Chapter 5 Hardware Layers: Backbone Networks Networking in the

Slides:



Advertisements
Similar presentations
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advertisements

Dwayne Whitten, D.B.A Mays Business School Texas A&M University
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Eighth Edition by William Stallings
Chapter 7 Data Link Layer
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology.
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. 8-1 FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
CSC 450/550 Part 3: The Medium Access Control Sublayer More Contents on the Engineering Side of Ethernet.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Chapter 8 Backbone Networks.
TDC /502, Summer II Unit 2: Underlying Technologies Transmission media (Section 3.1. Read on your own) Local Area Networks (LANs) –Ethernet.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
1 Chapter 8 Local Area Networks - Internetworking.
Review on Networking Technologies Linda Wu (CMPT )
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
Backbone Networks. Copyright 2005 John Wiley & Sons, Inc8 - 2 Backbone Networks High speed networks linking an organization’s LANs –Making information.
Copyright 2005 John Wiley & Sons, Inc8 - 1 Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
EE 4272Spring, 2003 Chapter 11. ATM and Frame Relay Overview of ATM Protocol Architecture ATM Logical Connections ATM Cells ATM Service Categories ATM.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
Chapter 7. Backbone Networks
Chapter 2 Review of Computer Network Technology
Connecting LANs, Backbone Networks, and Virtual LANs
SIMS-201 LAN Basics, MANs, WANs.
Network Topologies An introduction to Network Topologies and the Link Layer.
Dwayne Whitten, D.B.A Mays Business School Texas A&M University
Network Topologies.
Chapter 8: Backbone Networks
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
1 Chapter 7. Backbone Networks Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Network Design Essentials
TC 361 Data Networking Test Review
Chapter 9A Network Basics.
Network Access and Transmission Methods Chapter 10.
Chapter 4 Local Area Networks. Layer 2: The Datalink Layer The datalink layer provides point-to- point connectivity between devices over the physical.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
Internetworking and ATM Lecture 8, April 30, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
Chapter 6 Wide Area Networking Concepts, Architectures, & Services.
Chapter 6 – Connectivity Devices
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Chapter 7 Backbone Network. Announcements and Outline Announcements Outline Backbone Network Components  Switches, Routers, Gateways Backbone Network.
William Stallings Data and Computer Communications
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Chapter2 Networking Fundamentals
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Slide 4-1 Chapter 4 Terms Data Communications and Networking Considerations Introduction to Information Systems Judith C. Simon.
1 Local Internets Cabletron SmartSwitch Local Internets ä Internet ä System of subnets such that any station on any subnet can communicate with.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
FDDI Network Security.
 Describe the basic and hybrid LAN physical topologies and their uses, advantages, and disadvantages  Describe the backbone structures that form the.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Copyright 2007 John Wiley & Sons, Inc8 - 1 Business Data Communications and Networking 9th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 2 IEEE CSMA/CD and the Evolution of Ethernet.
Chapter 7 Backbone Network
Chapter 7 Backbone Networks 9/19/2018 9:33:33 AM9/19/2018 9:33:33 AM.
Ethernet and Token Ring LAN Networks
Ethernet and Token Ring LAN Networks
Presentation transcript:

Chapter 5 Hardware Layers: Backbone Networks Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc.

Copyright ã 2002 John Wiley & Sons, Inc. All rights reserved Copyright ã 2002 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. Adopters of the textbook are granted permission to make back-up copies for their own use only, to make copies for distribution to students of the course the textbook is used in, and to modify this material to best suit their instructional needs. Under no circumstances can copies be made for resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter 5. Learning Objectives Understand hierarchical backbones and the devices they use Understand flat backbones and the devices they use Understand collapsed backbones and the devices they use Understand VLANs and the devices they use Be familiar with FDDI Be familiar with ATM Understand the best practice recommendations for backbone design

Chapter 5. Outline Introduction Backbone Architectures Hierarchical backbones, Flat backbones, Collapsed backbones, Virtual LANs Fiber Distributed Data Interface Topology, Medium Access Control, Error Control, Message Delineation, Data Transmission in the Physical Layer Asynchronous Transfer Mode Topology, Medium Access Control, Error Control, Message Delineation, Data Transmission in the Physical Layer, ATMs and LANs The Best Practice Backbone Design Architectures, Effective Data Rates, Conversion Between Protocols, Recommendations

Introduction

Backbone Networks Backbone networks are high speed networks that link an organization’s LANs and also provide connections to other backbones, MANs, WANs and the Internet. A backbone that connects backbones in several buildings is also often called a campus network. A backbone is also sometimes called an enterprise network if it connects all the networks within a company, especially if this includes large WAN segments.

Backbone Architecture Layers (Figure 5-1) Network designers view networks as made of three technology layers: The access layer which is the technology used in LANs. The distribution layer which is the part of the backbone that connects the LANs together. The core layer connects different backbone networks together, often between buildings. Some organizations are not large enough to have a core layer. In such cases their backbone only spans the distribution layer.

Figure 5-1 Backbone network design layers

Backbone Architectures

Backbone Network Types There are four basic types of backbone networks: Hierarchical Backbones Flat Backbones Collapsed Backbones Virtual LANs

Hierarchical Backbones Figure 5-2 shows an example of a distribution layer hierarchical backbone. Each LAN is a separate and isolated network, connected by a TCP/IP gateway (usually a router) to a shared media backbone network. Within the LANs messages are sent based on the data link layer addresses. To move between LANs, message traffic needs to be sent specifically to the router, which forwards the message based on its network layer address.

Figure 5-2 Hierarchical backbone architecture

Flat Backbones Figure 5-3 gives an example of a distribution layer flat backbone with a bus topology. With a flat backbone, LANs are connected using bridges or layer-2 switches. Packets are forwarded based on their data link layer addresses, making the entire flat backbone a single subnet. Flat backbones using bridges were developed in the mid-1980s to reduce costs, because at the time routers were very expensive. Bridges have now become obsolete and are typically replaced by layer-2 switches, which have continued to fall in price.

Figure 5-3 Flat backbone architecture

Collapsed Backbones (Figure 5-4) Collapsed backbones use a star topology, usually with a high speed switch at the center. Collapsed backbones can use either layer-2 switches or layer-3 routing switches. The two main advantages are: 1) each connection to the switch becomes a separate point-to-point circuit also giving much higher performance (from 200-600% higher) 2) the network has far fewer devices and so is much simpler to manage. Two minor disadvantages are: 1) use more cable and the cable runs for longer distances, 2) if the central switch fails, the network goes down.

Figure 5-4 Collapsed backbone architecture

Rack-Mounted Collapsed Backbones Rack-mounted backbones collapse the backbone into a single room, called a main distribution facility (MDF) where networking equipment is connected and mounted on equipment racks (Figure 5-5). Devices are connected using short patch cables. Moving computers between LANs is relatively simple since equipment is all in the same location.

Fig. 5-5 Rack-mounted collapsed backbone architecture

Chassis-based Collapsed Backbones Chassis switch designs include a number of open slots and have an internal capacity capable of supporting all active modules. A variety of modules (i.e., card-mounted networking devices) can be inserted into these slots providing a high level flexibility in network configuration. By turning the backbone into an internal bus, chassis switches also can provide very high performance speeds capable of aggregate data rates in the Gbps range.

Figure 5-7 Central Parking’s collapsed backbone

Virtual LANs VLANs are a new type of LAN/BN architecture using intelligent, high-speed switches. Unlike other LAN types, which physically connect computers to LAN segments, VLANs assign computers to LAN segments by software. VLANs have been standardized as IEEE802.1q and IEEE802.1p. The two basic designs are: Single-switch VLANs Multiswitch VLANs

Single Switch VLANs (Figure 5-8) With single switch VLANs, computers are assigned to VLANs using special software, but physically connected together using a large physical switch. Computers can be assigned to VLANs in four ways: Port-based VLANs assign computers according to the VLAN switch port to which they are attached MAC-based VLANs assign computers according to each computer’s data link layer address IP-based VLANs assign computers using their IP-address Application-based VLANs assign computers depending on the application that the computer typically uses. This has the advantage of allowing precise allocation of network capacity.

Figure 5-8 Single-switch VLAN architecture

Multiswitch VLANs (Figure 5-9) Multiswitch VLANs send packets between multiple switches, making VLANs with segments in separate locations possible. When a frame is sent between switches it is modified and to include a tag field carrying VLAN information field. When the frame reaches the final switch, the tag field is removed prior to the frame being sent to its destination computer. Multiswitch VLANs can also prioritize traffic using the IEEE802.1p standard in the hardware layers and the RSVP standard in the internetwork layers. IEEE802.1p works with the IEEE802.11ac frame definition which includes a special priority field.

Figure 5-9 Multiswitch VLAN architecture

Figure 5-10 IONA VLAN

Fiber Distributed Data Interface

Fiber Distributed Data Interface (FDDI) FDDI (standardized as ANSI X3T9.5) backbone protocol was developed in the 1980s and popular during the 80s and 90s. FDDI operates at 100 Mbps over a fiber optic cable. Copper Distributed Data Interface (CDDI) is a related protocol using cat 5 twisted wire pairs. FDDI’s future looks limited, as it is now losing market share to Gigabit Ethernet and ATM.

FDDI Topology (Figure 5-11) FDDI uses both a physical and logical ring topology capable of attaching a maximum of 1000 stations over a maximum path of 200 km. A repeater is need every 2 km. FDDI uses dual counter-rotating rings (called the primary and secondary). Data normally travels on the primary ring. Stations can be attached to the primary ring as single attachment stations (SAS) or both rings as dual attachment stations (DAS).

Figure 5-11 Optical cable topology for an FDDI local area network.

FDDI’s Self Healing Rings An important feature of FDDI is its ability to handle a breaks in the network by forming a single temporary ring out of the pieces of the primary and secondary rings. Figure 5-12 shows an example of a cable break between two dual attachment stations. Once the stations detect the break, traffic is rerouted through a new ring formed out of the parts of the primary and secondary rings not affected by the break. The network then operates over this temporary ring until the break can be repaired.

Figure 5-12 Managing a broken circuit

FDDI Media Access Control FDDI uses a token passing system. Computers wanting to send packets wait to receive a token before transmitting. Multiple packets can be attached to the token as it moves around the network. When a station receives the token, it looks for attached packets addressed to it and removes them from the incoming packet. If the station wants to send a packet it attaches it to the token and sends the token with its attached packets to the next station. This controlled access technique provides a higher performance level at high traffic levels compared to a contention-based technique like Ethernet.

FDDI Message Delineation (Fig. 5-13) The FDDI frame can be broken into three parts: Frame Start: like Ethernet, the frame begins with a preamble (8-bytes in this case) and a 1-byte start delimiter. Frame Body: the main body of the frame includes the following fields: 1-byte frame control field (used for the token) 2 or 6 byte fields for the destination and source addresses (6 bytes is more common) the data field contains 0-4500 bytes of data the frame check sequence (FCS) used in error control. Frame End: the frame ends with a 1-byte end delimiter and a 2-byte frame status field.

Figure 5-13 FDDI frame layout

Asynchronous Transfer Mode

Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) (also called cell relay) was originally designed to carry both voice and data traffic over WANs. It is also used in backbone networks. In the WAN, ATM almost always uses SONET as its hardware layer. In backbones, ATM is often implemented as a standalone protocol. On order to interconnect with the TCP/IP world, an ATM gateway is used that converts TCP/IP and Ethernet frames into ATM cells and then converts them back once they have reached their destination network.

ATM Topology ATM uses a mesh topology (see Figure 5-14) This mesh is made up of point-to-point, full duplex circuits that interconnect ATM switches. ATM circuits typically operate at 155 Mbps in each direction, although higher speeds, esp. 622 Mbps (1.24 Gbps total) is also possible. Although originally designed to run on optical fiber, some versions of ATM can run on cat-5e twisted pair cables.

Figure 5-14 ATM mesh architecture

ATM Media Access Control ATM uses full-duplex circuits, so media access control is less of an issue. To handle circuit congestion, ATM prioritizes transmissions based on Quality of Service (QoS). Priorities are based on 5 ATM service class definitions. Real time applications, such as voice, get a high priority, since it can not allow delays. E-mail gets a lower priority, since small delays don’t matter very much.

ATM Addressing (Figure 5-15) ATM addressing uses virtual channels (VCs). Each cell’s VC has two parts: a virtual path identifier and a virtual channel identifier. Virtual channels are also assigned a service class when they are created. When a cell reaches an ATM switch, the switch looks up the VC number in its VC table to determine where to send it next (similar to how a routing table works).

Figure 5-15 Addressing and forwarding with ATM virtual circuits

ATM virtual circuits ATM is connection-oriented: all packets travel in order in the same virtual channel. VCs can be set up in one of two ways: Permanent Virtual Circuits (PVCs) – permanent virtual circuits set up for long periods. Switched Virtual Circuits (SVCs) - temporary virtual circuits set up for one transmission and deleted when the transmission is completed.

ATM Error Control ATM’s error control technique is called throw-it-on-the-floor. Error checking is only done on the ATM header. If an error is detected, the cell is discarded. Full error control, including requests for retransmission are handled at the source and destination computers (on a LAN this is typically done using TCP).

ATM Message Delineation (Fig. 5-16) ATM has a 53-byte frame called a cell. The ATM header includes these fields: Generic Flow Control: controls the flow of data across the circuit Virtual Path Identifier: identifies the group of channels the data is moving with. Virtual Circuit Identifier: identifies the specific channel. Payload Type: indicates type of data in data field Cell Loss Priority: whether or not the cell is discarded if the circuit gets busy. Header Error Control: uses CRC-8 for error control but only on the header portion of the field.

Figure 5-16 ATM cell layout

ATM and LANs Ethernet and TCP/IP use large variable length frames/packets with fixed addresses while ATM uses small fixed length cells addressed using virtual channels. For that reason, Ethernet and TCP/IP must first be translated before being sent over ATM networks. Two approaches for this are: LAN Encapsulation (LANE), which splits frames into 48 byte pieces, reassembling them when they reach their destination LAN. Multiprotocol Over ATM (MPOA) is an extension of LANE that uses both IP and Ethernet addresses.

LAN Encapsulation (LANE) LANE works by breaking Ethernet frames into 48-byte chunks. This occurs in the LAN’s gateway ATM edge switch (see Figure 5-17). The edge switch also creates a virtual channel identifier for the cells to use. The cells are then sent over the ATM backbone using this virtual channel identifier. When they reach the destination edge switch, the frame is reassembled. LANE’s high overhead creates significant delays, lowering network performance as a consequence.

Figure 5-17 ATM in the backbone

The Best Practice Backbone Design

Current Backbone Technology Trends The following trends in backbone technologies have been taking place in recent years: Organizations are moving to collapsed backbones or VLANs. Gigabit Ethernet use is growing. FDDI seems to be on its way out. ATM, while still popular in WANs, is losing ground to Gigabit Ethernet as a backbone technology. Taken together, it appears that Ethernet use will dominate both the LAN and backbone environments.

Figure 5-19 Effective data rates for backbone technologies Technology Effective Data Rate Full Duplex 1 GbE 1.8 Gbps Full Duplex 10 GbE 18 Gbps FDDI 7-70 Mbps depending on traffic ATM (155 Mbps, Full Duplex) 160 Mbps ATM (622 Mbps, Full Duplex) 760 Mbps  Assumes: collapsed backbone connecting Ethernet LANs transmitting mostly large frames Figure 5-19 Effective data rates for backbone technologies

Backbone Recommendations (Fig. 5-20) The best practices are recommended for backbones: 1. Architecture: collapsed backbone or VLAN. 2. Technology: gigabit Ethernet. ATM and FDDI use has started to fall off over the past year. 3. The ideal network design combines use of layer-2 and layer-3 Ethernet switches. 4. The access layer (LANs) uses 10/100 layer-2 switches using cat 5e or cat 6 twisted pair cables (cat 6 is needed for 1000BaseT). 5. The distribution layer uses layer-3 Ethernet switches that use 1000BaseT or fiber, Cat 6 or Cat 7 TP. 6. The core layer uses layer-3 Ethernet switches running 10GbE or 40GbE over fiber. 7. Network reliability is increased using redundant switches and cabling.

Figure 5-20 The best practice network design

End of Chapter 5