The difference between unmanaged, managed, and Web-smart switches
With regard to management options, the three primary classes of switches are unmanaged, managed, and Web smart. Which you choose depends largely on the size of your network and how... more/see it nowmuch control you need over that network.
Unmanaged switches are basic plug-and-play switches with no remote configuration, management, or monitoring options, although many can be locally monitored and configured via LED indicators and DIP switches. These inexpensive switches are typically used in small networks or to add temporary workgroups to larger networks.
Managed switches support Simple Network Management Protocol (SNMP) via embedded agents and have a command line interface (CLI) that can be accessed via serial console, Telnet, and Secure Shell. These switches can often be configured and managed as groups. More recent managed switches may also support a Web interface for management through a Web browser.
These high-end switches enable network managers to remotely access a wide range of capabilities including:
Enabling and disabling individual ports or port Auto MDI/MDI-X.
Port bandwidth and duplex control.
IP address management.
MAC address filtering.
Port mirroring to monitor network traffic.
Prioritization of ports for quality of service (QoS).
802.1X network access control.
Link aggregation or trunking.
Managed switches, with their extensive management capabilities, are at home in large enterprise networks where network administrators need to monitor and control a large number of network devices. Managed switches support redundancy protocols for increased network availability.
Web-smart switches—sometimes called smart switches or Web-managed switches—have become a popular option for mid-sized networks that require management. They offer access to switch management features such as port monitoring, link aggregation, and VPN through a simple Web interface via an embedded Web browser. What these switches generally do not have is SNMP management capabilities or a CLI. Web-smart switches must usually be managed individually rather than in groups.
Although the management features found in a Web-smart switch are less extensive than those found in a fully managed switch, these switches are becoming smarter with many now offering many of the features of a fully managed switch. Like managed switches, they also support redundancy protocols for increased network availability.
Black Box Explains...Layer 2, 3, and 4 switches.
... more/see it now
E-Mail, Diagnostics, Word Processing, Database
Shells and Gateway Workstation Software
TR=Token Ring; A=ARCNET®; P=PhoneNET®
With the rapid development of computer networks over the last decade, high-end switching has become one of the most important functions on a network for moving data efficiently and quickly from one place to another.
Here’s how a switch works: As data passes through the switch, it examines addressing information attached to each data packet. From this information, the switch determines the packet’s destination on the network. It then creates a virtual link to the destination and sends the packet there.
The efficiency and speed of a switch depends on its algorithms, its switching fabric, and its processor. Its complexity is determined by the layer at which the switch operates in the OSI (Open Systems Interconnection) Reference Model (see above).
OSI is a layered network design framework that establishes a standard so that devices from different vendors work together. Network addresses are based on this OSI Model and are hierarchical. The more details that are included, the more specific the address becomes and the easier it is to find.
The Layer at which the switch operates is determined by how much addressing detail the switch reads as data passes through.
Switches can also be considered low end or high end. A low-end switch operates in Layer 2 of the OSI Model and can also operate in a combination of Layers 2 and 3. High-end switches operate in Layer 3, Layer 4, or a combination of the two.
Layer 2 Switches (The Data-Link Layer)
Layer 2 switches operate using physical network addresses. Physical addresses, also known as link-layer, hardware, or MAC-layer addresses, identify individual devices. Most hardware devices are permanently assigned this number during the manufacturing process.
Switches operating at Layer 2 are very fast because they’re just sorting physical addresses, but they usually aren’t very smart—that is, they don’t look at the data packet very closely to learn anything more about where it’s headed.
Layer 3 Switches (The Network Layer)
Layer 3 switches use network or IP addresses that identify locations on the network. They read network addresses more closely than Layer 2 switches—they identify network locations as well as the physical device. A location can be a LAN workstation, a location in a computer’s memory, or even a different packet of data traveling through a network.
Switches operating at Layer 3 are smarter than Layer 2 devices and incorporate routing functions to actively calculate the best way to send a packet to its destination. But although they’re smarter, they may not be as fast if their algorithms, fabric, and processor don’t support high speeds.
Layer 4 Switches (The Transport Layer)
Layer 4 of the OSI Model coordinates communications between systems. Layer 4 switches are capable of identifying which application protocols (HTTP, SNTP, FTP, and so forth) are included with each packet, and they use this information to hand off the packet to the appropriate higher-layer software. Layer 4 switches make packet-forwarding decisions based not only on the MAC address and IP address, but also on the application to which a packet belongs.
Because Layer 4 devices enable you to establish priorities for network traffic based on application, you can assign a high priority to packets belonging to vital in-house applications such as Peoplesoft, with different forwarding rules for low-priority packets such as generic HTTP-based Internet traffic.
Layer 4 switches also provide an effective wire-speed security shield for your network because any company- or industry-specific protocols can be confined to only authorized switched ports or users. This security feature is often reinforced with traffic filtering and forwarding features. collapse
Black Box Explains...SFP, SFP+, and XFP transceivers.
SFP, SFP+, and XFP are all terms for a type of transceiver that
plugs into a special port on a switch or other network device to convert the port to... more/see it nowa copper or fiber interface. These compact transceivers replace the older, bulkier GBIC interface. Although these devices are available in copper, their most common use is to add fiber ports. Fiber options include multimode and single-mode fiber in a variety of wavelengths covering distances of up to 120 kilometers (about 75 miles), as well as WDM fiber, which uses two separate wavelengths to both send and receive data on a
single fiber strand.
SFPs support speeds up to 4.25 Gbps and are generally used for Fast Ethernet or Gigabit Ethernet applications. The expanded SFP
standard, SFP+, supports speeds of 10 Gbps or higher over fiber. XFP
is a separate standard that also supports 10-Gbps speeds. The primary difference between SFP+ and the slightly older XFP standard is that SFP+ moves the chip for clock and data recovery into a line card on the host device. This makes an SFP+ smaller than an XFP, enabling greater port density.
Because all these compact transcievers are hot-swappable, there’s no need to shut down a switch to swap out a module—it’s easy to change interfaces on the fly for upgrades and maintenance.
Another characteristic shared by this group of transcievers is that they’re OSI Layer 1 devices—they’re transparent to data and do not examine or alter data in any way. Although they’re primarily used with Ethernet, they’re also compatible with uncommon or legacy standards such as Fibre Channel, ATM, SONET, or Token Ring.
Formats for SFP, SFP+, and XFP transceivers have been standardized by multisource agreements (MSAs) between manufacturers, so
physical dimensions, connectors, and signaling are consistent and
interchangeable. Be aware though that some major manufacturers, notably Cisco, sell network devices with slots that lock out transceivers from other vendors.
Black Box Explains...Power over Ethernet (PoE).
What is PoE?
The seemingly universal network connection, twisted-pair Ethernet cable, has another role to play, providing electrical power to low-wattage electrical devices. Power over Ethernet (PoE) was ratified by the... more/see it nowInstitute of Electrical and Electronic Engineers (IEEE) in June 2000 as the 802.3af-2003 standard. It defines the specifications for low-level power delivery—roughly 13 watts at 48 VDC—over twisted-pair Ethernet cable to PoE-enabled devices such as IP telephones, wireless access points, Web cameras, and audio speakers.
Recently, the basic 802.3af standard was joined by the IEEE 802.3at PoE standard (also called PoE+ or PoE plus), ratified on September 11, 2009, which supplies up to 25 watts to larger, more power-hungry devices. 802.3at is backwards compatible with 802.3af.
How does PoE work?
The way it works is simple. Ethernet cable that meets CAT5 (or better) standards consists of four twisted pairs of cable, and PoE sends power over these pairs to PoE-enabled devices. In one method, two wire pairs are used to transmit data, and the remaining two pairs are used for power. In the other method, power and data are sent over the same pair.
When the same pair is used for both power and data, the power and data transmissions don’t interfere with each other. Because electricity and data function at opposite ends of the frequency spectrum, they can travel over the same cable. Electricity has a low frequency of 60 Hz or less, and data transmissions have frequencies that can range from 10 million to 100 million Hz.
There are two types of devices involved in PoE configurations: Power Sourcing Equipment (PSE) and Powered Devices (PD).
PSEs, which include end-span and mid-span devices, provide power to PDs over the Ethernet cable. An end-span device is often a PoE-enabled network switch that’s designed to supply power directly to the cable from each port. The setup would look something like this:
End-span device → Ethernet with power
A mid-span device is inserted between a non-PoE device and the network, and it supplies power from that juncture. Here is a rough schematic of that setup:
Non-PoE switch → Ethernet without PoE → Mid-span device → Ethernet with power
Power injectors, a third type of PSE, supply power to a specific point on the network while the other network segments remain without power.
PDs are pieces of equipment like surveillance cameras, sensors, wireless access points, and any other devices that operate on PoE.
PoE applications and benefits.
• Use one set of twisted-pair wires for both data and low-wattage appliances.
• In addition to the applications noted above, PoE also works well for video surveillance, building management, retail video kiosks, smart signs, vending machines, and retail point-of-information systems.
• Save money by eliminating the need to run electrical wiring.
• Easily move an appliance with minimal disruption.
• If your LAN is protected from power failure by a UPS, the PoE devices connected to your LAN are also protected from power failure.
Because Power over Ethernet (PoE) delivers power over the same cable as data, it’s popular for powering devices such as VoIP phones, wireless access points, and security cameras. It often... more/see it nowleads to significant savings by eliminating the need to install a separate power outlet.
Most PoE today is standards-based IEEE 802.3af or the newer higher-powered IEEE 802.3at PoE, which are very safe because power source equipment (PSE) doesn’t add power to the data line unless it detects a compatible powered device (PD) connected to the other end of the cable. This protects devices that do not support PoE. PSEs and PDs also negotiate power requirements, so a PD never receives too much power. Both PSEs and PDs have power supplies and regulators isolated from ground to minimize shock hazard.
But here’s where it gets complicated…
Because most PoE available today is standards-based 802.3af or 802.3at, it’s easy to forget that there are versions of PoE that are NOT standards based. Some of these non-standards-based versions of PoE feature power injectors that inject power without checking compatibility—and that can be very bad news for an innocent network device.
Non-standard PoE tends to fall into three categories: proprietary PoE, high-wattage proprietary PoE, and passive PoE.
Before the ratification of the 802.3af standard in 2003, PoE was a free-for-all with many vendors offering their own method of delivering power over data lines. Some vendors still offer their own proprietary PoE. These proprietary solutions offer varying degrees of communication between PSE and PD. Our Black Box® Wireless Point-to-Point Ethernet Extender Kit (LWE100A-KIT) uses Prorietary PoE in the form of 12 VDC running at 12 W, which is well below the 48 VDC and 15.4 W provided by standard 802.3af.
High-wattage Proprietary PoE.
Many vendors offer high-wattage PoE solutions designed to deliver from 50 watts to 100 or even 200 watts per port. High-wattage proprietary PoE is often used with high-powered outdoor wireless radios.
Passive PoE injects power into an Ethernet cable on Pins 4 and 5 with negative return on Pins 7 and 8 and absolutely no communication between PSE and PD. This method was once a very common “home brew” method of transferring power over data cable and is still commonly used in telecomm applications.
Document and label.
There’s nothing wrong with PoE that’s not standards based—these power methods work as well as 802.3af/at PoE to power network devices. You do, however, need to be aware of what kind of Power over Ethernet you have and what it will work with. Good network documentation and labeling are the keys that enable you to know that, for instance, that power injector is a high-wattage proprietary injector that will fry the IP camera you’re about to connect. Proper documentation, which is good practice in any case, becomes absolutely vital when you have components that may damage other components.
Black Box Explains...PoE phantom power.
10BASE-T and 100BASE-TX Ethernet use only two pairs of wire in 4-pair CAT5/CAT5e/CAT6 cable, leaving the other two pairs free to transmit power for Power over Ethernet (PoE) applications. However,... more/see it nowGigabit Ethernet or 1000BASE-T uses all four pairs of wires, leaving no pairs free for power. So how can PoE work over Gigabit Ethernet?
The answer is through the use of phantom power—power sent over the same wire pairs used for data. When the same pair is used for both power and data, the power and data transmissions don’t interfere with each other. Because electricity and data function at opposite ends of the frequency spectrum, they can travel over the same cable. Electricity has a low frequency of 60 Hz or less, and data transmissions have frequencies that can range from 10 million to 100 million Hz.
10- and 100-Mbps PoE may also use phantom power. The 802.3af PoE standard for use with 10BASE-T and 100BASE-TX defines two methods of power transmission. In one method, called Alternative A, power and data are sent over the same pair. In the other method, called Alternative B, two wire pairs are used to transmit data, and the remaining two pairs are used for power. That there are two different PoE power-transmission schemes isn’t obvious to the casual user because PoE Powered Devices (PDs) are made to accept power in either format.
SHDSL, VDSL, VDSL2, ADSL, and SDSL.
xDSL, a term that encompasses the broad range of digital subscriber line (DSL) services, offers a low-cost, high-speed data transport option for both individuals and businesses, particularly in areas without... more/see it nowaccess to cable Internet.
xDSL provides data transmission over copper lines, using the local loop, the existing outside-plant telephone cable network that runs right to your home or office. DSL technology is relatively cheap and reliable.
SHDSL can be used effectively in enterprise LAN applications. When interconnecting sites on a corporate campus, buildings and network devices often lie beyond the reach of a standard Ethernet segment. Now you can use existing copper network infrastructure to connect remote LANS across longer distances and at higher speeds than previously thought possible.
There are various forms of DSL technologies, all of which face distance issues. The quality of the signals goes down with increasing distance. The most common will be examined here, including SHDSL, ADSL, and SDSL.
SHDSL (also known as G.SHDSL) (Single-Pair, High-Speed Digital Subscriber Line) transmits data at much higher speeds than older versions of DSL. It enables faster transmission and connections to the Internet over regular copper telephone lines than traditional voice modems can provide. Support of symmetrical data rates makes SHDSL a popular choice for businesses for PBXs, private networks, web hosting, and other services.
Ratified as a standard in 2001, SHDSL combines ADSL and SDSL features for communications over two or four (multiplexed) copper wires. SHDSL provides symmetrical upstream and downstream transmission with rates ranging from 192 kbps to 2.3 Mbps. As a departure from older DSL services designed to provide higher downstream speeds, SHDSL specified higher upstream rates, too. Higher transmission rates of 384 kbps to 4.6 Mbps can be achieved using two to four copper pairs. The distance varies according to the loop rate and noise conditions.
For higher-bandwidth symmetric links, newer G.SHDSL devices for 4-wire applications support 10-Mbps rates at distances up to 1.3 miles (2 km). Equipment for 2-wire deployments can transmit up to 5.7 Mbps at the same distance.
SHDSL (G.SHDSL) is the first DSL standard to be developed from the ground up and to be approved by the International Telecommunication Union (ITU) as a standard for symmetrical digital subscriber lines. It incorporates features of other DSL technologies, such as ADSL and SDS, and is specified in the ITU recommendation G.991.2.
Also approved in 2001, VDSL (Very High Bitrate DSL) as a DSL service allows for downstream/upstream rates up to 52 Mbps/16 Mbps. Extenders for local networks boast 100-Mbps/60-Mbps speeds when communicating at distances up to 500 feet (152.4 m) over a single voice-grade twisted pair. As a broadband solution, VDSL enables the simultaneous transmission of voice, data, and video, including HDTV, video on demand, and high-quality videoconferencing. Depending on the application, you can set VDSL to run symmetrically or asymmetrically.
VDSL2 (Very High Bitrate DSL 2), standardized in 2006, provides a higher bandwidth (up to 30 MHz) and higher symmetrical speeds than VDSL, enabling its use for Triple Play services (data, video, voice) at longer distances. While VDSL2 supports upstream/downstream rates similar to VDSL, at longer distances, the speeds don’t fall off as much as those transmitted with ordinary VDSL equipment.
ADSL (Asymmetric DSL) provides transmission speeds ranging from downstream/upstream rates of 9 Mbps/640 kbps over a relatively short distance to 1.544 Mbps/16 kbps as far away as 18,000 feet. The former speeds are more suited to a business, the latter more to the computing needs of a residential customer.
More bandwidth is usually required for downstream transmissions, such as receiving data from a host computer or downloading multimedia files. ADSLs asymmetrical nature provides more than sufficient bandwidth for these applications.
The lopsided nature of ADSL is what makes it most likely to be used for high-speed Internet access. And the various speed/distance options available within this range are one more point in ADSLs favor. Like most DSL services standardized by ANSI as T1.413, ADSL enables you to lease and pay for only the bandwidth you need.
SDSL (Symmetric DSL) represents the two-wire version of HDSL—which is actually symmetric DSL, albeit a four-wire version. SDSL is also known within ANSI as HDSL2.
Essentially offering the same capabilities as HDSL, SDSL offers T1 rates (1.544 Mbps) at ranges up to 10,000 feet and is primarily designed for business applications.
Black Box Explains... GBICs
A Gigabit Interface Converter (GBIC) is a transceiver that converts digital electrical currents to optical signals and back again. GBICs support speeds of 1 Gbps or more and are typically... more/see it nowused as an interface between a high-speed Ethernet or ATM switch and a fiber backbone. GBICs are hot-swappable, so switches dont need to be powered down for their installation. collapse