1. The document provides an overview of key concepts that will be covered in a training on hybrid microwave networks, including native Ethernet, Ethernet over PDH, Ethernet over SDH, SXU configuration, simple bridge, adaptive attenuation, frame admission, link aggregation, MAC address limiting, MAC whitelisting, port mirroring, RSTP, static unicast filtering, weighted fair queuing, and layer 1 and 2 connection wizards.
2. Configuration steps are outlined for configuring native Ethernet, Ethernet over PDH, Ethernet over SDH, SXU units, simple bridges, adaptive modulation, frame admission controls, link aggregation groups, MAC address limits, MAC whitelists, port mirroring, RST
What is the FTP? Why we use FTP? What is the Conflict problem? How to solve this conflict? TN:: Configuring an FTP
Server Planning Advice Configuring an FTP Server Using CLI. Configuring an FTP/SFTP Server Using MINI-LINK Craft.
I tried to make as detailed, clear, abundant example and visual presentation of VLANs as possible. You can contact the e-mail address in the slide to get information about the yours issue or correct my any mistakes.
What is the FTP? Why we use FTP? What is the Conflict problem? How to solve this conflict? TN:: Configuring an FTP
Server Planning Advice Configuring an FTP Server Using CLI. Configuring an FTP/SFTP Server Using MINI-LINK Craft.
I tried to make as detailed, clear, abundant example and visual presentation of VLANs as possible. You can contact the e-mail address in the slide to get information about the yours issue or correct my any mistakes.
VLAN, Trunk and 802.1q Router Configuration Objectiv.docxdickonsondorris
VLAN, Trunk and 802.1q Router Configuration
Objectives
Initial Configuration
VLAN Trunking Configuration
802.1q Router/Switch trunking
Topology
You can click the Show Lab Content button to download the lab or you can download the l ab from
[email protected] in Content.
VLAN, Trunk and 802.1q Router Configuration
Step 1: Initial Switch Configuration
Configure hostnames on the switches
Configure enable secret, console and vty (Telnet) passwords as uwstout
Configure VLANs 10, 20 and 30 on StoutSW1 and StoutSW2
Configure the ports the PCs are connected to in the proper vlans
Shutdown the fa0/4 interfaces on each switch
Configure an IEEE 802.1Q trunk between StoutSW1 and StoutSW2 using the fa0/1 interfaces
Configure the IP addresses and subnet masks on PC1a, PC1b and PC2 according to the topology
diagram
Verify your configuration before moving on to Step 2
If you need help remembering the commands for the initial configuration steps, try using ? or refer to the
previous labs.
Before moving to Step 2 verify your trunk and VLAN configuration, PC IP addresses and that the switchports
for the PCs are in the correct vlans. Use “show” commands and ipconfig to verify the initial configuration.
VLAN, Trunk and 802.1q Router Configuration
Step 2: Configure 802.1 trunk between Menomonie and StoutSW1
Data from one vlan cannot cross into another vlan without the help of a router to route the data. Currently
the PCs cannot successfully send to each other because they are on different VLANs. In this step you will
configure a trunk between the Menomonie router and the StoutSW1 switch. (This type of configuration is
referred to as “Router-on-a-Stick”) so the router can be used to route traffic between the VLANs. The
physical interface on the router that is connected to StoutSW1 is fastethernet0/1 so you will configure the
trunked sub-interfaces on the fastethernet0/1 interface. Then configure fastethernet0/8 on StoutSW1 to trunk.
Configure the Router:
Configure the hostname on the router to Menomonie:
In global configuration mode type, hostname Menomonie
Configure the first sub-interface on Menomonie to route vlan 10
In global configuration mode type, interface fastethernet0/1.10
In interface configuration mode for fa0/1.10 type, encapsulation dot1q 10
Configure the second sub-interface on Menomonie to route vlan 20
In global configuration mode type, interface fastethernet0/1.20
In interface configuration mode for fa0/1.20 type, encapsulation dot1q 20
Configure the third sub-interface on Menomonie to route vlan 30
In global configuration mode type, interface fastethernet0/1.30
In interface configuration mode for fa0/1.30 type, encapsulation dot1q 30
Now that the virtual trunked interfaces have been configured you can assign an IP address to the
interfaces. The addresses for each inter ...
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
3. Agenda
After Training you will be able to understand the following
concepts of Hybird Microwave
1. Native Ethernet
2. Ethernet over PDH
3. Ethernet over SDH
4. SXU CONFIGURATION
5. Simple Bridge
6. Adaptive Attenuation
7. Frame Addmission
8. Link aggregation group
8. Mac Addrss Limiting per port
10. Mac White List
11. Port Mirroring
12. RSTP
13. Static Unicast Filtering
14. Weighted Fair Queuing
15. Layer 1 & layer 2 connection Wizard
4. Native Ethernet
The Ethernet traffic is sent over a single hop or
through a network. Native Ethernet traffic is sent
over a dedicated physical link instead of being
transported over PDH or SDH. Native Ethernet
enables more efficient use of bandwidth and
maximizes Ethernet throughput since no PDH
overhead is added.
18. We can see the configuration of any Switch port, we can see here that Switch port no 1 is
assigned to LAN 1/7/3,we need to take care that LAN port should be configured as UNI
19. Switch port 2 is assigned to WAN port & It should be configured as NNI
20. No we need to configure the VLAN for layer 2 switching,
21. We have Default VLAN with VLAN ID 1,this should be always there and all ports should
be defined in Default VLAN,
22. After creating VLAN we can see that the LAN port is UP & Receiving & Transmitting the
Ethernet Frames
23. We can also see that the Radio link is carrying Ethernet traffic now
53. SXU3 B
SDH Cross Connect Unit
• ADM, Add Drop Multiplexer
- 21xE1 drop capabilities
• Ethernet over SDH
- Up to 4* STM-1=600 Mbit/s
• SDH Cross Connnect capabilities on VC12, VC3 and
VC4 level
• SNCP
54. SXU3 B
SDH Cross Connect Unit
• Half slot plug-in board
- Fits in AMM 2P B, AMM 6P C and D
• Interfaces
- 4xE1 interface on front
- Ethernet connection via NPU3 B
• Traffic via high speed bus in the backplane
-No unnecessary cabling
80. Hitless Adaptive Modulation is supported by MMU2 H and enables automatic
switching between different modulations, depending on radio channel
conditions. Hitless Adaptive Modulation makes it possible to increase the
available capacity over the same frequency channel during periods of normal
propagation conditions.
82. We can see that in good condition link capacity is 154 Mbps with 128 QAM
83. When radio conditions goes bad then link capacity reduces to 90 Mbps with 16 QAM to make sure that the
impotant date still running on the microwave link.
85. Frame admittance - It is possible to block or admit the following frame types at
the network edge:
Q-Tagged (priority bits/VID set in Q-tag)
Priority tagged (only priority bits set in Q-tag)
Untagged (no Q-tag)
Other/unrecognized frame types (for example S-tags) are discarded at the
network edge.
86. We can defined the type of frames we want to access ,default is Admit All
87. We have 2 options:-
1. Admit Only VLAN-tagged Frames
2. Admit Only Untagged And Priority-tagges frames
95. MAC address limiting per port. It is possible to limit the MAC address table per port
to prevent external devices/networks to flood the customer network with MAC
addresses.
It will allow operator to set the limit of the MAC address in Network as per the
requirment.
96. Click on Switch port & define Maximum Learned MAC address, In out example Switch port will
listen only 20 MAC address & drop all other data.
97. Default value is 0 which means it will learn all MAC addresses. Maximum Value is 0 to 16383
98. MAC WHITE
LIST
A source MAC address based white list can provide port access control at the
network edge
99. Right Click on Ethernet Switch → Conofigure → MAC white list
105. If we wish to delete MAC white list then we have to make sure it is not assiegned to any Switch port
else we will face Error messege
106. It gives the facility to measure the traffic on any port to be mirrored on another port for
quality measurement, Wire shark is best tool to get the output on local machine for
investigation
Port Mirroring
109. Now here we have mirroed port no 2 to port no 5, Port no 5 is connecte to external machine like
laptop not using Wire shark we can monitor all data going Via port no 2
110. RSTP activates a redundant link in case of link failure and protects the
network from infinite loops
Rapid
Spanning Tree
protocol
111. Right Click on Ethernet Switch → Configure → Spanning Tree
124. A potential problem with strict priority scheduling
is that queues with lower priorities may be
starved, that is, the frames in the queues are not
handled and eventually dropped. By using
Weighted Fair Queuing (WFQ) it is possible to
avoid starvation. When WFQ is used, queues
can be configured with a weight parameter,
which decides how large share of the available
output port bandwidth that is dedicated to the
specific queue,