ADDER ADDERLink INFINITY 101T-DVI User Manual Download Page 27

26

INST

ALLA

TION

CONFIGURA

TION

OPERA

TION

FUR

THER

INFORMA

TION

INDEX

Spanning Tree Protocol (STP)

In order to build a robust network, it is necessary 

to include certain levels of redundancy within the 
interconnections between switches. This will help to 
ensure that a failure of one link does not lead to a 
complete failure of the whole network.

The danger of multiple links is that data packets, especially 
multicast packets, become involved in continual loops as 
neighbouring switches use the duplicated links to send and 

resend them to each other. 

To prevent such bridging loops from occurring, the 
Spanning Tree Protocol (STP), operating at 

layer 2

, is 

used within each switch. STP encourages all switches 

to communicate and learn about each other. It prevents 

bridging loops by blocking newly discovered links until it 

can discover the nature of the link: is it a new host or a 

new switch? 

The problem with this is that the discovery process can 

take up to 50 seconds before the block is lifted, causing 

problematic timeouts.
The answer to this issue is to enable the portfast variable 
for all host links on a switch. This will cause any new 

connection to go immediately into forwarding mode. 
However, take particular care not to enable portfast on 

any switch to switch connections as this will result in 

bridging loops.

Forwarding modes

In essence, the job of a layer 2 switch is to transfer as 
fast as possible, data packets arriving at one port out to 

another port as determined by the destination address. 

This is known as data forwarding and most switches offer 
a choice of methods to achieve this. Choosing the most 
appropriate forwarding method can often have a sizeable 
impact on the overall speed of switching:

• 

Store and forward

 is the original method and requires 

the switch to save each entire data packet to buffer 

memory, run an error check and then forward if no 

error is found (or otherwise discard it).

• 

Cut-through

 was developed to address the latency 

issues suffered by some store and forward switches. 

The switch begins interpreting each data packet as it 
arrives. Once the initial addressing information has been 
read, the switch immediately begins forwarding the 
data packet while the remainder is still arriving. Once 
all of the packet has been received, an error check is 
performed and, if necessary, the packet is tagged as 
being in error. This checking ‘on-the-fly’ means that 
cut-through switches cannot discard faulty packets 
themselves. However, on receipt of the marked packet, a 

host will carry out the discard process.     

• 

Fragment-free

 is a hybrid of the above two methods. 

It waits until the first 64 bits have been received before 
beginning to forward each data packet. This way the 

switch is more likely to locate and discard faulty packets 

that are fragmented due to collisions with other data 

packets.  

• 

Adaptive

 switches automatically choose between the 

above methods. Usually they start out as a cut-through 
switches and change to store and forward or fragment-
free methods if large number of errors or collisions are 

detected. 

So which one to choose? The 

Cut-through

 method has the 

least latency so is usually the best to use with ADDERLink 

INFINITY units. However, if the network components and/
or cabling generate a lot of errors, the 

Store and forward

 

method should probably be used. On higher end store and 
forward switches, latency is rarely an issue.

Layer 2 and Layer 3: The OSI model

When discussing network switches, the terms Layer 2 and 

Layer 3 are very often used. These refer to parts of the 

Open System Interconnection (OSI) model, a standardized 
way to categorize the necessary functions of any standard 

network. 

There are seven layers in the OSI model and these define 
the steps needed to get the data created by you (imagine 

that you are Layer 8) reliably down onto the transmission 

medium (the cable, optical fiber, radio wave, etc.) that 
carries the data to another user; to complete the picture, 
consider the transmission medium is Layer 0. In general, 

think of the functions carried out by the layers at the top 

as being complex, becoming less complex as you go lower 

down. 

As your data travel down from you towards the 

transmission medium (the cable), they are successively 
encapsulated at each layer within a new wrapper (along 
with a few instructions), ready for transport. Once 
transmission has been made to the intended destination, 

the reverse occurs: Each wrapper is stripped away and the 

instructions examined until finally only the original data are 

left.
So why are Layer 2 and Layer 3 of particular importance 

when discussing ADDERLink INFINITY? Because the 

successful transmission of data relies upon fast and reliable 

passage through network switches – and most of these 

operate at either Layer 2 or Layer 3.

