This document provides guidance on configuring the CUWB System’s ethernet network, with a focus on ensuring proper connectivity and isolation between the User’s Local Area Network (LAN) and the CUWB Anchor Network. It outlines the requirements for host PC connectivity, describes best practices for physical and VLAN-based network isolation, and details proper switch, cabling, and topology configurations to ensure reliable system operation and performance.
The CUWB system operates across two distinct ethernet networks: the “User Network”, and the “Anchor Network”. The Anchor Network is the ethernet network and equipment comprising the isolated Anchor Array (ie., Host PC, Anchors, PoE Switches, etc). The User Network is the Ethernet Network connected to local networking equipment (ie., Host PC, CUWB Viewer PC, CUWB Logging, User-Based Applications, Wide-Area Network, etc).
The Host PC running the CUWB Manager must maintain connectivity to the User Network and the Anchor Network. This can be achieved using either:
Internet Access is required for setup only. Once the CUWB Manager package is installed the Host PC can be isolated from the internet.


For Ubuntu 24.04 running on some hardware, network configuration settings may not persist across reboots or may revert unexpectedly to default values. This behavior can affect systems using automatically managed network interfaces (e.g., DHCP or link-local) configured through NetworkManager or default Netplan settings.
If you experience this issue, it is recommended configuring the network interfaces using a static Netplan configuration. This ensures that the settings remain consistent and predictable after restarts.
For this static netplan example, enp1s0 is the LAN and enp2s0 is the Anchor Network.
Additional Netplan documentation can be found in Ubuntu Server Documentation
Open a terminal and execute the following command to list the network interfaces
lp link show
This command should output a similar response:
2: enp1s0: <BROADCAST,MULTICAST,UP,LOWER_UP>mtu 1500 ...
3: enp2s0: <BROADCAST,MULTICAST>mtu 1500 ...
Navigate to the Netplan directory located at /etc/netplan and list the files
cd /etc/netplan
ls
There should be a YAML file like 01-netcfg.yaml or 50-cloud-init.yaml.
sudo cp 01-netcfg.yaml 01-netcfg.yaml.backup
Open the yaml configuration file in a text editor.
sudo nano /etc/netplan/01-netcfg.yaml
Replace the file contents with the following example. Adjust the example interface names to the Host PC as needed.
network:
version: 2
renderer: networkd
ethernets:
enp1s0
dhcp4: true
dhcp6: false
enp2s0:
dhcp4: false
dhcp6: false
link-local: [ipv4]
sudo netplan apply
sudo netplan try
ip -4 addr
When working with a single Ethernet interface on a Host PC, it’s possible to segment network traffic using VLANs (Virtual LANs). Ubuntu uses Netplan for network configuration. The following instructions walkthrough configuring the host PC with:
This setup assumes that the connected switch is configured to tag Anchor Network traffic with the appropriate VLAN ID before it reaches the host PC.
To list the available interfaces issue the following command in the terminal window. Look for the main Ethernet interface (likely named eth0, enpXsY, or similar). The rest of this example assumes the network interface is called “eth0”.
ip link show
Netplan configuration files are located in /etc/netplan/. They are usually YAML files like 00-installer-config.yaml.
In this scenario eth0 will be set to the user’s LAN with DHCP and vlan20 will be used for the Anchor Network configured with Link-local.
sudo nano /etc/netplan/01/vlan-config.yaml
Add the following lines to the vlan-config.yaml file:
network:
version: 2
ethernets:
eth0: # The Physical interface
dhcp4: true
vlans:
vlan20: # The name of the VLAN.
id: 20 # VLAN for the Anchor Network (set at the switch).
link: eth0 # The physical interface.
addresses:
- 169.254.20.1/16 #Any address in the link local range.
link-local: [ipv4]
dhcp4: false
dhcp6: false
Once the VLAN configuration file has been updated and saved, apply the changes using the following command:
sudo netplan apply
After applying netplan, check the status using the following command:
sudo ip a
Notes:
- Make sure the switch port is configured as a trunk port and allows the VLANs being tagged.
- If using a management VLAN, ensure the switch and host can route properly through it.
- ping the gateway or another host on the VLAN to test connectivity.
The anchor network is designed to be an isolated network that utilizes link-local (Automatic IP assignment) with no connection to the wide-area network (WAN). This provides a secure network with minimal setup and prevents anchor network broadcast and multicast traffic from interfering with WAN devices and configurations.
