You are on page 1of 16

Release date Download more Info Contact person

August 2005 www.acterna.com Todd Rapposelli


Tel: +1 404 229 7348
E-mail: todd.rapposelli@acterna.com

Fundamentals of Ethernet
10 Megabit Ethernet to 10 Gigabit Ethernet

Ethernet History The first commercial release of In 1983, the IEEE approved the
The University of Hawaii’s ALOHA Ethernet was by DEC, Intel, and Xerox IEEE 802.3 standard, which included
network is considered to be the (DIX) in 1980 as Ethernet, Version 1. It IEEE 802.2 Logical Link Control (LLC).
ancestor of all shared media networks. was commonly referred to as Ethernet This made Novell Netware’s proprietary
In 1968, Norman Abramson pioneered DIX80. The second revision release, format incompatible with the latest
the precepts of Ethernet by developing Ethernet, Version 2, was released in technology. In order to resolve this
this packet radio networking system 1982. It was commonly referred to as incompatibility, Sub-Network Access
that ran at 4800 bps and 9600 bps. Ethernet DIX82. Ethernet, Version 2 is Protocol (SNAP) was created for the
A few years later in 1973, Robert the standard of Ethernet technology new IEEE 802.3 standard.
Metcalfe and David Boggs at Xerox that is in use today.
Corporation in Palo Alto, CA applied Once the overall packet specifications
the ALHOA network principles and In 1980, the IEEE formed Project 802 to were finalized, the transmission
created the world’s first Local Area provide a framework for the standardi- medium needed to be agreed upon. In
Network (LAN). Initially named ALTO zation of LAN technology. Novell the late 1980s, SynOptics Communica-
ALOHA, the name was later changed to released Novell Netware ’86 in 1983, tions developed a mechanism for
Ethernet. This first version of Ethernet which used a proprietary frame format transmitting 10 Mbps Ethernet signals
ran at speeds up to 2.94 Mbps. One of based on a preliminary specification of over twisted-pair cables.
the first customers of Ethernet was the the IEEE 802.3 standard. This is the
White House, where it was used for same Novell software that is used It was this combination of a low cost
word processing. Beyond this high- today to manage printers and servers. transmission medium with agreed
profile customer, though, this version packet technology specifications that
of Ethernet was not successfully com- led to the wide deployment of Ethernet.
mercialized. The Ethernet-over-twisted-pair specifi-
cation (10 BASE-T) was approved by the
IEEE in 1990 as the IEEE 802.3i
standard. It quickly became the
preferred Ethernet media type.
Section 1: – Data Link Layer: Layer 2 There are two types of transport
OSI Model Overview The data link layer represents the protocols – a connection-oriented
The International Standards beginning of the data and offers the transport protocol (TCP) and a con-
Organization (ISO) designed the Open basic data framing. This layer can be nectionless transport protocol
System Interconnect (OSI) model for provided by the carrier (frame relay, (UDP). Connection-oriented applica-
data communications. This model, in for example), or it can be provided by tions require all packets to get from
some form, is followed by ALL data the customer in a point-to-point the source to the destination. An
communications. Any time two or leased line environment (HDLC or example of this transport protocol is
more computers transmit information, PPP, for example). e-mail. If all of the packets making
they follow the OSI model. – Network Layer: Layer 3 up the e-mail don’t get transmitted,
The network layer represents the the e-mail is unreadable. Connec-
The OSI model (Table 1) is a series of beginning of customer traffic. This is tionless applications are those that
basic building blocks. Each block has the layer where computers speak to do not require all packets to get from
its own function and role in getting each other and data is addressed for the source to the destination. An
data from one point to another. end-to-end communications. The example of this transport protocol is
addressing type for this layer is often streaming audio. If a packet or two is
a router or a computer. Examples of missed, the computer will skip a few
network layer protocols include IP bars of music and keep playing.
Layer 7 Application Layer and IPX. – Session, Presentation, and Applica-
– Transport Layer: Layer 4 tion Layers: Layers 5, 6, and 7
Layer 6 Presentation Layer
At this layer, the lower layers and the In most data communication
Layer 5 Session Layer application meet. The transport networks today, these layers merge
layer identifies the application that together into the application layer.
Layer 4 Transport Layer rides within the data packet and Aspects of Lotus Notes, POP3 mail,
makes sure that all of the packets get SMTP mail, and Web surfing all have
Layer 3 Network Layer
from the source to the destination. layers 5, 6, and 7 built into them. For
Layer 2 Data Link Layer This layer also specifies the connec- purposes of this document, these
tion type, or transfer protocol, of the layers will be combined into layer 7
Layer 1 Physical Layer
application. and will be referred to as the appli-
Table 1: OSI model cation layer.

– Physical Layer: Layer 1


The physical layer represents the
“pipe”. This is normally what major
service providers offer to their
customers. There are two parts to
the physical layer – the physical
media and the bandwidth. The
physical media can be twisted pair
copper, coax, or fiber. The
bandwidth is a combination of
signal characteristics and rates
(T1 B8ZS, for example).

2
OSI Model Analogy any layer 1 technology. The layers can Using the OSI layer and technology
In order to better understand the now be switched around depending on the information from Table 3, Table 4
five-layer model (physical layer, data network architecture (dial-up or DSL). shows three specific methods of how
link layer, network layer, transport Each layer is independent of the layers end users can access the Internet.
layer, and application layer), a parallel above and below it.
model built around a familiar process – Notice that the end-to-end addressing
mail delivery – is offered. scheme (layer 3 – IP) is constant no
matter how the Internet is accessed.
OSI Model Importance
The most important aspect of the OSI
model is apparent when dealing with
a service issue or performing service The application is the letter itself. It is the actual piece of information sent from
turn-up. Each layer builds upon the Application Layer one location destined for another location to be read by a specific person.
next layer – the bottom layer being A final distinguishing factor is the name that appears on the envelope. Just as a
the physical layer. Looking at the mail Transport Layer household can have multiple residents, a computer can have multiple
applications. The name on the envelope identifies who should read the letter.
model analogy (Table 2), a closed road
or broken down mail truck means no The address on the envelope represents the network layer. In this case, the
Network Layer
mail delivery. No matter how perfect address is the street address, city, state, and zip code.
the envelope or how well it is The data link, being the basic data format, would be represented by the envelope
Data Link Layer
addressed, if the truck can’t carry the that the letter is put into. The envelope distinguishes one letter from another.
mail, it won’t get to its destination. The roads and trucks that carry mail are analogous to the physical layer. The
Similarly, if the copper that carries the Physical Layer roads represent the copper or fiber, while the truck represents the technology
(T1, for example).
customer data is bad or if the T1 is
incorrectly optioned, the data at layers Table 2: OSI five-layer model vs. mail model analogy
2 and up will not properly get from the
source to the destination.

When looking at problem circuits,


some problems are easier to identify OSI Layer Technology
than others. If a farmer in Georgia cuts
Application Lotus Notes, WWW, SMTP, POP3
through a pair of copper cables, none
of the data will transmit across the Transport TCP, UDP, SPX
copper. Since the failure is total and
Network IP, IPX
usually very obvious, it is easy to
identify and resolve. The more difficult Data Link HDLC, PPP, Frame Relay, ATM, MAC
problems to solve are on the marginal
Physical QFSK (modem), T1, T3, SONET, DMT (DSL), 802.3 (Ethernet)
circuits. These types of problems tend
to come and go and are difficult to Table 3: Technologies associated with the OSI layers
identify. Many of these marginal
problems will present themselves at
higher layers, even though the problem
is at a lower layer of the OSI model. OSI Layer From Home - Modem From Home - DSL From Office

Application HTTP (WWW) HTTP (WWW) HTTP (WWW)


Examples of OSI Layer Technologies
Table 3 provides examples of technolo- Transport TCP TCP TCP
gies and the layers that they reside in
Network IP IP IP
within the OSI model. It is important to
remember that almost any layer 3 tech- Data Link PPP ATM Frame Relay
nology can reside on any layer 2
Physical QFSK DMT T1
technology, which in turn can reside on
Table 4: Three different end user methods

3
Section 2: In terms of testing, there are no options Physical Layer –
Ethernet Technology or settings for line coding. All test sets 10 Gbps Ethernet
for Ethernet support this type of line
Fundamentals
coding. LAN Versus WAN
Physical Layer – 10 Mbps, There are two types of 10 Gigabit
100 Mbps, and 1 Gbps Ethernet Duplex Options Ethernet (10 GigE) – WAN and LAN. The
The physical layer for Ethernet is Another important physical layer char- LAN specification (10G BASE-R) is very
defined by certain electrical and bit acteristic of Ethernet is its full-duplex much like traditional Ethernet. It has
rate specifications. The electrical spec- or half-duplex operation. A full-duplex no common clock, and it is very similar
ifications are based on the IEEE 802.3 circuit is able to transmit and receive at in the physical layer. The WAN specifi-
Ethernet standard. the same time, similar to a telephone cation (10G BASE-W) is based on the
where a person can speak and hear at SONET/SDH signal architecture at the
Line Coding the same time. A half-duplex circuit is physical layer.
10 Mbps, 100 Mbps, and 1 Gbps either speaking or listening; it is
Ethernet technologies utilize a specific incapable of both operations simulta- Line Coding
type of line coding referred to as neously. Since it can only operate in 10 Gigabit Ethernet LAN
8B/10B. 8B/10B conversion is a one direction, a half-duplex circuit 10 GigE LAN has a line coding of
simple algorithm that converts 8 bits only offers the user about half of its 64B/66B instead of the 8B/10B
into 10 bits, producing a 25% actual bandwidth. In other words, a coding used for lower speed Ethernet
overhead. This effectively increases the 100 Mbps circuit running in a half- services. The main reason for the
line rate without increasing the actual duplex environment offers the user switch from 8B/10B is the bit rate.
throughput. There are two main only about 50 Mbps worth of actual At 10 Gigabit, an 8B/10B formatted
reasons for the use of this particular data throughput. signal has a line rate of 12.5 Gbps. The
type of line coding. 64B/66B signal, with significantly less
10 Megabit Ethernet (10 BASE-X) is overhead (3% instead of 25%), has an
(1) DC Current Elimination: In order to most commonly deployed in a half- effective line rate of 10.3 Gbps.
keep the average DC current on the duplex environment. Users requiring
wire equal to zero, there must be an lower bandwidth applications are able 10 Gigabit Ethernet WAN
equal number of positive pulses and to utilize 10 BASE-X and save the cost The 10 GigE WAN specification utilizes
negative pulses. The algorithm for of higher bandwidth equipment. SONET physical layer standards. Most
8B/10B converts the 8-bit sequence, often, an NRZ optical pulse is used.
where a positive or negative DC voltage 100 Megabit Ethernet (100 BASE-X) There is also a common clock; there-
would present itself. Those 8 bits are can be deployed in either a full-duplex fore, no 64B/66B conversion is
converted to a 10-bit sequence, elimi- or half-duplex environment, required.
nating the DC current artifact. depending on bandwidth require-
ments. Most switches deployed in a
(2) Clocking: There is no common LAN today are capable of 100 BASE-X.
clock within an Ethernet circuit. The
bit stream from one device drives the Gigabit Ethernet (1000 BASE-X) is
clock on the receiving device. If there almost always deployed in a full-
are two many zeros (absence of pulses) duplex environment, allowing
in the bit stream, the receiving device network routers and switches to take
will lose synchronization. The 8B/10B full advantage of the bandwidth. The
conversion takes the 8 bits without IEEE 802.3 Ethernet standard,
enough clocking pulses and converts however, does allow for 1000 BASE-X
it to 10 bits without enough positive deployment in a half-duplex environ-
pulses. ment.

