TDC365 Spring 2001John Kristoff - DePaul University1 Interconnection Technologies Bridging II.

Slides:



Advertisements
Similar presentations
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Advertisements

Communication Networks Recitation 3 Bridges & Spanning trees.
Introduction to Computer Networks Spanning Tree 1.
IEEE 802.1D: Spanning Tree Algorithm and the Filtering Database Ben Schultz Bridge Functions Consortium UNH InterOperability Lab July, 2000.
Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
STP Spanning tree protocol. Trunk port : A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a specific.
“Internetworking” Bridges –Transparent bridges –Source Routing - Transparent Bridges Routers (Network Layer) Brouters
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
Dec 6, 2007CS573: Network Protocols and Standards1 Transparent Bridging Network Protocols and Standards Winter
Internetworking Fundamentals (Lecture #5) Andres Rengifo Copyright 2008.
CSEE W4140 Networking Laboratory Lecture 8: LAN Switching Jong Yul Kim
Autumn 2000John Kristoff1 Computer Networks LAN Bridges and Switches.
TDC365 Spring 2001John Kristoff - DePaul University1 Interconnection Technologies Bridging III.
TDC365 Spring 2001John Kristoff - DePaul University1 Interconnection Technologies Bridging I.
Spring 2000John Kristoff1 LAN Bridges and Switches Computer Networks.
Sept 14, 2004CS573: Network Protocols and Standards1 Spanning Tree Algorithm Network Protocols and Standards Autumn
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture 12: LAN Redundancy Switched Networks Assistant Professor Pongpisit.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – Chapter 2 Spanning tree Protocol 1.
1 Spanning Tree Algorithm Advanced Computer Networks.
Spanning Tree Protocol Cisco Networking Academy Program © Cisco Systems, Inc Spanning Tree Protocol.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
1 Transparent Bridging Advanced Computer Networks.
Cisco 3 – Switching STP Perrine. J Page 110/19/2015 Chapter 8 Spanning Tree Protocol (STP) Having redundancy in a network is important, and allows the.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Scaling Broadcast Ethernet Some slides used with.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
Topic 5 Spanning tree protocol
M. Veeraraghavan (originals by J. Liebeherr) 1 Internetworking Bridges Routing with Bridges * * Reading material is EL 536 textbook (sections 14.1 and.
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Ethernet switches and IP routers
Instructor Materials Chapter 3: STP
Spanning Tree Protocol
Spanning Tree Protocol
Transparent Bridging.
Bridging.
3. Internetworking (part 2: switched LANs)
Spanning Tree Algorithm
Chapter 3 Part 1 Switching and Bridging
Configuring Catalyst Switch Operations
Spanning Tree Protocol
One Upon A Time Computer Networks
© 2002, Cisco Systems, Inc. All rights reserved.
Spanning Tree Protocol
LAN switching and Bridges
NT2640 Unit 9 Activity 1 Handout
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
LAN switching and Bridges
Dr. Rocky K. C. Chang 23 February 2004
Chapter 15. Connecting Devices
LAN switching and Bridges
Presentation transcript:

TDC365 Spring 2001John Kristoff - DePaul University1 Interconnection Technologies Bridging II

TDC365 Spring 2001John Kristoff - DePaul University2 Consider...

TDC365 Spring 2001John Kristoff - DePaul University3 Transparent bridging loops • Bridges will flood unlearned destinations • With bridge loops, frames proliferate • Bridges will learn source addresses • With bridge loops, address table thrahses • Bridges will forward unlearned destinations • With bridge loops, frames can loop indefinitely

TDC365 Spring 2001John Kristoff - DePaul University4 Bridge loop solutions • Absolve never to have loops • Allow loops, but prevent looped frames • Do not allow loops, but allow redundancy

TDC365 Spring 2001John Kristoff - DePaul University5 Spanning tree algorithm • Ensures just one single path between any two hosts • Disables active redundancy/loops • Bridges must cooperate to discover and form loop-free paths • Bridges should (de)activitate paths when necessary • Standardized in IEEE 802.1D

TDC365 Spring 2001John Kristoff - DePaul University6 A Pruned tree topology

TDC365 Spring 2001John Kristoff - DePaul University7 The root bridge • Think of an upside down tree... • Elect a single root bridge • Root bridge is logical center of the catenet • Not necessarily the physical center • Any bridge could potentially be root bridge • Root bridge can change over time

TDC365 Spring 2001John Kristoff - DePaul University8 Designated bridges • One designated bridge per branch (LAN) • Only bridge to forward traffic for the branch • Root bridge is designated bridge for all its LAN attachments • Non-root bridges may be designated bridge for zero or more LAN attachments

