background image

User Manual 

Publication date:September, 2007 

Revision A3 

29 

 

 

 How does a MAC work? 

The MAC sub-layer has two primary jobs to do: 

1. 

Receiving and transmitting data

. When receiving data, it parses frame to                      

detect error; when transmitting data, it performs frame assembly. 

2. 

Performing Media access control.

 It prepares the initiation jobs for a                     

frame transmission and makes recovery from transmission failure. 

 

Frame transmission 

As Ethernet adopted Carrier Sense Multiple Access with Collision Detect 

(CSMA/CD), it detects if there is any carrier signal from another network device 
running over the physical medium when a frame is ready for transmission. This is 
referred to as sensing carrier, also “Listen”. If there is signal on the medium, the 
MAC defers the traffic to avoid a transmission collision and waits for a random 
period of time, called backoff time, then sends the traffic again. 

After the frame is assembled, when transmitting the frame, the preamble 

(PRE) bytes are inserted and sent first, then the next, Start of frame Delimiter (SFD), 
DA, SA and through the data field and FCS field in turn. The followings summarize 
what a MAC does before transmitting a frame. 

 

 

1. 

MAC will assemble the frame. First, the preamble and Start-of-
Frame delimiter will be put in the fields of PRE and SFD, followed 
DA, SA, tag ID if tagged VLAN is applied, Ethertype or the value 
of the data length, and payload data field, and finally put the FCS 
data in order into the responded fields. 

2. 

Listen if there is any traffic running over the medium. If yes, wait. 

3. 

If the medium is quiet, and no longer senses any carrier, the 
MAC waits for a period of time, i.e. inter-frame gap time to have 
the MAC ready with enough time and then start transmitting the 
frame. 

4. 

During the transmission, MAC keeps monitoring the status of the 
medium. If no collision happens until the end of the frame, it 
transmits successfully. If there is a collision happened, the MAC 
will send the patterned jamming bit to guarantee the collision 
event propagated to all involved network devices, then wait for a 
random period of time, i.e. backoff time. When backoff time 
expires, the MAC goes back to the beginning state and attempts 
to transmit again. After a collision happens, MAC increases the 
transmission attempts. If the count of the transmission attempt 
reaches 16 times, the frame in MAC’s queue will be discarded. 

Summary of Contents for 16 PORT GIGABIT ETHERNET NETWORK SWITCH

Page 1: ...16 PORT GIGABIT ETHERNET NETWORK SWITCH User Manual ...

Page 2: ......

Page 3: ...16 Port GbE Web Smart Switch User s Manual Release 1 04 ...

Page 4: ... Management Agent of 16 Port GbE Web Smart Switch 14 2 1 4 IP Address Assignment 16 2 2 Typical Applications 21 3 Basic Concept and Management 23 3 1 What s the Ethernet 23 3 2 Media Access Control MAC 26 3 3 Flow Control 32 3 4 How does a switch work 35 3 5 Virtual LAN 39 3 6 Link Aggregation 45 4 Operation of Web based Management 47 4 1 Web Management Home Overview 48 4 2 Configuration 50 4 2 1 ...

Page 5: ...92 4 4 Maintenance 94 4 4 1 Warm Restart 95 4 4 2 Factory Default 96 4 4 3 Software Upgrade 97 4 4 4 Configuration File Transfer 98 4 4 5 Logout 99 5 Maintenance 100 5 1 Resolving No Link Condition 100 5 2 Q A 100 Appendix A Technical Specifications 101 Appendix B MIB Specifications 105 ...

Page 6: ...iv Revision History Release Date Revision 1 00 02 10 2007 A1 1 01 03 13 2007 A1 1 02 06 28 2007 A2 1 03 07 13 2007 A2 1 04 09 04 2007 A3 ...

Page 7: ...tatement This equipment has been tested and found to comply with the limits for a class A computing device pursuant to Subpart J of part 15 of FCC Rules which are designed to provide reasonable protection against such interference when operated in a commercial environment European Community CE Electromagnetic Compatibility Directive This equipment has been tested and found to comply with the prote...

Page 8: ......

Page 9: ...itch This guide also covers management options and detailed explanation about hardware and software functions Overview of this user s manual Chapter 1 Introduction describes the features of 16 Gigabit Web Smart Switch Chapter 2 Installation Chapter 3 Operating Concept and Management Chapter 4 Operation of Web based Management Chapter 5 Maintenance ...

Page 10: ...Multi Mode SFP Fiber transceiver 1000Mbps LC 10km SFP Fiber transceiver 1000Mbps LC 30km SFP Fiber transceiver 1000Mbps LC 50km SFP Fiber transceiver 1000Mbps BiDi SC 20km 1550nm SFP Fiber WDM transceiver 1000Mbps BiDi SC 20km 1310nm SFP Fiber WDM transceiver 10 100 1000Mbps TP is a standard Ethernet port that meets all IEEE 802 3 u x z Gigabit Fast Ethernet specifications 1000Mbps SFP Fiber trans...

