Professional Documents
Culture Documents
Basics Manual Local Area Network (LAN)
Basics Manual Local Area Network (LAN)
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction,
translation, conversion into any electronic medium or machine scannable form is not permitted,
either in whole or in part. An exception is formed by the preparation of a backup copy of the soft-
ware for your own use.
This manual has been created by Hirschmann electronics GmbH & Co. KG according to the best
of our knowledge. Hirschmann reserves the right to change the contents of this manual without
prior notice. Hirschmann can give no guarantee in respect of the correctness or accuracy of the
details in this manual.
Hirschmann can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. For the rest, we refer to the conditions of use
specified in the license contract.
Printed in Germany
Hirschmann worlwide:
U Germany
Hirschmann Electronics GmbH & Co. KG
Automation and Network Solutions
Stuttgarter Straße 45-51
D-72654 Neckartenzlingen
Tel. ++49-7127-14-1527
Fax ++49-7127-14-1542
email: ans-hi-line@nt.hirschmann.de
Internet: www.hirschmann.de
U Austria
Hirschmann Austria GmbH
Oberer Paspelweg 6-8
A-6830 Rankweil-Brederis
Tel. ++43-5522-3070
Fax ++43-5522-307555
A-1230 Wien
Tel. ++43-1-6174646
Fax ++43-1-6174646
email: cherz@nt.hirschmann.de
U Switzerland
Hirschmann Electronics GmbH & Co. KG, Neckartenzlingen
Niederlassung Uster
Seestr. 16
CH-8610 Uster
Tel. ++41-1905-8282
Fax ++41-1905-8289
email: ans_ch@hirschmann.ch
ETHERNET Basics
Version 1.0 03/01 5
Hirschmann worlwide:
U France
Hirschmann Electronics S.A.
24, rue du Fer à Cheval, Z.I.
F-95200 Sarcelles
Tel. ++33-1-39330280
Fax ++33-1-39905968
email: ans@hirschmann.fr
U Great Britain
Hirschmann Electronics Ltd.
St. Martins Way
St. Martins Business Centre
GB-Bedford MK42 OLF
Tel. ++44-1234-345999
Fax ++44-1234-352222
email: enquiry@hirschmann.co.uk
U Netherlands
Hirschmann Electronics B.V.
Pampuslaan 170
NL-1382 JS Weesp
Tel. ++31-294-462555
Fax ++31-294-480639
email: ans@hirschmann.nl
U Spain
Hirschmann Electronics S.A.
Calle Traspaderne, 29
Barrio del Aeropuerto
Edificio Barajas 1,2 Planta
E-28042 Madrid
Tel. ++34-1-7461730
Fax ++34-1-7461735
email: hes@hirschmann.es
ETHERNET Basics
6 Version 1.0 09/00
Hirschmann worlwide:
U Hungary
Hirschmann Electronics Kft.
Rokolya u. 1-13
H-1131 Budapest
Tel. ++36-1-3494199
Fax. ++36-1-3298453
email: hirh.vez@nap-szam.hu
U USA
Hirschmann Electronics Inc.
30 Hook Mountain Road _ Unit 201
USA-Pine Brook, N. J. 07058
Tel. ++1-973-8301470
Fax ++1-973-8302000
email: ans@hirschmann-usa.com
U Singapore
Hirschmann Electronics Pte. Ltd.
3 Toh Tuck Link
# 04-01 German Districentre
Singapore 596228
Tel: (65)463 5855
Fax:(65) 463 5755
email: hirschmann.ap@pacific.net.sg
U China (PRC)
Hirschmann Electronics
Shanghai Rep. Office
Room 518, No. 109 Yangdang Road
Lu Wan District, 200020
SHANGHAI, PRC
Tel +86-21 63 58 51 19
Fax +86-21 63 58 51 25
E-mail: hirschsh@public4.sta.net.cn
ETHERNET Basics
Version 1.0 03/01 7
Hirschmann worlwide:
ETHERNET Basics
8 Version 1.0 09/00
Content
Content
1 Overview 15
1.4 IP address 35
1.4.1 Network mask 36
1.4.2 Example of how the network mask is used 37
ETHERNET Basics
Version 1.0 03/01 9
Content
2 Network Planning 41
2.3 Variability 59
2.4 Redundancy 65
2.4.1 Normal mode ('as-delivered' setting) 65
2.4.2 Frame redundancy (10 Mbit/s Ethernet) 65
2.4.3 Switch redundancy (100 Mbit/s Ethernet) 68
ETHERNET Basics
10 Version 1.0 09/00
Content
3 Network management 71
3.3 Security 79
3.3.1 SNMP 79
3.3.2 SNMP traps 80
4 Switching Functions 81
ETHERNET Basics
Version 1.0 03/01 11
Content
5.1 Tasks 91
ETHERNET Basics
12 Version 1.0 09/00
Content
ETHERNET Basics
Version 1.0 03/01 13
Content
A Appendix 131
FAQ 133
Stichwortverzeichnis 139
ETHERNET Basics
14 Version 1.0 09/00
Overview
1 Overview
ETHERNET Basics
Version 1.0 03/01 15
Overview
ETHERNET Basics
16 Version 1.0 09/00
Overview 1.1 Historical Development of Ethernet
The constant growth in the use of data processing systems and their intro-
duction into many areas (office communications, scientific-technical applica-
tions, construction, manufacturing, etc.) make high-capacity and high-
function data networks mandatory. One possible way to economically solve
this problem is the use of local area networks.
In 1972 Xerox began to develop the bus-connected local area network (LAN)
at its Palo Alto Research Center using the CSMA/CD access method. The
name of the access method stands for three actions that characterize it::
D Carrier Sense
D Multiple Access
D Collision Detection.
In 1980, DIX published the first specifications for Ethernet Version 1.0.
At the same time, working group 802 of the Institution of Electronical and
Electronic Engineers (IEEE) began to develop a standard for a CSMA/CD
bus LAN. The Ethernet Version 1.0 specifications formed the base for this
work. The T24 Committee on Communication Protocols of the European
Computer Manufacturers Association (ECMA) also provided useful input for
the development of the standard.
The result of this work is IEEE recommendation 802.3. In 1982, the DIX
group modified their Ethernet Version 2.0 specifications to conform with the
IEEE recommendations. In 1985, the recommendation was raised to the sta-
tus of a standard.
ETHERNET Basics
Version 1.0 03/01 17
Overview 1.1 Historical Development of Ethernet
A further significant step for the success of local area networks was the crea-
tion of the ISO/OSI reference model (International Standardization Organisa-
tion / Open System Interconnection).
The reference model consists of 7 layers, ranging from the application layer
to the physical layer.
The model was published in October 1984 in international standard
ISO 7498.
ETHERNET Basics
18 Version 1.0 09/00
Overview 1.1 Historical Development of Ethernet
However, the data rate and the transmission media were permanently adap-
ted. The next data rate - 100 Mbit - was actually already attained by FDDI.
The transition from 10 MBit Ethernet to FDDI was, however, not a very
smooth one for users. Standardization of FDDI was also very sluggish, and
the data terminal equipment never fell to price level that might have made
them competitive in the market.
Thus, the development of 100 MBit Ethernet began. On the physical level,
FDDI components were adopted. Since 1994 FDDI has at times been im-
plemented with TP cable. Initially there were two approaches to finding a
solution. The first one, Fast Ethernet, simply adapted all transmission
parameters to the new speed. The other approach defined a new access
method - demand priority - and from that time on was referred to as project
group 802.12 by the IEEE. The sole disadvantage of the first proposal -
reducing the spatial extent of a network to one tenth of its size - became
insignificant due to the widespread availability of bridges and switches.
Consequently, it became the new standard. It was adopted in 1995.
Although 802.12 was also adopted, it hardly plays a role anymore.
ETHERNET Basics
Version 1.0 03/01 19
Overview 1.1 Historical Development of Ethernet
The next level of speed appeared once and for all to belong to another form
of transmission - ATM - which promised data rates in excess of 622 MBit.
This is why the idea of 1 GBit Ethernet, presented in 1995, was not taken very
seriously. As it turned out, this appeared to be a quite premature. Work on
the standard proceeded very quickly. For example, it was possible to adopt
transmission components from Fiberchannel. Products already became
available far before the standard was adopted in 1998. The first chips ap-
peared at the end of 1996, and functional devices hit the market a year later.
In 1999 even twisted pair transmission was standardized at this speed.
Ever since Gigabit Ethernet has become commonplace and the digitalization
has continued its torrid pace, calls for even more bandwidth have become
increasing louder. This has led to work on developing a 10 Gigabit Ethernet
standard that got underway in 1999.
ETHERNET Basics
20 Version 1.0 09/00
Overview 1.2 The ISO/IEC 8802-3 Standard
3 Collision Detection: If more than one member of the network start trans-
mitting data simultaneously, a data collision will result. The transmitting
members will detect the collision and terminate transmission. A backoff
strategy determines when the members can retry the data transmissions.
ETHERNET Basics
Version 1.0 03/01 21
Overview 1.2 The ISO/IEC 8802-3 Standard
Network access
Network member
ready to transmit
yes
Start to
Transmit
transmit data
jam signal
yes
Collision?
no
no End of
transmission?
yes
Terminate
network access
ETHERNET Basics
22 Version 1.0 09/00
Overview 1.2 The ISO/IEC 8802-3 Standard
1.2.2 Collisions
The logical result of the CSMA/CD method is that there is a finite probability
that multiple users could attempt to access the medium simultaneously. For
that reason, the access method must have a mechanism for dealing with any
collisions as they occur.
1 The following conventions have been agreed to for meeting these requi-
rements:
The signal transmission time depends on the minimum data packet
length. ISO/IEC 8802-3 defines the time window (slot time) to be the time
it takes from the beginning of the transmission until a collision at the far
end of the transmission medium occurs. The slot time is 51.2 µs.
The minimum data packet length is equal to the slot time. This insures
that the transmitting station can detect a collision while the transmission
is still taking place and therefore knows that the transmission has failed.
