Skip to main content
Electronic Theatre Controls Inc

Network Definitions

Summary

This article provides basic definitions to words, phrases, or concepts used in networking.  As with most support articles, the definitions listed will be added or modified over time.

This article does not go into full details about every word, phrase, or concept.  If you would like to learn more about networking definitions in general, the Internet has lots of in-depth network support articles and we encourage you to use your search engine of choice to explore these topics.  If you would like to learn more about a specific word, phase, or concept and how it specifically relates to an ETC control system, please feel free to reach out to ETC Applications Engineering or ETC Technical Support.

 

---------------------------------------------------------------------------

 

10/100/1000BASE-T - common data-rate transmission speeds expressed as megabit per second (Mbps or Mb/s) used in Ethernet-based networks. 100 Mbps has been the most common for a number of years, although 1000 Mbps is becoming much more common, and is also frequently expressed as 1 Gbps (Gigabit per second). 1 Mbps is equal to ~125 kilobytes per second (KB/s) bandwidth, so theoretically approximately 125 megabytes per second (MB/s) is possible on a 1000 Mbps connection, although actual observed bandwith on any connection may be slightly less due to processing overhead and other capabilities of the networking hardware.

2.5/5/10GBASE-T - common data-rate transmission speeds expressed as gigabit per second (Gbps or Gb/s) used in Ethernet-based networks. Currently they're not as common in the consumer market

2.4Ghz - coming soon (wifi)

5.0Ghz - coming soon (wifi)

Access Control Entry - See Access Control List.  An Access Control Entry or ACE is an individual line or condition in an ACL.  For example a condition of an ACE may be to block port 5568 which is the port used by sACN lighting level packets.  That would be one line/condition in the ACL and is considered an ACE.

clipboard_e91a950780ff2ad27f1d0ea1bb5d54eda.png

Access Control List - An Access Control List or ACL for short is a feature in network switch hardware.  This feature allows the switch to block or allow network traffic based on specific conditions.  The conditions are input by a technician using the network switches Console Port or web user interface.  This ACL is applied on a port by port basis (physical network ports on the hardware).  Think of an ACL like a traffic monitor that inspects every network packet that enters or exits a network port.  The packet(s) will either be blocked or permitted based on the conditions in the ACL.  Depending on the capabilities of the network switch, the ACL may be applied to incoming traffic, outgoing traffic, or both.  The most common ACL used in ETC networks is to block sACN lighting levels. 

In this example, two different areas of a building each have a lighting controller that both use sACN universe 1.  Both areas of the building exist on same lighting network but different lighting switches.  It is then desirable to block sACN traffic between the network switches so that area A doesn't accidentally control area B.


For more information on how to configure ACLs in Cisco network switches, see this article.

Anycast - Used to describe the transmission of data over a network.  Read the definition for Multicast first to better understand the concept of Anycast.  First, there are no ETC products that support Anycast at this time.  Anycast is when a network device (receiver for multicast network traffic) sources it's multicast network traffic from the closest logical source on the network when multiple sources are present.  A good analogy would be to think of Internet video streaming services.  If the streaming service has let's say 5 locations around the country that all host a video that you want to watch, Anycast would tell the network switches (network infrastructure) that your receiver (home PC or smart TV or phone) would stream the video from the closest logical host (source).  The video would be streamed over multicast (only those who ask to get that information will get it).  Once again, this is not supported by ETC hardware.  In a lighting network, if more than one source of sACN exists, the receivers, DMX gateways for example, would want to receive all sACN sources and decide for itself which one "wins" using HTP (Highest Takes Precedence) and sACN Priority values.  Hence, lighting receivers want to listen to all multicast sources.

clipboard_ec9f16f7009ed03eb3bfd961fd8210856.png

arp -a - This is a Command Prompt command.  The purpose of arp -a is to return or print a list of IP Addresses and MAC Addresses that this computer has communicated with.  This is an excellent way to gather a list of MAC Addresses for the ETC networked hardware on a site.  The easiest way for your computer to interact with networked hardware is to run Concert or other product specific software such as LightDesigner or EchoAccess.  The simplest way is to simply ping IP Address and arp -a will return the MAC Address.  In the screenshot below, the PC has an IP Address of 10.101.19.20 and launched LightDesigner.  The returned list shows a PCCS at 10.101.10.10 and the remaining are all PACPs.

clipboard_e65a87493af692a041c0b0618b463847c.png

BACnet - stands for Building Automation and Control Networks, which is a protocol created in 1995 as ASHRAE-135, and used to control/monitor multiple systems within a facility, including HVAC, fire/life safety systems, access control, energy utility/buliding integration, wireless communications, and lighting systems. BACnet supports multiple physical data link technologies.

BACnet/IP  - one of the data link technologies utilized by BACnet, and the only one supported by ETC products, including the Paradigm Central Control Server (P-CCS), Echo BACnet Interface (EBI), Mosaic Show Controller (MSC), and EchoFlex CAN2GO BACnet Gateway

BBMD  - BACnet Broadcast Management Device, which receives BACnet broadcast messages on one IP subnet, and forwards then to another subnet. Used as a special type of router to bridge BACnet messages across two networks.

