Internetworking Fundamentals (Lecture #5) Andres Rengifo Copyright 2008.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 19 Introduction to Computer Networks.
Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
STP Spanning tree protocol. Trunk port : A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a specific.
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
CSEE W4140 Networking Laboratory Lecture 8: LAN Switching Jong Yul Kim
1 Chapter 8 Local Area Networks - Internetworking.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
Sept 14, 2004CS573: Network Protocols and Standards1 Spanning Tree Algorithm Network Protocols and Standards Autumn
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
TDC365 Spring 2001John Kristoff - DePaul University1 Interconnection Technologies Bridging II.
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
LAN Overview (part 2) CSE 3213 Fall April 2017.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Connecting LANs, Backbone Networks, and Virtual LANs
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
1 CISCO NETWORKING ACADEMY PROGRAM (CNAP) SEMESTER 1/ MODULE 8 Ethernet Switching.
1 Spanning Tree Algorithm Advanced Computer Networks.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Module 8: Ethernet Switching
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Multiplexing FDM & TDM. Multiplexing When two communicating nodes are connected through a media, it generally happens that bandwidth of media is several.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Configuring Cisco Switches Chapter 13 powered by DJ 1.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
Routing and Addressing
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
1 Networking and Internetworking Devices we need networking and internetworking devices to extend physical distance and to improve efficiency and manageability.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
Youngstown State University Cisco Regional Academy
Instructor Materials Chapter 5: Ethernet
Networking Devices.
3. Internetworking (part 2: switched LANs)
Chapter 4 Data Link Layer Switching
Chapter 3 Part 1 Switching and Bridging
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Dr. Rocky K. C. Chang 23 February 2004
Chapter 15. Connecting Devices
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

Internetworking Fundamentals (Lecture #5) Andres Rengifo Copyright 2008

Bridges A LAN bridge is a device that interconnects two separate LAN segments. It works on the data link layer or it is referred to as a layer 2 device. It is a bit more intelligent because it can make “routing” and “switching” decisions of frames within network topologies. Bridge Protocol Architecture The IEEE 802.1D specification defines the protocol architecture for MAC bridges. Within the 802, architecture, the endpoint, or station address is designated at the MAC level. Thus, it is at the MAC level that a bridge can function. A frame destined to a final destination is captured by the MAC Bridge, stored temporally, and then sent over the next segment. The LLC sub layer is not involved because the bridge is simply relaying MAC frames.

Bridges (Cont.) There are many reasons why multiple LAN’s should be separated by bridges or routers, such as: 1.Reliability: If there are issues on a device that connects to LAN1, LAN2, LAN3, etc connected to the bridge will not be affected as the separation creates an individual domain. 2.Performance: The more devices you connect to a LAN, the less efficient performance will be. If there are multiple networks attached through a bridge, each segment can grow to its optimal capacity without affecting every LAN attached to the bridge. 3.Security: Different LAN segments have different needs. A “Research and Development LAN” has different traffic patterns then a Human Resources LAN. Security is important to protect data that is restricted to the public. A bridge allows separate physical interfaces to deal with other LANs own data patterns. 4.Geography: The obvious reason to use a bridge is to interconnect two separate topologies that could be located in different buildings, regions, etc.

Bridges (Cont.) It can filter and drop unwanted traffic by checking its internal Media Access Control tables, which are tables created by understanding the physical topology of the local segment. A basic bridge can only interconnect segments that use the same data link and physical layer protocols. Translation bridges are able to take a specific PDU frame from one topology and convert it to another frame type in another topology like a token ring frame to an Ethernet frame.

Bridges (Cont.) There are two types of bridging mechanisms: –Transparent Bridging Also referred as to the learning bridge. Frames are sent one hop at a time towards the destination. There is no pre-determined path between source and destination. Each bridge along the way will process the frame according to its “learning” table obtained by analyzing each bridge local segments.

Bridges (Cont.) Source Route Bridging –The path between source and destination is predetermined and included on the frame as it traverses the network.’ –Each frame has a “map” or topology of bridges that need to be followed. –Obtained via explorer or discovery frames that leave prior to the data transfer to determine the path to be taken from source to destination. –Very deterministic way of sending data. If the path is broken a new explore frame has to be released to discover the new path.

Bridges (Cont.) How does the learning bridge work?

Bridges (Cont.) Spanning Tree Algorithm –Purpose is to have bridges dynamically create loop free topologies to provide a path between every pair of LANs in the network. –A loop is created when there are alternate routes between two hosts. –Bridges can forward traffic indefinitely which can degrade a network.

Bridges (Cont.) Bridges exchange special messages with each other that allow them to calculate a spanning tree or a subset of the topology, which is loop free. –Special messages are called BPDUs or Bridge Protocol Data Units. Functions of the BPDUs are the following: –Find one Root Bridge among all the bridges exchanging BPDUs –Determine the shortest path distance between the Root Bridge and themselves. –Elect a Designated Bridge for each LAN. –Choose which interface or port, know as the root port, gives them the best path from themselves to the Root Bridge. –Determine and select ports that should be included in the spanning tree. Only forward traffic to and from these ports.

Bridges (Cont.) BPDU's are sent every 2 seconds on every port in order to ensure a stable, loop-free topology. –How is a root bridge selected? First the bridge is turned on. Every time a bridge comes up it assumes that it is the root bridge. They set their ID equal to the root ID. The bridge ID is actually made up of two components, as follows: 1. A two byte priority. The switch sets this number which, by default, is the same for all switches. The default priority on Cisco switches is 32,768 or 0x A 6 byte Media Access Control (MAC) address. This is the MAC address of the switch or the bridge. The combination of these two numbers determines which switch will become the root bridge. The lower the number the more likely this switch will become the root. By exchanging BPDUs, the switches determine which one is the root bridge.

Bridges (Cont.) In Spanning Tree Algorithm, there are 5 Spanning Tree Protocol Port States: –1) Blocking, 2) Listening, 3) Learning, 4) Forwarding and 5) Disabled –Blocking - All ports start in this mode to prevent the bridge from creating a bridging loop. (20 seconds to Listening mode) –Listening - All ports attempt to learn if there are any other paths to the root bridge. (15 seconds to Learning mode) –Learning - Similar to Listening state except the port can add information that the port learned into its address table.(15 seconds to Forwarding mode) –Forwarding - The port is capable of sending and receiving data.

Spanning Tree Algorithm Example

Assume that there are two LANs interconnected with three bridges. Host A is sending from Subnet A to Subnet B. Since there is no notion of where destination is all three bridges store the frame, begin to look up their tables to see where the destination is, and forward the frame to Subnet B. All three bridges know about host A and add that device to their table. By nature, one of the devices will be the first one to forward the frame across to Subnet B. Since each bridge is transparent to the other, it will look as if host A is directly connected to Subnet B from the point of view of B1 and B2. Bridge #1 and Bridge #2 will take in the frame re-compute their “learning” tables by re-defining host A to be residing on Subnet B and the frame is then forward to Subnet A.

Spanning Tree Algorithm (Cont.) This has created a loop. Now assume that Bridge#1 succeeds in forwarding a frame back to Subnet B. Bridge#2 will note that A is still on Subnet B but Bridge#3 realizes that host A has now “moved” to Subnet A. It then prepares itself to forward the frame towards Subnet A. Now assume that Bridge#1 sends a frame onto Subnet A. Bridges#2 and #3 will take notice of host A has now moved to Subnet A and will re-compute their “learning” tables and begin forwarding towards Subnet B. Not only has there been a loop but also frames have been duplicated out of proportion causing a network to break. The introduction of the Spanning Tree Algorithm will prevent these loops by “blocking” specific ports and only allowing proper ports to forward the given traffic.

Switching Basics Reasoning for migration to switching architectures: –Faster CPUs were developed which can process a lot more instructions per second. –Faster Operating Systems which allow for multi-thread network transactions. –“Heavier” Application developing requires faster access to the wire with better buffering capabilities.

Switching Basics (Cont.) Switching is defined as the process by which packets are moved at a very fast rate through a device called a switch which can handle high throughputs using a few specific algorithms such as: –Cut- Through –Store and Forward –Adaptive Cut-Through –Fragment Free Cut-Through

Switching Basics (Cont.) Switches are bridges in “steroids” –Switches take in frames from sources which are then analyzed against a MAC table used to forward the frame to the specific physical destination defined on the frame’s header. If the destination is not “listed” on the MAC table, then the process of “flooding” will take effect until a destination was found. –Switches separate multiple LAN segments and allow for multiple user connectivity since the amount of ports available by the device addresses bridge’s capacity issues such as speed and port density. –Switches allow for another option not available with bridging architectures referred to as Virtual LANs.

Boolean Basics To understand where the conversion comes from, the base 2 number system has to be understood: –For example if binary number is provided to you, then the base-2 numbering scheme will be represented in this way: Each digit in a binary number is multiplied by 2 (the base) to the power of the digit’s position in the binary number, with the first position being the power of (0). 1*(2 7 )+0*(2 6 )+1*(2 5 )+1*(2 4 )+1*(2 3 )+1*(2 2 )+0*(2 1 )+0*(2 0 )= 188 in decimal.

Boolean Basics (Cont.) To convert a binary number to decimal,I like to use a graphical method which helps understand why the each binary integer or bit in an octet has a specific decimal value. –Think of each “box” as a light switch. So that when you are given a decimal number, you can actually turn the “light switch” ON for that value until you get the desired result.

Logic Tables When dealing with binary numbers, rules of addition, subtraction, division and multiplication are not really followed like we normally do with base-10 numbering schemes. –Two very important operations OR operation –Assume there are two binary bits available. The number of combinations that these two bits can provide can be OFF/OFF, OFF/ON, ON/OFF or ON/ON. This is the same as saying 00, 01, 10, and 11. If two bits are OR together, the answer will be always 1 provided that at least one of the bits is equal to 1. It will be 0 always when both bits are 0. »B1 B2OR »0 00 »011 »101 »111

Logic Tables (Cont.) AND operation –Assume there are two binary bits available. The number of combinations that these two bits provide has already been described above. If two bits are AND together, the answer will be always 1 provide that both bits are 1, otherwise the answer will be 0. »B1 B0AND »0 00 »010 »100 »111

Logic Tables (Cont.) Should there be three bits instead of two, there will be a total of 8 different combinations of 0s and 1s as shown below: B2B1B

Hexadecimal numbering vs Decimal numbering Hexadecimal (Hex) numbering uses 0-F (A=10, B=11, C=12, D=13, E=14 and F=15). It is a base-16 numbering system. F is the largest digit that can be used in any position. This is the same as having 9 be the largest number that can be used in any position in a decimal number. –Each digit in a hex number is multiplied by 16 to the power of the digit’s position in the hex number, with the first position being the power of (0).