CS 3700 Networks and Distributed Systems Bridging (From Hub to Switch by Way of Tree) Revised 8/19/15.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
CS 356: Computer Network Architectures Lecture 8: Learning Bridges and ATM Ch 3.1 Xiaowei Yang
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 19 Introduction to Computer Networks.
CSE 534 Fundamentals of Computer Networks Lecture 4: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised.
CS 4700 / CS 5700 Network Fundamentals Lecture 7: Bridging (From Hub to Switch by Way of Tree) Revised 1/14/13.
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
CSEE W4140 Networking Laboratory Lecture 8: LAN Switching Jong Yul Kim
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
CSE390 Advanced Computer Networks Lecture 7: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised Fall.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
COMS W COMS W Lecture 7. LAN Switching: Bridges & Spanning Tree Protocol.
LAN switching and Bridges
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
1 LAN switching and Bridges. 2 Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent bridges.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
CS3502: Data and Computer Networks Local Area Networks - 4 Bridges / LAN internetworks.
Ethernet (LAN switching)
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Scaling Broadcast Ethernet Some slides used with.
CSE 461 University of Washington1 Topic How do we connect nodes with a switch instead of multiple access – Uses multiple links/wires – Basis of modern.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Computer Networks Lecture 5a: Interconnecting LANs Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
M. Veeraraghavan (originals by J. Liebeherr) 1 Internetworking Bridges Routing with Bridges * * Reading material is EL 536 textbook (sections 14.1 and.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Introduction to Communication Networks – Dr. Michael Schapira Rothberg A413.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Ethernet switches and IP routers
Chapter 16– Connecting LANs
CS 3700 Networks and Distributed Systems
Spanning Tree Protocol
Lab 2 – Hub/Switch Data Link Layer
MAC Addresses and ARP 32-bit IP address:
Bridging.
3. Internetworking (part 2: switched LANs)
Chapter 4 Data Link Layer Switching
Chapter 3 Part 1 Switching and Bridging
Lab 2 – Hub/Switch Data Link Layer
CS 3700 Networks and Distributed Systems
Computer Networks Lecture 6a: Interconnecting LANs
CS 457 – Lecture 8 Switching and Forwarding
LAN switching and Bridges
CS 4700 / CS 5700 Network Fundamentals
LAN switching and Bridges
Chapter 6 The Link Layer and LANs
Bridges and Extended LANs
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
LAN switching and Bridges
CS 4700 / CS 5700 Network Fundamentals
Dr. Rocky K. C. Chang 23 February 2004
Connections Johan Lukkien
Chapter 15. Connecting Devices
LAN switching and Bridges
Presentation transcript:

CS 3700 Networks and Distributed Systems Bridging (From Hub to Switch by Way of Tree) Revised 8/19/15

Just Above the Data Link Layer 2  Bridging  How do we connect LANs?  Function:  Route packets between LANs  Key challenges:  Plug-and-play, self configuration  How to resolve loops Application Presentation Session Transport Network Data Link Physical

 Pros: Simplicity  Hardware is stupid and cheap  Cons: No scalability  More hosts = more collisions = pandemonium Recap 3  Originally, Ethernet was a broadcast technology Tee Connector Terminator Hub Repeater

The Case for Bridging 4  Need a device that can bridge different LANs  Only forward packets to intended recipients  No broadcast! Hub A C B A C B Send Packet B  C Send Packet B  C Bridge

Bridging the LANs 5  Bridging limits the size of collision domains  Vastly improves scalability  Question: could the whole Internet be one bridging domain?  Tradeoff: bridges are more complex than hubs  Physical layer device vs. data link layer device  Need memory buffers, packet processing hardware, routing tables Hub

Bridge Internals 6  Bridges have memory buffers to queue packets  Bridge is intelligent, only forwards packets to the correct output  Bridges are high performance, full N * line rate is possible Switch Fabric InputsOutputs Bridge Makes routing decisions Hub Memory buffer

Bridges 7  Original form of Ethernet switch  Connect multiple IEEE 802 LANs at layer 2  Goals  Reduce the collision domain  Complete transparency “Plug-and-play,” self-configuring No hardware of software changes on hosts/hubs Should not impact existing LAN operations Hub 1.Forwarding of frames 2.Learning of (MAC) Addresses 3.Spanning Tree Algorithm (to handle loops)

00:00:00:00:00:DD13 minutes Frame Forwarding Tables 8  Each bridge maintains a forwarding table MAC AddressPortAge 00:00:00:00:00:AA11 minute 00:00:00:00:00:BB27 minutes 00:00:00:00:00:CC32 seconds

Frame Forwarding in Action 9  Assume a frame arrives on port 1  If the destination MAC address is in the forwarding table, send the frame on the correct output port  If the destination MAC isn’t in the forwarding table, broadcast the frame on all ports except 1 Port 1 Port 3 Port 2 Port 4

Learning Addresses 10  Manual configuration is possible, but…  Time consuming  Error Prone  Not adaptable (hosts may get added or removed)  Instead, learn addresses using a simple heuristic  Look at the source of frames that arrive on each port Hub 00:00:00:00:00:AA 00:00:00:00:00:BB Port 1Port 2 00:00:00:00:00:BB20 minutes MAC AddressPortAge 00:00:00:00:00:AA10 minutes Delete old entries after a timeout

Complicated Learning Example 11  FFEEDDCCBBAA Port 1Port 2Port 1Port 2 Hub AA1 1 CC2 1 EE2 2 Bridge 1Bridge 2

The Danger of Loops 12   This continues to infinity  How do we stop this?  Remove loops from the topology  Without physically unplugging cables  uses an algorithm to build and maintain a spanning tree for routing AA Port 1 Hub Port 1 Hub Port 2 AA1 1 BB CCDD AA

Spanning Tree Definition 13  A subset of edges in a graph that:  Span all nodes  Do not create any cycles  This structure is a tree

Spanning Tree Poem 14 Algorhyme I think that I shall never see a graph more lovely than a tree. A tree whose crucial property is loop-free connectivity. A tree that must be sure to span so packet can reach every LAN. First, the root must be selected. By ID, it is elected. Least-cost paths from root are traced. In the tree, these paths are placed. A mesh is made by folks like me, then bridges find a spanning tree. - Radia Perlman

15 CCIS DISTINGUISHED LECTURE SERIES Network Protocols: Myths, Missteps, and Mysteries Radia Perlman EMC Abstract The main point of this lecture is to encourage critical thinking. So much of what “everyone knows” about network protocols is, actually false. For instance, why do we need both Ethernet and IP? The “obvious” answer is that IP is “layer 3” and Ethernet is “layer 2”, but in fact, once Ethernet stopped being a single wire (layer 2), and something that is forwarded (layer 3’s job) it became a layer 3 protocol. So the right question is “why do we use to layer 3 protocols?” The answer is subtle and leads to discussion of how Ethernet became a “layer 3” protocol, and evolution to TRILL and other overlay networks. There are also buzzwords such as “SDN”, and fads such as “active networks” and “information-centric networking”. This talk will demystify these, as time follows. Biography Radia Perlman received her PhD in EECS from MIT and is currently a Fellow at EMC. She has made many contributions to the fields of network routing and security protocols including robust and scalable network routing, spanning tree bridging, storage systems with assured delete, and distributed computation resilient to malicious participants. She wrote the textbook Interconnections, and co-wrote the textbook Network Security. She holds over 100 issued patents. She has received numerous awards including lifetime achievement awards from ACM’s SIGCOMM and USENIX. She is a member of the National Academy of Engineering and is inducted into the internet Hall of Fame, and the inventor Hall of Fame. Friday February 5 th, WVF 2:00pm Refreshments to follow CCIS Distinguished Lecturer Series Spring 2016

802.1 Spanning Tree Approach Elect a bridge to be the root of the tree 2. Every bridge finds shortest path to the root 3. Union of these paths becomes the spanning tree  Bridges exchange Configuration Bridge Protocol Data Units (BPDUs) to build the tree  Used to elect the root bridge  Locate the next hop closest to the root, and its port  Select ports to be included in the spanning trees

Definitions 17  Bridge ID (BID) =  Root Bridge: bridge with the lowest BID in the tree  Path Cost: cost (in hops) from a transmitting bridge to the root  Each port on a bridge has a unique Port ID  Root Port: port that forwards to the root on each bridge  Designated Bridge: the bridge on a LAN that provides the minimal cost path to the root  The designated bridge on each LAN is unique

Determining the Root 18  Initially, all hosts assume they are the root  Bridges broadcast BPDUs:  Based on received BPDUs, each switch chooses:  A new root (smallest known Root ID)  A new root port (what interface goes towards the root)  A new designated bridge (who is the next hop to root) Root IDPath Cost to RootBridge ID

Comparing BPDUs 19 if R1 < R2: use BPDU1 else if R1 == R2 and Cost1 < Cost2: use BPDU1 else if R1 == R2 and Cost1 == Cost 2 and B1 < B2: use BPDU1 else: use BPDU2 R1Cost1B1R2Cost2B2 BPDU1BPDU2

Spanning Tree Construction 20 0: 0/0 12: 12/0 3: 3/0 27: 27/0 41: 41/0 9: 9/0 68: 68/0 27: 0/1 12: 0/1 41: 3/1 68: 9/1 41: 0/2 3: 0/2 68: 3/2 9: 3/2 68: 0/3 9: 0/3

Designated Bridges 21  Ultimately, each bridge must decide to enable or disable each port  Reasons to keep a port enabled: 1. You receive no BPDUs on that port Indicates there are no other bridges 2. The port is a root port You need to be able to forward packets to the root of the spanning tree 3. You are the designated bridge for that LAN All other bridges on that LAN have a longer path to the root, or their bridge ID is higher than yours ? ? ? ? ? ? ? On, 1 On, 2 On, 3 Off On, 3

?? More Designated Bridges 22  Ultimately, each bridge must decide to enable or disable each port  Reasons to keep a port enabled: 1. You receive no BPDUs on that port Indicates there are no other bridges 2. It is the root port You need to be able to forward packets to the root of the spanning tree 3. You are the designated bridge for that LAN All other bridges on that LAN have a longer path to the root, or their bridge ID is higher than yours ? ? ? ? ? ? On, 2 On, 3 On, 2Off 3

Bridges vs. Switches 23  Bridges make it possible to increase LAN capacity  Reduces the amount of broadcast packets  No loops  Switch is a special case of a bridge  Each port is connected to a single host Either a client machine Or another switch  Thus, there are no collision domains  No need for CSMA/CD! Simplifies hardware.  Can have different speeds on each port 2 hosts on 1 port Not a legal network with switches

Switching the Internet 24  Capabilities of switches:  Network-wide routing based on MAC addresses  Learn routes to new hosts automatically  Resolve loops  Could the whole Internet be one switching domain? NO

Limitations of MAC Routing 25  Inefficient  Flooding packets to locate unknown hosts  Poor Performance  Spanning tree does not balance load  Hot spots  Extremely Poor Scalability  Every switch needs every MAC address on the Internet in its routing table!  IP addresses these problems (next lecture…)