The job of any network switch is to receive each incoming 
network packet, strip away only the first few wrappers to 

discover the intended destination then rewrap the packet 
and send it in the correct direction. 

continued

Summary of Contents for ADDERLink INFINITY 101T-DVI

Page 1: ...ADDERLink INFINITY 101T DVI User Guide Experts in Connectivity Solutions KVM Extension Solutions...

Page 2: ...t 7 ADDERLink INFINITY browser based configuration utility 8 Restoring a backup firmware image 9 Performing an upgrade 9 Operation Status indicators 10 Resetting 10 Further information Getting assista...

Page 3: ...eloped the ADDERLink INFINITY Management AIM server to allow comprehensive and secure central control of all transmitters receivers and users One to many configuration Using multicast techniques an un...

Page 4: ...wallet containing Four self adhesive rubber feet Quick start guide Safety document ALIF101T DVI unit OPTIONAL EXTRAS Country specific power cords CAB IEC AUS Australia CAB IEC EURO Europe CAB IEC UK...

Page 5: ...l power adapter is not present Red USB plug provides power only when the external power adapter is not present Ethernet port page 5 Optional external power input page 6 Reset button page 7 page 6 Cabl...

Page 6: ...rnet cable the length of cable should not exceed 100 metres 328 feet Network cables used for connections may be category 5 5e 6 or 7 twisted pair cable The ALIF101T unit has an auto sensing capability...

Page 7: ...B Power sourcing behavior Power taken from both USB plugs Power taken from power adapter only Power taken from power adapter only unless it becomes unavailable in which case power will be taken from b...

Page 8: ...sion 4 12 or above IMPORTANT When using AIM to configure ALIF units it is vital that all units that you wish to locate and control are set to their factory default settings Otherwise they will not be...

Page 9: ...u do use one 2 Connect the other end of the link cable directly to the network port of your computer To access the browser based configuration utility 1 Temporarily connect the ALIF101T unit and your...

Page 10: ...p 5 Click the Upgrade Now button A progress bar will be displayed however if your screen is connected to ALIF101T unit being upgraded then video may be interrupted and the status indicators on ALIF101...

Page 11: ...normal operation is affected You will need a thin implement such as a straightened out paper clip to press and hold the button Depending on when you release the button one of three functions will occu...

Page 12: ...es Appendix B Configuration pages Appendix C Dimensions Appendix D Tips for success when networking ALIF units Appendix E Troubleshooting Appendix F Glossary Appendix G Open source licenses Further in...

Page 13: ...4 60Hz vesa 1152 x 864 70Hz vesa 1152 x 864 75Hz cvt 1280 x 720 60Hz vesa 1280 x 720 60Hz vesa 1280 x 768 60Hz vesa reduced 1280 x 786 60Hz vesa 1280 x 786 75Hz vesa 1280 x 786 85Hz vesa 1280 x 800 60...

Page 14: ...ation pages This section covers the browser based configuration utility for the ALIF101T unit The pages are titled as follows System Configuration System Messages Video Configuration Statistics Analog...

Page 15: ...ides the most efficient way to deliver video and audio to multiple destinations Enable options These checkboxes allow you to determine which peripheral options will be used Video digital audio and USB...

Page 16: ...pixels between video frames The Magic Eye feature increases the frame rate and eliminates unnecessary network traffic by ignoring the color dithering where it occurs If the video source is not noisy o...

Page 17: ...Dummy Boot Keyboard When ticked ALIF101T unit will report a virtual dummy boot keyboard to the attached PC to ensure that a keyboard is always reported when the PC boots up The dummy boot keyboard use...

Page 18: ...via the network Provide the IP address of a suitable server here also ADDERLink INFINITY servers use the User Datagram Protocol UDP for all Syslog traffic Store system messages in unit When ticked th...

