This document provides an introduction to 802.1P/Q VLAN tagging. It defines key concepts such as VLANs, tagged and untagged frames, and VLAN applications. The document outlines the objectives of understanding smaller broadcast domains, VLANs, and tagged frame structures. It also summarizes common IEEE networking standards and the agenda covered in the document.
This document provides an introduction to 802.1P/Q VLAN tagging. It defines key concepts such as VLANs, tagged and untagged frames, and VLAN applications. The document outlines the objectives of understanding smaller broadcast domains, VLANs, and tagged frame structures. It also summarizes common IEEE networking standards and the agenda covered in the document.
This document provides an introduction to 802.1P/Q VLAN tagging. It defines key concepts such as VLANs, tagged and untagged frames, and VLAN applications. The document outlines the objectives of understanding smaller broadcast domains, VLANs, and tagged frame structures. It also summarizes common IEEE networking standards and the agenda covered in the document.
This document provides an introduction to 802.1P/Q VLAN tagging. It defines key concepts such as VLANs, tagged and untagged frames, and VLAN applications. The document outlines the objectives of understanding smaller broadcast domains, VLANs, and tagged frame structures. It also summarizes common IEEE networking standards and the agenda covered in the document.
IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering Services in a bridged local network
IEEE 802.1 q : VLAN Tagging
IEEE 802.1 p : Priority Tagging / Mapping
IEEE 802.1ag : OAM (CFM)
Proprietary and Confidential What is VLAN?
Advantages for using VLAN
Regular Ethernet frame
Tagged frame structure
Types of VLAN
Types of connections
802.1P implementations
2 of 19 Agenda Agenda 4 Proprietary and Confidential A Layer 2 Protocol which enables enhanced traffic maneuvers :
Prioritization Filtering Provisioning Mapping (e.g. - ATM to/from ETH) 4 of 19 What is VLAN? 5 Proprietary and Confidential 5 of 19 What is VLAN? Regular ETH networks forward broadcast frames to all endpoints 6 Proprietary and Confidential 6 of 19 VLAN networks forward broadcast frames only to pre-defined ports (Profile Membership) VLAN 1 VLAN 547 Switch ports What is VLAN? 7 Proprietary and Confidential Breaking large networks into smaller parts (Formation of virtual workgroups)
Simplified Administration (no need for re-cabling when user moves)
Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones
Security establishing tunnels / trunks through the network for dedicated users (traffic between VLANs is restricted). 3 of 19 Advantages of VLAN 8 Proprietary and Confidential 7 of 19 Before we start explaining bit by bit, what is VLAN and how does it work, let us review first the structure of a regular ETH frame 9 Proprietary and Confidential 8 of 19 Preamble + SFD DA SA Length / Type DATA + PAD FCS 6 Bytes 6 Bytes 8 Bytes 2 Bytes 46 - 1500 Bytes 4 Bytes (32-bit CRC) FCS is created by the sender and recalculated by the receiver Length / Type < 1500 - Parameter indicates number of Data Bytes Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)
Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes Untagged Ethernet Frame 10 Proprietary and Confidential 4 of 42 9 of 19 Additional information is inserted Frame size increases to 1522 Bytes 4 Bytes 16 Bit 3 Bit 1 Bit 12 Bit TPID = 0x8100 TCI CFI P-TAG VLAN ID TPID = Tag protocol ID TCI = Tag Control Information CFI = 1 bit canonical Format Indicator Preamble + SFD DA SA Length / Type DATA + PAD FCS VLAN TAG Tagged Ethernet Frame 11 Proprietary and Confidential VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4094:
2^12 = 4096 VID 0 = reserved VID 4096 = reserved (every vendor may use some VIDs for internal purposes such as MNG etc.) VID 1 = default
After tagging a frame, FCS is recalculated
CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over ETH backbones (some vendors may use CFI for internal purposes) Tagging a Frame 12 Proprietary and Confidential Protocol type Value Tagged Frame 0x8100 ARP 0x0806 Q-in-Q (CISCO) 0x8100 Q-in-Q (other vendors) 0x88A8 Q-in-Q (other vendors) 0x9100 Q-in-Q (other vendors) 0x9200 RARP 0x8035 IP 0x0800 IPv6 0x86DD PPPoE 0x8863/0x8864 MPLS 0x8847/0x8848 IS-IS 0x8000 LACP 0x8809 802.1x 0x888E TPID in tagged frames in always set to 0x8100 TPID / ETHER-Type / Protocol Type It is important that you understand the meaning and usage of this parameter
Later when we discuss QoS, we shall demonstrate how & why the system audits this parameter 13 Proprietary and Confidential 10 of 19 Membership by Port VID Port 1 1 1 2 44 3 200 4 PRO easy configured CON no user mobility VID1 VID1 VID 44 VID200 VLAN types 14 Proprietary and Confidential 11 of 19 Membership by MAC VID MAC 1 00:33:ef:38:01:23 1 00:01:de:22:42:ae 44 00:20:8f:40:15:ef 200 00:20:32:35:ea:11 PRO user mobility, no reconfiguration when PC moves
CON needs to be assigned initially, not an easy task with thousands of endpoints VLAN types 15 Proprietary and Confidential 12 of 19 Membership by Subnet Address (a.k.a. Layer 3 VLAN) VID Subnet Address 1 10.0.0.0 / 24 1 20.0.0.0 / 30 44 11.0.0.0 / 24 200 192.168.1.0 / 24 Membership is based on the Layer 3 header No process of IP address is done
Main disadvantage longer overall throughput VLAN types 16 Proprietary and Confidential Membership by Protocol Type
VID Protocol Type 1 IP 44 IPX The VID is derived from the protocol type field found in the Layer 2 header 13 of 19 VLAN types 17 Proprietary and Confidential 14 of 19 VLAN aware Switch Device unaware of VLANs transmits untagged (regular) ETH frames Switch tags the ingress frames with VID according to specific Tagging mechanism Access Port a port which is not aware of VLANs (Cannot tag outgoing frames or un-tag incoming frames) A Port Types 18 Proprietary and Confidential 14 of 19 Device unaware of VLANs transmits untagged (regular) ETH frames Switch tags the ingress frames with VID according to specific Tagging mechanism
Switch un-tags frames with VID received from network and delivers untagged frames to Access ports Trunk Port a port which is aware of VLANs (Can tag or un-tag incoming frames) VLAN aware Switch A T Port Types 19 Proprietary and Confidential VLAN aware Switch 14 of 19 14 of 19 Trunk Port can carry tagged frames with different VIDs. This requires Port Membership configuration. A T A A This port is not a member of the Trunk port membership list, hence, traffic is discarded Port Types 20 Proprietary and Confidential
VLAN aware Switch 15 of 19 Q-in-Q (A.K.A. Double TaggingVLAN Encapsulation) Enhanced security not exposing original VID
Improved flexibility of VID in the network (Ingress VID was already assigned in the network) CN PN + Port Types 21
Introduction to QoS / CoS 22 Proprietary and Confidential We can extend the benefits of ATM QoS into Ethernet LANs to guarantee Ethernet priorities across the ATM backbone. A L2 switch or L3 router reads incoming 802.1p or IP ToS priority bits, and classifies traffic accordingly.
To match the priority level with the appropriate ATM service class and other parameters, the switch then consults a mapping table with pre-defined settings. CBR
VBR
UBR P-Tag 6
P-Tag 4
P-Tag 0
Mapping ATM QoS over ETH CoS (RFC 1483) Core Site Hub Site Tail site RNC BSC/MSC FibeAir IP-10
n x T1/E1 FE/GE GE GE STM1/ OC3 ATM Router MPLS Router IP-10 23 Proprietary and Confidential 16 of 19 Mapping ETH to MPLS and vice versa Core Site Hub Site Tail site RNC BSC/MSC FibeAir IP-10
n x T1/E1 FE/GE GE GE STM1/ OC3 STM1/ OC3 MPLS Router MPLS Router IP-10 IP-10s L2 switch can take part in the process of transporting services through MPLS core
Frames/services are mapped to MPLS FECs according to: VLAN ID mapped to MPLS EXP bits VLAN P-Bit mapped to MPLS EXP bits 24 Proprietary and Confidential 802.1P utilizes Traffic Classes:
A switch port allocates ingress frames to queues (buffers) according to their P-Tag value
The more queues the more prioritizing levels (classes)
Downside more time, more memory
Normally 4 queues (TCs) are sufficient
In this example the port groups a few Bits into a single queue
The following table shows IEEE definition of traffic classes
It shows the ingress options for P-Tag VS. egress P-tag
The number of egress priorities (classes) depend on the number of assigned queues
26 VLAN P-Bit Remap (Traffic Classes) Proprietary and Confidential Acronyms ETH Ethernet NIC Network Internet Card VID Vlan ID VLAN Virtual LAN P-TAG Priority Tag, Priority Bits CFI Canonical Format Indicator TPID Tag Protocol Identifier FCS Frame Check Sequence DA Destination Address SA Source Address QoS Quality of Service 27 Proprietary and Confidential