BPDU  - Bridge Protocol Data Unit is used in Spanning Tree to determine network topology.  Spanning Tree is used when a network is setup in a ring or mesh topology.  BPDU's are transmitted from each switch to it's neighbor switch to inform them them which physical ports on the switch are in which state (forwarding, listening, blocked, and so on).  Think of it like a "Hello" message between neighboring switches.  The neighboring switch uses that information to determine what state it should put its ports into and then transmits its own BPDU down the line. 

There are multiple pieces of information contained within the BPDU "Hello" packet regarding the switch.  Some examples include:

  • MAC Address
  • IP Address
  • Bridge Priority (Switch Priority)
  • Network port and speed (physical port)

One of the purposes of the BPDU is to find the best path (or lowest cost path) to the root bridge.  Eventually the root bridge will get the BPDU's from its neighboring switch and it will transmit a configuration message on all of its ports.  BPDU's are transmitted in moderate frequency of about 1 message every 2 seconds.  Note that in a Spanning Tree scenario, at the time of network convergence (when a switch or node is added to the network), ports do not immediately start data transmission immediately.  Instead they navigate through many different BPDU states until it is proven that this port does not create a "loop" and is safe, then it will start transmitting data.

BPDU Guard - This is a feature in some Cisco switch models.  A BPDU Guard can be applied to physical ports of a network switch.  The purpose of a BPDU Guard is to keep Spanning Tree and the network topology predictable.  When a port on a network switch has BPDU Guard enabled, the device on the other end cannot influence Spanning Tree on that VLAN/network.  If BPDU packets are detected on a network port that has BDPU Guard enabled, then the port is automatically disabled.  The port would then have to be manually enabled again using the web interface or command line.  This can be done in the Error Recovery Settings area of the network switch. 

This is an excellent tool in networks to prevent accidental changes in ring-topology when additional or temporary edge switches are added that may not be part of the permanent loop/ring topology.  If BPDU Guard is enabled and a BPDU is detected, the BPDU Handling state for that port will show up as "Guarding" (Blocked State) in the switch webUI.  Also the Operational Status of the port will say "Down (BPDU Guard)".

Note that BPDU Guard is used with ports that have PortFast enabled.  PortFast still uses STP but allows traffic to flow immediately (port STP is set to "Forwarding State") instead of first waiting for the BPDU's to negotiate the Spanning Tree topology first ("Learning and Listening States", these states are bypassed).  If PortFast is enabled and a BPDU packet is detected whilst BPDU Guard is also enabled, then the port immediately gets disabled.

Bridge ID & Bridge Priority - Aids in determining which bridge (or network switch) is elected the Root Bridge in a ring or mesh topology.  It contains a numeric value (in increments of 4096).  It is one part that makes up the Bridge ID (the other part of the Bridge ID being the MAC Address of the port).  The network switch with the lowest Bridge ID is the root bridge.  The Bridge Priority can be edited while the MAC Address cannot.  The default Bridge Priority for a Cisco switch is 32768 in a range of 0-61440 (increments of 4096).  If all Bridge Priorities are equal (for example, they are left at the defaults of 32768), then the MAC Address is the deciding factor in determining which switch becomes the root bridge.  In that case, the switch with the lowest MAC Address becomes the root bridge.

Broadcast - Used to describe the transmission of data over a network.  Broadcast is when network information from the source (transmitter) is sent to all devices on the network.  Think of this like a flyer in the mail that gets sent to every home.  This forces all devices to receive the broadcast information and do one of two things; either act on it (do an action) or ignore it (throw it in the invisible trash can).  Broadcast storms often refer to instances when all the data on the network is being broadcast and forcing devices to spend all their time throwing away messages rather than doing their normal computing tasks.  In the mail example with the flyers, its like spending all of your time throwing away flyers you are not interested in.  This can result in slower response from devices or even device reboots.

clipboard_e98342dae0a323730a2b173d702674e0c.png

Category Cables (Ethernet) - Over time Ethernet-based networks have used different Category cables, expressed as "Cat#". Each variant has characteristics that (typically) allow for higher frequency transmission and bandwidth speeds over specific lengths of cable. Since 2001 the Cat5e has been the most common, while Cat6 and Cat6a is quickly becoming more frequent, as it is backwards compatible with Cat5/5e. A chart of some relevant information is found below:

Cable Type Max Frequency Transfer Speeds Support Max Length
Cat5 100 MHz 10BASE-T
100BASE-TX
1000BASE-T
2.5BASE-T
328 ft / 100 meters
Cat5e 100 MHz 10BASE-T
100BASE-TX
1000BASE-T
2.5GBASE-T
328 ft / 100 meters
Cat6 250 MHz 10BASE-T
100BASE-TX
1000BASE-T
2.5GBASE-T
5GBASE-T
10GBASE-T
328 ft / 100 meters (up to 5GBASE-T)
180 ft / 55 meters (for 10GBASE-T)
Cat6a 500 MHz 10BASE-T
100BASE-TX
1000BASE-T
2.5GBASE-T
5GBASE-T
10GBASE-T
328 ft / 100 meters for all speeds

 

Command Line Interface - CLI for short.  This often refers to the type of interface used for configuration of a device such as a network switch.  It equates to the Command Prompt (PC) or Terminal (Mac).  A command line interface can sometimes contain the same or more options for configuration of a device than a graphical user interface (GUI) such as a webUI for a network switch.  CLI commands use specific syntax and it is recommended to refer to a manual when first learning to use it.

