Acromag EIS-408FX-M Скачать руководство пользователя страница 4

 

1-2 

Switches on the other hand, are intelligent devices used to more efficiently connect distributed 
Ethernet nodes than a hub. Unlike a simple hub, a switch provides 

targeted 

data transfer, as it 

will forward a data packet to a specific port or network segment, rather than to all ports, thus 
freeing up bandwidth. The ability to target a packet to a specific port increases network 
throughput and helps to eliminate the collisions that have historically made Ethernet 
non-deterministic. 

So we see that by targeting the data transfer between ports, switches act as intelligent repeaters 
to increase network distances. In doing this, they actually split networks into separate collision 
domains at each port. Thus, switches increase determinism by reducing collisions. Switches also 
increase network bandwidth and throughput, as well as provide supplemental error checking on 
data packets to help ensure the integrity of forwarded data. Each port of this switch functions just 
like any other Ethernet device. It is able to receive and decode Ethernet frames, test for frame 
integrity, plus assemble and transmit Ethernet frames.     

With Ethernet, any device can try to send a data frame out at any time. If two devices happen to 
send a data frame at the same time, then a collision may occur. The arbitration protocol for 
carrier transmission access of the Ethernet network is called Carrier Sense Multiple Access with 
Collision Detect (CSMA/CD). With CSMA/CD, each device will first sense whether the line is idle 
and available for use. If it is, the device will begin to transmit its first frame. If another device also 
tries to send a frame at the same time, then a collision occurs and both frames are discarded.   
Each device then waits a random amount of time and retries its transmission until it is 
successfully sent. 

Unlike other Ethernet devices, such as an Ethernet host adapter or Network Interface Card (NIC), 
the port of a switch does not require its own MAC address. During retransmission of a received 
packet, the switch port will instead look like the originating device by having assumed its source 
address. This is why the Ethernet collision domain is said to terminate at the switch port. That is, 
a two-port switch will effectively break a network into two distinct data links or segments.    An 
eight port switch like the Acromag EIS-408FX can break a network into 8 distinct data links or 
segments (also called 

collision domains

). Since all Ethernet nodes are able to recognize the 

occurrence of a collision, and since the detection of a collision is principal to the way Ethernet 
arbitrates media access, large domains containing many nodes can become quite cumbersome.   
Thus, using an Ethernet switch to subdivide a large network into separate collision domains will 
certainly help to increase throughput. 

The current tendency in critical industrial control applications is to connect one Ethernet device 
per switch port. This will produce the most deterministic mode of operation as the switch can 
then operate full-duplex, with no chance of collisions. This ensures determinism, helping critical 
control applications to remain predictable and on-time. 

Each port of a switch forwards data to another port based on the MAC address contained in the 
received data packet/frame. In order to know which port to forward a data packet to, the switch 
will learn and store the MAC addresses of every device it is connected to, along with the 
associated port number. However, until the switch actually learns the port a particular address 
resides at (the first packet), it forwards this traffic to all ports just like a hub. The switch will its 
internal look-up table to quickly determine the location (port) of a node, establish a temporary 
connection between itself and the node, then terminate the connection once a packet is 
transferred. In this way, it increases network bandwidth and provides the network determinism 
required for critical control applications

.   

This switch uses a 

store and forward

 algorithm to process Ethernet frames. That is, it first stores 

the Ethernet frame and examines it for errors before forwarding it to its destination. Although this 
method may seem to increase the forwarding time (latency) and possibly cause fragmentation, it 
effectively reduces the occurrence of error frames and improves overall throughput. This is 
particularly useful when there is heavy network traffic and or greater potential for noise and 
interference. 

Содержание EIS-408FX-M

Страница 1: ...0Base TX and 2x 100Base FX User s Manual ACROMAG INCORPORATED Tel 248 624 1541 30765 South Wixom Road Fax 248 624 9234 P O BOX 437 Wixom MI 48393 7037 U S A Copyright 2005 Acromag Inc Printed in the U...

Страница 2: ...il Mounting Installation 2 6 Wall Mounting Installation 2 7 Chapter 3 Web based Management 3 1 Introduction 3 1 Preparation for Web Management 3 1 System Login 3 1 Configuration via the Web based Mana...

Страница 3: ...is switch is smart enough to temporarily disable the second path holding it as a backup in case the primary path fails It also includes a normally closed alarm relay to signal a port failure if enable...

Страница 4: ...Ethernet collision domain is said to terminate at the switch port That is a two port switch will effectively break a network into two distinct data links or segments An eight port switch like the Acr...

Страница 5: ...ports IEEE 802 3 10Base T 802 3u 100Base TX 100Base FX Non blocking store and forward switching architecture 1Mbits embedded buffer memory with 2K entry MAC address table Web based reconfiguration wit...

Страница 6: ...Wall Mounting Installation Introduction Panel Layout Front View 1 LED indicators PWR RM PWR1 PWR2 FAULT 2 DIP switches to enable port alarms and designate redundant Ring Master 3 RJ 45 ports w integr...

Страница 7: ...F No power 1 is being supplied Green Power 2 is ON PWR 2 OFF No power 2 is being supplied Green Indicates this switch is designated as the redundant Ring Master R M OFF Indicates switch is NOT the Rin...

Страница 8: ...res of your DC supply into the V and V contacts of the terminal block connector The acceptable wire range is 12 to 24 AWG 2 Tighten the terminal screws to prevent the wires from coming loose 3 OPTIONA...

Страница 9: ...DI MDI X crossover and automatic 10 100Mbps data rate sensing for 10Base T or 100Base TX connections Automatic MDI MDI X crossover allows you to connect to other switches hubs or workstations without...

Страница 10: ...the data can be sent If the aging time is too short the MAC address table will constantly refresh resulting in excess consumption of switch computing resources For this reason a longer aging time is r...

Страница 11: ...is positioned at the top 2 For flat surface or wall mounting you can remove the DIN Rail clip in similar fashion Follow these steps to mount the switch to the DIN rail track 1 Insert the upper end sp...

Страница 12: ...witch 2 Use a screwdriver to attach the wall mounting plate to the rear panel of the switch using the six screws provided Tighten these screws to secure the switch to the wall mounting plate 3 Use the...

Страница 13: ...ble Java applets to use network ports Preparation for Web Management Before you attempt to use the embedded web interface to manage switch operation verify that the switch is properly installed on you...

Страница 14: ...configure Rapid Spanning Tree Protocol RSTP Redundant Ring This section is to enable and configure redundant ring settings QoS This section is to enable and configure QoS Quality of Service settings...

Страница 15: ...network device in order to let the flow control of that corresponding port of the switch to work Asymmetric indicates that you don t need to activate the flow control function of the remote network de...

Страница 16: ...tings Note Remember to click on the Save Configuration button to save your settings Otherwise the settings you made will be lost when the switch is powered off Switch Settings With the Switch Settings...

Страница 17: ...l monitored ports will be copied to the mirror ports You can choose a single port or any combination of ports but you can only monitor them in one mirror mode To disable this function set the monitor...

Страница 18: ...ember to select Save Configuration to save your settings Otherwise the settings you made will be lost when the switch is powered off Because the port based VLAN is defined on the switch itself and doe...

Страница 19: ...3 7 Basic 1 Click on Add button to add a new tag based VLAN...

Страница 20: ...to communicate with one another 5 Here you can specify the egress outgoing VLAN frames to be Tagged frames or Untagged frames Click on Apply to apply your settings Tag Indicates that egress outgoing f...

Страница 21: ...o transmit data to each other this is their tagged port The tagged VLAN settings for switch 1 are as follows settings for switch 2 are the same those for switch 1 1 You must specify which port s belon...

Страница 22: ...VLAN ID VID to which it belongs Tag uplink ports do not use port VLAN ID s 4 Always remember to select Save Configuration to preserve your settings Otherwise your settings will be lost when the switch...

Страница 23: ...Mask You can assign the subnet mask for the IP address here If the DHCP Client function is enabled you don t need to assign the subnet mask Gateway You can assign the gateway for the switch here The d...

Страница 24: ...ter SWT Swedish Winter 1 hour 1 pm EET Eastern European USSR Zone 1 2 hours 2 pm BT Baghdad USSR Zone 2 3 hours 3 pm ZP4 USSR Zone 3 4 hours 4 pm Local Time Zone Conversion from UTC Time at 12 00 UTC...

Страница 25: ...a network The spanning tree was created to combat the negative effects of message loops in switched networks A spanning tree uses a spanning tree algorithm STA to automatically sense that a switch has...

Страница 26: ...40 seconds here This value represents the time that a bridge will wait without receiving Spanning Tree Protocol configuration messages before attempting a reconfiguration If this switch is not the ro...

Страница 27: ...e the STP mathematic calculation False means that this port includes the STP mathematic calculation Once you finish your configuration click Apply to save your settings Note Always remember to select...

Страница 28: ...nt ring function by checking this option Note You must enable the redundant ring function before connecting any backup path to prevent the inadvertent generation of message loops Working Ports You can...

Страница 29: ...ked and connects to the backup redundant path the upper right corner path is the backup path The settings of Switch 1 The settings of Switch 2 The settings of Switch 3 The settings of Switch 4 Note Be...

Страница 30: ...that it has two message paths to another Switch 1 is configured to be the master switch and the backup path will be decided by this master switch For our example we specified the path on the right as...

Страница 31: ...iority to the lowest priority For example the system will process 8 packets with the highest priority in the queue then 4 with middle priority then 2 with low priority and 1 with the lowest priority a...

Страница 32: ...multitude of other computers that have identified themselves as being interested in receiving the originating computers data Multicasting is useful for such applications as updating the address books...

Страница 33: ...fferent multicast groups VID and member ports and IP multicast addresses that range from 224 0 0 0 to 239 255 255 255 Once you finish your configuration click on Apply to apply your settings Security...

Страница 34: ...s of your TFTP server here Backup File Name Specify the correct backup file name here Once you finish your configuration click on Apply to apply your settings TFTP Update Firmware In this section you...

Страница 35: ...r default state including the IP address please use the reset button on the front panel of your switch refer to the Reset Button section System Reboot System Reboot allows you to reset the switch soft...

Страница 36: ...t ingress incoming traffic and egress outgoing traffic rate controls For example let s assume port 1 is at 10Mbps you can set its effective transmit egress rate to be 1Mbps and receive ingress rate to...

Страница 37: ...hernet cables are categorized into unshielded twisted pair UTP and shielded twisted pair STP types Shielded cables are recommended In general category 3 4 and 5 Ethernet cables are suitable for system...

Страница 38: ...equipment or other wiring A high number of oversized packets can result from a bad transceiver excessive cable noise or from a speed mismatch between the switch ports and the connected devices LED Ind...

Страница 39: ...EIA TIA 568 100 ohm 100m maximum length 100BaseT X Twisted pair UTP STP Cat 5 cable EIA TIA 568 100 ohm 100 meters maximum length 100BaseFX Select multi mode or single mode cables per model Power Inpu...

Отзывы: