Uploaded by vo vantap

AFxFamily Trainning

advertisement
Narrowband & Distribution
ABB Ethernet Solutions
AFS650 / AFS670 / AFR677 Family
© ABB Group
October 2, 2014 | Slide 1
AFS6xx Family – ABB Ethernet Solutions
Table of contents
Time
Day 1
09.00 –
12.45 am
-Introduction
-Networking Basics
01.30 –
04.00 pm
Lunch
-Equipment Introduction
L2 Overview
-User-SW “AFS Finder” PC- Installation
-Local Management Access
-Basic Programming
Day 2
-Layer 2 Network
VLAN Foundation
Spanning Tree Protocol
Lunch
-Layer 2 Programming
VLAN Programming
Spanning Tree Programming
Day 1
Networking Basics
OSI Stack & TCP/IP Architecture
© ABB Group
October 2, 2014 | Slide 3
Principles of the Internet


Edge vs. core (end-systems vs. routers)

Dumb network

Intelligence at the end-systems
Different communication paradigms

Connection oriented vs. connection less

Packet vs. circuit switching

Layered System

Network of collaborating networks
The network edge
end
systems (hosts):

run application programs

e.g., WWW, email

at “edge of network”
client/server
model:

client host requests, receives
service from server

e.g., WWW client (browser)/
server; email client/server
peer-peer

model:
host interaction symmetric
e.g.: teleconferencing
Network edge: connection-oriented service
Goal:
data transfer between end
sys.
setup (prepare
for) data transfer ahead of time
handshaking:
Hello,
hello back human protocol
set
up “state” in two
communicating hosts
TCP
- Transmission Control
Protocol
Internet’s
service
connection-oriented
TCP service
[RFC 793]
in-order byte-stream
data transfer
reliable,
loss:
acknowledgements and
retransmissions
flow
control:
sender
won’t overwhelm receiver
congestion
senders
control:
“slow down sending rate”
when network congested
Network edge: connectionless service
Goal: data transfer between end systems

UDP - User Datagram Protocol [RFC 768]: Internet’s connectionless service

unreliable data transfer

no flow control

no congestion control
The IP Model
Application layer
SMTP HTTP
FTP
Telnet
TCP
UDP
DNS
RTP
PPP
ATM
Optics
Video
Transport layer
Network layer
IP
Ethernet
Audio
ADSL
Satellite
3G
Physical and Data link layer
The OSI Model
7
Application
6
Presentation
5
Session
4
Transport
3
Network
2
Data Link
1
Physical
Upper Layers
Application oriented
“End-to-End”-Layers
Lower Layers
Network oriented
“Hop-by-hop” layers
OSI Model and the Internet

Internet protocols are not directly based on the OSI model

However, we do often use the OSI numbering system. You should at least
remember these:

Layer 7: Application

Layer 4: Transport (e.g. TCP, UDP)

Layer 3: Network (IP)

Layer 2: Data link

Layer 1: Physical
Layer Interaction:
TCP/IP Model
End
to
end
Hop
by
hop
Application
Application
TCP or UDP
TCP or UDP
IP
IP
Link
Physical
Host
Link
IP
Link
Link
IP
Link
Physical
Router
Link
Physical
Router
Host
End-to-end layers

Upper layers are “end-to-end”

Applications at the two ends behave as if they can talk
directly to each other

They do not concern themselves with the details of what
happens in between
Hop-by-hop layers

At the lower layers, devices share access to the same
physical medium

Devices communicate directly with each other

The network layer (IP) has some knowledge of how many
small networks are interconnected to make a large
internet

Information moves one hop at a time, getting closer to the
destination at each hop
Layer Interaction:
TCP/IP Model
Application
Application
TCP or UDP
TCP or UDP
IP
IP
Link
Physical
Host
Link
IP
Link
Link
IP
Link
Physical
Router
Link
Physical
Router
Host
Layer Interaction:
The Application Layer
Applications behave as if they can talk to each other,
but in reality the application at each side talks to the
TCP or UDP service below it.
Application
Application
TCP application
or UDP
or UDP
The
layer doesn't care about whatTCP
happens
atIPthe lower layers,
IP provided the
IP transport layer
IP
carries the application's data safely from end to end.
Link
Physical
Host
Link
Link
Link
Link
Physical
Router
Link
Physical
Router
Host
Layer Interaction:
The Transport Layer
The transport layer instances at the two ends act as if
they are talking to each other, but in reality they are
each talking to the IP layer below it. The transport
layer doesn't care about what the application layer is
Application
Application
doing above it.
TCP or UDP
TCP or UDP
IP
IP the
The IP
transport layerIPdoesn't care what
happens in
IPLink
layer or below,
long asLink
the IPLink
layer can move
Link as
Link
Link
datagrams from one side to the other.
Physical
Host
Physical
Router
Physical
Router
Host
Layer Interaction:
The Network Layer (IP)
The IP layer has to know a lot about the topology of
the network (which host is connected to which router,
which routers are connected to each other),
but it
Application
Application
doesn't care about what happens at the upper layers.
TCP or UDP
IP
TCP or UDP
IP
IP
IP
LinkIP layer works
Link Link
Link hop byLink
The
forwardsLink
messages
hop
from one side
to the other side.
Physical
Physical
Physical
Host
Router
Router
Host
Layer Interaction:
Link and Physical Layers
The link layer doesn't care what happens above it, but
it is very closely tied to the physical layer below
it.
Application
Application
All or
links
have
no
TCP
UDPare independent of each other, andTCP
or UDP
way of communicating with each other.
IP
IP
Link
Physical
Host
Link
IP
Link
Link
Link
Physical
Router
IP
Link
Physical
Router
Host
Layering: physical communication
data
application
transport
network
link
physical
application
transport
network
link
physical
network
link
physical
application
transport
network
link
physical
data
application
transport
network
link
physical
Frame, Datagram, Segment, Packet


Different names for packets at different layers

Ethernet (link layer) frame

IP (network layer) datagram

TCP (transport layer) segment
Terminology is not strictly followed

we often just use the term “packet” at any layer
Encapsulation & Decapsulation

Lower layers add headers (and sometimes trailers) to data from higher
layers
Application
Transport
Network
Network
Data Link
Data Link
Data
Header Transport Layer Data
Header
Network Layer Data
Header Header
Data
Header
Link Layer Data
Header Header Header
Data
Trailer
Trailer
Layer 2 - Ethernet frame
Preamble
Dest


Type
Data
2 bytes
46 to 1500
bytes
Destination and source are 48-bit MAC addresses (e.g.,
00:26:4a:18:f6:aa)
6 bytes

Source
6 bytes
CRC
4 bytes
Type 0x0800 means that the “data” portion of the Ethernet frame contains an
IPv4 datagram. Type 0x0806 for ARP. Type 0x86DD for IPv6.
“Data” part of layer 2 frame contains a layer 3 datagram.
Layer 3 - IPv4 datagram
Version
IHL
Differentiated Services
Identification
Time to Live
Total Length
Flags
Protocol
Fragment Offset
Header Checksum
Source Address (32-bit IPv4 address)
Destination Address (32-bit IPv4 address)
Options
Padding
Data (contains layer 4 segment)

Version = 4
If no options, IHL = 5
Source and Destination
are 32-bit IPv4
addresses

Protocol = 6 means data
portion contains a TCP
segment. Protocol = 17
means UDP.
Layer 4 - TCP segment
Source Port
Destination Port
Sequence Number
Acknowledgement Number
Data
Offset
Reserved
UAE R S F
RCO S Y I
GKL TNN
Checksum
Window
Urgent Pointer
Options
Padding
Data (contains application data)

Source and Destination are 16-bit TCP port numbers (IP addresses are
implied by the IP header)

If no options, Data Offset = 5 (which means 20 octets)
Day 1
Networking Basics
IP Addressing
Purpose of an IPv4 address

Unique Identification of:


Source

So the recipient knows where the message is from

Sometimes used for security or policy-based
filtering of data
Destination


So the networks know where to send the data
Network Independent Format

IP over anything
Purpose of an IP Address

Identifies a machine’s connection to a network

Physically moving a machine from one network to
another requires changing the IP address

Unique; assigned in a hierarchical fashion

IANA (Internet Assigned Number Authority)

IANA to RIRs (AfriNIC, ARIN, RIPE, APNIC, LACNIC)

RIR to ISPs and large organisations

ISP or company IT department to end users

IPv4 uses unique 32-bit addresses

IPv6 used similar concepts but 128-bit addresses
Basic Structure of an IPv4 Address


32 bit number (4 octet number):
(e.g. 133.27.162.125)
Decimal Representation:
133

27
162
125
Binary Representation:
10000101 00011011 10100010 01111101

Hexadecimal Representation:
85
1B
A2
7D
Addressing in Internetworks

The problem we have
 More than one physical network
 Different Locations
 Larger number of hosts
 Need a way of numbering them all

We use a structured numbering system

Hosts that are connected to the same physical network
have “similar” IP addresses

Often more then one level of structure; e.g. physical
networks in the same organisation use “similar” IP
addresses
Network part and Host part

Remember IPv4 address is 32 bits

Divide it into a “network part” and “host part”


“network part” of the address identifies which network in
the internetwork (e.g. the Internet)
“host part” identifies host on that network

Hosts or routers connected to the same link-layer
network will have IP addresses with the same network
part, but different host part.

Host part contains enough bits to address all hosts on
the subnet; e.g. 8 bits allows 256 addresses
Dividing an address

Hierarchical Division in IP Address:

Network Part (or Prefix) – high order bits (left)


describes which physical network
Host Part – low order bits (right)

describes which host on that network
Network Part

Host Part
Boundary can be anywhere

choose the boundary according to number of hosts

very often NOT a multiple of 8 bits
Network Masks


“Network Masks” help define which bits are used to describe the
Network Part and which for the Host Part
Different Representations:

decimal dot notation: 255.255.224.0

binary: 11111111 11111111 11100000 00000000

hexadecimal: 0xFFFFE000

number of network bits: /19


count the 1's in the binary representation
Above examples all mean the same: 19 bits for the Network Part
and 13 bits for the Host Part
Example Prefixes

137.158.128.0/17
1111 1111
1000 1001

198.134.0.0/16
1111 1111
1100 0110

(netmask 255.255.128.0)
1111 1111 1 000 0000 0000 0000
1001 1110 1 000 0000 0000 0000
(netmask 255.255.0.0)
1111 1111
1000 0110
0000 0000
0000 0000
0000 0000
0000 0000
205.37.193.128/26
(netmask 255.255.255.192)
1111 1111 1111 1111 1111 1111 11 00 0000
1100 1101 0010 0101 1100 0001 10 00 0000
Special Addresses


All 0’s in host part: Represents Network

e.g. 193.0.0.0/24

e.g. 138.37.64.0/18

e.g. 196.200.223.96/28
All 1’s in host part:
Broadcast

e.g. 193.0.0.255
(prefix 193.0.0.0/24)

e.g. 138.37.127.255 (prefix 138.37.64.0/18)

e.g. 196.200.223.111 (prefix 196.200.223.96/28)

127.0.0.0/8: Loopback address (127.0.0.1)

0.0.0.0: Various special purposes
Exercise


Verify that the previous examples are all broadcast
addresses:

193.0.0.255
(prefix 193.0.0.0/24)

138.37.127.255 (prefix 138.37.64.0/18)

196.200.223.111 (prefix 196.200.223.96/28)
Do this by finding the boundary between network part and
host part, and checking that the host part (if written in
binary) contains all 1's.
Day 1
Networking Basics
ARP
Encapsulation Reminder

Lower layers add headers (and sometimes trailers) to data
from higher layers
Application
Transport
Network
Network
Data Link
Data Link
Data
Header Transport Layer Data
Header
Network Layer Data
Header Header
Data
Header
Link Layer Data
Header Header Header
Data
Trailer
Trailer
Ethernet Reminder

Ethernet is a broadcast medium

Structure of Ethernet frame:
Preamble
Dest
Source
Type
Data

Entire IP packet makes data part of Ethernet frame

Delivery mechanism (CSMA/CD)

back off and try again when collision is detected
CRC
Ethernet/IP Address Resolution



Internet Address

Unique worldwide (excepting private nets)

Independent of Physical Network technology
Ethernet Address

Unique worldwide (excepting errors)

Ethernet Only
Need to map from higher layer to lower
(i.e. IP to Ethernet, using ARP)
Address Resolution Protocol

ARP is only used in IPv4

ND replaces ARP in IPv6

Check ARP cache for matching IP address

If not found, broadcast packet with IP address to every host
on Ethernet

“Owner” of the IP address responds

Response cached in ARP table for future use

Old cache entries removed by timeout
Types of ARP Messages

ARP request


Who is IP addr X.X.X.X tell IP addr Y.Y.Y.Y
ARP reply

IP addr X.X.X.X is Ethernet Address hh:hh:hh:hh:hh:hh
ARP Procedure
1. ARP Cache is checked
5. ARP Entry is added
2. ARP Request is Sent using broadcast
4. ARP Reply is sent unicast
3. ARP Entry is added
ARP Table
IP Address
Hardware Address
Age (Sec)
192.168.0.2
08-00-20-08-70-54
3
192.168.0.65
05-02-20-08-88-33
120
192.168.0.34
07-01-20-08-73-22
43
Day 1
AFS650, AFS670 Family
Drivers & Typical Applications
Packet Switched Networks Drivers
Additional applications trend towards Ethernet

Today's SCADA communication uses increasingly the IEC 608705-104 (IEC 104)

Utility Internal Voice communication for operational purpose is
moving towards Voice over IP service (VoIP)

Video over IP: IT infrastructure can be used for Video surveillance
(CCTV)

In-Plant applications

Intrusion Detection System

Fire Detection System

Access Control System

ICCP Links between Control Centres

Substation Automation IEC61850
Packet Switched Networks Applications
Distribution Management System
Requires:

FE/GbE backbone for

SCADA communication
Voice over IP
CCTV (video)

Electrical ports required

Depending on design Switches or
Routers required

Fast redundancy required

Management System for supervision
required
Packet Switched Networks Applications
In-plant communication
Requires:

FE/GbE backbone & GbE for server
connections

Optical & electrical ports

Depending on design Switches or
Routers required

Power over Ethernet (PoE)

Port Authentication (802.1x) for security
on outdoor cameras

SNTP (Simple Network Time Protocol)
for time distribution
Packet Switched Networks Applications
IEC61850 Substation Automation
Requires:
IED = Intelligent Electronic Devices

Utility hardened switches supporting
IEC61850 (Station & Process bus)

High number of optical ports

Pure Layer 2 Ethernet switches

Fast redundancy protocol needed

QoS and VLAN used to provide
required performance

IEEE 1613 compatibility for substation
EMI/EMC
Day 1
AFS650, AFS670 Family
Feature Overview
AFS Family
Overview
AFS650/655
ABB FOX Switch Family
Utility Grade Switches
AFS670/675
AFS677/AFR677

IEC 61850 approved

IEEE 1613 compliant
EMI substations requirement

Extended temperature range
0°C up to 60°C
option -40°C to 85°C (70°C)
option conformal coating (high humidity)

Fanless design

Redundant power supply

AC power supply (90 .. 265 VAC)
and/or
DC power supply (18 .. 60, 77 .. 300 VDC)
AFS670/ AFS675

19” managed Switch of utility grade

Metal housing, Ports on front or on rear

High port density, modular concept

Up to 28 FE ports (electrical, optical or SFP cages)

Huge variety on optical ports: SFP cages, SC, ST,.., MM and
SM

SFP’s in various versions available (MM, SM, single fibre)

Up to 4 GbE ports (optical, electrical or combo ports)

Up to 4 Ports PoE

24/36/48 VDC or 60/120/250 VDC, 110/230VAC Power supply,
Redundant Power supply possible

CRA (Configuration Recovery Adapter) port for easy exchange of
product
AFS650/ AFS655
Technical Features

DIN Rail mounted managed Ethernet Switch of utility grade
(wall mounting possible)

Metal housing

Up to 10 FE ports (electrical, optical or SFP cages)

Up to 3 GbE ports (electrical, SFP or Combo ports)

Multimode and Single Mode versions available

Huge variety on optical ports: SFP cages, SC, ST, …

SFP’s in various versions available (MM, SM, single
fibre)

24/36/48 VDC or 60/120/250 VDC, 110/230VAC Power
supply, Redundant Power supply possible

CRA (Configuration Recovery Adapter) port for easy
exchange of product
General Features AFS650, AFS670 Family

Full managed Ethernet Switch supporting

Protection features such as
RSTP Rapid Spanning Tree Protocol (IEEE802.1w),
MSTP Multiple Spanning Tree Protocol on AFS677 (IEEE802.1s)
MRP Media Redundancy Protocol (IEC62439)
E-MRP Enhanced Redundancy Protocol (Proprietary)
 Protection Scheme in case of link failure

VLAN’s (IEEE802.1Q)
 Separation different applications

Traffic prioritization (IEEE802.1D/p), 4 queues
 Priorization for mission critical applications

Port Rate Limiting (Ingress & Egress) in steps of kbps
 Avoids blocking of mission critical data's

Link Aggregation (IEEE802.3ad)
 Bundling of several parallel links
General Features AFS650, AFS670 Family

Full managed Ethernet Switch supporting

PTP Timing (IEEE1588): Transparent Mode on AFS650/670,
full hardware support on AFS677

Authentication (IEEE802.1x) / Port Security
 Security of end user

Port mirroring
 Packet sniffing for troubleshooting

Traffic Monitoring
 Packet counters for troubleshooting

IGMP (Internet Group Management Protocol) snooping
 Multicast traffic handling

SNMP V1, V2, V3, SSH (Secure Shell)
 Network management
General Features AFS650, AFS670 Family


Configuration

Command Line Interface

Telnet

WEB Interface

Management System AFS-View
Configuration Recovery Adapter (CRA)
 Configuration stored on a USB stick for easy product replacement

Watchdog & Rollback feature
 Restores old configuration in case of cutting of the equipment

Diagnostic LEDs

2 x Alarm contacts

SFP Diagnostics

Local Logfile & Syslog Function

LLDP (Link Layer Discovery Protocol)
 Automatic topology discovery of network
Day 1
AFS677 & AFR677
Hardware Overview
AFS677 & AFR677
Look and Feel
Power Supplies
Alarm contacts
USB Port
for CRA
Gigabit Ethernet
Combo-Port
Configuration
Port (serial)
GbE SFP ports
(optical)
GbE
Electrical Ports
AFS677 & AFR677
Hardware Features

19” managed Full Gigabit Switch of utility grade

Metal housing, Ports on front or on rear (typical substation config)

Equipped with 16 GbE Combo-Port

Combo-Port offers either electrical or SFP-based interface


Electrical 100Mbit/s or 1000Mbit/s
SFP’s in various versions available (MM, SM, short and long
haul)

SFPs for 100Mbit/s or 1000Mbit/s

Up to 4 Ports PoE

Low/ High Voltage as well as AC/ DC power supply,
redundancy possible

CRA (Configuration Recovery Adapter) port for easy exchange of
product
Day 1
AFS677 & AFR677
Specific L2 Feature Overview
Event Time Stamping
Reference Time required for event recording
Event A
Event B
Event A
Event B
Event A
Event B
IRIG-B Interface
IRIG-B Interface
IRIG-B Interface
GPS Receiver
GPS Receiver
GPS Receiver
Event A
Event B
Event A
Event B
IRIG-B Interface
GPS Receiver
Event A
Event B
IEEE1588: Precision Time Protocol (PTP)
SNTP
PTP
SNTP
PTP
SNTP
PTP
SNTP
PTP

Time synchronisation is needed at many levels of utility
networks, typically to time-stamp different types of events.

Simple Network Time Protocol (SNTP) offers accuracy in
the milisecond range, which is not always sufficient

For higher accuracy (microsecond range) PTP can be used
=> accuracy in the microsecond range

PTP includes correction of the run-time between switches

PTP is supported in hardware in AFS677 & AFR677
Day 2
Layer 2 Network
Network Design
Layer-2 Network Design

A good network design is modular and hierarchical, with a
clear separation of functions:

Core: Resilient, few changes, few features, high
bandwidth, CPU power

Distribution: Aggregation, redundancy

Access: Port density, affordability, security features,
many adds, moves and changes
Layer-2 Network Design - Simple
ISP1
Network Border
Core
Distribution
Access
Layer-2 Network Design - Redundant
ISP1
ISP2
Network Border
Core
Distribution
Access
In-Building and Layer 2


There is usually a correspondence between building
separation and subnet separation

Switching inside a building

Routing between buildings
This will depend on the size of the network

Very small networks can get by with doing switching
between buildings

Very large networks might need to do routing inside
buildings
Layer 2 Concepts

Layer 2 protocols basically control access to a shared
medium (copper, fiber, electro-magnetic waves)

Ethernet is the de-facto wired-standard today


Reasons:

Simple

Cheap

Manufacturers keep making it faster
Wireless (802.11a,b,g,n) is also Layer-2 technology.
Ethernet Functions

Source and Destination identification


MAC addresses
Detect and avoid frame collisions

Listen and wait for channel to be available

If collision occurs, wait a random period before retrying

This is called CASMA-CD: Carrier Sense Multiple
Access with Collision Detection
Ethernet Frame

SFD = Start of Frame Delimiter

DA = Destination Address

SA = Source Address

CRC = Cyclick Redundancy Check
Evolution of Ethernet Topologies

Bus


Everybody on the same coaxial cable
Star


One central device connects every other node

First with hubs (repeated traffic)

Later with switches (bridged traffic)
Structured cabling for star topologies standardized
Switched Star Topology Benefits

It’s modular:

Independent wires for each end node

Independent traffic in each wire

A second layer of switches can be added to build a
hierarchical network that extends the same two benefits
above

ALWAYS DESIGN WITH MODULARITY IN MIND
Hub

Receives a frame on one port and sends it out every other
port, always.

Collision domain is not reduced

Traffic ends up in places where it’s not needed
Hub
Hub
A frame sent by one node is always sent to
every other node. Hubs are also called
“repeaters” because they just “repeat” what
they hear.
Switch

Learns the location of each node by looking at the source
address of each incoming frame, and builds a forwarding
table

Forwards each incoming frame to the port where the
destination node is

Reduces the collision domain

Makes more efficient use of the wire

Nodes don’t waste time checking frames not
destined to them
Switch
Forwarding Table
Address
Port
AAAAAAAAAAAA
1
BBBBBBBBBBBB
5
Switch
B
A
Switches and Broadcast


A switch broadcasts some frames:

When the destination address is not found in the table

When the frame is destined to the broadcast address
(FF:FF:FF:FF:FF:FF)

When the frame is destined to a multicast ethernet
address
So, switches do not reduce the broadcast domain!
Switch vs. Router

Routers more or less do with IP packets what switches do
with Ethernet frames


A router looks at the IP packet destination and checks
its routing table to decide where to forward the packet
Some differences:

IP packets travel inside ethernet frames

IP networks can be logically segmented into subnets

Switches do not usually know about IP, they only deal
with Ethernet frames
Switch vs. Router


Routers do not forward Ethernet broadcasts.

Switches reduce the collision domain

Routers reduce the broadcast domain
This becomes really important when trying to design
hierarchical, scalable networks that can grow sustainably
S
R
S
Traffic Domains
Router
Switch
Hub
Switch
Hub
Broadcast Domain
Hub
Hub
Collision Domain
Traffic Domains


Try to eliminate collision domains

Get rid of hubs!

Actually hubs are very rare today.
Try to keep your broadcast domain limited to no more than
250 simultaneously connected hosts

Segment your network using routers
Layer 2 Network Design Guidelines

Always connect hierarchically

If there are multiple switches in a building, use an
aggregation switch

Locate the aggregation switch close to the building
entry point (e.g. fiber panel)

Locate edge switches close to users (e.g. one per floor)

Max length for Cat 5 is 100 meters
Minimize Path Between Elements
✗
✔
Virtual LANs (VLANs)

Allow us to split switches into separate (virtual) switches

Only members of a VLAN can see that VLAN’s traffic

Inter-vlan traffic must go through a router
VLAN introduction

VLANs provide segmentation based on broadcast domains.

VLANs logically segment switched networks based on the functions, project teams, or
applications of the organization regardless of the physical location or connections to
the network.

All workstations and servers used by a particular workgroup share the same VLAN,
regardless of the physical connection or location.
Local VLANs

2 VLANs or more within a single switch

VLANs address scalability, security, and network
management. Routers in VLAN topologies provide
broadcast filtering, security, and traffic flow
management.

Edge ports, where end nodes are connected, are
configured as members of a VLAN

The switch behaves as several virtual switches,
sending traffic only within VLAN members.

Switches may not bridge any traffic between VLANs,
as this would violate the integrity of the VLAN
broadcast domain.

Traffic should only be routed between VLANs.
Local VLANs
Switch
VLAN X
VLAN Y
Edge ports
VLAN X nodes
VLAN Y nodes
Broadcast domains with VLANs and routers
10.1.0.0/16
10.2.0.0/16
Without VLANs:
10.3.0.0/16



Without VLANs, each group is on a different IP
network and on a different switch.
One link per VLAN or a single VLAN
Trunk (later)
Using VLANs. Switch is configured with the ports
on the appropriate VLAN. Still, each group on a With
different IP network; however, they are all on the VLANs
same switch.
10.1.0.0/16
10.2.0.0/16
What are the broadcast domains in each?
10.3.0.0/16
VLANs
Switch 1
172.30.1.21
255.255.255.0
VLAN 1
o
r
t
123456. P
L
A
N
121221. V
172.30.2.12
255.255.255.0
VLAN 2
172.30.2.10
255.255.255.0
VLAN 2
172.30.1.23
255.255.255.0
VLAN 1
TwoTwo
VLANs
= Two subnets
VLANs
Ÿ



Two Subnets
Important notes on VLANs:
VLANs are assigned to switch ports. There is no “VLAN” assignment
done on the host (usually).
In order for a host to be a part of that VLAN, it must be assigned an IP
address that belongs to the proper subnet. Remember: VLAN =
Subnet
VLANs
ARP Request
Switch 1
172.30.1.21
255.255.255.0
VLAN 1
o
r
t
123456. P
L
A
N
121221. V
172.30.2.12
255.255.255.0
VLAN 2
172.30.2.10
255.255.255.0
VLAN 2
172.30.1.23
255.255.255.0
VLAN 1
TwoTwo
VLANs
= Two subnets
VLANs
Ÿ


Two Subnets
VLANs separate broadcast domains!
e.g. without VLAN the ARP would be seen on all subnets.
Assigning a host to the correct VLAN is a 2-step process:
 Connect the host to the correct port on the switch.
 Assign to the host the correct IP address depending on the VLAN
membership
VLAN operation

As a device enters the network, it automatically assumes
the VLAN membership
of the port to which it is attached.

The default VLAN for every port in the switch is VLAN 1
and cannot be deleted.
(This statement does not give the whole story. More
in the lab later for interested groups…)

All other ports on the switch may be reassigned to alternate
VLANs.
VLANs across switches

Two switches can exchange traffic from one or more
VLANs

Inter-switch links are configured as trunks, carrying frames
from all or a subset of a switch’s VLANs

Each frame carries a tag that identifies which VLAN it
belongs to
VLANs across switches
No VLAN Tagging
VLAN Tagging

VLAN tagging is used when a single link needs to carry traffic for more than
one VLAN.
VLANs across switches
Tagged Frames
802.1Q Trunk
Trunk Port
VLAN X
VLAN Y
VLAN X
Edge Ports
This is called “VLAN Trunking”
VLAN Y
802.1Q

The IEEE standard that defines how ethernet frames
should be tagged when moving across switch trunks

This means that switches from different vendors are able to
exchange VLAN traffic.
802.1Q tagged frame
Tagged vs. Untagged

Edge ports are not tagged, they are just “members” of a
VLAN

You only need to tag frames in switch-to-switch links
(trunks), when transporting multiple VLANs

A trunk can transport both tagged and untagged VLANs

As long as the two switches agree on how to handle
those
VLANS increase complexity


You can no longer “just replace” a switch

Now you have VLAN configuration to maintain

Field technicians need more skills
You have to make sure that all the switch-to-switch trunks
are carrying all the necessary VLANs

Need to keep in mind when adding/removing VLANs
Good reasons to use VLANs

You want to segment your network into multiple subnets,
but can’t buy enough switches


Hide sensitive infrastructure like IP phones, building
controls, etc.
Separate control traffic from user traffic

Restrict who can access your switch management
address
Day 2
Layer 2 Network
Switching Loops
Switching Loop
Switch A

When there is more
than one path
between two
switches

What are the
potential problems?
Switch B
Swtich C
Switching Loop

If there is more than one path between two switches:

Forwarding tables become unstable


Source MAC addresses are repeatedly seen coming from different ports
Switches will broadcast each other’s broadcasts

All available bandwidth is utilized

Switch processors cannot handle the load
Switching Loop
Switch A
Switch B
Swtich C
Node 1
Node1 sends a
broadcast frame
(e.g. an ARP request)
Switching Loop
Switch A
Switch B
Swtich C
Node 1
Switches A, B and
C broadcast node
1’s frame out
every port
Switching Loop
Switch A
Switch B
Swtich C
Node 1
But they receive
each other’s
broadcasts, which
they need to
forward again out
every port!
The broadcasts are
amplified, creating
a broadcast
storm…
Good Switching Loops???

But you can take advantage of loops!


Redundant paths improve resilience when:

A switch fails

Wiring breaks
How to achieve redundancy without creating dangerous
traffic loops?
What is a Spanning Tree
“Given
a connected,
undirected graph, a
spanning tree of that
graph is a subgraph
which is a tree and
connects all the vertices
together”.
A
single graph can
have many different
spanning trees.
Spanning Tree Protocol

The purpose of the protocol is to have bridges dynamically
discover a subset of the topology that is loop-free (a tree)
and yet has just enough connectivity so that where
physically possible, there is a path between every switch
Spanning Tree Protocol

Several flavors:

Traditional Spanning Tree (802.1d)

Rapid Spanning Tree or RSTP (802.1w)

Multiple Spanning Tree or MSTP (802.1s)
Traditional Spanning Tree (802.1d)

Switches exchange messages that allow them to compute
the Spanning Tree

These messages are called BPDUs (Bridge Protocol
Data Units)

Two types of BPDUs:

Configuration

Topology Change Notification (TCN)
Traditional Spanning Tree (802.1d)

First Step:

Decide on a point of reference: the Root Bridge

The election process is based on the Bridge ID, which
is composed of:

The Bridge Priority: A two-byte value that is
configurable

The MAC address: A unique, hardcoded address
that cannot be changed.
Root Bridge Selection (802.1d)

Each switch starts by sending out BPDUs with a Root
Bridge ID equal to its own Bridge ID


Received BPDUs are analyzed to see if a lower Root
Bridge ID is being announced


I am the root!
If so, each switch replaces the value of the advertised
Root Bridge ID with this new lower ID
Eventually, they all agree on who the Root Bridge is
Root Bridge Selection (802.1d)
32678.0000000000AA
Switch A
Switch B
32678.0000000000BB
 All switches have the same priority.
 Who is the elected root bridge?
Switch C
32678.0000000000CC
Root Port Selection (802.1d)

Now each switch needs to figure out where it is in relation
to the Root Bridge

Each switch needs to determine its Root Port

The key is to find the port with the lowest Root Path
Cost

The cumulative cost of all the links leading to the
Root Bridge
Root Port Selection (802.1d)

Each link on a switch has a Path Cost

Inversely proportional to the link speed
e.g. the faster the link, the lower the cost
Link Speed
STP Cost
10 Mbps
100
100 Mbps
19
1 Gbps
4
10 Gbps
2
Root Port Selection (802.1d)

Root Path Cost is the accumulation of a link’s Path Cost
and the Path Costs learned from neighboring Switches.

It answers the question: How much does it cost to
reach the Root Bridge through this port?
Root Port Selection (802.1d)
1.
2.
3.
4.
Root Bridge sends out BPDUs with a Root Path Cost
value of 0
Neighbor receives BPDU and adds port’s Path Cost to
Root Path Cost received
Neighbor sends out BPDUs with new cumulative value
as Root Path Cost
Other neighbor’s down the line keep adding in the same
fashion
Root Port Selection (802.1d)

On each switch, the port where the lowest Root Path Cost was received
becomes the Root Port

This is the port with the best path to the Root Bridge
Root Port Selection (802.1d)
32678.0000000000AA
1
Switch A 2
Cost=19
1
Switch B
Cost=19
2 Cost=19
32678.0000000000BB
2
1
Switch C
32678.0000000000CC
 What is the Path Cost on each Port?
 What is the Root Port on each switch?
Root Port Selection (802.1d)
32678.0000000000AA
1
Switch A 2
Cost=19
Root Port
1
Switch B
32678.0000000000BB
Cost=19
2 Cost=19
2
1
Switch C
32678.0000000000CC
Root Port
Electing Designated Ports (802.1d)

OK, we now have selected root ports but we haven’t solved the loop problem
yet, have we?The links are still active!

Each network segment needs to have only one switch forwarding traffic to and
from that segment

Switches then need to identify one Designated Port per link

The one with the lowest cumulative Root Path Cost to the Root Bridge
Root Port Selection (802.1d)
32678.0000000000AA
1
Switch A 2
Cost=19
1
Switch B
32678.0000000000BB
Cost=19
2 Cost=19
2
1
Switch C
32678.0000000000CC
Which port should be the Designated Port on
each segment?
Electing Designated Ports (802.1d)

Two or more ports in a segment having identical Root Path Costs is possible,
which results in a tie condition

All STP decisions are based on the following sequence of conditions:

Lowest Root Bridge ID

Lowest Root Path Cost to Root Bridge

Lowest Sender Bridge ID

Lowest Sender Port ID
Root Port Selection (802.1d)
Designated
Port
32678.0000000000AA
1
Switch A 2
Cost=19
1
Switch B
Designated
Port
Cost=19
2 Cost=19
32678.0000000000BB
Designated
Port
2
1
Switch C
32678.0000000000CC
In the B-C link, Switch B
has the lowest Bridge
ID, so port 2 in Switch B
is the Designated Port
Blocking a port

Any port that is not elected as either a Root Port, nor a
Designated Port is put into the Blocking State.

This step effectively breaks the loop and completes the
Spanning Tree.
Root Port Selection (802.1d)
32678.0000000000AA
1
Switch A 2
Cost=19
1
Switch B
32678.0000000000BB
2 Cost=19
✗
2
Cost=19
1
Switch C
32678.0000000000CC
Port 2 in Switch C is put into the Blocking
State, because it is neither a Root Port nor
a Designated Port
Spanning Tree Protocol States

Disabled



Port is shut down
Blocking

Not forwarding frames

Receiving BPDUs
Listening

Not forwarding frames

Sending and receiving BPDUs
Spanning Tree Protocol States


Learning

Not forwarding frames

Sending and receiving BPDUs

Learning new MAC addresses
Forwarding

Forwarding frames

Sending and receiving BPDUs

Learning new MAC addresses
STP Topology Changes

Switches will recalculate if:

A new switch is introduced

It could be the new Root Bridge!

A switch fails

A link fails
Root Bridge Placement


Using default STP parameters might result in an undesired
situation

Traffic will flow in non-optimal ways

An unstable or slow switch might become the root
You need to plan your assignment of bridge priorities
carefully
Bad Root Bridge Placement
Out to router
32678.0000000000DD
Swtich D
Switch B
32678.0000000000BB
Root
Bridge
32678.0000000000CC
Switch C
Switch A
32678.0000000000AA
Good Root Bridge Placement
Alternative
Root
Bridge
1.0000000000DD
Out to standby
router
Swtich D
32678.0000000000CC
Switch C
Out to active
router
Switch B
Switch A
Root
Bridge
0.0000000000BB
32678.0000000000AA
STP Design Guidelines



Enable spanning tree even if you don’t have redundant
paths
Always plan and set bridge priorities

Make the root choice deterministic

Include an alternative root bridge
If possible, do not accept BPDUs on end user ports
802.1d Convergence Speeds

Moving from the Blocking state to the
Forwarding State takes at least 2 x Forward
Delay time units
(~ 30 secs.)


Some vendors have added enhancements such
as PortFast, which will reduce this time to a
minimum for edge ports


This can be annoying when connecting end user
stations
Never use PortFast or similar in switch-to-switch links
Topology changes typically take 30 seconds too

This can be unacceptable in a production network
Rapid Spanning Tree (802.1w)

Convergence is much faster


Communication between switches is more interactive
Edge ports don’t participate

Edge ports transition to forwarding state immediately

If BPDUs are received on an edge port, it becomes a
non-edge port to prevent loops
Rapid Spanning Tree (802.1w)

Defines these port roles:

Root Port (same as with 802.1d)

Alternate Port

A port with an alternate path to the root

Designated Port (same as with 802.1d)

Backup Port

A backup/redundant path to a segment where
another bridge port already connects.
Rapid Spanning Tree (802.1w)

Synchronization process uses a handshake method

After a root is elected, the topology is built in cascade,
where each switch proposes to be the designated
bridge for each point-to-point link

While this happens, all the downstream switch links are
blocking
Rapid Spanning Tree (802.1w)
DP
Root
Proposal
RP
Agreement
Switch
Switch
Switch
Switch
Rapid Spanning Tree (802.1w)
DP
Root
DP
Proposal
RP
RP
Agreement
Switch
Switch
Switch
Switch
Rapid Spanning Tree (802.1w)
DP
Root
DP
RP
RP
Switch
Switch
DP
Proposal
Agreement
RP
Switch
Switch
Rapid Spanning Tree (802.1w)
DP
Root
DP
RP
RP
Switch
Switch
DP
DP
Proposal
Agreement
RP
RP
Switch
Switch
Rapid Spanning Tree (802.1w)

Prefer RSTP over STP if you want faster convergence

Always define which ports are edge ports
Multiple Spanning Tree (802.1s)

Allows separate spanning trees per VLAN group



Different topologies allow for load balancing between
links
Each group of VLANs are assigned to an “instance” of
MST
Compatible with STP and RSTP
Multiple Spanning Tree (802.1s)
Root VLAN A
Vlan A
Root VLAN B
Vlan B
✕
✕
Multiple Spanning Tree (802.1s)

MST Region

Switches are members of a region if they have the
same set of attributes:

MST configuration name

MST configuration revision

Instance-to-VLAN mapping

A digest of these attributes is sent inside the BPDUs for
fast comparison by the switches

One region is usually sufficient
Multiple Spanning Tree (802.1s)

CST = Common Spanning Tree


In order to interoperate with other versions of Spanning
Tree, MST needs a common tree that contains all the
other islands, including other MST regions
IST = Internal Spanning Tree

Internal to the Region, that is

Presents the entire region as a single virtual bridge to
the CST outside
Multiple Spanning Tree (802.1s)

MST Instances

Groups of VLANs are mapped to particular Spanning
Tree instances

These instances will represent the alternative
topologies, or forwarding paths

You specify a root and alternate root for each instance
Multiple Spanning Tree (802.1s)
CST
MST Region
MST Region
IST
IST
802.1D switch
Multiple Spanning Tree (802.1s)

Design Guidelines

Determine relevant forwarding paths, and distribute
your VLANs equally into instances matching these
topologies

Assign different root and alternate root switches to each
instance

Make sure all switches match region attributes

Do not assign VLANs to instance 0, as this is used by
the IST
Additional Information
AFS677 & AFR677
Specific L3 Feature Overview
Data transfer: SWITCH (Layer 2)
Client B
Client A
Client A
One IP network
Client C
10.10.1.0/16
Application
Application
Presentation
Presentation
Session
Session
Transport
Switch 2
Switch 1
Client B
Client D
Switch
Network
Transport
Network
Data Link
Data Link
Data Link
Physical
Physical
Physical

All NE are in the same IP network and form one broadcasting domain

Packet forwarding is done based on MAC-address

Fast convergence in case of link failure (RSTP, E-MRP..)

No logical separation of the connected Networks

Unmanaged and Managed switches available
All AFS switches are fully managed
Data transfer: ROUTER (Layer 3)
Client A
Client C
10.10.1.0/16
Client B
Client A
2 different IP Networks
192.168.1.0/24
Application
Application
Presentation
Presentation
Session
Router
Transport
Client B
Router
Client D
Session
Transport
Network
Network
Network
Data Link
Data Link
Data Link
Physical
Physical
Physical

Router separates different IP networks = logical separation

Router creates several broadcast domains
(1 IP network = 1 broadcast domain)

Packet forwarding is done based on IP-address

Slower convergence in case of link failure (routing protocol)

Routing can be implemented in software (slower) or hardware (faster)
AFR677 supports routing in hardware

Routers are managed devices
Switching & Routing



Switching is required for:

Mission Critical services

Substation automation applications

Distribution communication applications
Routing is required for:

Big and complex communication networks

Connection of different LAN/ WAN networks

At the borders of substations or control centres
Most applications can run over a Switched or a routed network

But IEC61850 GOOSE & SV messages can not be routed today!
(update to IEC standard under development)
 Network structure needs to be planned carefully
IP Routing Table

Any routing table requires at least three fields:
DESTINATION
NEXT HOP
DESTINATION NEXT HOP
Network A
Network B
Network C
local
local
B.2
OUTBOUND
INTERFACE
A.1
B.1
B.1
OUTBOUND INTERFACE
DESTINATION NEXT HOP
Network A
Network B
Network C
B.1
local
local
OUTBOUND
INTERFACE
B.2
B.2
C.1
Static vs. Dynamic Routing

Routing tables can be populated in two ways:


Static Routing:

The routes are manually entered by the network administrator.

Used in small network with only little changes.

No traffic redundancy is supported
Dynamic Routing:

Used in bigger, more dynamic networks

The routes are automatically 'learned' by the router, based on a
routing protocol (OSPF, RIP, BGP, …)

In case of a path failure, the routing protocol can calculate
alternate paths thus providing redundancy.
L3 Functionality on AFR677


Routing Features

Static Routing

Dynamic Routing: OSPF or RIP

Port-based and VLAN-based routing
Network Protection

OSPF/RIP recalculation in case of network failure

Routing functionality can be combined with L2
protection
(e.g. E-MRP)

Virtual Router Redundancy VRRP / E-VRRP & Tracking
AFR677
Port-based and VLAN-based routing
AFR677


There are two different possibilities to configure routing:

Port-Based Routing: Individual physical ports are considered to be router interfaces.

VLAN based Routing: A VLAN is assigned a virtual router interface.

Physical interfaces and VLAN virtual interface are assigned an IP address
The configurations can also be mixed.
AFR677
Port based and VLAN base router configuration
R
R
Switch
Switch
Layer 2 Switch
R
VLAN
Switch
Router & Switch
Definition of VLANs
VLAN
Router
R
R
VLAN
R
VLAN
Switch
Routing between VLANs Free Configuration
AFR677
Virtual Router Redundancy Protocol (VRRP)
Router A
(active)
Router A
(standby)
X
Router B
(standby)
Router B
(active)
Additional Information
ABB FOX Firewall
Introduction to AFF650
AFF650: ABB FOX Firewall
Hardware


2 ports 100BASE-X

TX/TX

FX/FX

FX/TX including single mode fibre
1 RS232 port with RJ11 socket for

configuration of AFF

secure modem access to network for
remote diagnosis

1 USB socket for CRA support

Temperature range:



Standard: 0°C to +60°C

On request: -40°C to +60°C
Voltage range:

9.6 to 60 VDC

18 to 30 VAC
Power consumption: 9.6 VA max. at 24 VDC
Why is Cyber Security security an issue?

Cyber security has become an issue by introducing Ethernet
(TCP/IP) based communication protocols to industrial
automation and control systems.
 e.g. IEC60870-5-104 or IEC61850

Connections to and from external networks (e.g. office
intranet) to industrial automation and control systems have
opened systems and can be misused for cyber attacks.

Cyber attacks on industrial automation and control systems
are real and increasing, leading to large financial losses
What is Cyber Security?

Main goals of Cyber Security are:

Availability
– avoid denial of service

Integrity
– avoid unauthorized modification

Confidentiality
– avoid disclosure

Authentication
– avoid spoofing / forgery

Authorization
– avoid unauthorized usage
ABB’s Security Landscape
System Overview
User
Corporate Network
NCC or Regional Centre
Internet
WAN
Plant / Substation
Plant / Substation
Stateful Inspection
Insecure
Secure
Request
Response
Request
X
Response
Packet Filtering
Insecure
Secure
Examples:
MAC Filter
IP Filter
Port Filter
Only allow traffic from 00:02:A3:02:60:00
Only allow traffic to 192.168.1.100
Block all TELNET traffic (port 23)
What is a VPN?
VPN is a secure L3 connection

Tunneling private communication through an
insecure network (e.g. the Internet)

Function of VPNs:


Authentication

Encryption
Applications: Connecting geographically
distributed participants

Connection of RTU in substation to control
center (through public network)

Connection of remote offices to headoffice.
AFF650 - Main Functions

Operates in Routing or Bridging Mode

Router Functionality

Firewall Functionality (in routing or bridging mode)

Stateful Inspection

Packet filtering (IP address or protocol)

Packet filtering (MAC address)

Protection against DoS attacks

Network Address Translation - NAT (1:1, 1:n)

VPN Functionality (IPSec)

Router Redundancy

Dynamic DNS
Example: Customer projects with firewalls
© ABB Group
October 2, 2014 | Slide 169
Download