is the root. If all the switches have the same priority, who’s the root depends on the MAC address. The switch with the smallest MAC address will become the root. After the root is elected, every switch will establish relation with the root. The switch does this by listening to the BPDU from the ports (all ports). To select the port for forwarding data and the port to be closed, a switch should view the following two parts in the BPDU:  path cost  port priority The switch first views the path cost, to select the port with the smallest cost. This value is calculated based on the rate of the line and the number of the lines. The port with the smallest cost
  • 15. Chapter 1 Layer 2 technology Confidential and Proprietary Information of ZTE CORPORATION 11 will be set to the forwarding status, while all other ports will be set to the blocking status. If one or more ports have the same path cost, the switch will evaluate the port priority. The port with the smallest port ID will be set to the forwarding status, while all other ports will be set to the blocking status. Thus, by election of the root and determination of the forwarding port, the STP determines a tree crossing all switches, forcedly setting a redundant line to standby or closed status to eliminate loops. Status of STP port The spanning tree changes the ports among different statuses. They are:  Blocking: The initial statuses of all the ports are “blocking”, for preventing loops. If the spanning tree determines that there is a better path, all these ports will be at “blocking” status.  Listening: The listening status is changed from the blocking status. During this period, a port tries to learn whether any better route is available to reach the root. At this status, the port can hear data frames but cannot receive or transmit data. In addition, the port is not allowed to put any information heard to the address table of the switch. The listening status is actually used to indicate that a port is preparing to transmit data, but it still has to wait for a while, to ensure that there is no loop. This while, or the “listening” period, is called “forward delay”.  Learning: The learning status is very similar to the listening status, with the only difference that the port at the learning status will add the address information learned into the address table of the switch. However, it still cannot receive or transmit data. The duration of this status is also called “forward delay”.  Forwarding: At the forwarding status, the port starts to receive/transmit data. A port will not be set to forwarding status, unless there is no redundant link, or the port itself is on the best path.  Disable: The port is not connected or is disabled by the administrator. Among all statuses, listening and learning are temporary. Ultimately, they will be changed to blocking or forwarding status.
  • 16. PO_SP01_E1 L2 Protocols 12 Confidential and Proprietary Information of ZTE CORPORATION Trunking The trunking function is the Link Aggregation technology. It makes one or more connections form a link aggregation set through aggregation. For MAC Client at the upper layer, link aggregation is a logical link, but the communication capacity of this link increases a lot. The trunking technology is used to connect two switches. If there is no fault, the bandwidth between two switches may increase as the physical links in the trunk increase, but the information flows are evenly distributed to the physical links in the trunk. When a physical link fails, it will automatically be disabled and transmission of information to it will be stopped. In addition, the switch will no longer allocate information flows to the port connected with this failed link. The failure of one or more physical links in the trunk does not affect the connectivity between two switches, but link bandwidth will decrease as disabled links increase. Therefore, the trunking technology can effectively improve network bandwidth and error tolerance. The trunking technology complies with the 802.3ad protocol. When link aggregation is used, pay attention to the following:  Before setting the port trunking, please remove the network connection cables of the ports to be set. Otherwise, loops will be generated.  When disabling aggregation of a port in the aggregated ports, please first remove the network connection cable, so that the data transmission at this port can be automatically taken over by another port, to avoid data loss.