024 - Ceragon - 802.1q - Presentation v3.2

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 28

Introduction to 802.

1 P/Q

Proprietary and Confidential

Prerequisites

Prior to taking this module, trainee should be familiar with the


following:
Ethernet Topologies
OSI 7 Layers model

Proprietary and Confidential

Agenda
Agenda

Proprietary and Confidential

What is VLAN?

A Layer 2 Protocol which enables enhanced


traffic maneuvers :

Prioritization
Filtering
Provisioning
Mapping (e.g. - ATM to/from ETH)

Proprietary and Confidential

What is VLAN?
Regular ETH networks forward broadcast frames to all endpoints

Proprietary and Confidential

What is VLAN?
VLAN networks forward broadcast frames only to pre-defined ports
(Profile Membership)

VLAN 1
Switch ports

VLAN 547

Proprietary and Confidential

Advantages of VLAN

Breaking large networks into smaller parts (Formation of virtual workgroups)


Simplified Administration (no need for re-cabling when user moves)
Improving Broadcast & Multicast traffic utilization
Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones
Security establishing tunnels / trunks through the network for dedicated
users (traffic between VLANs is restricted).

Proprietary and Confidential

Before we start explaining bit by bit, what is VLAN


and how does it work, let us review first the
structure of a regular ETH frame

Proprietary and Confidential

Untagged Ethernet Frame

FCS is created by the sender and recalculated by the receiver

Preamble +
SFD
8 Bytes

DA
6 Bytes

SA

Length / Type DATA + PAD

6 Bytes

2 Bytes

46 - 1500 Bytes

Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes

Length / Type < 1500 - Parameter indicates number of Data Bytes


Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)

Proprietary and Confidential

FCS
4 Bytes
(32-bit
CRC)

Tagged Ethernet Frame


Additional information is inserted
Frame size increases to 1522 Bytes

4 Bytes

Preamble + SFD

DA

SA

VLAN TAG

TPID =
0x8100

10

DATA + PAD

TCI

P-TAG
TPID = Tag protocol ID
TCI = Tag Control Information
CFI = 1 bit canonical Format Indicator

Length / Type

3 Bit

Proprietary and Confidential

CFI
1 Bit

VLAN ID
12 Bit

FCS

Tagging a Frame

VLAN ID uses 12 bits, therefore the number of maximum VLANs is


4096:
2^12 = 4096
VID 0 = reserved
VID 4090-4096 = reserved (dedicated for IP-10s internal purposes such as MNG etc.)
VID 1 = default

After tagging a frame, FCS is recalculated


CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over
ETH backbones (some vendors may use CFI for internal purposes)

11

Proprietary and Confidential

TPID / ETHER-Type / Protocol Type


TPID in tagged frames in always set to
0x8100
It is important that you understand the
meaning and usage of this parameter
Later when we discuss QoS, we shall
demonstrate how & why the system
audits this parameter

Protocol type

Value

Tagged Frame

0x8100

ARP

0x0806

Q-in-Q (CISCO)

0x8100

Q-in-Q (other
vendors)
Q-in-Q (other
vendors)
Q-in-Q (other
vendors)

0x9200
0x8035

IP

0x0800

IPv6

0x86DD

MPLS

Proprietary and Confidential

0x9100

RARP

PPPoE

12

0x88A8

0x8863/0x886
4
0x8847/0x884
8

IS-IS

0x8000

LACP

0x8809

802.1x

0x888E

VLAN Membership: By Port


Every switch port is associated with specific VLAN membership
PRO easy configured
CON no user mobility

13

VLAN 9

VLAN 100

VLAN 1

VLAN 333

VLAN 5

VLAN 22

For example ports 1,2 & # can see each other but cannot PING
other ports (different VLAN membership)

Proprietary and Confidential

VLAN Membership: By MAC


PRO user mobility, no
reconfiguration when PC
moves
CON needs to be assigned
initially, not an easy task
with thousands of
endpoints

00:20:8f:40:15:31
00:20:8f:40:15:ef

00:20:8f:40:15:30

VLAN 44

00:33:ef:38:01:23
00:33:ef:38:01:a0

00:33:ef:38:01:25

VLAN 5

14

Proprietary and Confidential

VLAN Membership: By Subnet (L3 VLAN)


Membership is based on the Layer 3 header
No process of IP address is done
Main disadvantage longer overall throughput

10.10.10.12
10.10.10.122

10.10.10.13

VLAN 44

11.1.1.10.12
11.1.1.10

11.1.1.10.23

VLAN 5

15

Proprietary and Confidential

Port Types
Access Port a port which is not aware of VLANs
(Cannot tag outgoing frames or un-tag incoming frames)

VLAN aware

A
Device unaware of VLANs
transmits untagged
(regular) ETH frames

16

Switch

Switch tags the ingress


frames with VID according
to specific Tagging
mechanism

Proprietary and Confidential

Port Types
Trunk Port a port which is aware of VLANs
(Can tag or un-tag incoming frames)

VLAN aware

A
Device unaware of VLANs
transmits untagged
(regular) ETH frames

Switch

Switch tags the ingress frames with VID according to


specific Tagging mechanism
Switch un-tags frames with VID received from network
and delivers untagged frames to Access ports

17

Proprietary and Confidential

Port Types
Trunk Port can carry tagged frames with different VIDs.
This requires Port Membership configuration.

VLAN aware

Switch

T
A
This port is not a member of the
Trunk
port membership list, hence,
traffic is
discarded

18

Proprietary and Confidential

Q-in-Q
Additional VLAN (S-VLAN) is inserted
Frame size increases to 1526 Bytes

Preamble +
SFD

DA

TPID =
0x88A8

P-TAG
3 Bit

19

CF
I
1 Bit

SA

4 Bytes

4 Bytes

SVLAN

CVLAN

TCI

Length /
Type

TPID =
0x8100

VLAN
12ID
Bit
Proprietary and Confidential

DATA +
PAD

FCS

TCI

P-TAG

CFI

3 Bit

1 Bit

VLAN
IDBit
12

Port Types
Q-in-Q (A.K.A. Double TaggingVLAN Encapsulation)

+
VLAN

CN

aware Switch

PN

Enhanced security not exposing original VID


Improved flexibility of VID in the network
(Ingress VID was already assigned in the network)

20

Proprietary and Confidential

Introduction to QoS / CoS

21

Mapping ATM QoS over ETH CoS (RFC 1483)


We can extend the benefits of ATM QoS into Ethernet LANs to guarantee Ethernet priorities
across the ATM backbone. A L2 switch or L3 router reads incoming 802.1p or IP ToS priority
bits, and classifies traffic accordingly.
To match the priority level with the appropriate ATM service class and other parameters, the
switch then consults a mapping table with pre-defined settings.
P-Tag 6

CBR

P-Tag 4

VBR

P-Tag 0

UBR

Hub
Site

FE/GE

GE

RNC

GE
n x T1/E1

Tail site

22

FibeAir
IP-10

IP-10

STM1/
OC3

ATM
Router

Proprietary and Confidential

MPLS
Router

Core
Site

BSC/MSC

Mapping ETH to MPLS and vice versa


IP-10s L2 switch can take part in the process of transporting
services through MPLS core

Frames/services are mapped to MPLS FECs according to:


VLAN ID mapped to MPLS EXP bits
VLAN P-Bit mapped to MPLS EXP bits

Hub
Site

FE/GE
n x T1/E1

Tail site

GE

RNC

GE

FibeAir
IP-10

IP-10

STM1/
OC3

STM1/
OC3

MPLS
Router

MPLS
Router

Core
Site

23

Proprietary and Confidential

BSC/MSC

VLAN P-Bit Remap (Traffic Classes)


IEEE Recommendation
The following table shows
IEEE definition of traffic
classes

Ingress
P-Tags

Number of Available Traffic Classes


1

0
(default)

It shows the ingress options


for P-Tag VS. egress P-tag

The number of egress


priorities (classes) depend
on the number of assigned
queues

Egress P-Tag
24

Proprietary and Confidential

VLAN P-Bit Remap (Traffic Classes)


The default priority used for transmission by end stations is 0
With a single queue, there are no choices. All traffic is Best Effort
Multiple queues are needed to isolate Network Control from the user data traffic

25

Proprietary and Confidential

Acronyms

26

ETH Ethernet
NIC Network Internet Card
VID Vlan ID
VLAN Virtual LAN
P-TAG Priority Tag, Priority Bits
CFI Canonical Format Indicator
TPID Tag Protocol Identifier
FCS Frame Check Sequence
DA Destination Address
SA Source Address
QoS Quality of Service

Proprietary and Confidential

Associated IEEE Standards

IEEE 802.3

: Ethernet (Max. frame size = 1518 bytes)

IEEE 802.3ac

: Ethernet (Max. frame size = 1522 bytes)

IEEE 802.1 d : MAC Bridge first introduced the concept of


Filtering Services in a bridged local network
IEEE 802.1 q

: VLAN Tagging

IEEE 802.1 p

: Priority Tagging / Mapping

IEEE 802.1ag : OAM (CFM)

27

Proprietary and Confidential

Thank You !
[email protected]

28

Proprietary and Confidential

You might also like