Evaluation and Comparison of Spanning Tree Protocol and Rapid Spanning Tree Protocol on Cisco Switches Via OPNET ENSC 427: COMMUNICATION NETWORKS

Total Page:16

File Type:pdf, Size:1020Kb

Evaluation and Comparison of Spanning Tree Protocol and Rapid Spanning Tree Protocol on Cisco Switches Via OPNET ENSC 427: COMMUNICATION NETWORKS Evaluation and Comparison of Spanning Tree Protocol and Rapid Spanning Tree Protocol on Cisco switches via OPNET ENSC 427: COMMUNICATION NETWORKS SPRING 2013 FINAL PROJECT Project Group # 2 Joseph Lu 301077704 [email protected] Sen Jiang 301121645 [email protected] Tao Xiong 301129494 [email protected] Table of Contents List of Figures ………………………………………………………………………………..….3 List of Tables …………………………………………………………………………………….4 Abstract .........................................................................................................................................5 1. Ethernet ……………………………………………………………………………………….5 1.1 Ethernet LAN ………………………………………………………………………………..5 1.2 Media Access Control (MAC) addressing ……………………………………………….….5 1.3 Switches ………………………….………………………………………………………….6 1.4 Virtual LANs ...........................................................................................................................6 2. Spanning Tree Protocol (STP) Overview ...............................................................................7 2.1 Spanning Tree Protocol (STP) ………………………………………………………………..7 2.2 Types of STPs ………………………………………………………………………………...9 2.2.1 Rapid Spanning Tree Protocol ……………………………………………………………9 2.2.2 Multiple Spanning Tree Protocol ………………………………………………………..11 2.3 Hypothesis …………………………………………………………………………………...11 3. OPNET Simulations ………………………………………………………………………...12 3.1 Topologies …………………………………………………………………………………..12 3.1.1 Three Layer Topology …………………………………………………………………..12 3.1.2 Ring Backbone Topology ……………………………………………………………….13 3.2 Simulation Setup …………………………………………………………………………….14 3.2.1 Simulation with Ring Backbone Topology ……………………………………………...14 3.2.2 Simulation with Three Layer Topology …………………………………………………19 4. Simulation Results …………………………………………………………………………..20 5. Conclusion and Discussion ………………………………………………………………….21 References ………………………………………………………………………………………23 2 List of Figures Figure.1 MAC Address ………………………………………………………………………….6 Figure.2 Spanning Tree Interface States [4] ...…………………………………………………...8 Figure.3 STP and Redundant Connectivity [4].………………………………………………….8 Figure.4 Root Port [5] …………………………………………………………………………..10 Figure.5 Designated Port [5] ……………………………………………………………………10 Figure.6 Alternate Port [5] ……………………………………………………………………...10 Figure.7 Backup Port [5] ………………………………………………………………………..10 Figure.8 Multiple Spanning Tree Protocol [7] ………………………………………………….11 Figure.9 Three Layer Topology [8] ……………………………………………………………..12 Figure.10 Ring Backbone Topology [8] ………………………………………………………...13 Figure.11 Scenario#1 and #2 ……………………………………………………………………14 Figure.12 Application Definition ………………………………………………………………..15 Figure.13 Profile Definition ……………………………………………………………………..15 Figure.14 Root Bridge Priority ………………………………………………………………….16 Figure.15 Workstation Attributes ……………………………………………………………….16 Figure.16 Server Attributes ……………………………………………………………………..17 Figure.17 Scenario#3 and Scenario#4 …………………………………………………………..17 Figure.18 Scenario#5 and Scenario#6 …………………………………………………………..18 Figure.19 Scenario#7 and Scenario#8 …………………………………………………………..18 Figure.20 Scenario#9 and Scenario#10 …………………………………………………………18 Figure.21 Scenario#11 and Scenario#12 ………………………………………………………..19 Figure.22 Scenario#13 and Scenario#14 ………………………………………………………..19 Figure.23 Results and Protocol Visualization of Scenario#1 and Scenario#2 ………………….20 Figure.24 Results and Protocol Visualization of Scenario#13 and Scenario#14 ……………….20 3 List of Tables Table.1 Port States of STP and RSTP [5] ………………………………………………………...9 Table.2 Project Specification ……………………………………………………………………14 Table.3 Results of All Scenarios ………………………………………………………………...21 4 ABSTRACT Spanning Tree Protocol (STP) was based on the algorithm invented by Radia Perlman to prevent loop forming in networks in 1985. [1] And in 1990, the IEEE published 802.1D as its first standard. It was introduced to any bridged Ethernet local area network. In 2001, the IEEE published Rapid Spanning Tree Protocol as 802.1w which provides significantly faster loop— free paths calculation in response to a topology change. Our project intends to evaluate and compare the performances of STP and RSTP on Cisco switches supported by OPNET. We were planning to do the comparison of STP with more other types such as Multiple Spanning Tree Protocol. However, after searching in OPNET V16.0, we found that in OPNET, Cisco switches only support STP and RSTP. Our project first introduce some background information regarding VLAN, STP, RSTP, Layer Two Switches, Layer Three Switches, Distribution Layer, Access Layer, and so on. Besides the background information, the report discusses some companies that produce switches, especially the one's switches we will be using: Cisco. It then includes our work on OPNET. We build and configure the three layer topology and the ring backbone topology, then analyze and explain some snapshots taken from OPNET. We create STP tree with three layers which totally have approximately ten Cisco switches, and observe the performance of connection coming back up after disconnecting the loop. After finishing the STP evaluation, we run the same procedure for RSTP, and finally compare their results for a conclusion. 1. ETHERNET 1.1. Ethernet LAN Ethernet is the most widely used local area network access model. It is standardized by the Institute of Electrical and Electronics Engineers (IEEE) as 802.3 [2] standard. An Ethernet environment involves various types of devices, such as hubs, bridges, and switches. A switching Ethernet environment is an Ethernet network that consists of switches instead of hubs. A switch is a more intelligent device than hub. It stores Media Access Control address in lookup table and maintain address at its own. There are switches that are used in different layers, such as layer two switches used in the data link layer which learn MAC address automatically, and are cheap and easy to deploy. Ethernet switches are able to link more than one local area network together. 1.2. Media Access Control (MAC) Addressing Media Access Control address [2] is the physical address of the network device found in the data link layer aside from the logical address that is found in the network layer. A MAC address is a hardware identification serial number that uniquely identifies each device in the 5 network. It is manufactured into every network adapter that differentiates network cards. Therefore, the MAC address cannot be modified. A MAC address is 48 bits (6 bytes) in length and usually written as a sequence of twelve hexadecimal digits. The first 24 bits (sixdigits) correspond to the organizational unique identifier (OUI) or the manufacturer’s unique identifier, while the last 24 bits (six digits) correspond to the device serial number that is assigned by the vendor, as illustrated in the figure below: Figure.1 MAC Address The combination of the OUI and the device serial number logically ensures that any of the network adapters have the different MAC address. 1.3. Switches As bridges add Bridges add a level of intelligence to the network by using the MAC address to build a table of hosts, mapping these hosts to a network segment and containing traffic within these network segments. A switch functions the same as a bridge. When a switch receives a frame, it examines the destination and source MAC addresses and compares them to a table of network segments and addresses. The frame is dropped if the segments are the same, whereas forwarded to the proper segment if the segments are different. In Ethernet LAN, switches are able to link several LANs together and forward frames between these LAN segments. They are used as a more intelligent version of hubs in networks. 1.4. Virtual LANs A Virtual Local Area Network (VLAN) is a group of data exchanging ports of every switch that are chosen specifically for putting logic inside the switches correspondingly. Generally speaking, the function of VLANs is assigning tasks to switches through specific ports. VLANs can also be defined as broadcast domains due to the fact that broadcast packets are sent out all ports that are in the same VLAN. VLAN mapping configures layer two switches to provide the logical connectivity among the VLAN members. VLANs are standardized as IEEE 802.1Q. 6 2. SPANNING TREE PROTOCOL (STP) OVERVIEW 2.1. Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) is a link—management protocol under the Institute of Electrical and Electronics Engineers (IEEE) standard 802.1D for routing bridges and switches. The idea of Spanning Tree Protocol is using the spanning—tree algorithm to provide redundancy to your network without breaking it. When there is one link in the network fails, another way would automatically come up for the traffic to reach its destination. Due to that the network connection forms many loops which make data traffic fails finding the way to its destination, traffic congestion happens as data is transmitted around in circles. By using the STP algorithm, the switches that send bridge protocol data units (BPDUs) are able to identify active redundant links, and block one of these links to prevent any possible network loops. In a network, broadcast storms and constant table changes are created by network loops which bring down the entire network. The spanning tree protocol creates a tree spanning across the entire network and forces redundant paths into a standby or blocking state in establishing path redundancy. In between two network devices such as switches, the spanning tree protocol allows only one active path at one time to prevent network loops.
Recommended publications
  • Transparent LAN Service Over Cable
    Transparent LAN Service over Cable This document describes the Transparent LAN Service (TLS) over Cable feature, which enhances existing Wide Area Network (WAN) support to provide more flexible Managed Access for multiple Internet service provider (ISP) support over a hybrid fiber-coaxial (HFC) cable network. This feature allows service providers to create a Layer 2 tunnel by mapping an upstream service identifier (SID) to an IEEE 802.1Q Virtual Local Area Network (VLAN). Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://tools.cisco.com/ITDIT/CFN/. An account on http:// www.cisco.com/ is not required. Contents • Hardware Compatibility Matrix for Cisco cBR Series Routers, page 2 • Prerequisites for Transparent LAN Service over Cable, page 2 • Restrictions for Transparent LAN Service over Cable, page 3 • Information About Transparent LAN Service over Cable, page 3 • How to Configure the Transparent LAN Service over Cable, page 6 • Configuration Examples for Transparent LAN Service over Cable, page 8 • Verifying the Transparent LAN Service over Cable Configuration, page 10 • Additional References, page 11 • Feature Information for Transparent LAN Service over Cable, page 12 Cisco Converged Broadband Routers Software Configuration Guide For DOCSIS 1 Transparent LAN Service over Cable Hardware Compatibility Matrix for Cisco cBR Series Routers Hardware Compatibility Matrix for Cisco cBR Series Routers Note The hardware components introduced in a given Cisco IOS-XE Release are supported in all subsequent releases unless otherwise specified.
    [Show full text]
  • How to Set up IP Camera by Using a Macintosh Computer
    EDIMAX COMPUTER INC. Edimax IP Camera series How to set up IP Camera by using a Macintosh computer 2011 Edimax Computer 3350 Scott Blvd., Building #15 Santa Clara, California 95054, USA Phone 408-496-1105 • Fax 408-980-1530 www.edimax.us How to setup Edimax IP Camera by a Macintosh computer Introduction The most important thing to setup IP Camera is to assign a static IP address so the camera can work with your network. So far the Edimax IP Cam Admin utility is Windows based only and the program can not work for Macintosh computers. Macintosh users can follow this guide to set up Edimax IP camera. Step 1. Understand the IP address used in your network. Have your Macintosh computer operate as usual. Go into System Preferences. In System Preferences, Go to Network. Select the adapter you are using. It could be an Airport card, a third- party Wireless card, or an Ethernet Adapter. Write down the IP address, subnet mask, Router, and DNS server address. We have a usb wireless card in this example. Its IP address 10.0.1.2 told us that the IP addresses used in the network are 10.0.1.x. All the devices in the network have the first three octets the same, but the last octet number must be different. We decide to give our new camera an IP address 10.0.1.100 because no other computer device use 10.0.1.100. We temporarily disconnect the wireless adapter. You can turn off your Airport adapter if you use it to get on Internet.
    [Show full text]
  • Ieee 802.1 for Homenet
    IEEE802.org/1 IEEE 802.1 FOR HOMENET March 14, 2013 IEEE 802.1 for Homenet 2 Authors IEEE 802.1 for Homenet 3 IEEE 802.1 Task Groups • Interworking (IWK, Stephen Haddock) • Internetworking among 802 LANs, MANs and other wide area networks • Time Sensitive Networks (TSN, Michael David Johas Teener) • Formerly called Audio Video Bridging (AVB) Task Group • Time-synchronized low latency streaming services through IEEE 802 networks • Data Center Bridging (DCB, Pat Thaler) • Enhancements to existing 802.1 bridge specifications to satisfy the requirements of protocols and applications in the data center, e.g. • Security (Mick Seaman) • Maintenance (Glenn Parsons) IEEE 802.1 for Homenet 4 Basic Principles • MAC addresses are “identifier” addresses, not “location” addresses • This is a major Layer 2 value, not a defect! • Bridge forwarding is based on • Destination MAC • VLAN ID (VID) • Frame filtering for only forwarding to proper outbound ports(s) • Frame is forwarded to every port (except for reception port) within the frame's VLAN if it is not known where to send it • Filter (unnecessary) ports if it is known where to send the frame (e.g. frame is only forwarded towards the destination) • Quality of Service (QoS) is implemented after the forwarding decision based on • Priority • Drop Eligibility • Time IEEE 802.1 for Homenet 5 Data Plane Today • 802.1Q today is 802.Q-2011 (Revision 2013 is ongoing) • Note that if the year is not given in the name of the standard, then it refers to the latest revision, e.g. today 802.1Q = 802.1Q-2011 and 802.1D
    [Show full text]
  • IEEE 802.1Aq Standard, Is a Computer Networking Technology Intended to Simplify the Creation and Configuration of Networks, While Enabling Multipath Routing
    Brought to you by: Brian Miller Yuri Spillman - Specified in the IEEE 802.1aq standard, is a computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing. - Link State Protocol - Based on IS-IS -The standard is the replacement for the older spanning tree protocols such as IEEE 802.1D, IEEE 802.1w, and IEEE 802.1s. These blocked any redundant paths that could result in layer 2(Data Link Layer), whereas IEEE 802.1aq allows all paths to be active with multiple equal cost paths, and provides much larger layer 2 topologies. 802.1aq is an amendment to the "Virtual Bridge Local Area Networks“ and adds Shortest Path Bridging (SPB). Shortest path bridging, which is undergoing IEEE’s standardization process, is meant to replace the spanning tree protocol (STP). STP was created to prevent bridge loops by allowing only one path between network switches or ports. When a network segment goes down, an alternate path is chosen and this process can cause unacceptable delays in a data center network. The ability to use all available physical connectivity, because loop avoidance uses a Control Plane with a global view of network topology Fast restoration of connectivity after failure, again because of Link State routing's global view of network topology Under failure, the property that only directly affected traffic is impacted during restoration; all unaffected traffic just continues Ideas are rejected by IEEE 802.1. accepted by the IETF and the TRILL WG is formed. Whoops, there is a problem. They start 802.1aq for spanning tree based shortest path bridging Whoops, spanning tree doesn’t hack it.
    [Show full text]
  • Linear Algebraic Techniques for Spanning Tree Enumeration
    LINEAR ALGEBRAIC TECHNIQUES FOR SPANNING TREE ENUMERATION STEVEN KLEE AND MATTHEW T. STAMPS Abstract. Kirchhoff's Matrix-Tree Theorem asserts that the number of spanning trees in a finite graph can be computed from the determinant of any of its reduced Laplacian matrices. In many cases, even for well-studied families of graphs, this can be computationally or algebraically taxing. We show how two well-known results from linear algebra, the Matrix Determinant Lemma and the Schur complement, can be used to elegantly count the spanning trees in several significant families of graphs. 1. Introduction A graph G consists of a finite set of vertices and a set of edges that connect some pairs of vertices. For the purposes of this paper, we will assume that all graphs are simple, meaning they do not contain loops (an edge connecting a vertex to itself) or multiple edges between a given pair of vertices. We will use V (G) and E(G) to denote the vertex set and edge set of G respectively. For example, the graph G with V (G) = f1; 2; 3; 4g and E(G) = ff1; 2g; f2; 3g; f3; 4g; f1; 4g; f1; 3gg is shown in Figure 1. A spanning tree in a graph G is a subgraph T ⊆ G, meaning T is a graph with V (T ) ⊆ V (G) and E(T ) ⊆ E(G), that satisfies three conditions: (1) every vertex in G is a vertex in T , (2) T is connected, meaning it is possible to walk between any two vertices in G using only edges in T , and (3) T does not contain any cycles.
    [Show full text]
  • Teacher's Guide for Spanning and Weighted Spanning Trees
    Teacher’s Guide for Spanning and weighted spanning trees: a different kind of optimization by sarah-marie belcastro 1TheMath. Let’s talk about spanning trees. No, actually, first let’s talk about graph theory,theareaof mathematics within which the topic of spanning trees lies. 1.1 Graph Theory Background. Informally, a graph is a collection of vertices (that look like dots) and edges (that look like curves), where each edge joins two vertices. Formally, A graph is a pair G =(V,E), where V is a set of dots and E is a set of pairs of vertices. Here are a few examples of graphs, in Figure 1: e b f a Figure 1: Examples of graphs. Note that the word vertex is singular; its plural is vertices. Two vertices that are joined by an edge are called adjacent. For example, the vertices labeled a and b in the leftmost graph of Figure 1 are adjacent. Two edges that meet at a vertex are called incident. For example, the edges labeled e and f in the leftmost graph of Figure 1 are incident. A subgraph is a graph that is contained within another graph. For example, in Figure 1 the second graph is a subgraph of the fourth graph. You can see this at left in Figure 2 where the subgraph in question is emphasized. Figure 2: More examples of graphs. In a connected graph, there is a way to get from any vertex to any other vertex without leaving the graph. The second graph of Figure 2 is not connected.
    [Show full text]
  • Introduction to Spanning Tree Protocol by George Thomas, Contemporary Controls
    Volume6•Issue5 SEPTEMBER–OCTOBER 2005 © 2005 Contemporary Control Systems, Inc. Introduction to Spanning Tree Protocol By George Thomas, Contemporary Controls Introduction powered and its memory cleared (Bridge 2 will be added later). In an industrial automation application that relies heavily Station 1 sends a message to on the health of the Ethernet network that attaches all the station 11 followed by Station 2 controllers and computers together, a concern exists about sending a message to Station 11. what would happen if the network fails? Since cable failure is These messages will traverse the the most likely mishap, cable redundancy is suggested by bridge from one LAN to the configuring the network in either a ring or by carrying parallel other. This process is called branches. If one of the segments is lost, then communication “relaying” or “forwarding.” The will continue down a parallel path or around the unbroken database in the bridge will note portion of the ring. The problem with these approaches is the source addresses of Stations that Ethernet supports neither of these topologies without 1 and 2 as arriving on Port A. This special equipment. However, this issue is addressed in an process is called “learning.” When IEEE standard numbered 802.1D that covers bridges, and in Station 11 responds to either this standard the concept of the Spanning Tree Protocol Station 1 or 2, the database will (STP) is introduced. note that Station 11 is on Port B. IEEE 802.1D If Station 1 sends a message to Figure 1. The addition of Station 2, the bridge will do ANSI/IEEE Std 802.1D, 1998 edition addresses the Bridge 2 creates a loop.