“Collision detection as a function of time and location. The jam (collision
notification) signal from member 2 reaches member 1 while member 1 is
still sending.” on page 24 shows this relationship. Network member 1
starts to transmit. Just before the transmission reaches network member
2, member 2 also begins to transmit. The signal from member 1 then rea-
ches member 2 who detects the collision and transmits the 32-bit jam
signal before terminating its own transmission. The jam signal arrives at
member 1 within the slot time interval, that is, while member 1 is still
transmitting. Member 1 is thus also able to detect the collision.
ETHERNET Basics
Version 1.0 03/01 23
Overview 1.2 The ISO/IEC 8802-3 Standard
Network Network
member member
1 2
0,5 Slot-
time 32 bit
32 bit 1 Slot-
time
1,5 Slot-
time Path
t t
If a data packet is shorter than the slot time, it is possible that a transmit-
ting member of the network might not be able to detect that a data packet
it had just sent has been damaged by a collision. In that case, there
would be no re-transmission of the damaged packet (see Fig. 4).
ETHERNET Basics
24 Version 1.0 09/00
Overview 1.2 The ISO/IEC 8802-3 Standard
Network Network
member member
1 2
0,5 Slot-
time 32 bit
1 Slot-
time
1,5 Slot-
time Path
t t
ISO/IEC specifies a slot time of 51.2 µs. Taking into consideration the
repeater propagation times of a network of maximum size, this results in
a maximum network size of 2500 meters. “Network Planning” on page 41
describes how this maximum can be extended.
ETHERNET Basics
Version 1.0 03/01 25
Overview 1.2 The ISO/IEC 8802-3 Standard
Path
The transmitted signals
pass through all seg-
ments and repeaters
Terminal 2 detects a
collision, terminates its
own data transmission,
and sends the jam signal
Terminal 1 detects
the collision
Time
2 If32amore
transmitting network station detects a collision, it must send at least
bits (jam size) before finally terminating its transmission attempt.
This minimum collision duration of 3.2 µs insures that each station in the
network detects the collision.
ETHERNET Basics
26 Version 1.0 09/00
Overview 1.2 The ISO/IEC 8802-3 Standard
3 Ifduea station in the network is unable to transmit its data packet completely
to a collision, then it must wait a predetermined length of time and re-
attempt the transmission.
First trans- no
mission attempt?
yes
no
Backoff < 1024?
yes
Wait time:=
random number * slot time * backoff
End
ETHERNET Basics
Version 1.0 03/01 27
Overview 1.2 The ISO/IEC 8802-3 Standard
The varying bit loss (preamble loss) of two successive data packets on the
same path can cause the interpacket gap to shrink. A repeater regenerates
the lost preamble bits of any packet passing through it. This gap shrinkage
is called interpacket gap shrinkage.
If the first data packet (frame) loses more preamble bits on reception than the
subsequent packet - A and B (see Fig. 7), then the gap will be reduced after
the preamble has been regenerated by the repeater - C (see Fig. 7).
ETHERNET Basics
28 Version 1.0 09/00
Overview 1.2 The ISO/IEC 8802-3 Standard
IFG
Frame 1 Frame 2
A
t
Preamble loss
Frame 1 Frame 2
B
t
C
t
These restrictions are removed for full duplex operation. Instead of the well
known bus structure, a point-to-point or bridge-to-bridge connection is used.
Transmitting and receiving are conducted over two separate lines so that
CSMA/CD rules can be ignored. Transmitting and receiving can take place
at the same time at a particular port, which means that twice the bandwidth
is available. By eliminating collisions it is possible to increase the effective
data throughput by a factor of almost 10. The effective maximum through-put
ETHERNET Basics
Version 1.0 03/01 29
Overview 1.2 The ISO/IEC 8802-3 Standard
Certain PC controller cards, such as that of Compaq and IBM, also supports
this full duplex function, so that the 20 Mbit/s bandwidth can be achieved in
a direct connection between these devices and a switch.
RS2-TX/TX RS2-TX/TX
i i
7 7
+24V +24V
Fault Fault
+24V*
FAULT
6
F/O cable +24V*
FAULT
6
P2 P1 P2 P1
Stand by RM Stand by RM
7 6 5 4 7 6 5 4
RS2-FX/FX RS2-FX/FX
5 4 5 4
3 2 3 2
2 3 2 2 3 2
1 0 1 0
RM RM
Stand by Stand by
1 1
V.24 V.24
Stand by Stand by
2 x 10 Mbit/s = 20 Mbit/s
LAN 1 LAN 2
ETHERNET Basics
30 Version 1.0 09/00
Overview 1.3 Frame structure
Within the scope of the CSMA/CD access principle, data frames specified in
ISO/IEC 8802-3 are used for data transfer.
A frame is a data packet with a defined form and length that consists of si-
gnals in Manchester code. A frame is transferred serially with a data rate of
10 Mbit/second, whereby the individual bits are combined in octets (bytes of
8 bits each). All octets of one frame, with the exception of the Frame Check
Sequence Field (FCS), are transferred with the least significant bit (LSB) first.
Octet
LSB MSB
20 21 22 23 24 25 26 27
Time
ETHERNET Basics
Version 1.0 03/01 31
Overview 1.3 Frame structure
U Preamble Field
The preamble, consisting of a string of alternate ones and zeros, serves
to stabilize and synchronize the respective recipient to the incoming
frame.
U Length/Type Field
The ISO/IEC 8802-3 standard uses this field as the length field to specify
the number of octets in the subsequent data field that are to be transfer-
red (values between 0 and 1518).
Ethernet Version 2.0 specifies this field as the type field, which contains
parameters specific to the manufacturer (values > 1518).
ETHERNET Basics
32 Version 1.0 09/00
Overview 1.3 Frame structure
A data field that is less than 46 octets is filled up by a pad field containing
additional octets.
ld
F ie ield
r F d
ite ess i el
im r F d
d Del dd s s iel
e l A e F k
Fi me on d dr pe ec ield
e
bl Fra nat
i A /Ty ie
ld e ld
el
h
d C F
m t ti c e t h F Fi Fi me nce
ea tar es ur eng ta at
a d a e
r
P S D o
S L Da D Pa Fr qu
Se
ETHERNET Basics
Version 1.0 03/01 33
Overview 1.3 Frame structure
ETHERNET Basics
34 Version 1.0 09/00
Overview 1.4 IP address
1.4 IP address
The IP address consists of 4 bytes. These 4 bytes are written in decimal no-
tation, each separated by a dot.
Since 1992, five classes of IP addresses have been defined in RFC 1340.
The most frequently used address classes are A, B and C.
0 31
Network address Host address
All IP addresses belong to class A when their first bit is a zero, i.e. the first
decimal number is less than 128.
The IP address belongs to class B if the first bit is a one and the second bit
is a zero, i.e. the first decimal number is between 128 and 191.
The IP address belongs to class C if the first two bits are a one, i.e. the first
decimal number is higher than 191.
Assigning the host address (host id) is the responsibility of the network
operator. He alone is responsible for the uniqueness of the IP addresses he
assigns.
ETHERNET Basics
Version 1.0 03/01 35
Overview 1.4 IP address
The bits of the host address (host id) that are to be shown by the mask are
set to one. The other host address bits are set to zero in the network mask
(see following example).
Decimal notation
255.255.192.0
Binary notation
11111111.11111111.11000000.00000000
Subnetwork mask bits
Class B
ETHERNET Basics
36 Version 1.0 09/00
Overview 1.4 IP address
Decimal notation
129.218.65.17
128 < 129 ≤ 191 ➝ Class B
binary notation
10000001.11011010.01000001.00010001
Subnetwork 1
Network address
Decimal notation
129.218.129.17
128 < 129 ≤ 191 ➝ Class B
binary notation
10000001.11011010.10000001.00010001
Subnetwork 2
Network address
ETHERNET Basics
Version 1.0 03/01 37
Overview 1.4 IP address
Romeo
Juliet
Lorenzo
LAN 1
LAN 2
Fig. 12: Management agent that is separated from its management station by a
router
Romeo then places this envelope in a second one with Lorenzo’s MAC
address as the destination and his own MAC address as the source. This
process is comparable to going from Layer 3 to Layer 2 of the ISO/OSI base
reference model.
Finally, Romeo puts the entire data packet into the mailbox. This is compa-
rable to going from Layer 2 to Layer 1, i.e. to sending the data packet via the
Ethernet.
Lorenzo receives the letter and removes the outer envelope. From the inner
envelope he recognizes that the letter is meant for Juliet. He places the inner
envelope in a new outer envelope and searches his address list (the ARP ta--
ble) for Juliet’s MAC address. He writes her MAC address on the outer enve-
lope as the destination address and his own MAC address as the source
address. He then places the entire data packet into the mail box.
ETHERNET Basics
38 Version 1.0 09/00
Overview 1.4 IP address
Juliet receives the letter and removes the outer envelope, exposing the inner
envelope with Romeo’s IP address. Opening the letter and reading its con--
tents corresponds to transferring the message to the higher protocol layers
of the ISO/OSI layer model.
Juliet would now like to send a reply to Romeo. She places her reply in an
envelope with Romeo’s IP address as destination and her own IP address as
source. The question then arises, where should she send the letter, since she
did not receive Romeo’s MAC address. It was lost when Lorenzo replaced
the outer envelope.
By comparing her IP address to Romeo's with the aid of the network mask,
Juliet would immediately recognize that Romeo lives nowhere close by, and
that to call out the window would be pointless.
In the MIB, Juliet finds Lorenzo listed under the variable hmNetGate-
wayIPAddr as a means of communicating with Romeo. The envelope with
the IP addresses is therefore placed in a further envelope with the MAC de-
stination address of Lorenzo.
The letter then travels back to Romeo via Lorenzo the same way the first let-
ter traveled from Romeo to Juliet.
ETHERNET Basics
Version 1.0 03/01 39
Overview 1.4 IP address
ETHERNET Basics
40 Version 1.0 09/00
Network Planning
2 Network Planning
The path variability value (see “Variability” on page 59) is just as important
for correct network functioning as signal delay value. Until now, it was neces-
sary to limit the number of repeaters to four in order to guarantee a minimum
interpacket gap size. The limitation of four repeaters was dropped from the
standard with the publication of Chapter 13 of ISO/IEC 8802-3. Instead of li-
miting the number of repeaters in a network, Chapter 13 specifies the maxi-
mum amount by which the interpacket gap can shrink and how this amount
can be calculated for a particular signal path.
ETHERNET Basics
Version 1.0 03/01 41
Network Planning
ETHERNET Basics
42 Version 1.0 09/00
Network Planning 2.1 Planning Rules
DTE
min. 2.5 m
Transceiver cable
max. 50 m Terminator
In order to expand the network, the norm prescribes the use of repeaters for
coupling two segments together.
ETHERNET Basics
Version 1.0 03/01 43
Network Planning 2.1 Planning Rules
Transceiver cable
max. 50 m Terminator
Repeater
DTE
R
The delay value through a repeater is approximately the same as the delay
value through a 500 meter coax segment.
This means that a signal path can contain a maximum of four repeaters and
five coax segments. Of the five coax segments, at least two must be pure
connecting segments (link segments) to which no stations are attached.
ETHERNET Basics
44 Version 1.0 09/00
Network Planning 2.1 Planning Rules
Transceiver cable
max. 50 m Terminator
Transceiver
Link Segment
DTE
Repeater
Because the thick yellow coax cable was too costly and too difficult to handle,
the standard was extended to include the RG 58 coax cable. This was named
the Cheapernet or thin wire Ethernet (10BASE2).
ETHERNET Basics
Version 1.0 03/01 45
Network Planning 2.1 Planning Rules
With a few restrictions and changes, the general specifications for the old
standard were also applied to the newer standard. The trans-mission quality
of this cable allows a maximum segment length of only 185 meters. Also,
each segment can have a maximum of only 30 transceivers attached with a
minimum spacing of 0.5 meters.
DTE
min. 0.5 m
Transceiver cable
max. 50 m Terminator
The increased popularity of this LAN type led to user requirements for more
flexible connection capabilities:
D thinner cable diameters
D lower cost cable
D use of already installed telephone wiring
D use of already installed IBM Type 1 cabling
D better transmission characteristics
D better interception security
D reduction of the problems due to potential differences
D greater distance
D resistance to electromagnetic interference
ETHERNET Basics
46 Version 1.0 09/00
Network Planning 2.1 Planning Rules
Table 3: The most important parameters for the media allowed by ISO/IEC 8802-3
Components Delay
RT2-TX/FX 84 BT
Class II Repeater 92 BT
Terminal equipment with TP connection 50 BT
Terminal equipment with F/O connection 50 BT
Kat. 5 TP cable 1,112 BT/m
F/O cable 1 BT
Savety margin 4 BT
ETHERNET Basics
Version 1.0 03/01 47
Network Planning 2.1 Planning Rules
ETHERNET Basics
48 Version 1.0 09/00
Network Planning 2.2 Maximum Network Size
Model 2 takes the delay values of all the network components in the signal
path into consideration. Considering all delay values is a very complex task,
so Model 2 uses a simplification and defines fixed delay values for the indivi-
dual segments. The disadvantage of this simplification is the invariance of
the delay values for the various segments.
The following model for calculating the maximum network range is derived
from Model 2. It has been optimally tailored to calculate a LAN made up of
Hirschmann network components. Just like Model 2, it includes all network
components found in the signal path. Only the form of the simplification has
been changed, which leads to a much more precise calculation of maximum
network range.
The basis for calculating the maximum network range is the maximum allo-
wable signal delay value in the signal path between any two network stations.
The critical case most frequently encountered can be found in the following
situation (see Fig. 17).
ETHERNET Basics
Version 1.0 03/01 49
Network Planning 2.2 Maximum Network Size
Station 1 transmits data to station 2, which is quite close. The data is then
sent into the rest of the network. Just before the data reaches station 3, sta-
tion 3 starts to send data to station 1 (cf. Appendix B, System Guidelines,
B1.1 IEEE Std. 802.3-1985 Baseband Systems). Because station 3 must be
sure to detect the data collision, the maxi-mum distance between stations 1
and 3 is 4520 meters given the standard minimum packet length and delay
value through an ideal transmission link (fiber optic only).
min. distance
max. distance
Signal delays in the individual components of the signal path form a signifi-
cant part of the total signal delay value. The delay value for a component is
a simple way to determine the effect the delay value through the component
has on the maximum range of the network.
Note: The conversion from time units to distance units assumes a cable pro-
pagation delay of 5 ns/m. A UTP cable has a signal delay of 5.6 ns/m(See
“The most important parameters for the media allowed by ISO/IEC 8802-3”
on page 47.)
ETHERNET Basics
50 Version 1.0 09/00
Network Planning 2.2 Maximum Network Size
V In order to determine if you comply with the standard, calculate the signal
propagation time between the two members of the network that are
farthest apart from one another.
Add up the values for all of the components within the signal path. The
table on page 47 lists all of the components belonging to the Hirschmann
network concept. Signal delay for each component is specified in terms of
the "propagation equivalent".
This total plus the length of the cable in the signal path must not exceed
4520 meters. In order to correctly compensate for the slower propagation
velocity in UTP cable segments, you should add 10% to the length of tho-
se cables..
ETHERNET Basics
Version 1.0 03/01 51
Network Planning 2.2 Maximum Network Size
Example 1:
The figure (see Fig. 18) shows a local area network that consists of twisted
pair segments.
Seven Rail Hubs RH1-TP/FL lie in the signal path between the two network
stations shown in the figure.
DTE 2
UTP
UTP
UTP
= Connection to FL port
ETHERNET Basics
52 Version 1.0 09/00
Network Planning 2.2 Maximum Network Size
The propagation equivalent for the interface cards and transceivers is calcu-
lated as follows:
DTE 1
Transceiver Mini-UTDE 140 m
Rail Hub 1 TP 95 m
TP 95 m
Rail Hub 2 TP 95 m
TP 95 m
Rail Hub 3 TP 95 m
TP 95 m
Rail Hub 4 TP/FL 180 m
TP/FL 180 m
Rail Hub 5 FL 130 m
FL 130 m
Rail Hub 6 TP/FL 180 m
TP/FL 180 m
Rail Hub 7 TP 95 m
TP 95 m
Transceiver Mini-UTDE 140 m
DTE 2
Σ 2020 m
ETHERNET Basics
Version 1.0 03/01 53
Network Planning 2.2 Maximum Network Size
Example 2:
The figure (see Fig. 19) shows a LAN whose coax segments are connected
together by fiber optic cables and star couplers. There are 5 star couplers
equipped with 2 KYDE-S µC coax interface cards and 8 OYDE-S µC optical
interface cards located between the network stations.
coax coax
DTE 1 DTE 2
ETHERNET Basics
54 Version 1.0 09/00
Network Planning 2.2 Maximum Network Size
The propagation equivalent for the interface cards and transceivers is calcu-
lated as follows:
DTE 1
Transceiver KTDE-S 205 m
Star coupler 1 KYDE-S µC 50 m
OYDE-S µC 40 m
Star coupler 2 OYDE-S µC 40 m
OYDE-S µC 40 m
Star coupler 3 OYDE-S µC 40 m
OYDE-S µC 40 m
Star coupler 4 OYDE-S µC 40 m
OYDE-S µC 40 m
Star coupler 5 OYDE-S µC 40 m
KYDE-S µC 50 m
Transceiver KTDE-S 205 m
DTE 2
Σ 830 m
ETHERNET Basics
Version 1.0 03/01 55
Network Planning 2.2 Maximum Network Size
Example 3:
The figure (see Fig. 20) shows a mixed LAN consisting of coax, fiber optic
and twisted pair segments. Because more than five star couplers are casca-
ded in the network, it is necessary to use a repeater. Interface cards with
clock regeneration - in this case the ECFL2 - realise all repeater functions.
DTE 2
UTP
UTP
fibre-
optic
= connection to OYDE-S µC
= transceiver = terminator
Fig. 20: Cascading of more than five star couplers possible using a retiming path
ETHERNET Basics
56 Version 1.0 09/00
Network Planning 2.2 Maximum Network Size
The propagation equivalent for the interface cards and transceivers is calcu-
lated as follows:
DTE 1
Transceiver KTDE-S 205 m
Star coupler 1 KYDE-S µC 50 m
OYDE-S µC 40 m
Star coupler 2 OYDE-S µC 40 m
OYDE-S µC 40 m
Star coupler 3 OYDE-S µC 40 m
ECFL2 170 m
Star coupler 4 ECFL2 170 m
OYDE-S µC 40 m
Star coupler 5 OYDE-S µC 40 m
OYDE-S µC 40 m
Star coupler 6 OYDE-S µC 40 m
OYDE-S µC 40 m
Star coupler 7 OYDE-S µC 40 m
UYDE 170 m
Star coupler 8 UYDE 170 m
UYDE 170 m
Transceiver Mini-UTDE 140 m
DTE 2
Σ 1645 m
ETHERNET Basics
Version 1.0 03/01 57
Network Planning 2.2 Maximum Network Size
ETHERNET Basics
58 Version 1.0 09/00
Network Planning 2.3 Variability
2.3 Variability
Just as it is necessary to check the signal run time, there is also a need to
check the Path Variability Value (PVV).
The PVV along the path between network stations must not exceed 49 BT.