Command PromptThis is a command line interface available on Windows computers.  An equivalent is available on Apple computers called Terminal.  The commands mentioned in this article are referencing those on a Windows PC.  Apple syntax will likely vary.  The Command Prompt allows the user to enter commands written in specific syntax in order to return information about your computer or the network the computer is connected to.  Command Prompt examples such as arp -a and ping are also defined in this article.  To access the Command Prompt, press the Windows button and go to Run (Windows button + R shortcut).  Next type in cmd and press enter.  This will launch a new window with a black background and a blinking cursor.

clipboard_e9aa5d6a5715c77f2099d65bbfe052fb5.png

Console Port - This is in reference to network switch hardware.  A typical managed network switch will have multiple methods from which to configure the network switch settings.  The most common is a web user interface by which entering the network switches IP address into a web browser on a computer will bring up an interface from which to edit the switch.  Additionally, managed switches may offer a different physical port on the switch hardware for switch configuration.  On Cisco SG350 network switches, for example, the console port is an RJ45 port on the rear of the hardware.  Though this is not a typical network connection. Instead it is a custom RJ45 to D-SUB 9 serial connector used to establish a Command Line Interface or CLI between a computer and the network switch from which to enter commands and modify the switch configuration.

Core Switch - coming soon

Daisy Chain Topology - Refers to network topology.  A daisy chain topology with network switches is similar to daisy chain topology used with DMX lighting.  In summary, one switch is connected to the next switch (and previous switch) to create a daisy chain.  This topology is useful when a small amount of network switches are utilized like 2 or 3.  When using larger quantities of switches this topology is discouraged because if a middle switch fails, it will prevent communication from reaching a larger percentage of the network.

DHCP - Dynamic Host Configuration Protocol.  Used to allow devices to automatically obtain a network IPv4 address.  For this to work two things need to be in place.  One, a DHCP server must be on the network.  Two, the network device in question must be set to obtain it's IP address automatically.  In summary, when a new network device comes online that does not have a static IP address, it (DHCP client) requests an IP address, the host (DHCP server) leases the address to the device and keeps track of it.  We say lease because there is an expiration to that lease.  This is configured by the network administrator.  For example, in coffee shops, when connecting to wifi, the coffee shop will assign your device an IP address and will likely expire within 24 hours.  At a home or office, the same process may include a lease that is good for a longer period of time like a month or a year.

In lighting systems, depending on the venue the network infrastructure, static IP addresses are preferred for permanently installed networked devices while temporary devices such as DMX gateways or mobile devices running console applications might prefer to stay dynamic (means they need to be given an address from a DHCP server).

There can only be one DHCP server on a network but there can be many clients.  If more than one server exists, unexpected results may occur.  Note that the server should also be configured to lease IP addresses that are in the same IP subnet that is in-use by other devices on the network, otherwise network communication will not be possible.

ETC devices that can be DHCP servers include:  Eos Family Consoles, Cobalt Family Consoles, High-End Systems Hog Family Consoles, Conductor.

DNS - coming soon

Edge Port - This is a feature in Cisco network switches related to Spanning Tree.  Edge Port is what the feature is called in the Cisco Web Interface for network switches.  In the switch configuration file or when using CLI (command line interface) this feature is called PortFast.  There are three settings the can be applied on a port by port basis; Enable, Auto, and Disable.  If Enabled, the port is set to a Forwarding State.  This means that all traffic is allowed through this port in relationship to the Spanning Tree.  This also means that BPDU exchange between switches will not force this port to change state to Blocking, Listening, or Learning.  Those other states are what keeps a Loop/Ring topology from sending traffic indefinitely ultimately resulting in a Broadcast Storm / Network Storm that could cause undesired behavior (lag, reboot, etc.) in network switches and edge devices (gateways, controllers, consoles).

  • If Edge Port is set to Enabled; BPDU's are ignored and traffic will flow around the Loop/Ring indefinitely.
    • Use this setting for all ports with Edge Devices connected (gateways, controllers, consoles, anything that is not another network switch).
    • CLI Syntax:  spanning-tree portfast
  • If Edge Port is set to Auto, The link will become active (Forwarding State) after 3 seconds of no BPDU's on the port, thus giving the port time for STP to resolve loops.
    • CLI Syntax:  spanning-tree portfast auto
  • If Edge Port is set to Disabled, BPDU's are respected and STP issues are resolved.
    • Use this setting for all ports connected to other network switches.
    • CLI Syntax:  no spanning-tree portfast

Ether Channel - coming soon

Fiber Optic Cable - coming soon

Fiber (Short Haul) - coming soon

Fiber (Long Haul) - coming soon

GBIC - coming soon

HTP - Highest Takes Precedence.  Common terminology used when referring to multiple lighting sources in DMX or sACN.  If there are two sources of sACN on a network and both have the same sACN Priority of 100, then the source with the lighting levels for a specific (DMX) address at a higher value wins or "takes precedence".  Example, source 1 is telling address 1 to be at 50% intensity and source 2 is telling address 1 to be at 75% intensity, then the result is that address 1 will be at 75%.  If source 2 then changes its level to 0%, the light will change to 50% because source 1 now has the highest value.

HTTP - coming soon

HTTPS - coming soon

Hops - coming soon

IGMP - coming soon

IGMP Querier - When enabled, a network switch will act as a querier for multicast traffic such as sACN lighting levels.  It's job is to send out a "query" at a pre-determined interval like 30 seconds or 2 minutes to ask all network devices if they are interested in multicast traffic such as sACN universes.  A DMX Gateway for example will respond to a query with a simple Membership Report packet, instructing the querier that it is interested in a universe, say universe 1.  The Querier then forwards that universe from the network port hosting the source, like a console, to the DMX gateway port.  This is done to help with network bandwidth and minimize traffic.  Think of the switch like a post office that is sending mail to the ports who asked for it, like a magazine subscription.  If no one asks for it, we enter the world of Unregistered Multicast.

clipboard_ef3e0b041b909a20a8885ab494194ed20.png

IGMP Querier Election - Only one IGMP Querier can be present on a network (or VLAN).  The Querier is a feature that can be enabled and disabled on managed switches (mileage may vary depending on make/model).  In a multiple network switch system, if Querier is only enabled on one switch, that switch will be the Querier.  If Querier is enabled on all switches (recommended incase of failure), the switch with the lowest IP Address will be elected the Querier.  This is the case with ETC provided Cisco switches (mileage may vary with other manufacturers).  All other switches with Querier enabled will yield to the one with the lowest address and not output Querier messages.  In the event the Querier is no longer seen on the network, the next lowest IP Address will take over as Querier and so on. 

If the lowest IP Addressed switch is not the desired Querier, it is recommended to change the IP Address of the desired switch so that it is the lowest.  In the default ETC network scheme, 10.101.1.1 is the lowest IP address but it is recommended to leave this reserved if a router is needed in the future.  10.101.1.2 would be the next lowest IP address.

It is recommended to make the core switch or the switch closest to the center of the network (fewest hops to all other switches) be the IGMP Querier.  This switch should also be easily accessible in the event of failure.

clipboard_e4198a687f5ffbd1528469a1914bcfdda.png

IGMP Snooping - coming soon

IGMP - Membership Report (Join Group)- coming soon

IGMP - Query Interval - This is the interval of time between General Membership Query packets transmitted by the IGMP Querier on a network.  Typically this interval can occur anywhere between 30 seconds to 125 seconds.  In order words, every X seconds, the querier sends out a packet asking if anyone is interested in multicast traffic.  Note that while there is only ever one IGMP querier active on a network, it is still possible for other network switches to have querier enabled in the event that the designated querier goes offline.  The relevant part for this definition is that all switches on the same network (that have querier enabled) must have the same query interval timers.

IGMP - Robustness - This is the quantity of General Membership Query packets transmitted at the given Query Interval.  Typically this ranges from 1 to 10.  As these packets are UDP, robustness is beneficial as it allows the querier to send it out more than once.

IGMP - Leave Group - It is possible for a multicast receiver to notify the querier that it wishes to leave a multicast group.  For example, if Port 1 on a DMX Gateway is changed from sACN Universe 1 to sACN Universe 2, the gateway transmitts a Leave Group packet notifying the querier (and all snooping switches) that it no longer needs to listen to sACN Universe 1 (239.255.0.1).  The switch hardware will then stop forwarding packets from that multicast address to the device (physical network port) that submitted the Leave Group request.

IGMP - General Membership Query - coming soon

IGMP - Group Specific Membership Query - coming soon

IP Address - coming soon

IP Gateway - coming soon

ipconfig -all - coming soon (Command Prompt)

IPv4 - coming soon

IPv6 - coming soon

Jumbo Frames - coming soon

LAG - coming soon (Link Aggregate Group)

LAN - coming soon (Local Area Network)

LTP - Latest Takes Precedence.  Common terminology used when referring to how a controller (lighting level source) handles a state change in lighting output.  In a lighting console, if we advance from Cue 1 to Cue 2, the lighting levels in Cue 2 will win or "take precedence" even if they are at a lower lighting level.  In an architectural controller, if Preset 2 if activated when Preset 1 is already on, the lighting levels will change to Preset 2 even if they are lower than Preset 1. 

MAC Address - coming soon

Managed Switch - Used to describe a network switch that is capable of having its settings or configuration altered using a web interface or Command Line Interface.  Unmanaged switches will not have such an interface from which to alter its properties.  Managed switches typically allow users to edit common features such as VLAN assignments on each port, Spanning Tree options for each port, and IGMP options for the switch.  It is often advantageous to use a managed switch in a lighting network as opposed to an Unmanaged switch so that these properties can be altered to suit the needs of the devices living on the network.  However a managed switch that is improperly configured can have undesired consequences for the devices on the network.  It is important to understand what the network requirements are for devices living on a managed switch.  For ETC provided network switches, visit this link for configuration guides.  As always, feel free to contact ETC Applications Engineering for any questions about managed switch settings for ETC lighting networks.