4
The most critical physical layer com-
ponent of a 10 GigE WAN signal is the
SONET framing structure. In a 10 GigE
WAN signal, the Ethernet packet is
placed into a SONET frame. This frame
also includes the section, line, and Byte Function Usage

path overhead. In this type of A1 Frame Alignment Supported


A2 Frame Alignment Supported
structure, there are several over-head
B1 Section Error Monitoring Supported
bytes that are slightly different than
D1-D3 DCC Not Supported
the traditional specification (Table 5). Section
E1 Orderwire Not Supported
F1 Section User Channel Not Supported
Duplex Options J0 Section Trace Specific Value
10 GigE Ethernet (10G BASE-X) must Z0 Growth Not Supported
be deployed as a full-duplex service. B2 Line Error Monitoring Supported
There are no specifications in the D4-D12 DCC Not Supported
standard allowing for a half-duplex E2 Orderwire Not Supported
option. H1/H2 Pointer Specific Value
H3 Pointer Action Specific Value
Line
WAN Interface Sublayer (WIS) K1/K2 APS Specific Value
M0 REI-L Not Supported
One of the main differences between
M1 STS-N REI-L Supported
10 GigE WAN and 10 GigE LAN is the
S1 Synchronization Not Supported
SONET portion. The WIS is responsible
Z1/Z2 Growth Not Supported
for mapping Ethernet frames into a B3 Path Error Monitoring Supported
SONET frame and demapping Ethernet C2 STS Path Signal Label Specific Value
frames from a SONET frame. F2 Path User Channel Not Supported

Path G1 Path Status Supported


Generally, the WIS is designed to: H4 Multiframe Indicator Not Supported
– Map Ethernet MAC frames into a J1 STS Path Trace Specific Value
SONET frame. N1 TCM Not Supported
– Implement framing, scrambling, Z3/Z4 Growth Not Supported

and defect/anomaly (error/alarm)


detection to allow for compatibility Table 5: 10 Gbps Ethernet WAN physical layer overhead
with the SONET requirements.
– Provide a 9.95328 Gbps effective
data rate at the service interface,
conforming to the requirements of a
SONET STS-192c signal.

Data Link Layer


The data link layer for Ethernet is the
same for 10 BASE-X, 100 BASE-X,
1000 BASE-X (GigE), or 10G BASE-X
(10 GigE). This layer is referred to as
the Media Access Control (MAC) layer.
It is the beginning of the basic data
format for Ethernet. Destination Source Frame Information
FCS
Address Address Type (Data)

Table 6 shows a basic Ethernet frame.


Table 6: Basic Ethernet frame
There are four main parts to the frame
– destination address, source ad-
dress, control information, and the
FCS.

5
– Destination and Source Address All of the previous information applies If the physical layer is bad, all of the
Fields: The destination and source to 10 BASE-X, 100 BASE-X, and information above it will be corrupted.
address fields, as their names 1000 BASE-X (GigE) services. There For an Ethernet deployment, there are
suggest, are the fields in the data is, however, one specification of the several danger zones that can cause
frame that identify the destination Ethernet standard that is more applica- the physical layer to be bad. Dirty fiber
and source MAC addresses for the ble for GigE services than for 10 BASE-X connections or bad media converters
frame. The source address is the and 100 BASE-X services – Pause (electrical-to-optical or short range
device that transmitted the frame, Control. optical to long range optical) are two
and the destination address is the examples of physical layer problems
device destined to receive the Pause control frames allow Ethernet that will generate customer traffic
frame. elements to throttle the actual errors. If a customer or a carrier
– Frame Type: This field contains infor- throughput of the link in real time. element is registering bad FCS frames,
mation that determines the format Most elements can support full 10 the cause is often a bad physical layer.
of the frame, either an Ethertype BASE-X and 100 BASE-X rates. When
field for Ethernet, Version 2 or a GigE was first released, many elements Table 7 shows the OSI model for
length field for IEEE 802.3. could not support long durations of full Ethernet that has been discussed
– Data Field: This field contains the bandwidth routing. Because of this, thus far.
bulk of the frame. This is where the the pause control specification
upper layer information is encapsu- allowed a local element to tell the far
lated. end element to slow down until the
– FCS Field: This is the frame check local element caught up. Although not
sequence. The FCS is a calculation as prevalent as a few years ago, this is
performed by the equipment gener- still part of the Ethernet standard and Layers 5/6/7 Application
ating the frame on the total bits in can be seen in deployed networks.
the frame. If any of the bits change Layer 4 Transport
while the packet traverses the
network, the FCS value will no longer Layer 3 Network
be valid. The device receiving the
Layer 2 MAC
frame at the far end will see that the
frame has been corrupted during Layer 1 802.3
transmission, and it will discard the
frame. Table 7: OSI model showing 802.3 and MAC
layers

6
Network Layer
The network layer resides within the Version IHL TOS Total Length
information field of the data link layer. Identifier Flags Fragment Offset
This layer contains individual TTL Protocol Header Checksum (FCS)
computer addresses or Web site Source Address
addresses. Commonly used network Destination Address
layer protocols include IP (most Information (Data)
common) and IPX (Novell). This
document will focus on IP for this Options and Padding

section, since IP is the technology that Table 8: IP portion of an Ethernet frame


almost all carriers are moving forward
with in order to provide next-genera-
tion services. Almost all potential
customers are standardized on IP- It is important to note that the infor- – The information field represents the
based networks as well. mation field can have a wide range data placed into the IP packet. This
in length. This allows for various includes all of the upper layer infor-
The overall role of IP is the routing of sized packets to be put into one IP mation at the transport and
the packet from the source to the desti- frame. For example, an Internet URL application layers.
nation. It is not responsible for quality request is a short connection – Finally, the FCS completes the
of service (QoS). It does not keep track request. The response is often a frame. The FCS is a layer 3 frame
of numbers of packets or lost packets large Web page. The requesting check sequence. The IP FCS allows a
throughout the network. These packet would be small, but the technician to differentiate layer 2
functions are the responsibility of response packets would be larger to versus layer 3 FCS issues.
higher layers of the OSI model. accommodate the larger amounts
of data in the Web page.
As with the MAC layer, the IP layer
contains a source address, a destina-
tion address, and an FCS. Table 8
shows the IP portion of an Ethernet
frame. It is more complicated than a
MAC frame. IP and the Internet
– Like the MAC frame, the IP frame IP addresses have four different value locations, each ranging from 0 to 255. An
includes a destination address, a IP address may look like 212.43.52.123.
source address, and an FCS. There is
a difference, however. The destina- The mechanism that allows a user to get from his local computer to an Internet
tion and source addresses are the site is through the IP addressing scheme built into the Internet. However, you
final end point addresses and are don’t enter an IP address into the URL field of your browser. You enter a Web
not the next addressable ports. See address, such as Acterna’s www.acterna.com.
the insert to the right for more infor-
mation regarding what an IP When you enter a Web address into the URL field, your computer sends that URL
address looks like and how it relates to a Domain Name Server (DNS). This server converts the Web address to its IP
to the Internet. address. Acterna’s IP address on the Internet is 157.234.223.80.
– The total length field identifies the
overall length of the information In fact, you will get to the same location on the Internet if you enter the IP
field. The overall length of the infor- address above in the URL field instead of entering www.acterna.com.
mation field can range from 46 bytes
to 1500 bytes.

7
Another layer can now be added to the Transport Layer – Flow Control: In addition to the
OSI model for Ethernet carrier-based The final layer of the OSI model prior sequence numbers discussed
deployments. The physical layer (layer to the actual desired data is the previously, there is another portion
1) and the data link layer (layer 2) have transport layer. There are two main of the header that contains a value
been defined. Layer 3 can also be protocols that reside over IP and are known as a “window size”. A
referred to as the IP layer (Table 9). common transport protocols in an IP window size is effectively the
network. These protocols are Trans- amount of data each end point will
mission Control Protocol (TCP) and receive prior to acknowledging its
User Datagram Protocol (UDP). receipt of the data. A larger window
Layers 5/6/7 Application size is more efficient than a smaller
This section is divided into two window size. The problem with a
Layer 4 Transport large window size occurs when
separate sections – TCP and UDP.
These two protocols are very different there are lost packets. Because a
Layer 3 IP larger window size indicates more
in their roles and responsibilities, and
it is important to distinguish between data between acknowledgements,
Layer 2 MAC
the two protocols. more data will need to be retrans-
Layer 1 802.3 mitted for each error if there is an
TCP – A Connection-Oriented error in that time period.
Table 9: OSI model showing the IP layer
Transport Protocol – Multiplexing: Users are used to
TCP has six main responsibilities. They running multiple applications on
include: their PCs simultaneously. Often-
Now that the IP layer has been added, times they are checking e-mail and
– Basic data transfer
there is another layer for the occur- accessing one or more Web sites at
– Reliability
rence of events. It is obvious that the the same time. TCP not only
– Flow control
main goal of IP is transmitting packets connects them to the other end
– Multiplexing
from a beginning point (source) to the point (Web site or e-mail), but it also
– Connection management
end point (destination). This is manages which packets entering
– Security
apparent from the basic IP frame their computer are from the Internet
format. or e-mail and makes sure that
– Basic data transfer and reliability:
TCP, being a connection-oriented outbound packets are properly
If a user incorrectly addresses a transport protocol, makes sure that identified by the far end.
packet, the packet will not arrive at the all data gets from the beginning to – Connection Management and
proper destination (like incorrectly the end of the network. Sequence Security: When two end points
addressing an e-mail). If the address- numbers are built into the TCP begin a conversation, the request-
ing scheme is flawed (the DNS server is overhead information of the TCP ing end point requests a connection
not operating properly, for example), frame. These sequence numbers to the receiving end point. The
users will not be able to transmit their keep track of all of the information receiving end point manages the
data to the destination. As discussed sent and the order in which it connection and, if implemented,
earlier, any errors at lower layers will arrives. If any packets do not arrive, will attempt to confirm that the
corrupt the traffic in the layers above it. the TCP layer knows which packets requesting end has the right to
Therefore, it is critical that the physical didn’t arrive and requests those access the information.
and MAC layers are clean for IP to run lost packets. It is this layer that
properly. allows for small blips in local area
networks and wide area networks
to go unnoticed by the user.

8
Now that TCP’s responsibilities have
Source Port Destination Port
been identified, the frame and its parts
Sequence Number
can be discussed. Table 10 shows a
Acknowledgement Number
typical TCP frame. Offset Reserved URG ACK PSH RST SYN FIN Window
Checksum Urgent Pointer
Compared to a less featured protocol, Options and Padding
such as MAC, the TCP frame is
extremely complicated and has many Information (Data)

different fields that are responsible for


the various tasks described above. It is Table 10: Typical TCP frame
outside the scope of this document to
define each portion of the TCP header.
However, a few of the fields are worth
discussing.

– Source and Destination Ports: When a user logs into a streaming


These are the address fields that Web site, such as www.cnn.com, to Source Port Destination Port
identify the application type. watch the latest news report, he uses Length Checksum
– Sequence and Acknowledgement UDP. CNN has many viewers with
Numbers: These are the fields that different computers, connection Information (Data)
keep track of the packet sequences speeds, and link qualities. CNN can’t
and which packets have and have stop transmitting video and retransmit Table 11: Typical UDP frame
not arrived from the far end sender. the packets that one user did not
– Checksum: This field, like other receive. CNN doesn’t want to know
checksum fields, represents the anything about what their users are
basic FCS for the frame. getting in real time. UDP allows users
Layers 5/6/7 Application
to connect to CNN without all of the
UDP – A Connectionless management and security that would Layer 4 TCP/UDP
Transport Protocol cause the video service to fail.
UDP is a simpler protocol than TCP. UDP Layer 3 IP
is designed with the following features: Transport Layer Summary
– Basic data transfer With a solid understanding of the Layer 2 MAC
– Connection management transport layer, the OSI model can be
Layer 1 802.3
re-defined as a complete set of
Based on this reduced feature set, the building blocks shown in Table 12. Table 12: OSI model showing the TCP/UDP
make up of the UDP frame provides a layer
good understanding of how it works
and why it has a reduced feature set
(Table 11).

The main use for UDP is for those


applications that do not require the
arrival of all of the data in order to work.
More importantly, UDP is for those
applications that cannot utilize the
information unless it arrives in
the sequence in which it was sent.
Examples of UDP applications include
VoIP and streaming video.

9
VLAN Tagging Section 3: Another way for transparent LANs to
work is through media converters. A
A Virtual Local Area Network (VLAN ) tag 10 BASE-X, 100 BASE-X,
media converter takes a signal, electri-
is made up of two parts, a tag value (0 1G BASE-X, and 10G BASE-X
to 4095) and a priority value (0 to 7). A cal or optical, and converts it into a
Deployment long haul optical signal. This allows
VLAN tag is a way to separate traffic on
a LAN into different sub-groups. There Currently, most carriers are offering 10 BASE-X or 100 BASE-X services to
are two main reasons for adding VLAN three versions of the Ethernet services. travel for miles. Gigabit Ethernet,
tags to a network – traffic routing and They are referred to as transparent LAN, although already optical, can also
traffic prioritization. switched Ethernet, and routed benefit from media converters.
Ethernet. Normally gigabit Ethernet is available
– Traffic Routing: VLAN tags allow for at 850 nm or 1310 nm, both consid-
quicker routing on higher-speed Deployment Options ered short haul wavelengths. A media
networks. With VLAN tags enabled, The three deployment options are converter can receive the 850 nm
the element performing the routing based on the OSI layer that is required or 1310 nm signal and convert it to
does not have to look to the IP layer for the traffic to transverse the network. 1550 nm.
to find the ultimate destination,
saving processing power and Transparent LAN (OSI Layer 1 Service) A final option for transparent services
reducing the time to route each The term “transparent” is used to is using a standard Add/Drop Multi-
packet. Any testing traffic placed on indicate that the LAN sites on either plexer (ADM). Like the DWDM-based
a network routed with VLANs must end of the service are connected by a option, the Ethernet signal is placed
have a valid VLAN tag. pipe and have no idea if the Ethernet directly into the transport system.
– Traffic Prioritization: If a network traffic is traveling 5 feet or 500 miles. Unlike the DWDM option, the signal is
has both voice and data traffic on it, Transparent service only requires that limited by the SONET signal structure.
the voice traffic should have priority the first layer of the OSI model (the If the SONET pipe available to the
over the data traffic. Most networks physical layer) is properly formatted in Ethernet is only an STS-12 (622 Mbps),
rely on VLAN tags to differentiate the order to transmit traffic. If the electrical the Ethernet is limited to the
voice from the data traffic. If the or optical characteristics of the signal bandwidth of an OC-12 service. For
network gets busy, the routers will are correct, the service will transmit 10 BASE-X or 100 BASE-X, this is more
drop the data traffic and route the the data. This service is ONLY point-to- than enough bandwidth. For gigabit
voice traffic. Although there is a point. Ethernet (1.25 Gbps), however, an
priority value that can be set with STS-12 mapped Ethernet circuit only
each VLAN tag, most networks Typically, this type of service is offered offers about 60% of the bandwidth
utilize different tag values for via a Dense Wave Division Multiplexing required. The customer only has
different levels of prioritization. (DWDM) system. Instead of a SONET access to 60% of the total possible
card as the customer interface, the bandwidth. To overcome this, some
A VLAN tag effectively sits between the card is an Ethernet card (typically providers are offering gigabit
MAC layer and the IP layer. It is gigabit). The signal that the card Ethernet encapsulated in an STS-24c
sometimes referred to as layer 2.5 receives is transmitted over the long (1.25 Gbps) or an STS-48c (2.5 Gbps).
(Table 13). haul and delivered to the far end.
There, it is converted back to the
appropriate wavelength for the
Layers 5/6/7 Application Ethernet service.

Layer 4 TCP/UDP

Layer 3 IP

Layer 2.5 VLAN

Layer 2 MAC

Layer 1 802.3
Table 13: OSI model showing VLAN tagging

10
Switched Ethernet (OSI Layer 2 Service) Routed Ethernet (OSI Layer 3 Service) WDM Deployment
This type of offering has more flexibili- A routed Ethernet service is a layer 3 This deployment is based on a trans-
ty, but it is slightly more complicated to (IP) service. In order for a fully IP- parent service using WDM elements
turn-up and troubleshoot. In order for addressable service to be offered, a only. Effectively, the carrier takes the
this service to operate, the customer large IP network is required at the core. customer LAN signal and converts the
must provide some type of addressing. This is typically a Packet Over SONET signal into a WDM wavelength. This
In OSI terms, this requires the (POS) network. Turning up a routed method of deployment works for any
customer to correctly address at layer 2 service requires a test set capable of Ethernet rate.
(MAC) or layer 2.5 (VLAN). By using generating traffic with an IP address.
addressing schemes, the carrier can Switched or Routed Deployment
sell the service as a point-to-multipoint Another type of routed service is gener- A switched or routed deployment offers
service instead of just a point-to-point ically referred to as managed Ethernet. carriers more flexibility and growth
service and can offer prioritization of When the term managed is added to than a WDM point-to-point Ethernet
the traffic. the service, the carrier owns that deployment. The service uses address-
portion of that service. An example of ing schemes either at layer 2, layer 2.5,
A layer 2 (MAC) service is typically a managed Ethernet service is a VPN. or layer 3.
offered using a Multi-Service Platform Many enterprise networks currently
(MSP) with a switch card. The switch utilize VPNs, but the VPN server is Because these services require
card looks at an Ethernet packet and owned and operated by the enterprise addressing to route the packets, any
switches it based on its destination customer. turn-up of the service will require
MAC address. An incorrect destination addressing on the test set. If either the
MAC address causes the switch card to Network Architecture technician or the customer incorrectly
ignore the packet. For carriers, network architecture addresses packets, the pipe will not
consists of the different types of transmit any of the traffic, making the
A layer 2.5 (VLAN) service is also equipment and architecture that is circuit appear down at the physical
available with carriers today. VLAN used to deploy Ethernet. Currently, layer. The problem, however, is at
tagging allows the user to easily set up both point-to-point services as well higher layers.
a point-to-multipoint network using a as point-to-multipoint services are
very simple addressing scheme. The available.
VLAN tags are very easy for the carrier
to read, allowing for quick and efficient
routing and prioritization.

11
Section 4: Turn-up Testing – Frame Size: Different frame sizes
can affect Ethernet elements.
Turn-up and Troubleshooting Traffic Generation
Smaller frames cause elements to
of Ethernet Networks An Ethernet service is a pipe offered to
the customer to transmit traffic from work harder than larger frames. The
For the purposes of this section, the
one point to another. In order to reason for this is that small frames
discussion will focus on the turn-up
confirm that the pipe is clean and will have a smaller payload and less
and troubleshooting of a basic
transmit the customer’s traffic, the time for the element to process a
Ethernet service. The screen shots
technician must generate traffic and frame before the next frame arrives.
shown throughout this section are
confirm that all of the traffic traverses At high utilizations, the element may
from an Acterna FST-2802 TestPad
the network without being corrupted. drop or corrupt frames.
Ethernet services test instrument.
– Payload: The payload is the PDU
Other Acterna products, such as the
When setting up a test set to generate portion of the frame. For the most
Acterna DA-3400, T-BERD 8000, or
traffic, there are three main parameters part, this portion is irrelevant to the
MTS-8000, offer similar test feature
that must be specified: utilization, Ethernet service. From a customer
sets and can be used instead of the
frame size, and traffic profile. standpoint, this is the most critical
FST-2802.
portion of the service. Therefore, the
– Utilization: This is the most critical ability to edit the payload may be a
Overview of Turn-up and
parameter. Depending on the requirement for some turn-ups.
Troubleshooting
As with any service, turn-up and trou- service, the Ethernet pipe may
bleshooting of Ethernet networks is transmit at a line rate of 1 Gbps or
critical to confirm that the service less. The carrier and type of network
works prior to the hand-off to the end determines the maximum through-
user. To confirm Ethernet services, the put. Therefore, generating traffic at
technician generates traffic and the maximum line rate and confirm-
measures the traffic for various param- ing that the traffic is not corrupted is
eters. This section covers the types of critical.
traffic that need to be generated as well
as the measurements that need to be
performed.

How Long to Generate Traffic?


Ethernet/SONET networks are often deployed with GBICs, SFPs, or XFPs.
Depending on the quality of the GBICs, SFPs, and XFPs, the network may have a
guaranteed error rate of 10-12 to 10-15. For a standard GigE network at an error
rate of 10-12, the user will experience a few errors a day. At an error rate of 10-15,
the user will experience about one error a week.

A 15-minute error-free test should be run to confirm that the network is properly
provisioned and that the circuit is capable of handling the traffic. Longer tests
offer more statistical information into the quality of the circuit and shorter tests
offer less information.

12
Traffic Rate – Constant Bandwidth When setting up a ramp test, there are Interpreting Errors
When setting utilization, there are a couple of extra parameters that are When generating traffic, any received
several different units of measure. The required over the constant rate test. To errors are an indication of a problem.
two main units of measure are an begin generating any traffic, the techni- Errors include runts, jabbers, and bad
actual bit rate (in Mbps or Gbps) or a cian must enter the step rate (2%, 5%, FCS frames. Either the customer
percentage of the total available 10%, etc). Then, the technician sets network or the carrier network will drop
bandwidth. Stating bandwidth in terms the time interval at each step (20 any errored frames.
of a percentage of the total available seconds, 1 minute, 5 minutes, etc).
bandwidth is the most common. The screen shot below of the FST-2802
The ramp test, like the constant rate TestPad offers visibility into the types
When turning up a circuit, generating test, confirms that the service works of errors that are tracked. Any errors
traffic at the maximum rate is the only and will transmit all of the customer’s will be displayed for the user to see.
way to confirm that the circuit can traffic without errors. Errors will be displayed in two different
transmit the customer data at the guar- categories – Error Stats and Summary.
anteed rate without errors. Depending Traffic Rate – Bursty The summary view scans all of the
on how the carrier offers the Ethernet Bursty traffic is a way to simulate real results and displays any results that
service, the maximum bandwidth customer data, similar to the QRSS test are out of specification as measured by
available to the end user may vary. pattern for a standard T1 Bit Error Rate the test instrument.
(BER) test. When the test set is set to
The maximum bandwidth test should bursty, the test set varies the traffic in
run error free and offer the customer two important ways. First, traffic uti-
proof that the circuit will transmit traffic lization is adjusted around a particular
appropriately. rate. If the technician sets the average
at 50% traffic utilization, the utilization
Traffic Rate – Ramp will fluctuate around 50%, which is
Another option for generating traffic is similar to actual customer traffic.
to step up (or ramp up) the traffic rate
over time. The test involves setting a The frame size is also varied by the test
constant bandwidth, waiting for a short set. Customer traffic has a wide variety
time, and then restarting the test at a of frame sizes due to different applica-
higher bandwidth. The easiest way to tions and different requirements. By One important error result that is
accomplish this test is to have a test generating different sized frames in displayed in the summary view is the
set do it for you. real time, the test set is able to emulate lost frames result. The FST-2802, using
customer data more effectively. one of its packet generation options,
By ramping up the traffic at specific can generate an Acterna test packet.
intervals, the service can be proven to Turn-Up Results This packet has a sequence number
be error free at all line rates, not just at After setting up and generating traffic, (similar to the TCP sequence number)
the maximum bandwidth being the results of the test are analyzed in and a timestamp. This allows the FST-
offered. If there are errors on the order to confirm that the service will or 2802 to perform real time QoS and SLA
circuit, the step function will identify will not work per the service level analysis including lost packet rate and
the rate at which the errors are being agreement (SLA). round trip delay.
caused.

13
Interpreting Link Statistics There are four tests that are part of the – Lost Frames: The RFC 2544 test will
Whether the link has errors or is RFC 2544 specification and are run a lost frames analysis at the rate
operating nominally, there are several relevant to circuit turn-up. They determined by the throughput test.
link statistics the technician can use to include: The appropriate result should be
confirm that the traffic he is transmit- – Throughput zero lost frames at the guaranteed
ting is getting properly received by the – Latency throughput rate.
test set. – Lost frames – Back-to-back frames: This test is
– Back-to-back frames mainly used in the manufacturing
The screen shot below displays the link arena to determine the buffering
statistics that the FST-2802 collects. All – Throughput: The throughput test capability of a single element. For
of the statistics captured on the screen identifies the maximum bandwidth circuit turn-up, this test is not
gives the technician a complete view of that the circuit will operate at. This required and doesn’t offer useful
how the circuit is behaving. value should match or be slightly information for the technician.
greater than the provisioned
bandwidth rate. This test generates a number of frames
– Latency: The latency result provided at full line rate (10 Mbps, 100 Mbps,
by the RFC 2544 test is a round trip 1 Gbps, or 10 Gbps). The test set
latency and is typically offered to the continues to drop the number of
millisecond. frames until the element under test
drops none of the frames.
The latency of the network can be a
somewhat tricky result. There are Troubleshooting
two main factors that create latency Troubleshooting Ethernet circuits
– network architecture and network presents a difficult problem. Many of
traffic. the problems that occur on a data
The first six results in the window are network often occur within the CPE LAN
the ones that are used most frequently. The network architecture adds a environment, outside of the carrier’s
The first three results show utilization fixed amount of latency into the domain of ownership. Troubleshooting
as a percentage of total bandwidth, network. The only way to reduce this and rectifying these issues is difficult
while the second three results show component of latency is to physical- without access to the customer
utilization as a frame rate. ly re-route the circuit through fewer network, which is not always easily
elements. obtained.
On the right side of the window, notice
the PAUSE Frames result. The pause The network traffic component is The carrier network can have its own
control frames are those frames that only a factor for switched or routed set of problems, including traffic
tell the elements to slow down or Ethernet circuits. Transparent LAN loading, capacity management, and
speed up their transmission rate in services have reserved bandwidth fiber/cabling issues. One of the most
order to most efficiently transmit the in the elements, and therefore, common problems is fiber and cabling
data. traffic does not affect the circuit issues. Dirty fiber ends and improperly
under test. On the other hand, the installed cable can affect a circuit’s
RFC 2544 Testing total traffic going through the router quality.
One of the most commonly used tests or switch can add latency to the
to turn-up Ethernet circuits is the circuit under test. Proper network Using a test set to troubleshoot param-
RFC 2544 test. RFC 2544 is a specifica- capacity management, though, will eters such as utilization, errored
tion that was initially developed to limit this factor. frames, and the type of traffic can help
qualify an Ethernet switch and define the carrier determine where a problem
its capabilities. This test has been originates.
adopted to characterize Ethernet
circuits prior to being handed off to
the end user.

14
Section 5: (5) Payload: The payload of a packet is (11) Trace Route: A trace route is a
Common Terms often viewed as layer 4 and up, thus means for a user to trace all IP addres-
effectively the application. Payload
and Definitions sable devices in the network from one
can also be the line between the carrier point to another. This allows the user
There are a variety of terms that are
service and the customer data. For to see all of the points along the way of
applied to Ethernet technology. The
frame relay, the line is between layer 2 a packet’s journey. An analogy to trace
following section explains many of
and layer 3. For a point-to-point data route is when FedEX scans a package
these terms within the context of an
T1, the payload line is between layer 1 as it goes through each one of its dis-
Ethernet deployment.
and layer 2. tribution centers. The user can see
(1) Utilization: The utilization on a every point that the package touched
(6) Frame Size: Frame size is measured on its journey.
link is determined by comparing the
from the beginning of an Ethernet
packet rate to the overall bandwidth of
packet to the end of the packet. Frame (12) Runts/Undersize: These errors
a link. For example, a 100 Megabit
sizes range from 64 bytes to 1518 are generically defined as any packet
Ethernet link (100 BASE-X) has an
bytes. If VLAN tagging is added (layer less than the minimum 64-byte length.
available bandwidth of 100 Mbps. If
2.5), the maximum frame size In addition, the packet does not have
the packet rate is 40 Mbps, then the
increases to 1522 bytes. an FCS value.
overall utilization is 40%. Utilization
for data can fluctuate widely through-
(7) PDU: A Protocol Data Unit (PDU) is (13) Jabbers/Oversize: A jabber is the
out the day on an operational network.
typically the data contained at layer 3 opposite of a runt. These are overly
Depending on user activity at any given
and above within the data frame. long packets (>1518 bytes). Broken
time, utilization can jump from 0% to
100% and back to 0% within a few NIC cards/ports often cause jabbers.
(8) CPE: Customer Premises
moments.
Equipment (CPE) usually refers to the (14) Bad FCS: Bad FCS frames are
customer equipment or the overall those frames with an incorrect FCS
(2) Throughput: Throughput is a
customer site. value. These errors are counted when
measurement similar to utilization.
one or more of the bits in a packet
Throughput, however, measures the
(9) Retransmission: Retransmissions have been switched (from a 1to a 0,
number of packets sent versus the
occur when the far end does not for example).
number of packets received. It is very
receive all of the data that it was sent.
much a quality of service metric. If 100
TCP sequences packets so that lost (15) Collisions: On a half-duplex
packets are sent and 90 of them arrive
packets are identified and retransmit- Ethernet link, each computer must
at the far end, then the throughput of
ted. The customer’s router can often share the bandwidth with the rest of
the system is 90%.
count these retransmissions and the computers. If two or more com-
express them as an error condition. It is puters on a network broadcast at the
(3) Round Trip Delay/Latency: Round
important to remember that errors in same time, the packets “collide” and
trip delay and latency are time meas-
the lower layers can corrupt the higher are unreadable. This event is known
urements for a network. Round trip
layers, so retransmissions can be a as a collision. On full-duplex links,
delay specifically addresses the time it
sign of a problem with the physical this is a non-event because there are
takes for a packet to go from one point
layer, the data link layer, or even the separate transmit and receive paths.
on the network to another point and
network layer.
back again. Latency is the time from
(16) Symbol Errors: Symbol errors
one point to another. Latency can be
(10) Ping: A ping is a packet that is represent line coding issues at the
measured for a single element (router)
sent from a source address to a desti- physical layer.
or for an entire network path.
nation address and back again. This
allows the user to determine if the
(4) Frame Counts: Frame counts are
network will allow traffic to go from one
packet counts. Each packet, as it is
point to another. If a customer can’t
received, is counted. It is also labeled
ping the far end device, he can’t send
as a good packet (good FCS) or a bad
traffic there.
packet (FCS error). Occasionally,
packets are also counted by their size.

15
MTU versus Frame Size For most Ethernet networks, the MTU
There is some confusion between the size should be set to 1500. This allows
maximum transmission unit (MTU) 1518 byte non-tagged Ethernet frames
settings in routers and switches and and 1522 byte VLAN-tagged Ethernet
the frame size generation setting frames to pass the entire network
when dealing with Ethernet turn-up untouched. Any frames larger than
and troubleshooting. The frame size 1518 or 1522 bytes will be broken up
is the overall length of the Ethernet into smaller frames by the first router
frame at layer 2 in the OSI model. and forwarded as multiple frames.
Standard Ethernet frames range from MTU sizes can be set as high as 9000+
64 bytes to 1518 bytes without a VLAN bytes to support jumbo frames.
tag and from 64 bytes to 1522 bytes
with a VLAN tag. Larger Ethernet
frames, typically called jumbo frames,
can have a frame size as large as
10,000 bytes.

The MTU setting is a layer 3 packet size


setting, often available in routers and
switches. As its name implies, the user
would set the MAXIMUM transmission
unit as the largest packet that the
router or switch can pass. Because this
is a layer 3 measurement, the user
must subtract the layer 2 (MAC) size
and the layer 2.5 (VLAN tag) size of the
overall frame to correctly set the MTU.

Worldwide Regional Sales


Headquarters Headquarters

One Milestone Center Court North America Latin America Europe, Middle East & © Copyright 2005 Note: Specifications,
Germantown, Maryland One Milestone Center Court Acterna do Brasil Ltda. Africa Acterna, LLC. terms and conditions
20876-7100 Germantown, Maryland Av. Eng. Luis Carlos Berrini Acterna Germany GmbH All rights reserved. are subject to change
USA 20876-7100 936 9th Floor Mühleweg 5 without notice.
USA 04571-000 São Paulo 72800 Eningen u.A. Acterna, Communications
Acterna is present in more Toll Free: 1 866 ACTERNA SP-Brazil Germany Test and Management
than 80 countries. To find Toll Free: 1 866 228 3762 Tel: +55 11 5503 3800 Tel: +49 7121 86 2222 Solutions, and its logo are
your local sales office go to: Tel: +1 301 353 1560 x 2850 Fax:+55 11 5505 1598 Fax:+49 7121 86 1222 trademarks of Acterna,
www.acterna.com Fax: +1 301 353 9216 LLC. All other trademarks
Asia Pacific and registered trademarks
Acterna Hong Kong Ltd. are the property of their
Suite 4010, 40th Floor respective owners. Major
China Resources Building Acterna operations sites
26 Harbour Road are IS0 9001 registered.
Wanchai
Hong Kong
Tel: +852 2892 0990
Fax:+852 2892 0770

FUNDETHERNET/WP/TFS/08-05/AE/PDFONLY

You might also like