ETHERNET Basics
Version 1.0 03/01 59
Network Planning 2.3 Variability
The transceiver connected to the second network station does not contri-
bute towards shrinkage of the packet interval. A value of 40 BT remains
as the budget for the other transmission components in the signal path
DTE 1
RH1-
DTE 2
TP/FL
UTDE
1 2
Fig. 21: Calculating the PVV
ETHERNET Basics
60 Version 1.0 09/00
Network Planning 2.3 Variability
ECFL4
ECAUI
CYDE
OYDE-S µC 2 2 4 2 3
KYDE-S µC - 2 4 2 3
CYDE - - 5 4 6
ECAUI - - - 2 3
ECFL4 - - - - 3
Variability Value
RH1-TP (TP ÷ TP) 3 BT
RH1-TP/FL (TP ÷ TP) 3 BT
RH1-TP/FL (TP ÷ FL) 6 BT
RH1-TP/FL (FL ÷ FL) 3 BT
RT1-TP/FL 3 BT
Mini OTDE 2 BT
KTDE-S 6 BT
Mini KTDE 6 BT
Mini UTDE 2 BT
ETHERNET Basics
Version 1.0 03/01 61
Network Planning 2.3 Variability
Example
The path variability value for the example in the figure (see Fig. 22) is calcu-
lated, starting from DTE 1, as follows:
Pair CYDE/ECFL4 6 BT
RH1-TP/FL, FL to TP 6 BT
RH1-TP/FL, TP to TP 3 BT
RH1-TP 3 BT
RH1-TP 3 BT
RH1-TP/FL, TP to FL 6 BT
RT1-TP/FL 1 BT
28 BT
Thus: 28 BT ≤ 40 BT
Note: Exclusive this components which are above the grey lines contribute
to the PVV. The both transceivers below the grey lines are just taken into
consideration within the budget and are not longer calculated to the PVV.
ETHERNET Basics
62 Version 1.0 09/00
Network Planning 2.3 Variability
RT1-
ECFL4 CYDE TP/FL
ASGE …
DTE 2
DTE 1 Mini-UTDE
Mini-KTDE
ETHERNET Basics
Version 1.0 03/01 63
Network Planning 2.3 Variability
ETHERNET Basics
64 Version 1.0 09/00
Network Planning 2.4 Redundancy
2.4 Redundancy
There are particularly critical areas in which data security is assigned abso-
lute priority. To circumvent any possible failure of the transmission medium
or of a concentrator in such areas, a standby line is frequently laid in a sepa-
rate cable line. The interface cards and units featuring a redundancy function
enable automatic changeover between one main line and a standby line.
ETHERNET Basics
Version 1.0 03/01 65
Network Planning 2.4 Redundancy
RM
Main link
Link in redundancy mode
ETHERNET Basics
66 Version 1.0 09/00
Network Planning 2.4 Redundancy
3 Network size:
In redundantly structured networks, the failure of links results in new
network topologies.
4 Variability:
In redundantly structured networks, the failure of links results in new
network topologies.
5 Ifmission
Rules 1 to 4 have been obeyed, then any number of redundant trans-
links may occur in one network.
RM RM
Main link
Link in redundancy mode
ETHERNET Basics
Version 1.0 03/01 67
Network Planning 2.4 Redundancy
U Line configuration
The RS2-../.. enables the setup of backbones in the line configurations.
Cascading takes place via the backbone ports.
Line structure
ETHERNET Basics
68 Version 1.0 09/00
Network Planning 2.4 Redundancy
The RS2-../.. is integrated into the ring via the backbone ports (ports 6
and 7). It is possible to mix the RS1 and RS2-../.. in any combination
within the redundant ring. If a line section fails, the ring structure of up to
50 RS1/ RS2-../.. transforms back to a line configuration within 0.5
seconds.
Note: The function “Redundant ring” requires the following setting for
ports 6 and 7: 100 Mbit/s, full duplex and autonegotiation (state on delive-
ry).
ETHERNET Basics
Version 1.0 03/01 69
Network Planning 2.4 Redundancy
redundant line
redundant line
Redundant coupling
Redundant coupling
Redundant coupling
of ring 1 and ring 2
main line
main line
1) : crossover twisted pair cable
2) : For redundant coupling of rings you use port 1 of the
RS2/RS1 for the main line and for the redundant line .
2) 2)
RS2 RS2 RS2 2) RS1 2) RS1 RS2
Two network segments are connected over two separate paths with one
RS2-../.. each.
The redundancy function is assigned to the RS2-../.. in the redundant link
via the standby DIP switch setting.
The RS2-../.. in the redundant line and the RS2-../.. in the main line
inform each other about their operating states via the control line (cros-
sed twisted pair cable).
Note: The main and redundant lines must be connected to port 1 of the
respective RS2-../..s.
Immediately after the main line fails, the redundant RS2-../.. switches to
the redundant line. As soon as the main line is restored to normal opera-
tion, the RS2-../.. in the main line informs the redundant RS2-../... The
main line is activated, and the redundant line is re-blocked.
An error is detected and eliminated within 0.5 seconds.
ETHERNET Basics
70 Version 1.0 09/00
Network management
3 Network management
ETHERNET Basics
Version 1.0 03/01 71
Network management
ETHERNET Basics
72 Version 1.0 09/00
Network management 3.1 Management principles
In the mid 70's the International Organization for Standardization ISO began
developing a model within the framework of Open Systems Interconnection
OSI that defined communication interfaces between devices in a computer
network, thus enabling the use of hardware from different manufacturers in
one single network.
The ISO/OSI basic reference model was issued as a standard in 1984. See
“Historical Development of Ethernet” on page 17.
6 Presentation Layer
5 Session Layer
4 Transport Layer
ETHERNET Basics
Version 1.0 03/01 73
Network management 3.1 Management principles
5-7 SNMP
4 UDP TCP
3 IP RARP/ARP
Fig. 29: Affiliation of the SNMP protocol stack to the OSI reference model
ETHERNET Basics
74 Version 1.0 09/00
Network management 3.1 Management principles
D Security management
– Password management
– Privilege management
– Access management
– Detecting unauthorized network users
D Accounting management
– Aids to accounting
– Verifying invoices
– Registering cost shares (each user's communication volume)
– Distributing these costs
ETHERNET Basics
Version 1.0 03/01 75
Network management 3.1 Management principles
Executive
Communication management
Management operations Operations
Manager Agent
Messages Sending
ETHERNET Basics
76 Version 1.0 09/00
Network management 3.2 Statistic tables
It is not sufficient for the network manager merely to be given the information
that an error has occurred in the network. Conclusions about network reliabi-
lity can only be drawn when the error frequency is known.
The management card records errors and events in statistics tables based
on statistics counters.
ETHERNET Basics
Version 1.0 03/01 77
Network management 3.2 Statistic tables
ETHERNET Basics
78 Version 1.0 09/00
Network management 3.3 Security
3.3 Security
3.3.1 SNMP
The Hirschmann agent communicates with the network management station
via the Simple Network Management Protocol. Therefore the network mana-
gement station uses the F network management software or the web
based interface.
Every SNMP packet contains the IP address of the sending computer and the
community under which the sender of the packet will access the Hirschmann
agent MIB.
The Hirschmann agent receives the SNMP packet and compares the IP
address of the sending computer and the community with the entries in the
access table for communities and the access table for hosts of its MIB. If the
community has the appropriate access right, and if the IP address of the sen-
ding computer has been entered, then the Hirschmann agent will allow
access.
In the delivery state, the Hirschmann agent is accessible via the community
”public” (read only) and ”private” (read and write) from every computer.
V First define a new community which you can access from your computer
with all rights.
Note: make a note of the community name and the associated index. For re-
asons of security, the community name cannot be read later. Access to the
community access, trap destination and trap configuration table is made via
the community index.
V Treat this community with discretion since everyone who knows the
community can access the switch MIB with the IP address of your com-
puter.
V Limit the access rights of the known communities or delete their entries.
ETHERNET Basics
Version 1.0 03/01 79
Network management 3.3 Security
Traps can be sent to various hosts to increase the transmission reliability for
the messages. A trap message consists of a packet that is not acknow-
ledged.
The management agent sends traps to those hosts that are entered in the
trap destination table. The trap destination table can be configured with the
management station via SNMP.
ETHERNET Basics
80 Version 1.0 09/00
Switching Functions
4 Switching Functions
ETHERNET Basics
Version 1.0 03/01 81
Switching Functions
ETHERNET Basics
82 Version 1.0 09/00
Switching Functions 4.1 Frame switching
ETHERNET Basics
Version 1.0 03/01 83
Switching Functions 4.1 Frame switching
4.1.4 Prioritization
The received data packets are assigned to priority queues (traffic classes in
compliance with IEEE 802.1D) by the priority of the data packet contained in
the VLAN tag.
This function prevents high priority data traffic being disrupted by other traffic
during busy periods. The traffic of lower priority will be dropped when the me-
mory or transmission channel is overloaded.
4.1.5 Tagging
The VLAN tag is integrated into the MAC data frame for the VLAN and prio-
ritization functions in accordance with the IEEE 802.1 Q standard. The VLAN
tag consists of 4 bytes. It is inserted between the source address field and
the type field.
When a data packet is being read, the two bytes are interpreted as type field
according to the source address. The content of these two bytes ”81 00” iden-
tifies this data packet as a data packet with an embedded tag.
ETHERNET Basics
84 Version 1.0 09/00
Switching Functions 4.1 Frame switching
ld
F ie ield
r F d
ite ess i el
F d
d e lim dr s s i el
d
el D A re F k d
Fi e on d d p e
ec iel
e m i
bl Fra nat A ld /Ty el
d ld d C Fh
e i e h i Fi
e el e
m t ti c F t F Fi me nc
r ea tar es o ur ag ng at
a
ata d a e
P S D S T Le D D Pa Fr qu
Se
7 1 6 6 4 2 42-1500 Octets 4
t
ier
r ntif
if ie I de
nt Bi
t
at
Ide , 3 orm ie
r
ol y
rit l F nt
i f
oc io ica de
r ot r I
P t
g Bi r P on AN it
a se an it L
T x8 U C B V B
2 1 12
4 Octets
ETHERNET Basics
Version 1.0 03/01 85
Switching Functions 4.1 Frame switching
Data packets with VLAN tag, the RS2 evaluates the 3 Bit priority field within
the VLAN tag.
ETHERNET Basics
86 Version 1.0 09/00
Switching Functions 4.2 Parallel Connection
If all eight ports are set to full duplex operation (see “Full duplex” on page
29), this results in a theoretical data throughput of 80 Mbit/s for the RS2-../...