Mesh - coming soon (Network Topology)

MFA - coming soon (Multi-Factor Authentication)

Multicast - Used to describe the transmission of data over a network.  Multicast is when a transmitter wants to send information to multiple receivers at the same time, but does not want the information to be "broadcast".  A real-world example is a lighting controller (console or arch controller) that is transmitting (outputting) sACN lighting levels on Universe 1.  Only those DMX Gateways programmed to output Universe 1 will receive those levels.  DMX Gateways outputting Universe 2 would not receive those levels (unless it is a multiple-port gateway outputting both universes).  In network speak, the receiver (DMX Gateway in this example) would tell an IGMP Querier that it wants to be a member of the multicast group that corresponds with sACN Universe 1 (239.255.0.1).  The IGMP Querier would add that receivers network port (physical port its plugged into) to an internal "table" inside the network switch.  As the network switch (Querier) gets information from a source of the multicast data, the switch then forwards that information to only those network ports listed in the "table".  For those devices not interesting in the multicast group, they simply do not get the message.  This is much more efficient than Broadcast.

It is possible to have more than one source of multicast information on a network such as sACN data.  Using that example, there could be two controllers such as a lighting console and an architectural controller both feeding information (level data) to a single DMX Gateway.  A typical ETC network utilizes multiple variations of multicast simultaneously.

clipboard_e450a9e198ceae2f041461f1634fcfa1c.png

Network Diameter - coming soon

Network Storm / Broadcast Storm - coming soon

NIC - Network Interface Controller is the physical hardware that connects a device to a network through either a wired Ethernet cable, or wirelessly to a router or WAP (Wireless Access Point). Most modern devices have the NIC directly hardwired onto a motherboard or expansion card (PCI or PCI-E), but are also commonly found as external adapters via USB or Thunderbolt.

NTP - coming soon (Time Service)

OSC coming soon

PIM coming soon (Protocol Independent Multicast)

PIM Dense Mode coming soon

PIM Spare Mode coming soon

Ping - coming soon

Ping -t - coming soon

PortFast - (See Edge Port) - This is the Cisco CLI (command line interface) command for using the Edge Port feature.  Edge Port is what it is called on the Web Interface of a network switch.

Private IP Address - coming soon

Public IP Address - coming soon

PoE - coming soon

PoE+ - coming soon

Proxy ARP - coming soon

QoS - coming soon

Path Cost - coming soon

Rapid Spanning Tree - coming soon

Ring / Loop Topology - coming soon (Network Topology)

RJ11 - coming soon

RJ45 - coming soon

Root Bridge - In a closed Ring / Loop Topology, Spanning Tree is required to prevent an infinity loop or Network Storm / Broadcast Storm of network traffic.  Read Spanning Tree first to better understand Root Bridge.  Root Bridge is the pre-determined "center" of the switches in a loop.  Essentially a loop has no center switch or core switch so one switch has to be elected from which to reference distance between switches and ultimately shut down the furthest link from it to break the loop and prevent Network Storms from occurring.

In a system where all things are equal between the network switches; (cable type, switch port speed, Bridge Priority, et cetera), the network switch with the lowest MAC Address is elected the Root Bridge.  It is possible to manually configure a switch to be the Root Bridge by altering its Bridge Priority (this will vary by switch and not all switches have the ability to alter this).  Note that physical cable distance or length is not a factor in determining the Root Bridge in most systems.

From the Root Bridge, the Path Cost (STP Path Cost) is determined, and the path to the Root Bridge that has the highest cost will be shut down (the segment between two switches).  The paths to the Root Bridge with the lowest costs will remain open for network traffic.  If traffic has to travel between multiple switches to get to the Root Bridge, the path with the fewest switches to pass through will remain open (every switch passed through adds a cost to the path).

clipboard_ec4a620146eaea2c28c5b1f5818c2e78e.png

Root Guard - This is a function related to Spanning Tree.  Root Guard gets assigned to network switch port(s), mostly commonly the ports on the Root Bridge that connect to other switches.  The function of the Root Guard is to prevent a Designated Port from becoming a Root Port if a new switch or mis-configured switch converges with the existing network.  Root Guard is typically enabled on ports that are facing other switches that are not supposed to be the Root Bridge.  In other words Root Guard is applied to ports with switch to switch connections, not for edge devices such as DMX Gateways, Console, Dimmer Racks, et cetera.

Root Path - This is a function related to Spanning Tree.  See also STP Path Cost.  The Root Path is the "lowest cost path" from a given point in the network topology to the Root Bridge.  The path is predictable if the Root Bridge has been assigned manually and the network topology is known.  If the Root Bridge is unknown, then investigation must occur to find the Root Path. This is typically done by accessing an interface for every switch in the network and documenting which port on each switch has Root Port (STP Root Port) designation.

sACN - Short for "Streaming ACN" (Streaming Architectural for Control Networks).  This is a lightweight version of the ACN protocol.  sACN is a standard approved by ESTA (Entertainment Services and Technology Association) beginning in 2009 and amended several times.  The current standard, last updated in 2018, is known as ANSI E1.31-2018.  In summary, sACN is a streaming protocol for lighting levels over a network.  Some have referred to it as "DMX over Network" but be careful because DMX can be transmitted using Cat5e cable but it is still considered RS-485 and not a network protocol.  

An sACN source transmits lighting levels using UDP over network.  The frequency of these packets is comparable to that of DMX in that packets are streamed (or transmitted) many times a second depending on the source. A single UDP packet contains information about what universe is being transmitted (between 1 and 63,999) and what each addresses lighting level is (comparable to DMX addresses between 1 and 512).  UDP packets do not require an "acknowledgement" from a receiver much like DMX.  With DMX a lighting console just sends continuous packets out and it is up to the receiver to interpret.

An sACN receiver is responsible to receiving the packet, and most likely, converting the sACN packet to another protocol such as DMX in the case of a DMX gateway.   A receiver is typically setup much like a lighting console.  It determines a patch by declaring a universe to listen to and if necessary, assign specific addresses in that universe to other objects such as dimmers or relays in the case of a power control product such as Sensor Dimmer Racks or Echo Relay Panels.

sACN can be transmitted using either unicast or multicast, the most common being the latter.  In multicast, sACN uses the following address range; 239.255.0.1 - 239.255.249.255 (universes 1 - 63,999).

In the event that multiple sACN sources are present on the network, it is up to the receiver to determine how to interpret multiple streams.  Another common concept with sACN is that of sACN Priority (see definition below).  The following support article goes into further detail on multiple control sources.  https://support.etcconnect.com/ETC/FAQ/Multiple_Control_Sources_and_Data_Loss_Behavior

sACN Discovery - This is a part of the sACN protocol described above.  sACN Discovery uses multicast address 239.255.250.214.  In order for sACN Discovery to work, both the transmitter and receiver must comply with this part of the standard.  The concept of the Discovery packet is that the sACN source, in addition to sending out lighting levels, also transmits a packet alerted others on the network which universes it is sourcing.  For example, if a source is transmitting universes 1, 2, and 3 then it would be transmitting lighting levels (typically over multicast) on multicast addresses 239.255.0.1, 239.255.0.2, and 239.255.0.3.  If we wished to find out what the source was transmitting without guessing or subscribing to those universes (likely because we don't know what it is transmitting), the source would also transmit a packet at 239.255.250.214 (the Discovery packet) that contains a list of the universes it is sourcing).  This is a very handy tool for troubleshooting and identifying different sACN sources and their respective universes on a network.  Not all products that are capable of transmitting sACN support (or transmit) sACN Discovery packets.

sACN Priority - This is a part of the sACN protocol described above.  An mentioned above, each UDP packet that is transmitted (streamed) from it's source contains lighting level information for addresses 1-512 (much like a DMX universe).  Embedded within each packet is a Priority number between 1-200.  1 is the lowest priority (least important) and 200 is the highest priority (most important).  When multiple controls sources are present on a network, which ever source is transmitting lighting levels at a higher priority wins.  If both sources are at the same priority then HTP usually wins (depends on the sACN receiver).  Be careful as some sACN receivers do not support multiple sources or rather they do not interpret the priority embedded within the packet and may try to continuously switch between the two different lighting levels.

There also exists what is known as a sACN Priority packet.  This is different than the Priority that is embedded within each sACN lighting level packet.  A sACN Priority packet can list unique sACN priorities for each address in the universe.  The embedded priority with a lighting level packet is a single priority for the whole universe.  The separate sACN Priority packet is sometimes referred to "Priority-by-Address".  Note that both the sACN source and sACN receiver need to support this in order for it to work.  The sACN Priority packet uses a different start code than a lighting level packet.  A standard sACN packet uses start code 0x00 and a priority packet uses 0xdd.  If the receiver does not support sACN Priority it is likely that the 0xdd packet will be ignored.

In a sACN Priority packet, only the "patched" addresses are given priority levels.  For those unpatched addresses, they are given a priority of 0.  A priority of 0 is still a valid priority (between the range of 0-200).  It is the lowest priority and essentially means "ignore me" and do not output any lighting levels associated with priority 0.  In order for this to work, the sACN receiver must understand (support) that concept that 0 priority should be ignored and not output.  If the receiver fails to interpret this, it will still output lighting levels at priority 0 if no other source exists on the network.

SNTP - coming soon (Time Service)

Spanning Tree Protocol (STP) - This is a mechanism in network switches that helps to prevent the retransmission of data in a closed Ring / Loop Topology.  In this scenario, we will examine a simple system with 3 network switches connected to one another to for a Ring/Loop.  Without Spanning Tree, data would flow endlessly around the circle and be re-transmitted indefinitely.  Such behavior, also referred to as a Network Storm / Broadcast Storm can easily take down a network (network switches and edge devices such as consoles, controllers, and gateways). 

What Spanning Tree does is to block or close off one of the segments so the network is no longer a closed loop.  The way it does this is by having one switch be the Root Bridge or center / leader of the switches and all other switches determine how far away they are from the center (Root Bridge), this distance is referred to as Path Cost.  Whichever "network segment" has the highest path cost gets blocked and breaks the endless circle.  The lowest cost path is the easiest path for traffic so those are left open.

Note:  For Cisco switches, individual ports on the network switches that connect to other network switches should have Edge Port disabled.  All other ports that host nodes (gateways, controllers, edge devices) should have Edge Port enabled.  See Edge Port definition for more details.

clipboard_ec2d3a763455b916f0c01d5b6ebb26af1.png

STP - Loopback Guard This is a function related to Spanning Tree.  Sometimes referred to as Loop Guard.  This is applied to individual ports on a network switch.  The function of a Loopback Guard is to protect network topology in the event that BPDUs are no longer received on a non-Designated Port.  Designated Ports on a network switch transmit constant BPDUs to alert the switch on the other end of the segment about the state of network topology. 

In an example where fiber is used between switches, there are two connections that make up one segment (at each switch).  There is a wire for transmit and a wire for receive which equals a pair of fiber cables.  If, for example, the transmit wire was severed but the receive was in-tact, BPDUs would cease to be transmitted from Switch A to Switch B.  Switch B would then transition its port state from Alternate to Designated.  The Switch B port changes state sas a result of no longer receiving BPDU packets.  Associated with BPDU is a max age time.  When the max age time expires from the last BPDU the port transitions state (to Designated).  When a port becomes Designated, it forwards network traffic.  Hence we have now created a network loop. If Loopback Guard was applied, it would place the port that was Alternate into an Inconsistant State which would block all traffic.

In the event that copper was used instead of fiber and only a single copper cable is used between switches (no EtherChannel or LAGs), the Loopback Guard would be less important because it is more likely that the cable as a whole would be severed instead of individual pairs in the cable (example Cat5e).  To summarize, if fiber is used between switches in a ring/loop topology, it would be recommended to apply Loopback Guard to all non-designated ports.

STP Path Cost - This is a function related to Spanning Tree.  See also Root Path.  The Root Path is determined by the Path Cost.  A refresher that the Root Path is the "lowest cost path" from a given point on a network to the Root Bridge.  The Path Cost is evaluated, in part, by the speed of the segment between two switches.  The table below outlines Path Costs based on typical network speeds.  It is important to note whether the switch ports can auto negotiate speeds at that will impact the Path Cost.  

Data rate STP cost RSTP cost
4 Mbit/s 250 5,000,000
10 Mbits/s 100 2,000,000
16 Mbits/s 62 1,250,000
100 Mbits/s 19 200,000
1 Gbits/s 4 20,000
2 Gbits/s 3 10,000
10 Gbits/s 2 2,000
100 Gbits/s N/A 200
1 Tbits/s N/A 20

The Path Cost is applied to each segment connecting network switches together.  For each segment between a given point in the network and the Root Bridge, the Path Costs are added together.  The path with the lowest cost becomes the Root Path.  In the example below, the Path Cost for Switch 2 to get to Switch 1 is 20,000.  If Switch 2 were to get to Switch 1 by way of Switch 3, then the Path Cost would be 40,000 (segment between Sw2 and Sw3 (20,000) + segment between Sw3 and Sw1 (20,000) = 40,000).  Therefore the lowest cost path, the Root Path is directly between Switch 2 and Switch 1.

clipboard_e34a75cd4abafb4de001ed04b9a2dd939.png

 

STP Port Role There are three main port roles; Root, Designated, and Alternate (Blocked).  Every active port on a network switch will have a role in Spanning Tree.  The individual port roles are explained in further detail below by name.  The graphic below shows port roles a simple loop topology.

clipboard_e0fe362ecd607e73987f2974625ee91f9.png

STP Port Role - Alternate Port - Sometimes called a Blocked Port.  The Alternate Port is chosen by looking at the segment and deciding which switch has the lowest Bridge ID.  The switch with the lowest Bridge ID will have its end of the segment (port) keep the Designated Port status and the higher Bridge ID will have its end of the segment (port) become an Alternate Port (Blocked Port).  This is the where the loop is broken.  §  This path is automatically disabled by Spanning Tree until such time as the network topology changes (addition or subtraction of a switch or segment) and this port has a lower Path Cost to the Root Bridge.

STP Port Role - Backup Port - In the event that two segments exists between the same two network switches, one port will be designated and the other will be called backup.  The backup port will block traffic unless the designated port goes down.  If only a single segment exists between two switches that backup port state does not apply.

STP Port Role - Designated Port - A Designated Port exists on at least one end of every segment connecting network switches together.  On the Root Bridge, every port connecting to a non-Root network switch is a Designated Port.  On non-Root network switches the port that is not the Root Port will become a Designated Port. 

STP Port Role - Root Port - A port with the designation "Root Port" implies that this port is the Root Path or "lowest cost path" to the Root Bridge.  In a loop topology, there can only be one Root Bridge and only one path (Root Path) to that switch from any given point in the topology.  This is a part of how Spanning Tree works.   A Root Port is the port on every non-Root network switch that has the lowest Path Cost to the Root Bridge.  There can only be one Root Port on every non-Root Switch.  Once the Root Bridge, Root Path, and Root Port have been declared, the network knows which segments in the loop to shutdown to prevent infinity loops.  The Root Port designation is given to a port that is connected to another switch.  Root Ports are not designated to ports with edge devices such as DMX Gateways, et cetera.

STP States - 1) Blocking / Disregarding State - (Spanning Tree) - Upon network convergence, when a port link first comes up, the port is put into a Blocking state.  In a Blocking state, the port will listen to BPDU packets from other switches but that is about it.  It will not transmit any packets.  This allows it to determine the root ID of the Root Bridge and get an idea of what the rest of the network topology looks like.  While in this state all other traffic is disregarded.  In normal Spanning Tree (not Rapid Spanning Tree RTSP), it can remain in this state for a maximum of 20 seconds.  After the Root Bridge and topology are identified, it will move into a Listening State next.

STP States - 2) Listening State - (Spanning Tree) - After leaving Blocking State, the network port enters Listening State.  This state determines if this port is permitted to forward network traffic.  It will continue to listen to BPDU packets from other switches but it will now also start transmitting its own BPDU packets.  By default this state will have a forwarding delay of 15 seconds.  After the delay the port moves to a Learning State.

STP States - 3) Learning State - (Spanning Tree) - After leaving Listening State, the network port enters Learning State.  In this state, the port learns and populates its VLAN and MAC address tables in preparation for forwarding traffic.  This is the first state that learns MAC addresses (the only other state that will learn MACs is Forwarding).  The port will also remain in this state for 15 seconds (forward delay) before moving to Forwarding State.

STP States - 4) Forwarding State - (Spanning Tree) - After leaving Learning State, the network port enters Forwarding State.  In this state, the port is actively forwarding packets and it considered a part of the network.  It continues to send and receive BPDU packets.  This is the only state that will forward normal network traffic.

STP States - Disabled State - (Spanning Tree) - In this state the packet does not forward any traffic and it does not participate in spanning tree. All packets including BPDUs are ignored.  This is the only state in which the port will not send BDPUs but it will continue to receive them (again, it will just ignore them).

Star Topology - coming soon (Network Topology)

STP -  coming soon (Shielded Twisted Pair)

Storm Control - A setting on network switches that watches the quantity of packets traversing a physical network port (interface).  If the quantity of packets per second exceeds a specified amount, the interface will dis-allow (block) packets until the quantity of packets decreases below the threshold.  At that time, the interface allows traffic to resume (forwarding state).  The quantity of packets per second and the hold interval are usually editable settings depending on the switch make and model.  Storm Control, again depending on switch make/model, can be applied to unicast, multicast, and broadcast traffic (or combinations of).

Subnet Mask - coming soon

Token Ring - coming soon

TTL - coming soon (Time to Live)

TCP coming soon

UDP - coming soon

Unicast - Used to describe the transmission of data over a network.  Unicast is when two devices communicate with each other directly.  Example, a lighting system has two controllers (either consoles or architectural controllers).  In order from them to communicate with one another and synchronize information, they will send unicast messages directly to one another on the network.  This is also commonly used with third party devices that wish to speak to ETC devices over the network.  They will exchange unicast or UDP messages back and forth to perform a simple function like activating a cue or preset.

clipboard_e2bf51f525199a7706e24845b8b9d0a20.png

Unmanaged Switch - This is in reference to network switch hardware.  An unmanaged switch does not allow for any of its properties, settings, or configuration to be edited.  The most common example of an unmanaged switch is a 5-port or 8-port switch commonly found at local brick and mortar stores marketed for residential applications.  A scenario in which this is advantageous may be for a small single switch network.  If multiple switches are in use, Managed switches are always preferred.  An unmanaged switch should not be used in a large network or a network with multiple switches as there is no way to edit common settings such as VLANs, Spanning Tree, or IGMP

Unregistered Multicast - "If no one asks for it, everyone gets it".  If a multicast source like a console is sending out sACN lighting levels or other multicast information and there are no receivers or DMX Gateways asking for that universe, then that universe gets treated like broadcast and those lighting levels get sent to all ports.  In small systems this is not an issue.  On larger systems, that amount of broadcast can result in undesirable behavior.  Example, network products have to discard all packets they receive that don't pertain to them, so a dimmer or relay cabinet has to spent more time discarding packets for universes that it doesn't care about then actually listening to the one or two universes it has patched to itself.  Visible side effects of a "broadcast storm" may include sluggish or "laggy" response to level changes and even processor reboots.  Using the post office analogy, a broadcast storm is like a mailer or leaflet that just gets sent to everyone, and everyone has to take time to receive the mailer and decide whether to read it (for the coupons) or throw it in the trash/shredder. 

Ideally an IGMP Querier will exist on a network that handles the multicast traffic and eliminates this.  Unregistered multicast is traditionally set to Forwarding by default meaning that all unregistered multicast gets forwarded to all ports as described above.  It is possible to configure network switch ports to instead Filter unregistered multicast.  In a filtered environment, if the network port didn't ask for it, it doesn't get it.  Cisco switches are able to configure Filter/Forwarding settings on a port by port basis.

Forwarding Example                                                                                                            Filtering Example

clipboard_e62611637608213fd550da17eee6bec9a.png

UTP coming soon (Unshielded Twisted Pair)

VLAN - coming soon

Wake on LAN - coming soon (WoL)

WAN - coming soon (Wide Area Network)

Wildcard MaskThis is in reference to Wildcard Masks used in Access Control Lists.  Most equate a Wildcard Mask as an inverted Subnet Mask whereas 255.x.y.z means that IPv4 traffic matching the first octet (for example 10.x.y.z) will be allowed/read by the receiving device.  In a Wildcard Mask 0.255.255.255 means that the first octet (0) is the match/allowed and anything not 0 is ignored.  This is somewhat true but there is more to it than that.

Real world example.  sACN traffic.  An Access Control List with an entry as follows:  Destination IP = 239.255.0.0 and Wildcard Mask of 0.0.255.255 means that any destination IPs of 239.255.0.0 through 239.255.255.255 will be watched.  The first two octets are matched and the last two It's up to the programmer to choose whether to permit or deny those packets.

For a more detailed list of Wildcard Ranges related to sACN and Access Control Lists, see this article.

 

 

  • Was this article helpful?