The Anchor Network must remain isolated from other networks and should consist solely of:
No additional devices, or gateways should exist on the anchor network. This includes common network services and equipment such as: DNS servers, routers, gateways, printers, or IP cameras. The Anchor Network must only contain CUWB Anchors and the Host PC’s Anchor interface. No administrative configuration is required with the exception of configuring the Host PC anchor network NIC to use link-local.
Why Isolation Matters
If the CUWB system shares a network with existing IT infrastructure, multicast traffic from CUWB anchors could be misinterpreted as a DDoS attack, leading to potential network outages. To ensure isolation, see different isolated Network Layouts below.
CUWB Anchors are equipped with ChainPoE technology allowing them to be connected in daisy-chained configurations of up to 12 anchors per PoE port. Each anchor features two interchangeable, bi-directional, PoE ports. Anchor ethernet ports are ambidextrous, they do not have a concept of IN/OUT and cables can be plugged in without regard to directionality.
A chain of Anchors can be made redundant by connecting both ends of the chain to PoE switch ports. In a redundant topology, the system maintains power and communication continuity in the event of an intermediate anchor or cable failure. Functional anchors on either side of the fault will continue to operate without manual intervention.
Important: Unused anchor ports should never be connected to Ethernet devices that are not anchors. Doing so may disrupt network operation and cause the CUWB system to automatically reject the device.
The Anchors require PoE-capable switches for both data and power delivery. The use of Category 6 (Cat6) ethernet cable is highly recommended, poor quality cables may reduce the number of anchors supported on a chain. If the PoE switch is unable to supply sufficient power the chain will power up as many anchors as possible, some or all anchors in the chain will lose power intermittently. Cables utilizing large gauge, with a low ‘maximum conductor resistance,’ are preferred to achieve best performance with regard to power.
PoE standards and corresponding supported chain lengths are as follows:
| PoE Standard | Supported Chain Length |
|---|---|
| 802.3af (Type 1) Class 3 (15.4 W) | Up to 6 anchors |
| 802.3at (Type 2) Class 4 (30 W) | Up to 12 anchors |
| 802.3bt (Type 3/4) | Up to 12 anchors |
Note: 802.3bt switches are compatible but offer no significant power advantage over 802.3at for CUWB anchors.
Ciholas recommends use of Gigabit (1000 Base-T) rated switches. Anchor chains using ChainPoE are 10/100 Base-T, and multiple chains can be connected to a single switch. Data from all chains is forwarded to the Host PC, meaning combined traffic bound for the Host PC port can exceed 100 Megabits.
PoE switches typically have a limit regarding the maximum power than can be drawn from the switch. As devices are powered by the switch, they negotiate a ‘PoE Class’ that indicates the amount of power that can potentially be used by the port. Ensure the switch’s total power budget can accommodate all connected anchor chains:
| PoE Class | Nominal Power | Supported Chain Length |
|---|---|---|
| Class 1 | 4 Watts | Single anchor |
| Class 2 | 7 Watts | 2–3 anchors |
| Class 3 | 15 Watts | 4–6 anchors |
| Class 4 | 30 Watts | 7–12 anchors |
Add up the expected power draw per port and provision the switch accordingly. With insufficient power, some of all anchors in the chain will lose power intermittently.
If a managed PoE switch is used:
Following these steps will ensure the system will function as desired. Unmanaged PoE switches are also supported and work effectively for most deployments.
Cables utilizing large gauge, with a low ‘maximum conductor resistance,’ are preferred to achieve best performance with regard to power. Cat6 or higher are recommended for all Anchor Network cabling.
All cables must be straight-through and terminate all four twisted pairs.
Do not use copper clad aluminum (CCA) cables with CUWB devices.
Isolation of the Anchor Network from the User Network is critical to system performance and ensures that Anchor Network ethernet traffic does not interfere with user devices and applications. The following are the three main methods to achieve isolation of the Anchor Network:
The following basic Anchor Network layout uses a single PoE switch to connect chains of anchors. This is the simplest setup that ensures isolation through physical isolation of the devices. Anchor chains are connected to one or more switches that connect only to other anchors and the designated NIC on the Host PC.

The VLAN topology allows User Network and Anchor Network devices to be physically connected to the same switches while logically isolated through VLANs. The following layout shows a network implemented using port based VLANs.

Isolation can be achieved using a mixture of both port based VLANs and physical isolation. This hybrid approach uses dedicated anchor-only switches trunked over VLAN-enabled uplinks.

Anchors can be chained with redundant PoE connections at both ends of the chain as shown below to increase system reliability. Each anchor actively uses one port for power and communication but will failover if a power fault is detected. Redundant connections can terminate on the same PoE switch or on separate switches, depending on design requirements. However, note the following:

Environment A: When a LAN or LAN segment, with all its associated interconnected equipment, is entirely contained within a single low-voltage power distribution system and within a single building. A multiport network interface device (NID), complying with Environment A requirements, does not require electrical power isolation between link segments.
In a redundant configuration, the two PoE switches must connect to the same power distribution system, or more precisely, the ground potential of the two PoE switches must terminate to the same grounding system. Redundant anchor chains cannot span more than one power domain or building.
Overall performance of the CUWB System depends on maintaining proper network configuration, sufficient power, and consistent connectivity between anchors and the host PC.
While each anchor communicates using 10/100 Ethernet, multiple anchor chains converge on a central switch and forward data to the host PC over a single link. It is recommended that the Host PC’s NIC and the switch port it connects to support Gigabit (1000Base-T) speeds to avoid potential bottlenecks.
Packet loss in the Anchor Network can negatively affect tracking accuracy and system responsiveness. Causes of packet loss may include:
Packet loss can be identified by gaps in position updates, degraded tracking quality, or log messages from the CUWB Manager.
Network-induced delays can cause performance issues to the CUWB system. Latency can originate from:
Expected one-way latency from anchor to Host PC is typically under 1 millisecond. Values higher than this may indicate network misconfiguration or congestion.
If the CUWB system is not performing as expected, follow these steps to identify and resolve common issues.
Anchors that are powered but not communicating with the CUWB Manager will display specific LED states. These patterns help determine the state of the anchor chain and whether communication is flowing correctly. For example, it is possible to identify the first and last nodes in a chain based on LED color. Once a CUWB Engine is started, it takes over control of the LEDs causing them to flash various network information. For additional details regarding LED color patterns, see Anchors During Installation.
| Symptom | Possible Cause | Resolution |
|---|---|---|
| Anchors not powering or losing power | Inadequate PoE budget | Upgrade switch or reduce anchors per chain |
| Anchors not discovered | NIC not set to Link-Local | Recheck network interface configuration |
| Tracking delayed or choppy | Host PC NIC not Gigabit /Network congestion | Upgrade NIC or isolate traffic |
| Random disconnects | Poor cabling / EMI interference | Replace cables or reroute away from EMI sources |
| Redundant chain not failing over | Incompatible switch behavior or power domain issue | Verify switch configuration |
It is always advised to check the CUWB Manager Logs for messages related to the issue. If the problem persists, please contact Ciholas for support.
| Version | Date | Change Description |
|---|---|---|
| v5.0.0 | 2025-10-31 | Initial Release |