Fig. 33: Example for a data throughput of 80 Mbit/s for an 8-port RS2-../.. in full
duplex operation
ETHERNET Basics
Version 1.0 03/01 87
Switching Functions 4.2 Parallel Connection
RS2-TX/TX
i
7
+24V
erve r 1 erve r 2
S
S
Fault
+24V*
6
FAULT
P2 P1
Stand by
5
RM
4
5 4
RS2-TX/TX
3 2
2 3 2
1 0
RM
Stand by
1
V.24
Stand by
LAN 1 LAN 2
ETHERNET Basics
88 Version 1.0 09/00
Spanning tree algorithm
Local area networks are becoming ever larger. This is true both for their geo-
graphic size as well as for the number of stations they include. As the net-
works become larger, there are reasons why it often makes sense to
implement several bridges:
D reduce network load in subnetworks
D create redundant connections and
D overcome distance limitations
Using many bridges with multiple connections between the subnetworks can
lead to considerable problems, possibly even to total network failure if the
bridges are configured incorrectly. The spanning tree algorithm described in
IEEE 802.1D was developed to prevent this.
Note: The standard demands, that all bridges of a mash have to work with
the spanning tree algorithm.
ETHERNET Basics
Version 1.0 03/01 89
Spanning tree algorithm
ETHERNET Basics
90 Version 1.0 09/00
Spanning tree algorithm 5.1 Tasks
5.1 Tasks
The spanning tree algorithm reduces the topology of any network that is con--
nected using bridges to a single tree structure. The root bridge forms the ori--
gin of the tree structure. Any rings that could occur are broken according to
pre-defined rules. If there should be a path failure, the algorithm will repeal
the loop breakage in order to maintain the data traffic. It is thus possible to
increase data reliability by redundant connections.
ETHERNET Basics
Version 1.0 03/01 91
Spanning tree algorithm 5.1 Tasks
ETHERNET Basics
92 Version 1.0 09/00
Spanning tree algorithm 5.2 Rule for creating the tree structure
The MAC address and priority are kept in the Management Information Base
(see “dot1dBridge (1.3.6.1.2.1.17)” on page 117):
– dot1dBaseBridgeAddress (1.3.6.1.2.1.17.1.1.0)
– dot1dStpPriority (1.3.6.1.2.1.17.2.2.0)
MSB LSB
ETHERNET Basics
Version 1.0 03/01 93
Spanning tree algorithm 5.2 Rule for creating the tree structure
The root path costs are calculated by adding up of the individual path costs
for the paths that a data packet must traverse between the port of a bridge
and the root bridge.
The root path costs and individual path costs are stored in the Management
Information Base (see “dot1dBridge (1.3.6.1.2.1.17)” on page 117):
– dot1dStpRootCost (1.3.6.1.2.1.17.2.6.0)
– dot1dStpPortPathCost (1.3.6.1.2.1.17.2.15.1.5.Index)
ETHERNET Basics
94 Version 1.0 09/00
Spanning tree algorithm 5.2 Rule for creating the tree structure
Bridge 1
PK = 100 PK = 15 625
PK Path costs
Ethernet (10 Mbit/s)
PK = 100
Bridge 2 Bridge 3 X.21 (64 kbit/s)
– dot1dStpPort (1.3.6.1.2.1.17.2.15.1.1.Index)
– dot1dStpPortPriority (1.3.6.1.2.1.17.2.15.1.2.Index)
MSB LSB
Priority Portnumber
ETHERNET Basics
Version 1.0 03/01 95
Spanning tree algorithm 5.2 Rule for creating the tree structure
In order to compute their tree structures, the bridges need information about
other bridges that are present in the network. This information is obtained by
each bridge sending a BPDU (Bridge Protocol Data Unit) to all other bridges.
ETHERNET Basics
96 Version 1.0 09/00
Spanning tree algorithm 5.2 Rule for creating the tree structure
yes
Using the network diagram (see Fig. 39), it is possible to follow the logic in
the flow chart (see Fig. 38) for determining the root path. The bridge with the
numerically smallest bridge identification (in this case, bridge 1) is selected
as the root bridge. In this example the partial paths all have the same path
costs. The path between bridge 2 and bridge 3 is removed because a con-
nection from bridge 3 to the root bridge via bridge 2 would result in twice the
path costs.
ETHERNET Basics
Version 1.0 03/01 97
Spanning tree algorithm 5.2 Rule for creating the tree structure
D The path via bridges 5 and 3 generates the same root path costs as the
path via bridges 4 and 2.
D The path via bridge 4 is selected because the bridge identifier 40 is nume-
rically less than 50.
There are however two paths between bridge 6 and bridge 4. In this case, the
larger port priority is decisive.
BID =10
Bridge 1
Bridge 2 Bridge 3
BID =70
Bridge 7
Bridge 4 Bridge 5
ETHERNET Basics
98 Version 1.0 09/00
Spanning tree algorithm 5.2 Rule for creating the tree structure
BID = 10
Bridge 2
Bridge 6 Bridge 5
Port 1 Port 2
ETHERNET Basics
Version 1.0 03/01 99
Spanning tree algorithm 5.2 Rule for creating the tree structure
ETHERNET Basics
100 Version 1.0 09/00
Management Information Base MIB
Example:
The generic object class
is the description of the abstract information „current port state“. It is, howev-
er, not possible to read any information from this, as the system does not
know which port is meant.
images this abstract information on the reality (instantiates it), which means
that it refers to port state of port 4. A value is assigned to this instance and
can then be read. The instance „get 1.3.6.1.2.1.17.2.15.1.3.4“ for
example, returns the response „5“, this means that port 4 is forwarding data.
ETHERNET Basics
Version 1.0 03/01 101
Management Information Base MIB
IP address xxx.xxx.xxx.xxx
(xxx = integer in the range 0-255)
TimeTicks Stopwatch
Elapsed time (in seconds) = numerical value / 100
Numerical value = integer in the range 0 - 23 2
ETHERNET Basics
102 Version 1.0 09/00
Management Information Base MIB
1 iso
3 org
6 dod
1 internet
2 mgmt 4 private
1 mib-2 1 enterprises
248 hirschmann
1 system
14 hmConfiguration
2 interfaces
3 at
4 ip
5 icmp
6 tcp
7 udp
8 egp
11 snmp
16 rmon
17 dot1dBridge
26 MauMgt
ETHERNET Basics
Version 1.0 03/01 103
Management Information Base MIB
ETHERNET Basics
104 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
6.1 MIB II
(1) system
|-- (1) sysDescr
|
|-- (2) sysObjectID
|
|-- (3) sysUpTime
|
|-- (4) sysContact
|
|-- (5) sysName
|
|-- (6) sysLocation
|
|-- (7) sysServices
sy sD e scr
OID 1.3.6.1.2.1.1.1.0
Access Read
ETHERNET Basics
Version 1.0 03/01 105
Management Information Base MIB 6.1 MIB II
sy sO b je c tID
OID1.3.6.1.2.1.1.2.0
Access Read
s y s U p T im e
OID 1.3.6.1.2.1.1.3.0
Access Read
Description The time in 1/100 seconds since the last reset of the net-
work management unit.
sy sC o n ta c t
OID1.3.6.1.2.1.1.4.0
ETHERNET Basics
106 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
sy sN a m e
OID1.3.6.1.2.1.1.5.0
s y s L o c a tio n
OID 1.3.6.1.2.1.1.6.0
s y s S e r v ic e s
OID 1.3.6.1.2.1.1.7.0
Access Read
ETHERNET Basics
Version 1.0 03/01 107
Management Information Base MIB 6.1 MIB II
(2) interfaces
|-- (1) ifNumber
|
|-- (2) ifTable
|-- (1) ifEntry
|-- (1) ifIndex
|
|-- (2) ifDescr
|
|-- (3) ifType
|
|-- (4) ifMtu
|
|-- (5) ifSpeed
|
|-- (6) ifPhysAddress
|
|-- (7) ifAdminStatus
|
|-- (8) ifOperStatus
|
|-- (9) ifLastChange
|
|-- (10) ifInOctets
|
|-- (11) ifInUcastPkts
|
|-- (12) ifInNUcastPkts
|
|-- (13) ifInDiscards
|
|-- (14) ifInErrors
|
|-- (15) ifInUnknownProtos
|
|-- (16) ifOutOctets
|
|-- (17) ifOutUcastPkts
|
|-- (18) ifOutNUcastPkts
|
ETHERNET Basics
108 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
(3) at
|-- (1) atTable
|-- (1) atEntry
|-- (1) atIfIndex
|
|-- (2) atPhysAddress
|
|-- (3) atNetAddress
(4) ip
|-- (1) ipForwarding
|
|-- (2) ipDefaultTTL
|
|-- (3) ipInReceives
|
|-- (4) ipInHdrErrors
|
|-- (5) ipInAddrErrors
|
|-- (6) ipForwDatagrams
|
|-- (7) ipInUnknownProtos
|
ETHERNET Basics
Version 1.0 03/01 109
Management Information Base MIB 6.1 MIB II
ETHERNET Basics
110 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
(5) icmp
|-- (1) icmpInMsgs
|
|-- (2) icmpInErrors
|
|-- (3) icmpInDestUnreachs
|
|-- (4) icmpInTimeExcds
|
|-- (5) icmpInParmProbs
|
|-- (6) icmpInSrcQuenchs
|
|-- (7) icmpInRedirects
|
|-- (8) icmpInEchos
|
|-- (9) icmpInEchoReps
|
|-- (10) icmpInTimestamps
|
|-- (11) icmpInTimestampReps
|
|-- (12) icmpInAddrMasks
|
|-- (13) icmpInAddrMaskReps
|
|-- (14) icmpOutMsgs
|
|-- (15) icmpOutErrors
|
|-- (16) icmpOutDestUnreachs
|
|-- (17) icmpOutTimeExcds
|
|-- (18) icmpOutParmProbs
|
|-- (19) icmpOutSrcQuenchs
|
|-- (20) icmpOutRedirects
|
|-- (21) icmpOutEchos
|
|-- (22) icmpOutEchoReps
|
|-- (23) icmpOutTimestamps
|
|-- (24) icmpOutTimestampReps
|
|-- (25) icmpOutAddrMasks
|
|-- (26) icmpOutAddrMaskReps
ETHERNET Basics
Version 1.0 03/01 111
Management Information Base MIB 6.1 MIB II
(6) tcp
|-- (1) tcpRtoAlgorithm
|
|-- (2) tcpRtoMin
|
|-- (3) tcpRtoMax
|
|-- (4) tcpMaxConn
|
|-- (5) tcpActiveOpens
|
|-- (6) tcpPassiveOpens
|
|-- (7) tcpAttemptFails
|
|-- (8) tcpEstabResets
|
|-- (9) tcpCurrEstab
|
|-- (10) tcpInSegs
|
|-- (11) tcpOutSegs
|
|-- (12) tcpRetransSegs
|
|-- (13) tcpConnTable
| |-- (1) tcpConnEntry
| |-- (1) tcpConnState
|
| |-- (2) tcpConnLocalAddress
|
| |-- (3) tcpConnLocalPort
|
| |-- (4) tcpConnRemAddress
|
| |-- (5) tcpConnRemPort
|-- (14) tcpInErrs
|
|-- (15) tcpOutRsts
ETHERNET Basics
112 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
(7) udp
|-- (1) udpInDatagrams
|
|-- (2) udpNoPorts
|
|-- (3) udpInErrors
|
|-- (4) udpOutDatagrams
|
|-- (5) udpTable
|-- (1) udpEntry
|-- (1) udpLocalAddress
|
|-- (2) udpLocalPort
(8) egp
|-- (1) egpInMsgs
|
|-- (2) egpInErrors
|
|-- (3) egpOutMsgs
|
|-- (4) egpOutErrors
|
|-- (5) egpNeighTable
|-- (1) egpNeighEntry
|-- (1) egpNeighState
|
|-- (2) egpNeighAddr
|
|-- (3) egpNeighAs
|
|-- (4) egpNeighInMsgs
|
|-- (5) egpNeighInErrs
|
|-- (6) egpNeighOutMsgs
|
|-- (7) egpNeighOutErrs
ETHERNET Basics
Version 1.0 03/01 113
Management Information Base MIB 6.1 MIB II
|
|-- (8) egpNeighInErrMsgs
|
|-- (9) egpNeighOutErrMsgs
|
|-- (10) egpNeighStateUps
|
|-- (11) egpNeighStateDowns
|
|-- (12) egpNeighIntervalHello
|
|-- (13) egpNeighIntervalPoll
|
|-- (14) egpNeighMode
|
|-- (15) egpNeighEventTrigger
|-- (6) egpAs
(11) snmp
|-- (1) snmpInPkts
|
|-- (2) snmpOutPkts
|
|-- (3) snmpInBadVersions
|
|-- (4) snmpInBadCommunityNames
|
|-- (5) snmpInBadCommunityUses
|
|-- (6) snmpInASNParseErrs
|
|-- (7) not used
|
|-- (8) snmpInTooBigs
|
|-- (9) snmpInNoSuchNames
|
|-- (10) snmpInBadValues
|
|-- (11) snmpInReadOnlys
|
|-- (12) snmpInGenErrs
|
|-- (13) snmpInTotalReqVars
|
|-- (14) snmpInTotalSetVars
|
|-- (15) snmpInGetRequests
|
|-- (16) snmpInGetNexts
|
|-- (17) snmpInSetRequests
ETHERNET Basics
114 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
|
|-- (18) snmpInGetResponses
|
|-- (19) snmpInTraps
|
|-- (20) snmpOutTooBigs
|
|-- (21) snmpOutNoSuchNames
|
|-- (22) snmpOutBadValues
|
|-- (23) not used
|
|-- (24) snmpOutGenErrs
|
|-- (25) snmpOutGetRequests
|
|-- (26) snmpOutGetNexts
|
|-- (27) snmpOutSetRequests
|
|-- (28) snmpOutGetResponses
|
|-- (29) snmpOutTraps
|
|-- (30) snmpEnableAuthenTraps
(16) rmon
|--(1) statistics
|--(1) etherStatsTable
|--(1) etherStatsEntry
|--(1) etherStatsIndex
|
|--(2) etherStatsDataSource
|
|--(3) etherStatsDropEvents
|
|--(4) etherStatsOctets
|
|--(5) etherStatsPkts
|
|--(6) etherStatsBroadcastPkts
|
|--(7) etherStatsMulticastPkts
|
|--(8) etherStatsCRCAlignErrors
|
|--(9) etherStatsUndersizePkts
|
|--(10) etherStatsOversizePkts
|
ETHERNET Basics
Version 1.0 03/01 115
Management Information Base MIB 6.1 MIB II
|--(11) etherStatsFragments
|
|--(12) etherStatsJabbers
|
|--(13) etherStatsCollisions
|
|--(14) etherStatsPkts64Octets
|
|--(15) etherStatsPkts65to127Octets
|
|--(16) etherStatsPkts128to255Octets
|
|--(17) etherStatsPkts256to511Octets
|
|--(18) etherStatsPkts512to1023Octets
|
|--(19) etherStatsPkts1024to1518Octets
|
|--(20) etherStatsOwner
|
|--(21) etherStatsStatus
|--(2) history (2)
|--(1) historyControlTable
|--(1) historyControlEntry
|--(1) historyControlIndex
|
|--(2) historyControlDataSource
|
|--(3) historyControlBucketsRequested
|
|--(4) historyControlBucketsGranted
|
|--(5) historyControlInterval
|
|--(6) historyControlOwner
|
|--(7) historyControlStatus
|--(2) etherHistoryTable
|--(1) etherHistoryEntry
|--(1) etherHistoryIndex
|
|--(2) etherHistorySampleIndex
|
|--(3) etherHistoryIntervalStart
|
|--(4) etherHistoryDropEvents
|
|--(5) etherHistoryOctets
|
|--(6) etherHistoryPkts
|
|--(7) etherHistoryBroadcastPkts
|
|--(8) etherHistoryMulticastPkts
|
|--(9) etherHistoryCRCAlignErrors
|
|--(10) etherHistoryUndersizePkts
|
|--(11) etherHistoryOversizePkts
|
|--(12) etherHistoryFragments
|
|--(13) etherHistoryJabbers
|
|--(14) etherHistoryCollisions
|
|--(15) etherHistoryUtilization
|--(2) alarm
|--(1) alarmTable
|--(1) alarmEntry
|--(1) alarmIndex
|
|--(2) alarmInterval
|
ETHERNET Basics
116 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
|--(3) alarmVariable
|
|--(4) alarmSampleType
|
|--(5) alarmValue
|
|--(6) alarmStartupAlarm
|
|--(7) alarmRisingThreshold
|
|--(8) alarmFallingThreshold
|
|--(9) alarmRisingEventIndex
|
|--(10) alarmFallingEventIndex
|
|--(11) alarmOwner
|
|--(12) alarmStatus
|--(9) event
|--(1) eventTable
|--(1) eventEntry
|--(1) eventIndex
|
|--(2) eventDescription
|
|--(3) eventType
|
|--(4) eventCommunity
|
|--(5) eventLastTimeSent
|
|--(6) eventOwner
|
|--(7) eventStatus
|--(2) logTable
|--(1) logEntry (1)
|--(1) logEventIndex
|
|--(2) logIndex
|
|--(3) logTime
|
|--(4) logDescription
(17) dot1dBridge
|--(1) dot1dBase
|--(1) dot1dBaseBridgeAddress
|
|--(2) dot1dBaseNumPorts
|
|--(3) dot1dBaseType
|
ETHERNET Basics
Version 1.0 03/01 117
Management Information Base MIB 6.1 MIB II
|--(4) dot1dBasePortTable
|--(1) dot1dBasePortEntry
|--(1) dot1dBasePort
|
|--(2) dot1dBasePortIfIndex
|
|--(3) dot1dBasePortCircuit
|
|--(4) dot1dBasePortDelayExceededDiscards
|
|--(5) dot1dBasePortMtuExceededDiscards
|--(2) dot1dStp