Page 19: ...rame rates Submit Click this button after ticking the above checkbox to plot the chosen statistics on a pop up graph Upgrade Use this page to upgrade the main or backup firmware image on ALIF101T unit...

Page 20: ...ion about the ALIF101T unit that may be requested by Adder Technical Support To get here 1 Connect your computer to the network port on the front panel 2 Run a web browser and enter the IP address of...

Page 21: ...20 INSTALLATION CONFIGURATION OPERATION FURTHER INFORMATION INDEX APPENDIX C Dimensions 1 97 50mm 4 x M3 holes 2 95 75mm 0 91 23mm 4 33 110mm 1 3 33mm 2 2 56mm 0 98 25mm 0 2 5mm...

Page 22: ...oughout a single subnet You also need a Layer 3 switch Ensure that it can operate efficiently as an IGMP Querier Creating an efficient network layout Network layout is vital The use of IGMP snooping a...

Page 23: ...1152 ensure that Jumbo Frames are enabled on all switches Choose an appropriate forwarding mode on all switches Use Cut through if available otherwise Store and forward Optimize the settings on the AL...

Page 24: ...are output by an ALIF unit but the network switches have not been configured to use jumbo frames the switches will attempt to break the large packets down into standard packets This process introduces...

Page 25: ...IF1000R 1002R and 2020R units cannot process Dual Link DVI as they are Single Link devices Ensure that the ALIF transmitter is set to supply a Single Link EDID to the graphics card When the video sour...

Page 26: ...l hosts report which multicast streams they wish to receive The Querier device and all snooping Layer 2 switches then update their lists accordingly the lists are also updated when Join Group and Leav...

Page 27: ...ans that cut through switches cannot discard faulty packets themselves However on receipt of the marked packet a host will carry out the discard process Fragment free is a hybrid of the above two meth...

Page 28: ...that is assigned to every networking device at manufacture Deciphering recipients at this level is more straightforward than at Layer 3 where the address of the recipient is represented by a logical I...

Page 29: ...d Copyright statement and distribution conditions Module openssl LICENSE ISSUES The OpenSSL toolkit stays under a dual license i e both the conditions of the OpenSSL License and the original SSLeay li...

Page 30: ...textual provided with the package Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of sour...

Page 31: ...s include the above copyright notice this list of conditions and the following disclaimer 2 binary distributions include the above copyright notice this list of conditions and the following disclaimer...

Page 32: ...in the Software without restriction including without limitation the rights to use copy modify merge publish distribute sublicense and or sell copies of the Software and to permit persons to whom the...

Page 33: ...for public use through a CC0 waiver All licenses certified by the Open Source Initiative at opensource org as of January 9 2013 and all Creative Commons licenses identified on the creativecommons org...

Page 34: ...RICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The Institute of Electrical and Electronic...

Page 35: ...ce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 The names of the authors may not be used...

Page 36: ...AS IS AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL DIRECT INDIRECT OR C...

Page 37: ...l cam ac uk MSF clock driver Trimble PARSE support 10 11 Nelson B Bolyard nelson bolyard me update and complete broadcast and crypto features in sntp 11 12 Jean Francois Boudreault Jean Francois Boudr...

Page 38: ...pple quack kfu com SunOS streams modules 48 52 Jack Sasportas jack innovativeinternet com Saved a Lot of space on the stuff in the html pic subdirectory 49 53 Ray Schnitzler schnitz unipress com Unixw...

Page 39: ...8 INSTALLATION CONFIGURATION OPERATION FURTHER INFORMATION INDEX www ctxd com Documentation by 2021 Adder Technology Limited All trademarks are acknowledged Part No MAN 000026 Release 1 0 www adder co...

Page 40: ...Indicators 10 Initial configuration 7 IP address 8 J Jumbo frames packets 25 L Layers 2 and 3 26 M Magic Eye 15 Management port 14 TX settings 14 N Network address 8 Network layout 21 Network link 5...

Reviews: