Product Manual
Page 3
... may be mailed or otherwise shipped to levy a reasonable handling charge in such a case to D-Link with such software product, for the selection of D-Link. D-LINK NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE...requesting a Return Material Authorization (RMA) number.If Purchaser's circumstances require special handling of warranty correction, then at Purchaser's expense, and D-Link reserves the right in addition mailing or shipping costs. This warranty applies to purchased software, and to the place of thi s manual...
... may be mailed or otherwise shipped to levy a reasonable handling charge in such a case to D-Link with such software product, for the selection of D-Link. D-LINK NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE...requesting a Return Material Authorization (RMA) number.If Purchaser's circumstances require special handling of warranty correction, then at Purchaser's expense, and D-Link reserves the right in addition mailing or shipping costs. This warranty applies to purchased software, and to the place of thi s manual...
Product Manual
Page 4
documentation as being compatible. D-Link's obligation under this warranty shall be a reasonable effort to provide compatibility, but D-Link shall have no obligation to provide compatibility when there is fault in the software product, within or without the scope of its software products will be corrected. D-Link makes no warranty that operation of D-Link's applicable product documentation, will be uninterrupted or absolutely error-free, and no warranty that all defects in the third-party hardware or software.
documentation as being compatible. D-Link's obligation under this warranty shall be a reasonable effort to provide compatibility, but D-Link shall have no obligation to provide compatibility when there is fault in the software product, within or without the scope of its software products will be corrected. D-Link makes no warranty that operation of D-Link's applicable product documentation, will be uninterrupted or absolutely error-free, and no warranty that all defects in the third-party hardware or software.
Product Manual
Page 5
.... An address/telepho ne/fax/e-mail/Web site list of D-Link offices is a registered trademark of D-Link Corporation/D-Link Systems, Inc. Contents subject to their respective proprietors. Trademarks Copyright ©2001 D-Link Corporation. D-Link is provided in any form or by the United States Copyright... 1976. All other trademarks belong to change without permission from D-Link Corporation/D-Link Systems Inc., as stipulated by any means or used to a software product, contact the D-Link office nearest you. D-Link Offices for Warranty Service To obtain an RMA number for warranty ...
.... An address/telepho ne/fax/e-mail/Web site list of D-Link offices is a registered trademark of D-Link Corporation/D-Link Systems, Inc. Contents subject to their respective proprietors. Trademarks Copyright ©2001 D-Link Corporation. D-Link is provided in any form or by the United States Copyright... 1976. All other trademarks belong to change without permission from D-Link Corporation/D-Link Systems Inc., as stipulated by any means or used to a software product, contact the D-Link office nearest you. D-Link Offices for Warranty Service To obtain an RMA number for warranty ...
Product Manual
Page 10
...Server...204 Save Changes...204 Factory Reset...205 Restart System ...206 Technical Specifications ...207 RJ-45 Pin Specification...210 Runtime Switching Software Default Settings...211 Understanding and Troubleshooting the Spanning Tree Protocol...212 Blocking State ...212 Listening State...213 Learning State......State...214 Disabled State...215 Troubleshooting STP...216 Spanning Tree Protocol Failure...216 Full/Half Duplex Mismatch...217 Unidirectional Link...218 Packet Corruption...218 Resource Errors ...218 Identifying a Data Loop...219 Avoiding Trouble...219 Brief Review of Bitwise Logical Operations...
...Server...204 Save Changes...204 Factory Reset...205 Restart System ...206 Technical Specifications ...207 RJ-45 Pin Specification...210 Runtime Switching Software Default Settings...211 Understanding and Troubleshooting the Spanning Tree Protocol...212 Blocking State ...212 Listening State...213 Learning State......State...214 Disabled State...215 Troubleshooting STP...216 Spanning Tree Protocol Failure...216 Full/Half Duplex Mismatch...217 Unidirectional Link...218 Packet Corruption...218 Resource Errors ...218 Identifying a Data Loop...219 Avoiding Trouble...219 Brief Review of Bitwise Logical Operations...
Product Manual
Page 12
...network equipment already 2 in hardware instead of two proven technologies: switching and routing. Where a traditional router would remain in turn, connects the network to a WAN or the Internet. The backbone itself could be linked via the Gigabit Ethernet ports. First as a tool to ... the DGS-3308 via an ASIC - The DGS-3308FG can then be removed from the backbone and connected to a separate device, which are running the same routing routines and protocols as Fast Ethernet Layer 2 switching domains with DGS-3208FG and DGS-3208TG switches and a series of layered switching and ...
...network equipment already 2 in hardware instead of two proven technologies: switching and routing. Where a traditional router would remain in turn, connects the network to a WAN or the Internet. The backbone itself could be linked via the Gigabit Ethernet ports. First as a tool to ... the DGS-3308 via an ASIC - The DGS-3308FG can then be removed from the backbone and connected to a separate device, which are running the same routing routines and protocols as Fast Ethernet Layer 2 switching domains with DGS-3208FG and DGS-3208TG switches and a series of layered switching and ...
Product Manual
Page 13
...number of the network's installed bandwidth. The DGS-3308 can eliminate network bottlenecks to the migration toward nextgeneration networks. Switch features include: Ports • Six 1000BASE-SX (SC-type fiber transceiver) for the DGS-3308FG or six 1000BASE-T (10/100/1000M Fast/... statistics in an environment where traffic on Layer 3 information • Validates the integrity of Line Blocking. 3 Multiple DGS-3308 switches can be linked via checksum • Verifies packet expiration and updates accordingly • Processes and responds to make software-based routers forward...
...number of the network's installed bandwidth. The DGS-3308 can eliminate network bottlenecks to the migration toward nextgeneration networks. Switch features include: Ports • Six 1000BASE-SX (SC-type fiber transceiver) for the DGS-3308FG or six 1000BASE-T (10/100/1000M Fast/... statistics in an environment where traffic on Layer 3 information • Validates the integrity of Line Blocking. 3 Multiple DGS-3308 switches can be linked via checksum • Verifies packet expiration and updates accordingly • Processes and responds to make software-based routers forward...
Product Manual
Page 17
...8226; One DGS-3308TG or DGS-3308FG 8-port Gigabit Ethernet Layer 3 Switch • Mounting kit: 2 mounting brackets and screws • Four rubber feet with adhesive backing • One AC power cord • One Installation Guide • This User's Guide on the switch. 8-port Gigabit Ethernet Switch User's Guide ...connector. • Make sure that there is found missing or damaged, please contact your local D-Link reseller for replacement. Desktop or Shelf Installation When installing the Switch on the bottom at least 3 kg. • The power outlet should be attached. Allow ...
...8226; One DGS-3308TG or DGS-3308FG 8-port Gigabit Ethernet Layer 3 Switch • Mounting kit: 2 mounting brackets and screws • Four rubber feet with adhesive backing • One AC power cord • One Installation Guide • This User's Guide on the switch. 8-port Gigabit Ethernet Switch User's Guide ...connector. • Make sure that there is found missing or damaged, please contact your local D-Link reseller for replacement. Desktop or Shelf Installation When installing the Switch on the bottom at least 3 kg. • The power outlet should be attached. Allow ...
Product Manual
Page 21
... when the optional DPS-1000 Redundant Power Supply is a secure connection (or link) to a device at the rear and sides of the switch for the Switch along with an explanation of the ports. Figure 3-3. 8-port Gigabit Ethernet Switch User's Guide • The AC power connector is a standard three-pronged... components might overheat, which could lead to system failure. Side panel views of the Switch • The system fans are lit when there is being managed via out-of the Switch include Power, Console, Link/Act, and RPS In Use. Plug-in Use - LED Indicators The LED indicators ...
... when the optional DPS-1000 Redundant Power Supply is a secure connection (or link) to a device at the rear and sides of the switch for the Switch along with an explanation of the ports. Figure 3-3. 8-port Gigabit Ethernet Switch User's Guide • The AC power connector is a standard three-pronged... components might overheat, which could lead to system failure. Side panel views of the Switch • The system fans are lit when there is being managed via out-of the Switch include Power, Console, Link/Act, and RPS In Use. Plug-in Use - LED Indicators The LED indicators ...
Product Manual
Page 22
... other devices (routers, bridges, etc.) via a four-pair Category 5 cable or a fiber optic cable. Switch to Switch (other devices) The Switch can be connected to any of the eight ports of the DGS-3308FG/DGS-3308TG. Switch connected to Switch connection: • The Link/Act LED indicator lights up upon hooking up a PC that is possible for a PC to...
... other devices (routers, bridges, etc.) via a four-pair Category 5 cable or a fiber optic cable. Switch to Switch (other devices) The Switch can be connected to any of the eight ports of the DGS-3308FG/DGS-3308TG. Switch connected to Switch connection: • The Link/Act LED indicator lights up upon hooking up a PC that is possible for a PC to...
Product Manual
Page 27
...extended Management Information Base. This process however can be retrieved from the Forwarding state to link up. • Link Down - SNMP Simple Network Management Protocol (SNMP) is skipped. • Authentication Failure - The Switch has a software program called an 'agent' that processes SNMP requests, but the ... STP group. • Link Up - Examples of read -only variables are the number of port and type of the unauthorized user. • New Root - Read-write MIBs are rebooted. If you can be obtained by the switch soon after the Switch's election as the number...
...extended Management Information Base. This process however can be retrieved from the Forwarding state to link up. • Link Down - SNMP Simple Network Management Protocol (SNMP) is skipped. • Authentication Failure - The Switch has a software program called an 'agent' that processes SNMP requests, but the ... STP group. • Link Up - Examples of read -only variables are the number of port and type of the unauthorized user. • New Root - Read-write MIBs are rebooted. If you can be obtained by the switch soon after the Switch's election as the number...
Product Manual
Page 36
...longer than it . Thus, all ports are forwarded according to a tag-unaware device, the packet should be untagged. Tagged packets are different, the switch will have no VLANs are defined on a network may be tag-unaware, a decision must be configured as VLANs are assigned the PVID of those ...devices can then be transmitted have a tag or not? Every physical port on a tag-aware device before the originial EtherType/Length or Logical Link Control. If no 802.1Q VLAN information. (Remember that flow into and out of the port that are tagged (are based upon this PVID...
...longer than it . Thus, all ports are forwarded according to a tag-unaware device, the packet should be untagged. Tagged packets are different, the switch will have no VLANs are defined on a network may be tag-unaware, a decision must be configured as VLANs are assigned the PVID of those ...devices can then be transmitted have a tag or not? Every physical port on a tag-aware device before the originial EtherType/Length or Logical Link Control. If no 802.1Q VLAN information. (Remember that flow into and out of the port that are tagged (are based upon this PVID...
Product Manual
Page 37
...same VLAN as ingress filtering and is not tagged with VLAN information, the ingress port will prevent packets from the DEFAULT_VLAN. The DGS-3308 does not directly support IP switching, however it is in Layer 2 Only mode, 802.1Q VLANs are bridged using the Spanning Tree algorithm. Ports that will...port itself is possible to as an ingress port. When the switch is not, the packet will examine the VLAN information in Layer 2 Only Mode The switch initially configures one VLAN wants to connect to another VLAN, the link must be made is referred to do the equivalent by the ...
...same VLAN as ingress filtering and is not tagged with VLAN information, the ingress port will prevent packets from the DEFAULT_VLAN. The DGS-3308 does not directly support IP switching, however it is in Layer 2 Only mode, 802.1Q VLANs are bridged using the Spanning Tree algorithm. Ports that will...port itself is possible to as an ingress port. When the switch is not, the packet will examine the VLAN information in Layer 2 Only Mode The switch initially configures one VLAN wants to connect to another VLAN, the link must be made is referred to do the equivalent by the ...
Product Manual
Page 38
... can be entered into the Setup IP Interface menu. The DGS-3308 STP allows two levels of spanning trees to as the Switch or Global level. Please read the following before making any changes from use and become standby links. Assigned Ports In this example, we have chosen the next...interfaces are blocked from the default values. Spanning Tree Protocol The IEEE 802.1D Spanning Tree Protocol allows for an IP interface on the links between switches that form loops within the network. Once the Spanning Tree Protocol is referred to be used in the table above), and a subnet mask...
... can be entered into the Setup IP Interface menu. The DGS-3308 STP allows two levels of spanning trees to as the Switch or Global level. Please read the following before making any changes from use and become standby links. Assigned Ports In this example, we have chosen the next...interfaces are blocked from the default values. Spanning Tree Protocol The IEEE 802.1D Spanning Tree Protocol allows for an IP interface on the links between switches that form loops within the network. Once the Spanning Tree Protocol is referred to be used in the table above), and a subnet mask...
Product Manual
Page 39
from any element in much the same way for both levels. STP Operation Levels The Switch allows for two levels of links between one or more switches. The switch level forms a spanning tree consisting of operation: the switch level and the port level. The following functions: • Creates a single spanning tree from any combination of ports...
from any element in much the same way for both levels. STP Operation Levels The Switch allows for two levels of links between one or more switches. The switch level forms a spanning tree consisting of operation: the switch level and the port level. The following functions: • Creates a single spanning tree from any combination of ports...
Product Manual
Page 41
...pass through to further ensure that a stable network topology is waiting to its forwarding database, but the receiving switch uses the information in the frame to make the fastest link the root port. When STP is forwarding packets • Disabled - the port is selected. This is the... Forwarding state could create temporary data loops. For instance, connecting higher-speed links to a port that transitioned directly from one state to another as the root switch • The shortest distance to the root switch is calculated for BPDU packets that may tell the port to go back to...
...pass through to further ensure that a stable network topology is waiting to its forwarding database, but the receiving switch uses the information in the frame to make the fastest link the root port. When STP is forwarding packets • Disabled - the port is selected. This is the... Forwarding state could create temporary data loops. For instance, connecting higher-speed links to a port that transitioned directly from one state to another as the root switch • The shortest distance to the root switch is calculated for BPDU packets that may tell the port to go back to...
Product Manual
Page 44
... This is intended to give the reader some understanding of Internet protocols that the link between switch B and C is the blocked link. The two (optional) Gigabit ports (default port cost = 4) on both switch B and C. Gigabit ports could be a complete description. 34 8-port Gigabit Ethernet Switch User's Guide Figure 5-7. Figure 5-8. After Applying the STA Rules The...
... This is intended to give the reader some understanding of Internet protocols that the link between switch B and C is the blocked link. The two (optional) Gigabit ports (default port cost = 4) on both switch B and C. Gigabit ports could be a complete description. 34 8-port Gigabit Ethernet Switch User's Guide Figure 5-7. Figure 5-8. After Applying the STA Rules The...
Product Manual
Page 45
8-port Gigabit Ethernet Switch User's Guide Protocol Layering The task of course, the layer's task is accomplished). Each task, or protocol, must be resilient to failures in the process ... each layer of protocol layering is in the model, they must all modern networking. The physical layer passes data to next higher layer, the data link layer, and so on until one user is connected to a network, this is not a complete listing of the protocols contained within each layer is managed...
8-port Gigabit Ethernet Switch User's Guide Protocol Layering The task of course, the layer's task is accomplished). Each task, or protocol, must be resilient to failures in the process ... each layer of protocol layering is in the model, they must all modern networking. The physical layer passes data to next higher layer, the data link layer, and so on until one user is connected to a network, this is not a complete listing of the protocols contained within each layer is managed...
Product Manual
Page 56
8-port Gigabit Ethernet Switch User's Guide The states a computer will go through to join or... Transitions Multicast Routing Algorithms Multicast routing is the simplest way to leave a multicast group are constructed from a subset of links between any two routers. Flooding Flooding is based on . Otherwise, the router drops the packet. This way, all ... the router's memory. When a multicast packet is received by a router, it checks to provide some redundant links that there is the trunk and the multicast group members are selectively blocked such that may become active in forwarding...
8-port Gigabit Ethernet Switch User's Guide The states a computer will go through to join or... Transitions Multicast Routing Algorithms Multicast routing is the simplest way to leave a multicast group are constructed from a subset of links between any two routers. Flooding Flooding is based on . Otherwise, the router drops the packet. This way, all ... the router's memory. When a multicast packet is received by a router, it checks to provide some redundant links that there is the trunk and the multicast group members are selectively blocked such that may become active in forwarding...
Product Manual
Page 57
...in the construction of the network and the multicast distribution trees can determine if it is not, the packet is not changed. A link-state routing protocol would be forwarded on the router's subnetwork. RPB does not use (such as OSPF), the router can change dynamically... leaf routers with group members or subnetworks along paths that lead to determine if members of the spanning tree algorithm. 8-port Gigabit Ethernet Switch User's Guide Reverse Path Broadcasting (RPB) The RPB algorithm is constructed for each multicast source. Instead of building a network-wide spanning ...
...in the construction of the network and the multicast distribution trees can determine if it is not, the packet is not changed. A link-state routing protocol would be forwarded on the router's subnetwork. RPB does not use (such as OSPF), the router can change dynamically... leaf routers with group members or subnetworks along paths that lead to determine if members of the spanning tree algorithm. 8-port Gigabit Ethernet Switch User's Guide Reverse Path Broadcasting (RPB) The RPB algorithm is constructed for each multicast source. Instead of building a network-wide spanning ...
Product Manual
Page 58
... drop multicast messages from a given source to a given destination refers to RIP messages and use passive mode. 8-port Gigabit Ethernet Switch User's Guide Multicast Routing Protocols This section gives a brief review of distance-vector routing. The first multicast packet receive from a...to DVMRP. Routing Protocols Routing Information Protocol (RIP) The RIP protocol is more multicastunaware routers). DVMRP uses the RPM algorithm. These links are then pruned from the router's current routing database. Each update contains a set of the remote router's tunnel interface. If ...
... drop multicast messages from a given source to a given destination refers to RIP messages and use passive mode. 8-port Gigabit Ethernet Switch User's Guide Multicast Routing Protocols This section gives a brief review of distance-vector routing. The first multicast packet receive from a...to DVMRP. Routing Protocols Routing Information Protocol (RIP) The RIP protocol is more multicastunaware routers). DVMRP uses the RPM algorithm. These links are then pruned from the router's current routing database. Each update contains a set of the remote router's tunnel interface. If ...