|--(1) dot1dStpProtocolSpecification
|
|--(2) dot1dStpPriority
|
|--(3) dot1dStpTimeSinceTopologyChange
|
|--(4) dot1dStpTopChanges
|
|--(5) dot1dStpDesignatedRoot
|
|--(6) dot1dStpRootCost
|
|--(7) dot1dStpRootPort
|
|--(8) dot1dStpMaxAge
|
|--(9) dot1dStpHelloTime
|
|--(10) dot1dStpHoldTime
|
|--(11) dot1dStpForwardDelay
|
|--(12) dot1dStpBridgeMaxAge
|
|--(13) dot1dStpBridgeHelloTime
|
|--(14) dot1dStpBridgeForwardDelay
|
|--(15) dot1dStpPortTable
|--(1) dot1dStpPortEntry
|--(1) dot1dStpPort
|
|--(2) dot1dStpPortPriority
|
|--(3) dot1dStpPortState
|
|--(4) dot1dStpPortEnable
|
|--(5) dot1dStpPortPathCost
|
|--(6) dot1dStpPortDesignatedRoot
|
|--(7) dot1dStpPortDesignatedCost
|
|--(8) dot1dStpPortDesignatedBridge
|
|--(9) dot1dStpPortDesignatedPort
|
|--(10) dot1dStpPortForwardTransitions
|--(3) dot1dSr
|
|--(4) dot1dTp
|--(1) dot1dTpLearnedEntryDiscards
|
|--(2) dot1dTpAgingTime
|
|--(3) dot1dTpFdbTable
|--(1) dot1dTpFdbEntry
|--(1) dot1dTpFdbAddress
|
|--(2) dot1dTpFdbPort
|
|--(3) dot1dTpFdbStatus
ETHERNET Basics
118 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
|--(4) dot1dTpPortTable
|--(1) dot1dTpPortEntry
|--(1) dot1dTpPort
|
|--(2) dot1dTpPortMaxInfo
|
|--(3) dot1dTpPortInFrames
|
|--(4) dot1dTpPortOutFrames
|
|--(5) dot1dTpPortInDiscards
|--(5) dot1dStatic
|--(1) dot1dStaticTable
|--(1) dot1dStaticEntry
|--(1) dot1dStaticAddress
|
|--(2) dot1dStaticReceivePort
|
|--(3) dot1dStaticAllowedToGoTo
|
|--(4) dot1dStaticStatus
|--(6) pBridgeMIB
|--(1) pBridgeMIBObjects
|--(1) dot1dExtBase
|--(1) dot1dDeviceCapabilities
|
|--(2) dot1dTrafficClassesEnabled
|
|--(3) dot1dGmrpStatus
|
|--(4) dot1dPortCapabilitiesTable
|--(1) dot1dPortCapabilitiesEntry
|--(1) dot1dPortCapabilities
|--(2) dot1dPriority
|--(1) dot1dPortPriorityTable
|--(1) dot1dPortPriorityEntry
|--(1) dot1dPortDefaultUserPriority
|
|--(2) dot1dPortNumTrafficClasses
|--(2) dot1dUserPriorityRegenTable
|--(1) dot1dUserPriorityRegenEntry
|--(1) dot1dUserPriority
|
|--(2) dot1dRegenUserPriority
|--(3) dot1dTrafficClassTable
|--(1) dot1dTrafficClassEntry
|--(1) dot1dTrafficClassPriority
|
|--(2) dot1dTrafficClass
|--(4) dot1dPortOutboundAccessPriorityTable
|--(1) dot1dPortOutboundAccessPriorityEntry
|--(1) dot1dPortOutboundAccessPriority
|--(3) dot1dGarp
|--(1) dot1dPortGarpTable
|--(1) dot1dPortGarpEntry
|--(1) dot1dPortGarpJoinTime
|
ETHERNET Basics
Version 1.0 03/01 119
Management Information Base MIB 6.1 MIB II
|--(2) dot1dPortGarpLeaveTime
|
|--(3) dot1dPortGarpLeaveAllTime
|--(4) dot1dGmrp
|--(1) dot1dPortGmrpTable
|--(1) dot1dPortGmrpEntry
|--(1) dot1dPortGmrpStatus
|
|--(2) dot1dPortGmrpFailedRegistrations
|
|--(3) dot1dPortGmrpLastPduOrigin
|--(7) qBridgeMIB
|--(1) qBridgeMIBObjects
|--(1) dot1qBase
|--(1) dot1qVlanVersionNumber
|
|--(2) dot1qMaxVlanId
|
|--(3) dot1qMaxSupportedVlans
|
|--(4) dot1qNumVlans
|
|--(5) dot1qGvrpStatus
|--(2) dot1qTp
|--(1) dot1qFdbTable
|--(1) dot1qFdbEntry
|--(1) dot1qFdbId
|
|--(2) dot1qFdbDynamicCount
|--(2) dot1qTpFdbTable
|--(1) dot1qTpFdbEntry
|--(1) dot1qTpFdbAddress
|
|--(2) dot1qTpFdbPort
|
|--(3) dot1qTpFdbStatus
|--(3) dot1qTpGroupTable
|--(1) dot1qTpGroupEntry
|--(1) dot1qTpGroupAddress
|
|--(2) dot1qTpGroupEgressPorts
|
|--(3) dot1qTpGroupLearnt
|--(4) dot1qForwardAllTable
|--(1) dot1qForwardAllEntry
|--(1) dot1qForwardAllPorts
|
|--(2) dot1qForwardAllStaticPorts
|
|--(3) dot1qForwardAllForbiddenPorts
|--(5) dot1qForwardUnregisteredTable
|--(1) dot1qForwardUnregisteredEntry
|--(1) dot1qForwardUnregisteredPorts
|
|--(2) dot1qForwardUnregisteredStaticPorts
|
|--(3)
dot1qForwardUnregisteredForbiddenPorts
|--(3) dot1qStatic
ETHERNET Basics
120 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
|--(1) dot1qStaticUnicastTable
|--(1) dot1qStaticUnicastEntry
|--(1) dot1qStaticUnicastAddress
|
|--(2) dot1qStaticUnicastReceivePort
|
|--(3) dot1qStaticUnicastAllowedToGoTo
|
|--(4) dot1qStaticUnicastStatus
|--(2) dot1qStaticMulticastTable
|--(1) dot1qStaticMulticastEntry
|--(1) dot1qStaticMulticastAddress
|
|--(2) dot1qStaticMulticastReceivePort
|
|--(3) dot1qStaticMulticastStaticEgressPorts
|
|--(4)
dot1qStaticMulticastForbiddenEgressPorts
|
|--(5) dot1qStaticMulticastStatus
|--(4) dot1qVlan
|--(1) dot1qVlanNumDeletes
|
|--(2) dot1qVlanCurrentTable
|--(1) dot1qVlanCurrentEntry
|--(1) dot1qVlanTimeMark
|
|--(2) dot1qVlanIndex
|
|--(3) dot1qVlanFdbId
|
|--(4) dot1qVlanCurrentEgressPorts
|
|--(5) dot1qVlanCurrentUntaggedPorts
|
|--(6) dot1qVlanStatus
|
|--(7) dot1qVlanCreationTime
|--(3) dot1qVlanStaticTable
|--(1) dot1qVlanStaticEntry
|--(1) dot1qVlanStaticName
|
|--(2) dot1qVlanStaticEgressPorts
|
|--(3) dot1qVlanForbiddenEgressPorts
|
|--(4) dot1qVlanStaticUntaggedPorts
|
|--(5) dot1qVlanStaticRowStatus
|--(4) dot1qNextFreeLocalVlanIndex
|
|--(5) dot1qPortVlanTable
|--(1) dot1qPortVlanEntry
|--(1) dot1qPvid
|
|--(2) dot1qPortAcceptableFrameTypes
|
|--(3) dot1qPortIngressFiltering
|
|--(4) dot1qPortGvrpStatus
|
|--(5) dot1qPortGvrpFailedRegistrations
|
|--(6) dot1qPortGvrpLastPduOrigin
|--(6) dot1qPortVlanStatisticsTable
|--(1) dot1qPortVlanStatisticsEntry
|--(1) dot1qTpVlanPortInFrames
ETHERNET Basics
Version 1.0 03/01 121
Management Information Base MIB 6.1 MIB II
|
|--(2) dot1qTpVlanPortOutFrames
|
|--(3) dot1qTpVlanPortInDiscards
|
|--(4) dot1qTpVlanPortInOverflowFrames
|
|--(5) dot1qTpVlanPortOutOverflowFrames
|
|--(6) dot1qTpVlanPortInOverflowDiscards
|--(8) dot1qLearningConstraintsTable
|--(1) dot1qLearningConstraintsEntry
|--(1) dot1qConstraintVlan
|
|--(2) dot1qConstraintSet
|
|--(3) dot1qConstraintType
|
|--(4) dot1qConstraintStatus
|--(9) dot1qConstraintSetDefault
|--(10) dot1qConstraintTypeDefault
(26) snmpDot3MauMgt
|--(2) dot3IfMauBasicGroup
|--(1) ifMauTable
|--(1) ifMauEntry
|-- (1) ifMauIfIndex
|
|-- (2) ifMauIndex
|
|-- (3) ifMauType
|
|-- (4) ifMauStatus
|
|-- (5) ifMauMediaAvailable
|
|-- (6) ifMauMediaAvailableStateExits
|
|-- (7) ifMauJabberState
|
|-- (8) ifMauJabberingStateEnters
|
|-- (9) ifMauFalseCarriers
|
|-- (10)ifMauTypeList
|
|-- (11)ifMauDefaultType
|
|-- (12)ifMauAutoNegSupported
|--(5) dot3IfMauAutoNegGroup
ETHERNET Basics
122 Version 1.0 09/00
Management Information Base MIB 6.1 MIB II
|--(1) ifMauAutoNegTable
|-- (1) ifMauAutoNegEntry
|
|-- (1) ifMauAutoNegAdminStatus
|
|-- (2) ifMauAutoNegRemoteSignaling
|
|-- (4) ifMauAutoNegConfig
|
|-- (5) ifMauAutoNegCapability
|
|-- (6) ifMauAutoNegCapAdvertised
|
|-- (7) ifMauAutoNegCapReceived
|
|-- (8) ifMauAutoNegRestart
ETHERNET Basics
Version 1.0 03/01 123
Management Information Base MIB 6.1 MIB II
ETHERNET Basics
124 Version 1.0 09/00
Management Information Base MIB 6.2 Private MIB
The private MIB is for configuring the device-specific properties of the RS2-
../...
The groups below are implemented in the RS2-../.. from the private MIB hm-
Configuration (OID = 1.3.6.1.4.1.248.14).
D hmChassis (OID = 1.3.6.1.4.1.248.14.1)
D hmAgent (OID = 1.3.6.1.4.1.248.14.2)
(14) hmConfiguration
|--(1) hmChassis
|--(1) hmSystemTable
|--(1) hmSysProduct
|
|--(2) hmSysVersion
|
|--(3) hmSysGroupCapacity
|
|--(4) hmSysGroupMap
|
|--(5) hmSysMaxPowerSupply
|
|--(6) hmSysMaxFan
|
|--(7) hmSysGroupModuleCapacity
|
|--(8) hmSysModulePortCapacity
|
|--(9) hmSysGroupTable
|--(1) hmSysGroupEntry
|--(1) hmSysGroupID
|
|--(2) hmSysGroupType
|
|--(2) hmSysGroupDescription
|
|--(4) hmSysGroupHwVersion
|
|--(5) hmSysGroupSwVersion
|
|--(6) hmSysGroupModuleMap
ETHERNET Basics
Version 1.0 03/01 125
Management Information Base MIB 6.2 Private MIB
|--(10) hmSysModuleTable
|--(1) hmSysModuleEntry
|--(1) hmSysModGroupID
|
|--(2) hmSysModID
|
|--(3) hmSysModType
|
|--(4) hmSysModDescription
|
|--(5) hmSysModVersion
|
|--(6) hmSysModNumOfPorts
|
|--(7) hmSysModFirstMauIndex
|--(11) hmInterfaceTable
|--(1) hmIfEntry
|--(1) hmIfaceGroupID
|
|--(2) hmIfaceID
|
|--(3) hmIfaceStpEnable
|
|--(4) hmIfaceLinkType
|
|--(5) hmIfaceAction
|
|--(6) hmIfaceNextHopMacAddress
|
|--(7) hmIfaceFlowControl
|--(20) hmSysChassisName
|--(21) hmSysStpEnable
|--(2) hmPSTable
|--(1) hmPSEntry
|--(1) hmPSSysID
|
|--(2) hmPSID
|
|--(3) hmPSState
|--(3) hmFanTable
|--(1) hmFanEntry
|--(1) hmFanSysID
|
|--(2) hmFanID
|
|--(3) hmFanState
ETHERNET Basics
126 Version 1.0 09/00
Management Information Base MIB 6.2 Private MIB
(14) hmConfiguration
|--(2) hmAgent
|--(1) hmAction
|
|--(2) hmActionResult
|
|--(3) hmNetwork
|--(1) hmNetLocalIPAddr
|
|--(2) hmNetLocalPhysAddr
|
|--(3) hmNetGatewayIPAddr
|
|--(4) hmNetMask
|--(4) hmFSTable
|--(1) hmFSUpdFileName
|
|--(2) hmFSConfFileName
|
|--(3) hmFSLogFileName
|
|--(4) hmFSUserName
|
|--(5) hmFSTPPassword
|
|--(6) hmFSAction
|
|--(8) hmFSActionResult
|
|--(9) hmFSConfigState
|--(5) hmTempTable (5)
|--(1) hmTemperature
|
|--(2) hmTempUprLimit
|
|--(3) hmTempLwrLimit
|--(6) hmNeighbourAgentTable
|--(1) hmNeighbourEntry
|--(1) hmNeighbourSlot
|
|--(2) hmNeighbourIpAddress
|--(7) hmAuthGroup
|--(1) hmAuthHostTableEntriesMax
|
|--(2) hmAuthCommTableEntriesMax
|
|--(3) hmAuthCommTable
|--(1) hmAuthCommEntry
|--(1) hmAuthCommIndex
|
|--(2) hmAuthCommName
|
|--(3) hmAuthCommPerm
|
|--(4) hmAuthCommState
|
|--(4) hmAuthHostTable
|--(1) hmAuthHostEntry
ETHERNET Basics
Version 1.0 03/01 127
Management Information Base MIB 6.2 Private MIB
|--(1) hmAuthHostIndex
|
|--(2) hmAuthHostName
|
|--(3) hmAuthHostCommIndex
|
|--(4) hmAuthHostIpAddress
|
|--(5) hmAuthHostIpMask
|
|--(6) hmAuthHostState
|--(8) hmTrapGroup
|--(1) hmTrapCommTableEntriesMax
|
|--(2) hmTrapDestTableEntriesMax
|
|--(3) hmTrapCommTable
|--(1) hmTrapCommEntry
|--(1) hmTrapCommIndex
|
|--(2) hmTrapCommCommIndex
|
|--(3) hmTrapCommColdStart
|
|--(4) hmTrapCommLinkDown
|
|--(5) hmTrapCommLinkUp
|
|--(6) hmTrapCommAuthentication
|
|--(7) hmTrapCommBridge
|
|--(8) hmTrapCommRMON
|
|--(9) hmTrapCommUsergroup
|
|--(10)hmTrapCommDualHoming
|
|--(11)hmTrapCommChassis
|
|--(12)hmTrapCommState
|--(4) hmTrapDestTable
|--(1) hmTrapDestEntry
|--(1) hmTrapDestIndex
|
|--(2) hmTrapDestName
|
|--(3) hmTrapDestCommIndex
|
|--(4) hmTrapDestIpAddress
|
|--(6) hmTrapDestState
|--(9) hmLastAccessGroup
|--(1) hmLastIpAddr
|
|--(2) hmLastPort
|--(3) userGroup
|--(1) userGroupTable
|--(1) userGroupEntry
|--(1) userGroupID
|
|--(2) userGroupDescription
|
|--(3) userGroupRestricted
|
|--(4) userGroupSecAction
|--(2) userGroupMemberTable
|--(1) userGroupMemberEntry
ETHERNET Basics
128 Version 1.0 09/00
Management Information Base MIB 6.2 Private MIB
|--(1) userGroupMemberGroupID
|
|--(2) userGroupMemberUserID
|--(3) userTable
|--(1) userEntry
|--(1) userID
|
|--(2) userRestricted
|--(4) portSecurityTable
|--(1) portSecurityEntry
|--(1) portSecSlotID
|
|--(2) portSecPortID
|
|--(3) portSecPermission
|
|--(4) portSecAllowedUserID
|
|--(5) portSecAllowedGroupIDs
|
|--(6) portSecConnectedUserID
|
|--(7) portSecAction
|--(5) userGroupSecurityAction
|--(4) hmDualHoming
|--(1) hmDualHomingTable
|--(1) hmDuHmEntry
|--(1) hmDuHmPrimGroupID
|
|--(2) hmDuHmPrimIfIndex
|
|--(3) hmDuHmPrimIfOpState
|
|--(4) hmDuHmRedGroupID
|
|--(5) hmDuHmRedIfIndex
|
|--(6) hmDuHmRedIfOpState
|
|--(7) hmDuHmDesiredAction
|
|--(8) hmDuHmOperState
|
|--(9) hmDuHmPortRevivalDelay
|
|--(10) hmDuHmLinkMode
|
|--(11) hmDuHmRedCheckEnable
|
|--(12) hmDuHmRedCheckState
ETHERNET Basics
Version 1.0 03/01 129
Management Information Base MIB 6.2 Private MIB
ETHERNET Basics
130 Version 1.0 09/00
Appendix
A Appendix
ETHERNET Basics
Version 1.0 03/01 131
Appendix
ETHERNET Basics
132 Version 1.0 09/00
Appendix A.1 FAQ
A.1 FAQ
www.hirschmann.com
ETHERNET Basics
Version 1.0 03/01 133
Appendix A.1 FAQ
ETHERNET Basics
134 Version 1.0 09/00
Appendix A.2 Literature references
ETHERNET Basics
Version 1.0 03/01 135
Appendix A.2 Literature references
ETHERNET Basics
136 Version 1.0 09/00
Appendix A.3 Reader’s comments
ETHERNET Basics
Version 1.0 03/01 137
Appendix A.3 Reader’s comments
General comments:
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
Street ..........................................................................................................
Dear user,
ETHERNET Basics
138 Version 1.0 09/00
A.4 Stichwortverzeichnis
A.4 Stichwortverzeichnis
Numerics DIX 17
10BASE2 45, 46 DoD 35
10BASE5 43, 46
10BASE-F 46 E
10BASE-T 46 ECMA 17
EGP 113
A electromagnetic interference 46
Access 75 errors 77
access right 79 Event 77
Accounting management 75 Exterior Gateway Protocol 113
address table 83
Address Translation Group 109 F
addresses 83 Fault management 74
age 83 fiber optic cable 46, 54
agent 80 fragments 83
aging time 83
alarm messages 80 G
alarm threshold 77 generic object class 101
ARP 38
AUI cable 43 H
hardware reset 80
B History 77
backbone 68 host address 36
backoff 21, 27 host id 35, 36
broadcast 83
broadcasts 77 I
bus structure 66 IBM Type 1 46
ICMP 111
C IEC 18
cable line 65 IEEE 17
Carrier Sense 17, 21 instantiated 101
Cascading 68 interface group 108
Cheapernet 45, 46 Interface-Gruppe 108
coax segment 44, 54 International Organization for Standardization
collision 23, 26 73
Collision Detection 17, 21 Internet Control Message Protocol group 111
collisions 77 Internet Protocol Group 109
Community 79 interpacket gap 28
Configuration management 74 interpacket gap size 41
configurations modifications 80 IP address 35, 38
CSMA/CD 17, 23, 31, 43 ISO 18, 73
ISO/IEC 8802-3 18, 21, 23, 41, 43, 49, 59
D ISO/OSI 38, 39
data field 32
data security 65 L
delay value 44, 49, 50 layer 73
Department of Defense 35 least significant bit 31
destination address 32, 38, 83 length field 32
device group 125 link down 80
distance 46 link segments 44
ETHERNET Basics
Version 1.0 09/00 139
A.4 Stichwortverzeichnis
LSB 31 RMON 74
run time 59
M
MAC address 38 S
MAC destination 39 security 46
main link 65 Security management 75
management group 127 SFD 32
Manchester code 31 signal delay 41, 50
MAU Management Group 122 signal delay value 50
maximum network range 49 signal path 41, 44, 49, 50, 51, 61
message 80 signal propagation 51
MIB 75 signal run time 59
Multiple Access 17, 21 Simple Network Management Protocol group
114
N slot time 23, 25
net id 36 SNMP 74, 75, 79, 80, 114
network address 35 source address 32, 38, 84
Network Information Center 35 source address field 84
network load 89, 91 source addresses 83
network management station 75 standby line 65
network size 25 star distribution point 47
network topology 67 Start Frame Delimiter 31
NMS 75 state on delivery: 79
Statistics 77
O statistics counter 77
object class 101 statistics table 77
object description 101 subidentifier 101
object ID 101
Open Systems Interconnection 73 T
OSI 73 TCP 112
telephone wiring 46
P thin wire Ethernet 45
packet length 50 tolerances 49
packet sizes 77 traffic load 84
Password 75 transceiver 43, 46
Path Variability Value 59 Transfer Control Protocol group 112
path variability value 41 transmission media 47
Performance management 74 Transmission security 80
polling 80 Trap destination table 80
preamble 32 traps 80
preamble loss 28 twisted pair cable 46
priority 84 twisted pair segment 52
priority queue 84 type field 32, 84
propagation equivalent 50, 51, 53
PVV 59, 62 U
UDP 113
R User Datagram Protocol group 113
redundancy function 70
Redundancy mode 65 V
redundancy mode 65 variability value 59
redundant 68 VLAN tag 84
repeater 41, 44
RG 58 coax cable 45 X
ring 66, 69 Xerox 17
ETHERNET Basics
140 Version 1.0 03/01
A.4 Stichwortverzeichnis
Y
yellow cable 43
yellow coax cable 45
ETHERNET Basics
Version 1.0 03/01 141
A.4 Stichwortverzeichnis
ETHERNET Basics
142 Version 1.0 09/00