Page 11: ...our network Hardware 12 10 100 1000Mbps Auto negotiation Gigabit Ethernet TP ports 4 10 100 1000Mbps TP or 1000Mbps SFP Fiber dual media auto sense 400KB on chip frame buffer Jumbo frame support Programmable classifier for QoS Layer 2 Layer 3 8K MAC address and support VLAN ID 1 4094 Per port shaping policing and Broadcast Storm Control IEEE802 1Q in Q nested VLAN support Full duplex flow control ...

Page 12: ...d Supports to send the trap event while monitored events happened Supports default configuration which can be restored to overwrite the current configuration which is working on via Web UI and Reset button of the switch Supports on line plug unplug SFP modules Supports Quality of Service QoS for real time applications based on the information taken from Layer 2 to Layer 3 Built in web based manage...

Page 13: ...ront panel of the switch LED display area locating on the left side of the panel contains a Power LED which indicates the power status and 16 ports working status of the switch Power Indication LED Gigabit Ethernet Port TP Port Status Indication LEDs RESET Button RESET button is used to restore the system default setting SFP Fiber Port Fiber Port Status Indication LEDs Fig 1 2 Front View of 16 Por...

Page 14: ...it Green when TP link on 1000Mbps speed Lit Amber when TP link on 100Mbps speed Off when 10Mbps or no link occur Blinks when any traffic is present 1000SX LX Gigabit Fiber Port 13 14 15 16 LED SFP LINK ACT Green Lit when SFP connection with remote device is good Blinks when any traffic is present Table1 1 1 4 2 User Interfaces on the Rear Panel Publication date Septembery 2007 Revision A3 6 AC Lin...

Page 15: ... Fiber transceiver SFP LC S10 1000Mbps LC SM 30km SFP Fiber transceiver SFP LC S30 1000Mbps LC SM 50km SFP Fiber transceiver SFP LC S50 1000Mbps LC SM 70km SFP Fiber transceiver SFP LC S70 1000Mbps LC SM 110km SFP Fiber transceiver SFP LC SB0 1000Mbps BiDi SC TX 1310nm SM 20km SFP Fiber WDM transceiver SFP BL3 S20 1000Mbps BiDi SC TX 1550nm SM 20km SFP Fiber WDM transceiver SFP BL5 S20 1000Mbps LC...

Page 16: ...nal SFP Fiber Transceivers to the 16 Port GbE Web Smart Switch Note If you have no modules please skip this section Fig 2 1 Installation of Optional SFP Fiber Transceiver Connecting the SFP Module to the Chassis The optional SFP modules are hot swappable so you can plug or unplug it before or after powering on 1 Verify that the SFP module is the right model and conforms to the chassis 2 Slide the ...

Page 17: ...e Now you can start having the switch in operation Power On The switch supports 100 240 VAC 50 60 Hz power supply The power supply will automatically convert the local AC power source to DC power It does not matter whether any connection plugged into the switch or not when power on even modules as well After the power is on all LED indicators will light up and then all off except the power LED sti...

Page 18: ... ZX From the viewpoint of connector type there mainly are LC and BIDI SC Gigabit Fiber with multi mode LC SFP module Gigabit Fiber with single mode LC SFP module Gigabit Fiber with BiDi SC 1310nm SFP module Gigabit Fiber with BiDi SC 1550nm SFP module The following table lists the types of fiber that we support and those else not listed here are available upon request Multi mode Fiber Cable and Mo...

Page 19: ...iber Cable 1 0 m Fiber Cable 10 10 m TP to fiber Converter 56 Bit Time unit 1ns 1sec 1000 Mega bit Bit Time unit 0 01μs 1sec 100 Mega bit Table 2 2 Sum up all elements bit time delay and the overall bit time delay of wires devices must be within Round Trip Delay bit times in a half duplex network segment collision domain For full duplex operation this will not be applied You may use the TP Fiber m...

Page 20: ...sing The switch supports both port based VLAN and tag based VLAN They are different in practical deployment especially in physical location The following diagram shows how it works and what the difference they are Case2a Port based VLAN See Fig 2 3 Fig 2 3 Port based VLAN Diagram 1 The same VLAN members could not be in different switches 2 Every VLAN members could not access VLAN members each othe...

Page 21: ...LAN1 and VLAN3 members but they could access VLAN4 members 3 VLAN3 members could not access VLAN1 VLAN2 and VLAN4 4 VLAN4 members could not access VLAN1 and VLAN3 members but they could access VLAN2 members Case3a The same VLAN members can be at different switches with the same VID See Fig 2 5 Fig 2 5 Attribute based VLAN Diagram Publication date September 2007 Revision A3 13 ...

Page 22: ...bE Web Smart Switch In the way of web user is allowed to startup the switch management function Users can use any one of them to monitor and configure the switch You can touch them through the following procedures Section 2 1 3 1 Configuring Management Agent of 16 Port GbE Web Smart Switch through Ethernet Port ...