TDC365 Spring 2001John Kristoff - DePaul University9 Root ports • Designated bridges have only one root port • Except the root bridge which has no root ports • A port that forwards traffic to the root bridge • Traffic received on a bridge's root port will be forwarded to one or more of its designated ports • As determined by normal forwarding rules

TDC365 Spring 2001John Kristoff - DePaul University10 Designated ports • A bridge port that forwards traffic away from the root bridge onto the LAN link (branch) • All root bridge ports are designated ports • Non-root bridges may have 0 or more designated ports

TDC365 Spring 2001John Kristoff - DePaul University11 Bridge identifier (ID) • Each bridge is assigned one bridge ID • Uniquely identifies a bridge in the catenet • 64 bit field = 48 bit MAC plus 16 bit priority • Priority field allows an administrator to control which bridge becomes the root bridge

TDC365 Spring 2001John Kristoff - DePaul University12 Port identifier (ID) • Each bridge port is given a 16-bit ID • 8-bit ID and an 8 bit priority field • Locally significant (not globally unique) • Ports are number 1 to N • Limits bridge to 255 ports or less

TDC365 Spring 2001John Kristoff - DePaul University13 Link/path costs • Each port has an associated link • Each link has an associated speed in bps • An inverse cost is associated with link speed • Example: • 10 Mb/s = 100, 100 Mb/s = 19, 1 Gb/s = 4 • Spanning tree is built using shortest path cost to root rather than strictly shortest path • Can be used to alter the path to root

TDC365 Spring 2001John Kristoff - DePaul University14 Calculating the spanning tree • Elect a root bridge • Elect designated bridges and ports • Maintain the topology over time

TDC365 Spring 2001John Kristoff - DePaul University15 Elect a root bridge • Initially each bridge considers itself root • Bridges send BPDU frames on LAN links • Bridge and port ID of sending bridge • Bridge and port ID of bridge considered root • Root path cost for the sending bridge • Bridge with the lowest ID becomes root • Bridges leaving/entering catenet may cause the spanning tree to reconfigure

TDC365 Spring 2001John Kristoff - DePaul University16 Elect the designated bridges • Initially each bridge considers itself the designated bridge • Bridges send BPDU frames LAN links • Bridge and port ID of sending bridge • Bridge and port ID of bridge considered root • The root path cost for the sending bridge • Lowest path cost to root wins

TDC365 Spring 2001John Kristoff - DePaul University17 Elect the designated port • Port from the designated bridge on the LAN • In case a bridge has more than 1 link on the LAN, port ID breaks a tie

TDC365 Spring 2001John Kristoff - DePaul University18 Bridges select root port • Each non-root bridge selects root port • Based on lowest path cost to root bridge • In case a bridge has more than one 1 link on the LAN, port ID breaks tie

TDC365 Spring 2001John Kristoff - DePaul University19 Bridge port state • Disabled - broken or administratively down • Blocking - not part of spanning tree • Listening - participating in election process • Learning - building address table • Forwarding - active in spanning tree

TDC365 Spring 2001John Kristoff - DePaul University20 Spanning tree illustrated

TDC365 Spring 2001John Kristoff - DePaul University21 Bridge protocol data unit (BPDU)

TDC365 Spring 2001John Kristoff - DePaul University22 Source route bridging • Intelligence moves to end stations • Only used in token ring environments • Some FDDI, but non-existant for Ethernet • Called bridging, but probably shouldn't be • Originally developed by IBM • Mostly of academic interest now • Uses a spanning tree for multicast/broadcast and route discovery traffic

TDC365 Spring 2001John Kristoff - DePaul University23 Source route bridges • Use routing information field (RIF) in frames • No bridge address tables • Hosts maintain address or rather route tables • Must number rings and bridges in order to build a path (RIF) • Allows for active loops

TDC365 Spring 2001John Kristoff - DePaul University24 Source route bridging illustrated

TDC365 Spring 2001John Kristoff - DePaul University25 Source routed destinations • Null • Destination on same LAN segment • Non-broadcast • Frame includes a RIF • All routes broadcast • Flooded to each LAN, bridges add to the RIF • Single route broadcast • Use spanning tree, bridges add to RIF

TDC365 Spring 2001John Kristoff - DePaul University26 Route discovery • Source sends all routes broadcast • Destination responds with a single route return using the route used by the first frame received • Source transmits a source route broadcast • Destination responds with a all routes broadcast • Source uses route from the first returned frame • Routes can also be statically configured in end stations

TDC365 Spring 2001John Kristoff - DePaul University27 Route discovery illustrated

TDC365 Spring 2001John Kristoff - DePaul University28 Routing information field (RIF)

TDC365 Spring 2001John Kristoff - DePaul University29 Final thoughts • Token ring can use transparent bridging • For all practical purposes, source route bridging and token ring are dead • This is somewhat unfortunate, there are a lot of networking lessons to be learned - good and bad • Yes, your instructor did a lot of this stuff