    [Show full text]
  • Sampling Random Spanning Trees Faster Than Matrix Multiplication
    Sampling Random Spanning Trees Faster than Matrix Multiplication David Durfee∗ Rasmus Kyng† John Peebles‡ Anup B. Rao§ Sushant Sachdeva¶ Abstract We present an algorithm that, with high probability, generates a random spanning tree from an edge-weighted undirected graph in Oe(n4/3m1/2 + n2) time 1. The tree is sampled from a distribution where the probability of each tree is proportional to the product of its edge weights. This improves upon the previous best algorithm due to Colbourn et al. that runs in matrix ω multiplication time, O(n ). For the special case of unweighted√ graphs, this improves upon the best previously known running time of O˜(min{nω, m n, m4/3}) for m n5/3 (Colbourn et al. ’96, Kelner-Madry ’09, Madry et al. ’15). The effective resistance metric is essential to our algorithm, as in the work of Madry et al., but we eschew determinant-based and random walk-based techniques used by previous algorithms. Instead, our algorithm is based on Gaussian elimination, and the fact that effective resistance is preserved in the graph resulting from eliminating a subset of vertices (called a Schur complement). As part of our algorithm, we show how to compute -approximate effective resistances for a set S of vertex pairs via approximate Schur complements in Oe(m + (n + |S|)−2) time, without using the Johnson-Lindenstrauss lemma which requires Oe(min{(m + |S|)−2, m + n−4 + |S|−2}) time. We combine this approximation procedure with an error correction procedure for handing edges where our estimate isn’t sufficiently accurate.
    [Show full text]
  • Power Over Ethernet
    How To | Power over Ethernet Introduction Power over Ethernet (PoE) is a technology allowing devices such as IP telephones to receive power over existing LAN cabling. This technical note is in four parts as follows: • PoE Technology • How PoE works • Allied Telesyn PoE implementation • Command Reference What information will you find in this document? The first two parts of this document describe the PoE technology, and the installation and management advantages that PoE can provide. This is followed by an overview of how PoE works, Power Device(PD) discovery, PD classification, and the delivery of power to PD data cables. The third part of this document focuses on Allied Telesyn’s implementation of PoE on the AT-8624PoE switch. The document concludes with a list of configuration and monitoring commands. Which product and software version does this information apply to? The information provided here applies to: • Products: AT8624PoE switch • Software version: 2.6.5 C613-16048-00 REV C www.alliedtelesyn.com PoE Technology Power over Ethernet is a mechanism for supplying power to network devices over the same cabling used to carry network traffic. PoE allows devices that require power, called Powered Devices (PDs), such as IP telephones, wireless LAN Access Points, and network cameras to receive power in addition to data, over existing infrastructure without needing to upgrade it. This feature can simplify network installation and maintenance by using the switch as a central power source for other network devices. A device that can source power such as an Ethernet switch is termed Power Sourcing Equipment (PSE). Power Sourcing Equipment can provide power, along with data, over existing LAN cabling to Powered Devices.
    [Show full text]
  • Modular Embedded PC's with Intel® Atom™ E3800 Top Side The
    QSys Modular Embedded PC’s with Intel® Atom™ E3800 The Qseven mainboard (carrier board) MB-Q7-2 in combination with The highlights: a standard Qseven 2.0 (x86) module forms an ultra compact hardware kit. By use of the new Intel® Atom™ family E3800 (BayTrail“) a very Based on Intel® Atom™ E3800 („BayTrail“) economical and extremely powerful embedded PC is available. The Optimized for ultra low power integrated Intel® HD Graphics Engine (Generation 7) raises the bar also Extended temperature in graphic intensive low power applications. High speed interfaces like Gigabit Ethernet, USB 3.0 and eSATAp The compact design with only 10 cm x 10 cm x 2,3 cm and the huge DisplayPort and LVDS amount of interfaces and functionalities allows the user to create high Extendable with 2x Mini PCIe incl. SIM card socket performant but passive cooled solutions like BoxPCs, PanelPCs and Onboard eMMC and mSATA socket custom specific devices in a very fast and convenient way. Integrated security features Audio with integrated amplifier Another key aspect is security which is supported by TPM 1.2/2.0, Ultra compact design (10cm x 10 cm x 2,3 cm) a Sentinel HL security controller and an integrated secure EEPROM Longevity support which allows the user to realize a very secure embedded device. Also usable as embedded alternative for Intel® NUC Standard boards (eNUC) Top side Bottom side Technical data hardware kit Performance/configurations Microprocessor (CPU module) With extended temperature support: CPU: Intel® Atom™ E3800 („BayTrail-I“) 5 variants from 1,46 GHz Single Core up to E3815: 1x 1,46 GHz, 512 KB L2-Cache, HD Gfx 400/400 MHz, 1,91 GHz Quad Core 5 W TDP, 2 GB Single-Ch.
    [Show full text]
  • USB to Ethernet Adapter | QUICK SETUP GUIDE RF-PCC132
    USB to Ethernet Adapter | QUICK SETUP GUIDE RF-PCC132 Thank you for purchasing this high quality Rocketfish USB to Ethernet Adapter. Use this adapter to instantly connect to a 10/100 Mbps network from the USB port on your desktop or laptop computer. 3 When the installation is complete, click Finish to restart your Package contents computer and finish the installation. • USB to Ethernet Adapter • Driver CD • Quick Setup Guide Setting up the adapter Note: The driver software must be installed before you connect the adapter. The adapter does not need to be connected for the software to install. To install on a Windows PC: 1 Insert the driver CD into the optical drive on your computer. The software should run automatically. The initial installation screen opens. Note: If the software does not run automatically, locate and double-click Run.exe on the driver CD. 4 Connect the USB connector on the adapter to an open USB port on 2 Click on your operating system, then follow on-screen instructions. your desktop or laptop computer. 5 Connect a network cable to the Ethernet port on the adapter. To install on a Mac: 1 Insert the driver CD into the optical drive of your computer. On the driver CD, locate and click AX88772.dmg. Click the DISK IMAGE icon. The driver setup driver setup dialog box opens. Note: If the computer has Windows 8, you do not need to install the driver from the disc. The drivers are installed automatically. 2 When the installer screen opens, click 4 When installation is complete, click Restart to FCC Information Continue to start the installation, then restart the computer and finish the installation.
    [Show full text]
  • Layer 2 Virtual Private Networks CM-SP-L2VPN-I11-130808
    Data-Over-Cable Service Interface Specifications Business Services over DOCSIS® Layer 2 Virtual Private Networks CM-SP-L2VPN-I11-130808 ISSUED Notice This DOCSIS specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry and its customers. This document may contain references to other documents not owned or controlled by CableLabs®. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses from third parties for technology referenced in this document. Neither CableLabs nor any member company is responsible to any party for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this document, or any document referenced herein. This document is furnished on an "AS IS" basis and neither CableLabs nor its members provides any representation or warranty, express or implied, regarding the accuracy, completeness, noninfringement, or fitness for a particular purpose of this document, or any document referenced herein. Cable Television Laboratories, Inc., 2006-2013 CM-SP-L2VPN-I11-130808 Data-Over-Cable Service Interface Specifications DISCLAIMER This document is published by Cable Television Laboratories, Inc. ("CableLabs®"). CableLabs reserves the right to revise this document for any reason including, but not limited to, changes in laws, regulations, or standards promulgated by various agencies; technological advances; or changes in equipment design, manufacturing techniques, or operating procedures described, or referred to, herein. CableLabs makes no representation or warranty, express or implied, with respect to the completeness, accuracy, or utility of the document or any information or opinion contained in the report.
    [Show full text]