Page 23: ...h through Ethernet Port Before start using the switch the IP address setting of the switch should be done then perform the following steps 1 Set up a physical path between the configured the switch and a PC by a qualified UTP Cat 5 cable with RJ 45 connector Note If PC directly connects to the switch you have to setup the same subnet mask between them But subnet mask may be different for the PC in...

Page 24: ...classes or categories Each class has its own network range between the network identifier and host identifier in the 32 bits address Each IP address comprises two parts network identifier address and host identifier address The former indicates the network where the addressed host resides and the latter indicates the individual host in the network which the address of host refers to And the host i...

Page 25: ...8 is reserved for loopback function Bit 0 1 7 8 31 0 Network address Host address Class B IP address range between 128 0 0 0 and 191 255 255 255 Each class B network has a 16 bit network prefix followed 16 bit host address There are 16 384 2 14 16 networks able to be defined with a maximum of 65534 2 16 2 hosts per network Bit 01 2 15 16 31 10 Publication date September 2007 Revision A3 17 Class C...

Page 26: ... mask 255 255 0 0 in default in which the first two bytes is with all 1s This means more than 60 thousands of nodes in flat IP address will be at the same network It s too large to manage practically Now if we divide it into smaller network by extending network prefix from 16 bits to say 24 bits that s using its third byte to subnet this class B network Now it has a subnet mask 255 255 255 0 in wh...

Page 27: ...2 25 128 126 24 256 254 23 512 510 22 1024 1022 21 2048 2046 20 4096 4094 19 8192 8190 18 16384 16382 17 32768 32766 16 65536 65534 Table 2 3 According to the scheme above a subnet mask 255 255 255 0 will partition a network with the class C It means there will have a maximum of 254 effective nodes existed in this sub netted network and is considered a physical network in an autonomous network So ...

Page 28: ...er Basically it is a routing policy For assigning an IP address to the switch you just have to check what the IP address of the network will be connected with the switch Use the same network address and append your host address to it Fig 2 9 First IP Address as shown in the Fig 2 9 enter 192 168 1 1 for instance For sure an IP address such as 192 168 1 x must be set on your PC Second Subnet Mask a...

Page 29: ... A The switch is suitable for the following applications Central Site Remote site application is used in carrier or ISP See Fig 2 10 Peer to peer application is used in two remote offices See Fig 2 11 Office network See Fig 2 12 Publication date September 2007 Revision A3 21 Central Site Fig 2 10 Network Connection between Remote Site and Central Site Fig 2 10 illustrates how the switches and the ...

Page 30: ...User Manual Fig 2 11 Peer to peer Network Connection Fig 2 12 Office Network Connection Publication date Septembery 2007 Revision A3 22 ...

Page 31: ...and provided 1000Mbps Now 10G s Ethernet is under approving Although these Ethernet have different speed they still use the same basic functions So they are compatible in software and can connect each other almost without limitation The transmission media may be the only problem Fig 3 1 IEEE 802 3 reference model vs OSI reference mode In Fig 3 1 we can see that Ethernet locates at the Data Link la...

Page 32: ... Data link layer is composed of both the sub layers of MAC and MAC client Here MAC client may be logical link control or bridge relay entity Logical link control supports the interface between the Ethernet MAC and upper layers in the protocol stack usually Network layer which is nothing to do with the nature of the LAN So it can operate over other different LAN technology such as Token Ring FDDI a...

Page 33: ... response The DSAP and SSAP pair with some reserved values indicates some well known services listed in the table below 0xAAAA SNAP 0xE0E0 Novell IPX 0xF0F0 NetBios 0xFEFE IOS network layer PDU 0xFFFF Novell IPX 802 3 RAW packet 0x4242 STP BPDU 0x0606 IP 0x9898 ARP Table 3 2 LLC type 1 connectionless service LLC type 2 connection oriented service and LLC type 3 acknowledge connectionless service a...

Page 34: ...and locally unique address Since this type of address is applied only to the Ethernet LAN media access control MAC they are referred to as MAC addresses The first three bytes are Organizational Unique Identifier OUI code assigned by IEEE The last three bytes are the serial number assigned by the vendor of the network device All these six bytes are stored in a non volatile memory in the device Thei...

Page 35: ...n all bit of DA is 1s it is a broadcast which means all network device except the sender itself can receive the frame and response Ethernet Frame Format There are two major forms of Ethernet frame type encapsulation and length encapsulation both of which are categorized as four frame formats 802 3 802 2 SNAP 802 3 802 2 Ethernet II and Netware 802 3 RAW We will introduce the basic Ethernet frame f...

Page 36: ... 3 RAW encapsulation Each of them has different fields following the Length field If the Length Type value is greater than 1500 it means the Length Type acts as Type Different type value means the frames with different protocols running over Ethernet being sent or received For example 0x0800 IP datagram 0x0806 ARP 0x0835 RARP 0x8137 IPX datagram 0x86DD IPv6 Data Less than or equal to 1500 bytes an...

Page 37: ...ield in turn The followings summarize what a MAC does before transmitting a frame 1 MAC will assemble the frame First the preamble and Start of Frame delimiter will be put in the fields of PRE and SFD followed DA SA tag ID if tagged VLAN is applied Ethertype or the value of the data length and payload data field and finally put the FCS data in order into the responded fields 2 Listen if there is a...

Page 38: ...ices This maximum time is traded off by the collision recovery time and the diameter of the LAN In the original 802 3 specification Ethernet operates in half duplex only Under this condition when in 10Mbps LAN it s 2500 meters in 100Mbps LAN it s approximately 200 meters and in 1000Mbps 200 meters According to the theory it should be 20 meters But it s not practical so the LAN diameter is kept by ...

Page 39: ...nd receiving frames are processed simultaneously This doubles the total bandwidth Full duplex is much easier than half duplex because it does not involve media contention collision retransmission schedule padding bits for short frame The rest functions follow the specification of IEEE802 3 For example it must meet the requirement of minimum inter frame gap between successive frames and frame forma...

Page 40: ...at that time the device will wait for a period of time known as an inter frame gap time to have the medium clear and stabilized as well as to have the jobs ready such as adjusting buffer counter updating counter and so on in the receiver site Once the inter frame gap time expires after the de assertion of carrier sense the MAC transmits data In IEEE802 3 specification this is 96 bit time or more C...

Page 41: ... a collision happened somewhere or an interface malfunctioned in the LAN When detecting the case the MAC drops the packet and goes back to the ready state 2 If the DA of the received frame exactly matches the physical address that the receiving MAC owns or the multicast address designated to recognize If not discards it and the MAC passes the frame to its client and goes back to the ready state 3 ...

Page 42: ...the location of the Length Type field of the normal non VLAN frame it will interpret the received frame as a tagged VLAN frame If this happens in a switch the MAC will forward it according to its priority and egress rule to all the ports that is associated with that VID If it happens in a network interface card MAC will deprive of the tag header and process it in the same way as a basic normal fra...

Page 43: ...es CSMA CD to arbitrate who can transmit data to the station s attached in the LAN When more than one station transmits data within the same slot time the signals will collide referred to as collision The arbitrator will arbitrate who should gain the media The arbitrator is a distributed mechanism in which all stations contend to gain the media Please refer to What s the Ethernet for more details ...

Page 44: ...en operating in full duplex mode the distance can reach farther than half duplex because it is not limited by the maximum propagation delay time 512 bits time If fiber media is applied the distance can be up to tens of kilometers Traffic Aggregation Traffic aggregation is to aggregate the bandwidth of more than one port and treat it as a single port in the LAN This single port possesses the featur...

Page 45: ...he packet broadcasted Due to the size of the MAC address limited MAC address aging function is applied When the MAC address has resided and keeps no update in the table for a long time this means the traffic using that entry has yet come for a while If this time period is more than the aging time the entry will be marked invalid The vacancy is now available for other new MAC Both learning and forw...

Page 46: ...implement and different chips may support different schedule algorithms Most common schedulers are FCFS First Come First Service Strictly Priority All High before Low Weighted Round Robin Set a weight figure to the packet with a priority level say 5 7 and next set another weight to the packet with a priority level say 2 4 and so on The WRR will transmit the packet with the weight So the packet of ...

Page 47: ...ich always lies on the edge of the LAN For a layer 2 VLAN it assumes it is a logical subset of a physical LAN separated by specific rules such as tag port MAC address and so on In other words they can communicate with each other between separated small physical LANs within a LAN but can not be between any two separated logical LANs Fig 3 7 In the figure above all stations are within the same broad...

Page 48: ...work easily according to the criteria needed for example financial accounting R D and whatever you think it necessary You can also easily move a user to a different location or join a new user somewhere in the building to VLAN Without VLAN it is very hard to do Basically VLAN can afford offering at least 3 benefits move and change users reduce broadcast traffic and increase performance Security Be...

Page 49: ...ing the source MAC address is four bytes long and contains VLAN protocol ID and tag control information composed of user priority Canonical Format Indicator CFI and optional VLAN identifier VID Normally the maximal length of a tagged frame is 1522 bytes 802 1Q VLAN tagged Ethernet frame 6 6 2 2 2 DA SA VLAN Protocol ID Tag Control Information Length Type Publication date September 2007 Revision A3...

Page 50: ... tag field The frame with VID assigned by a port is called PVID Each port can only be assigned a PVID The default value for PVID is 1 the same as VID Ingress filtering The process to check a received packet and compare its VID to the VLAN membership of the ingress port The ingress filtering can be set by per port When receiving a packet VLAN bridge examines if the VID in the frame s header present...

Page 51: ... transmitted with the priority accordingly If enabled an egress port will transmit out a tagged packet if the port is connected to a 802 1Q compliant device If an egress port is connected to a non 802 1Q device or an end station VLAN bridge must transmit out an untagged packet i e the tag has been stripped off in an egress port Egress rule can be set by per port Independent VLAN Learning IVL It sp...

Page 52: ...f ingress filtering is disabled VLAN bridge will only check the MAC address table to see if the destination VLAN exists If VLAN does not exist then drop the packet and if both DA and VLAN do not exist forwards the packet If just knows VLAN existed then floods the packet to all the ports the VLAN covers If we plan to deploy four VLANs in an office and use a switch to partition them we should check ...

Page 53: ... cost beyond your budget and the solution caused by the limitation of hardware performance may not be scalable If the item 2 is the case now you do not have to pay much more extra cost and can keep flexible according to the demand of bandwidth because all equipments are there already And what s more you can avoid worrying about the interoperability issue Applying LACP in your network you will not ...

Page 54: ...to station Here station may be a host or a router Link Aggregation called port trunking sometimes has two types of link configuration including static port trunk and dynamic port trunk Static Port Trunk When physical links are changed administrator needs to manually configure the switches one by one Dynamic Port Trunk When physical links are changed LACP takes over and automatically reconfigure Ad...

Page 55: ... in the table below IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 254 Password admin Table 4 1 When the configuration of your Web Smart Switch is finished you can browse it by the IP address you set up For instance type http 192 168 1 1 in the address row in a browser then the following screen see Fig 4 1 would show up and ask for your password input for login and acce...

Page 56: ...information of the switch including Switch Status TP Port Status Fiber Port Status Aggregation VLAN Mirror SNMP and Maximum Packet Length With this information you will know the software version MAC address ports available and so on It would be helpful while malfunction occurred For more details please refer to Section 4 4 1 Fig 4 2 Publication date Septembery 2007 Revision A3 48 ...

Page 57: ...ersa if ports are disconnected they will show just in black On the left side the main menu tree for web is listed in the page According to the function name in boldface all functions can be divided into three parts including Configuration Monitoring and Maintenance The functions of each folder are described in its corresponded section respectively As to the function names in normal type are the su...

Page 58: ...p Configuration Aggregation LACP RSTP 802 1X IGMP Snooping Mirror QoS Filter Rate Limit Storm Control and SNMP System Configuration Ports Configuration VLAN Mode Configuration VLAN Group Configuration Aggregation LACP RSTP 802 1X IGMP Snooping Mirror QoS Filter Rate Limit Storm Control SNMP Configuration Publication date Septembery 2007 Revision A3 50 ...

Page 59: ...IP address active subnet mask active gateway DHCP server and Lease time left Set device name DHCP enable fallback IP address fallback subnet mask fallback gateway management VLAN password and inactivity timeout Parameter description System Description The simple description of this switch Firmware Version The firmware version of this switch Hardware Version The hardware version of this switch MAC ...

Page 60: ...ress Users can configure the IP settings and fill in new values Then click Apply button to update Default 192 168 1 1 Fallback Subnet Mask Subnet mask is made for the purpose to get more network address because any IP device in a network must own its IP address composed of Network address and Host address otherwise can t communicate with other devices each other But unfortunately the network class...

Page 61: ...must be forwarded to a default router on a default path This means any packet with undefined IP address in the routing table will be sent to this device unconditionally Default 192 168 1 254 Management VLAN Show the management VLAN number Password Set a password for this switch Up to 16 characters are allowed in this parameter Any alphanumeric character is acceptable Default admin Inactivity Timeo...

Page 62: ...se Auto Speed 1000 Full and Disable If the media is TP the Speed Duplex is comprised of the combination of speed mode 10 100 1000Mbps and duplex mode full duplex and half duplex The following table summarized the function the media supports Media type NWay Speed Duplex 1000M TP ON OFF 10 100 1000M Full for all Half for 10 100 1000M Fiber ON OFF 1000M Full In Auto Speed mode no default value In For...

Page 63: ...User Manual Fig 4 4 Port Configuration Publication date September 2007 Revision A3 55 ...

Page 64: ...nect to For example for a port based VLAN named PVLAN 1 contains port members Port 1 2 3 4 If you are on the port 1 you can communicate with port 2 3 4 If you are on the port 5 then you cannot talk to them Each port based VLAN you built up must be assigned a group name This switch can support up to maximal 16 port based VLAN groups Tag based Tag based VLAN identifies its member by VID This is quit...

Page 65: ... it will just show the ID Member of the existed port based VLAN group If you are in tag based VLAN it will show the ID VID Member of the existed tag based VLAN group The switch can store the configuration of port based VLAN and tag based VLAN separately When you choose one of VLAN mode the switch will bring you the responded VLAN configuration which keeps the default data You can easily create and...

Page 66: ... tag based mode Member In modify function this is used to enable or disable if a port is a member of the new added VLAN Enable means it is a member of the VLAN Just tick the check box beside the port x to enable it Fig 4 7 Port Based VLAN Configuration Add Group Create a new port based VLAN or tag based VLAN which depends on the VLAN mode you choose in VLAN mode function Publication date September...

Page 67: ...g 4 8 Add or Remove VLAN Member Delete Group Just tick the check box beside the ID then press the Delete button to delete the group Fig 4 9 Port Based VLAN Configuration Publication date September 2007 Revision A3 59 ...

Page 68: ...gregation Trunking With this function user is allowed to add a new trunking group or modify the members of an existed trunking group Parameter description Normal Set up the ports that do not join any aggregation trunking group Group 1 8 Group the ports you choose together Up to 12 ports can be selected for each group Fig 4 10 Aggregation Trunking Configuration 4 2 6 LACP Smart Web Switch supports ...

Page 69: ...user is allowed to set the aggregation key value Parameter description Protocol Enabled Just tick the check box to enable LACP protocol then press the Apply button to apply Key Value It s key for an aggregation This must be an integer value between 1 and 255 or auto select by switch Fig 4 11 LACP Port Configuration Publication date September 2007 Revision A3 61 ...

Page 70: ...designated port The switch with the highest priority lowest numeric value becomes the STP root switch If all switches have the same priority the switch with the lowest MAC address will then become the root switch Select a vale from the drop down list box The lower the numeric value you assign the higher the priority for this system Default 32768 Hello Time This is the time interval in seconds betw...

Page 71: ...nable LACP protocol then press the Apply button to apply Edge Just tick the check box beside the port x to enable edge function Path Cost Path cost is the cost of transmitting a frame on to a LAN through that port It is assigned according to the speed of the bridge The slower the media the higher the cost user can select auto or set the rage from 1 to 200000000 Fig 4 12 RSTP Configuration Publicat...

Page 72: ...ort Access Entity by exchanging the authentication message when the Authenticator PAE request to it Authenticator An entity facilitates the authentication of the supplicant entity It controls the state of the port authorized or unauthorized according to the result of authentication message exchanged between it and a supplicant PAE The authenticator may request the supplicant to re authenticate its...

Page 73: ...uthentication server running RADIUS switch at the central location acts Authenticator connecting to PC A and A is a PC outside the controlled port running Supplicant PAE In this case PC A wants to access the services on device B and C first it must exchange the authentication message with the authenticator on the port it connected via EAPOL packet The authenticator transfers the supplicant s crede...

Page 74: ...quest the authentication server sends Radius Access Challenge to the supplicant for asking for inputting user password via the authenticator PAE 7 The supplicant will convert user password into the credential information perhaps in MD5 format and replies an EAP Response with this credential information as well as the specified authentication algorithm MD5 or OTP to Authentication server via the au...

Page 75: ...ort basic Enabled mode which can distinguish the device s MAC address and its VID The following table is the summary of the combination of the authentication status and the port status versus the status of port mode set in 802 1x Port mode port control state set in 802 1x port setting Here Entry Authorized means MAC entry is authorized Port Mode Port Control Authentication Port Status Disable Don ...

Page 76: ...e It is not allowed for putting a blank between any two characters Default None Admin State This is used to set the operation mode of authorization There are three type of operation mode supported Force Unauthorized Force Authorized Auto y Force Unauthorized The controlled port is forced to hold in the unauthorized state y Force Authorized The controlled port is forced to hold in the authorized st...

Page 77: ...802 1X Configuration Statistics Choose the port which you want to show of 802 1X statistics the screen include Authenticator counters backend Authenticator counters dot1x MIB counters and Other statistics Press the Refresh button will fresh the screen and see the newer counters Fig 4 17 802 1X Statistics Publication date September 2007 Revision A3 69 ...

Page 78: ...on Reauthentication Enabled Choose whether regular authentication will take place in this port Default disable Reauthentication Period 1 65535 s A non zero number seconds between the periodic re authentication of the supplicant Default 3600 EAP timeout 1 255 s A timeout condition in the exchange between the authenticator and the supplicant The valid range 1 255 Default 30 seconds Fig 4 18 802 1X P...

Page 79: ...ck box to enable this function Default disable Router Ports Just tick the check box beside the port x to enable router ports then press the Apply button to start up Default none Unregistered IGMP Flooding enabled Just tick the check box to enable this function Default enable VLAN ID At the IGMP Enable mode being selected it will list the VLAN ID number IGMP Snooping Enabled After IGMP Enabled func...

Page 80: ...User Manual Fig 4 19 IGMP Configuration Publication date Septembery 2007 Revision A3 72 ...

Page 81: ...t A and Port B are Source Ports and Port C is Mirror Port respectively thus the traffic passing through Port A and Port B will be copied to Port C for monitor purpose Parameter description Source Port Set up the port for being monitored Just tick the check box beside the port x and valid port is Port 1 16 Mirror Port Use the drop down menu to select a mirror port Fig 4 20 Mirror ports configuratio...

Page 82: ...ework Fig 4 21 QoS Configuration Function name QoS Configuration Function description While setting QoS function please select QoS Mode in drop down menu at first Then you can use 802 1p Priority and DSCP Priority functions In this function you can enable disable QoS Mode and set Priority Control such as 802 1p and DSCP The switch only supports Strict Priority High priority queue is always passed ...

Page 83: ... apply to all ports on the switch if one of the following values is selected All Low Priority All Normal Priority All Medium Priority or All High Priority Port Number When Custom is selected for Prioritize Traffic you may assign specific Port Number for 802 1p Configuration 802 1p Configuration Each Priority can select any of Queue In Default Priority 0 is mapping to Queue normal Priority 1 is map...

Page 84: ...ng to any of queue low normal medium high Parameter description Prioritize Traffic Five Prioritize Traffic values are provided Custom All Low Priority All Normal Priority All Medium Priority and All High Priority The QoS setting would apply to all ports on the switch if one of the following values is selected All Low Priority All Normal Priority All Medium Priority or All High Priority Port Number...

Page 85: ...types of mode in this drop down menu Default is disabled Disabled Allow all IP Address login to this switch and manage it Static Just allow the IP Address which set by administrator to login to this switch and manage it DHCP Allow the IP Address get from DHCP server can login to this switch and manage it IP Address Setting up the IP Address it can be one IP Address or a LAN IP Mask Setting up the ...

Page 86: ...User Manual Fig 4 24 Filter Configuration Publication date Septembery 2007 Revision A3 78 ...

Page 87: ...es are also generated if flow control is enabled The format of the packet limits to unicast broadcast and multicast Valid value of Port 1 16 ranges from 128 3968 kbps Default No Limit Egress Set up the limit of Egress bandwidth for the port you choose Outgoing traffic will be discarded if the rate exceeds the value you set up in Data Rate field Pause frames are also generated if flow control is en...

Page 88: ...ription ICMP Rate To enable the ICMP Storm capability User can use drop down menu to select number of frames Default is No Limit The setting range is 1k 1024k per second Learn Frames Rate To enable the Learn Frames Storm capability User can use drop down menu to select number of frames Default is No Limit The setting range is 1k 1024k per second Broadcast Rate To enable the Broadcast Storm capabil...

Page 89: ...ber of frames Default is No Limit The setting range is 1k 1024k per second Flooded unicast Rate To enable the Flooded unicast Storm capability User can use drop down menu to select number of frames Default is No Limit The setting range is 1k 1024k per second NOTE After completing the function s setting press Apply button to have this function taken effect ...

Page 90: ... settings community name trap host and public traps as well as the throttle of SNMP A SNMP manager must pass the authentication by identifying both community names then it can access the MIB information of the target device So both parties must have the same community name Once completing the setting click Apply button the setting takes effect Parameters description SNMP enable The term SNMP enabl...

Page 91: ...ault SNMP function Disable Default community name for Get public Default community name for Set private Default community name for Trap public Fig 4 27 SNMP Configuration Publication date September 2007 Revision A3 83 ...

Page 92: ... is good or bad In the Fig 4 25 the window can show all ports counter information at the same time If the counting is overflow the counter will be reset and restart counting Function name Statistics Overview Function description Display the summary counting of each port s traffic including Tx Bytes Tx Frames Rx Bytes Rx Frames Tx Errors and Rx Errors Parameters description Tx Bytes Total transmitt...

Page 93: ...number of each port s traffic In the Fig 4 26 the window can show all counter information each port at one time Parameter description Rx Packets The counting number of the packet received RX Octets Total received bytes Rx High Priority Packets Number of Rx packets classified as high priority Rx Low Priority Packets Number of Rx packets classified as low priority Rx Broadcast Show the counting numb...

Page 94: ...ber of the transmitted broadcast packet Tx Multicast Show the counting number of the transmitted multicast packet Tx Broad and Multicast Show the counting number of the transmitted broadcast with multicast packet Tx Error Packets Show the counting number of the received error packets Rx 64 Bytes Number of 64 byte frames in good and bad packets received Rx 65 127 Bytes Number of 65 126 byte frames ...

Page 95: ...h byte frames in good and bad packets transmitted Rx CRC Alignment Number of Alignment errors and CRC error packets received Rx Undersize Number of short frames 64 Bytes with valid CRC Rx Oversize Number of long frames according to max_length register with valid CRC Rx Fragments Number of short frames 64 bytes with invalid CRC Rx Jabber Number of long frames according tomax_length register with in...

Page 96: ...User Manual Fig 4 29 Detailed Statistics for each port Publication date Septembery 2007 Revision A3 88 ...

Page 97: ...formation and status for all ports in the same time Parameter description LACP Aggregation Overview Show the group port status Default will set to red sign for port link down user can check legend table below for all reference LACP Port Status Group Port Show the port number Normal as Legend Fig 4 30 LACP Status Publication date September 2007 Revision A3 89 ...

Page 98: ...w the current hello time of the root bridge Hello time is a time interval specified by root bridge used to request all other bridges periodically sending hello message every hello time seconds to the bridge attached to its designated port Max Age Show the root bridge s current max age time Fwd Delay Show the root bridge s forward delay time Topology Show the root bridge s spanning tree topology Ro...

Page 99: ... the query for each group to which it belongs It Calculate the number of times of IGMPV1 report V2 Reports When a host receives a group membership query it identifies the groups associated with the query and determines to which groups it belongs The host then sets a timer with a value less than the Max Response Time field in the query for each group to which it belongs It Calculate the number of t...

Page 100: ...s to ping Count Use drop down menu to set number of echo requests to send Four type of number can choose there are 1 5 10 and 20 Default 1 Time Out in secs Use drop down menu to set number of echo requests time out in second Four type numbers can choose there are 1 5 10 and 20 Default 1 NOTE All the functions should press Apply button to start up after you set up the parameters Ping Results Target...

Page 101: ...tus Received replies Show the received replies number of times Request timeouts Show the timeout of request Average Response times In ms Show the average response time in milliseconds Fig 4 33 Ping Publication date September 2007 Revision A3 93 ...

Page 102: ... Maintenance There are five functions contained in the maintenance function Warm Restart Factory Default Maintenance Software Upgrade Configuration File Transfer Logout Publication date Septembery 2007 Revision A3 94 ...

Page 103: ...ding software you have to reboot the device to have new configuration take effect The function being discussed here is software reset Function name Warm Restart Function description Reboot the switch Reboot takes the same effect as the RESET button on the front panel of the switch Press Yes button to confirm warm restart function and it will take around thirty 30 seconds to complete the system boo...

Page 104: ...g all settings will be restored to the factory default values when Factory Default function is performed If you want to restore all configurations including the IP address setting to the factory default please press the RESET button on the front panel Note for RESET button You must press the RESET button over 3 seconds to restore the factory default setting Fig 4 35 Publication date Septembery 200...

Page 105: ...grade Function name Software Upgrade Function description You can just click Browse button to retrieve the file you want in your system to upgrade your switch Fig 4 36 Software Upgrade Publication date September 2007 Revision A3 97 ...

Page 106: ...ion You can backup your switch s configuration file into your computer folder in case accident happens In addition uploading backup configuration file into a new or a crashed switch can save much time and avoid mistakes Fig 4 37 Configuration Upload Download Publication date Septembery 2007 Revision A3 98 ...

Page 107: ...he browser the switch will automatically have you logout Besides this manually logout and implicit logout you can set up the parameter of Auto Logout Timer in system configuration function to explicitly ON OFF this logout function Parameter description Auto Manual Logout If no action and no key is stroke as well in any function screen more than the minutes you set up in Auto Logout Timer the switc...

Page 108: ...work configuration on Computer C 2 The uplink connection function fails to work 9 The connection ports on another must be connection ports Please check if connection ports are used on that 16 Port GbE Web Smart Switch 9 Please check the uplink setup of the 16 Port GbE Web Smart Switch to verify the uplink function is enabled 3 The console interface cannot appear on the console port connection 9 16...

Page 109: ...Any ports can be in disable mode force mode or auto polling mode Supports Head of Line HOL blocking prevention Supports broadcast storm filtering Web based management provides the ability to completely manage the switch from any web browser Supports Port based VLAN and Tag based IEEE802 1Q VLAN Auto aging with programmable inter age time Supports 802 1p Class of Service with 2 level priority queui...

Page 110: ... SC transceiver Transmission Mode 10 100Mbps support full or half duplex 1000Mbps support full duplex only Transmission Speed 10 100 1000Mbps for TP 1000Mbps for Fiber Full Forwarding Filtering Packet Rate PPS packets per second Forwarding Rate Speed 1 488 000PPS 1000Mbps 148 800PPS 100Mbps 14 880PPS 10Mbps MAC Address and Self learning 8K MAC address Buffer Memory Embedded 400 KB frame buffer Flo...

Page 111: ...ED 10 100 1000M TP Port 1 to 16 LINK ACT 10 100 1000Mbps 1000M SFP Fiber Port 13 16 SFP LINK ACT Power Requirement AC Line Voltage 100 240 V Frequency 50 60 Hz Consumption 30W Ambient Temperature 0 to 50 C Humidity 5 to 90 Dimensions 44 H 442 W 170 3 D mm Comply with FCC Part 15 Class A CE Mark Approval ...

Page 112: ...le disable any port set VLAN group set Trunk Connection VLAN Function Port Base 802 1Q Tagged allowed up to 24 active VLANs in one switch Trunk Function Ports trunk connections allowed Bandwidth Control Supports by port Egress Ingress rate control Quality of Service QoS Referred as Class of Service CoS by the IEEE 802 1P standard Two queues per port Network Management Web browser support based on ...

Page 113: ...CT IDENTIFIER switch 7 GESM SW16LProduces OBJECT IDENTIFIER GESM SW16LProductId 1 GESM SW16LIllegalLogin TRAP TYPE ENTERPRISE GESM SW16LProductId DESCRIPTION Send this trap when the illegal user try to login the Web management UI 1 GESM SW16LRxErrorThreshold TRAP TYPE ENTERPRISE GESM SW16LProductId VARIABLES ifIndex DESCRIPTION Send this trap when the number of the Rx bad packet over the Rx Error ...

Page 114: ......

Page 115: ......

Reviews: