Bridges, Routers and Switches Part One Three things are certain: Death, taxes, and lost data. Guess which has occurred. Haiku error message.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

Cisco S3 C5 Routing Protocols. Network Design Characteristics Reliable – provides mechanisms for error detection and correction Connectivity – incorporate.
Routing Protocol.
1 6/14/ :27 CS575Internetworking & Routers1 Rivier College CS575: Advanced LANs Chapter 13: Internetworking & Routers.
Mod 10 – Routing Protocols
CCNA 2 v3.1 Module 6.
Routing Fundamentals and Subnetting
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Routing and Routing Protocols
Routing.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Chapter 5 – Routing Protocols: IGRP. Building a Network To Be Reliable – provide error detection and ability to correct errors To Provide Connectivity.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
Each computer and router interface maintains an ARP table for Layer 2 communication The ARP table is only effective for the broadcast domain (or LAN)
Chapter Six NetworkingHardware. Agenda Questions about Ch. 11 Midterm Exam Ch.6 Cable kit.
ROUTING BASICS. Why are Routers Necessary? One of the key components of the technical infrastructure of the network One of the key components of the technical.
Introduction to Routing and Routing Protocols By Ashar Anwar.
Distance Vector Routing Protocols W.lilakiatsakun.
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
University of the Western Cape Chapter 11: Routing Aleksandar Radovanovic.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Understanding Routing. Agenda What Is Routing? Network Addressing Routing Protocols.
Introduction to Dynamic Routing Protocol
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Cisco – S1C10 Routers All You Ever Wanted To Know But Were Afraid to Ask.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
CCNA 1 Module 10 Routing Fundamentals and Subnets.
Routing Principles Raghunath M D JTO(NSS),BSNL Mobile Services, Ernakulam 1.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Sem1 - Module 10 Routing Fundamentals and Subnets Review.
Routing and Routing Protocols
Cisco Systems Networking Academy S2 C 11 Routing Basics.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
IP Routing Principles. Network-Layer Protocol Operations Each router provides network layer (routing) services X Y A B C Application Presentation Session.
Chapter 5 IP Routing Routing Protocol vs. Routed Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
1 Version 3.1 Module 6 Routed & Routing Protocols.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Sem1 - Module 10 Routing Fundamentals and Subnets
1 Networking and Internetworking Devices we need networking and internetworking devices to extend physical distance and to improve efficiency and manageability.
Release 16/7/2009 Internetworking Devices Chapter 10 Jetking Infotrain Ltd.
Chapter 11 Routing. Objectives Routing BasicsRouting Basics Why Routing Protocols are NecessaryWhy Routing Protocols are Necessary Distance-Vector RoutingDistance-Vector.
Cisco 2 - Routers Perrine modified by Brierley Page 13/21/2016 Chapter 4 Module 6 Routing & Routing Protocols.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
VCC Semester 1 CHAPTER 11. VCC  Content Layer 3 Devices ARP concept Network layer services Routed and routing protocols Protocol analyzer.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
+ Dynamic Routing Protocols 2 nd semester
Introduction to Dynamic Routing Protocol
Networking Devices.
3. Internetworking (part 2: switched LANs)
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Dynamic Routing and OSPF
Presentation transcript:

Bridges, Routers and Switches Part One Three things are certain: Death, taxes, and lost data. Guess which has occurred. Haiku error message

Bridging Bridges connect two independent LANs to form internetworks

Types of Bridges Transparent Source Routing Transnational

Bridges Each LAN is referred to as a Network Segment

Bridge Ports Bridge Ports connect the Bridge to the Network Consist of a Network Interface (Ethernet, Token Ring, FDDI)

Bridges Form One Logical Network

Bridging and ISO Model Bridges function at at the Media Access (MAC) layer

Bridging and ISO Model Bridges “see” the network at the MAC layer Bridges make forwarding decisions based on MAC (Physical) addresses

Bridging and ISO Model Bridges have no knowledge of paths between address Bridges are transparent to higher level protocol Bridges are protocol independent, the same bridge can pass IP, IPX, DecNet traffic

Transparent Bridges Usually used on Ethernet networks Called Transparent because nodes are not aware of its presence Defined by IEEE standard Forwards frames between networks Self learning

Transparent Bridges Maintains a data base of all known node address on each port

Transparent Bridges Transparent Bridges Transparent Bridges are self learning Examine every frame which passes a port Determines the source address Compares each address to its data base If address is not in data base then the bridge adds the address

Transparent Bridges

Transparent Bridge Frame Forwarding Examines Destination address If address is on the same LAN as the incoming port, ignores the frame If Not Looks up destination address in its Data Base If Address is found Forward out the appropriate Port If Address is not found Forwards out all Ports

Spanning Tree Algorithm

Eliminates all active loops in the network by creating a set of paths with only one path between each node Bridges negotiate which paths are to remain open and which paths will be blocked If a path becomes inaccessible, the bridges will reconfigure the network, creating a new spanning tree and new set of paths Spanning Tree Algorithm

Source Route Bridging Only used in Token Ring environments

Source Route Bridging NOTE: Despite its name Source Routing is Bridging and takes place at the MAC layer

Source Route Bridging Node maintain their own routing table When a frame is transmitted to a node on another ring, the packet must contain the route or path Node “discovers” the route by sending out an Explorer Frame with the address of the destination Node Depending on the protocols used the node may send an All Route Exploder Frame or a Singe Route Explorer Frame

Source Route Bridging The route explorer frame records the Bridge Number and Ring Number of all bridges and networks crossed When it reaches the destination node, the destination node sets a flag and transmits the frame back to the sending node The Route Explorer Frame now has the route to the destination station If two Routes return to the sending node, it usually uses the first route received

Source Route Bridging

Source Route Bridges can connect rings running at different speeds

What’s Wrong with Source Routing? Takes processing resources of end nodes Each Ring and Bridge must be assigned a Ring Number and Bridge Number - Any error in assigning these numbers causes fatal errors Fatal errors happen often

Source Route Bridging

Allows loops How many paths though this network?

Source Route Bridging What else is wrong with Source Routing? What is good about Source Routing?

Source Route and Transparent Bridges in Same Network Usually not very reliable - may work in some simple networks Source Routed traffic can only cross Source Route Bridges

Transnational Bridges Connect two dissimilar topologies

Advantages of Bridging Easy to install and configure Inexpensive Transparent to Network Automatically adapt to Network Changes Bridge unroutable protocols

Disadvantages of Bridges Can not take advantage of redundant paths in the network Can not prevent Broadcast Storms Because bridges form a single logical network the network becomes large and therefore difficult to manage

Routers What makes a Protocol Routable To be routable a protocol must assign addresses so that the address contain Network and Node address Routable Protocols include IP IPX DecNet Vines Non-Routable Protocols NetBios

Routers Function of a Router is to efficiently forward packets between networks Very often more than one path exists, a router must chose the “best” path Routers function at the Network layer of the OSI Model, routing decisions are made using the address assigned by a Network layer protocol such as IP

Routers Since routers function at the Network layer routers are protocol dependent devices Must support IP, IPX, AppleTalk, DecNet, etc.

Routers Multiple Protocols Most routers can route a verity of protocols The ability to route multiple protocols is implemented in software

Routers

Routers Routers can connect dissimilar LAN topologies Routers can connect LANs to the WAN

Routers - Why use Routers Segment Networks Congestion Control Source Quench technique - Router can request a source to stop transmitting until congestion is relieved

Routers Bridges examine each frame on the network segment Routers only receive packets addressed to them Packets are addressed to routers from workstations or other routers

Routers Node Configuration

Routers Routing Tables Routers maintain a Routing Table The Routing Table instructs the router where (out which interface) to send the packet Packets are routed one hop at a time

Routers Routing Table

Routers - Multiple Routes

Routers Multiple Routes Routing Table Router 1 Target Net Next Hop Router Metric Net4 Attached 0 Net 1 Router 2 1 Net 1 Router 3 2 Net 3 Router 3 1 Net 3 Router 2 2 Net 2 Router 3 1 Net2 Router 2 2

Routers Metric Values Chose route with lowest Metric value Metric value can represent: Hops Transmission Delay Administrative Considerations (Cost) Line Capacity

Routers - Backup Links

Routers - Routing Protocol Routing Tables are dynamically created by the router Router communicate with other routers to learn all paths through the network This communication consists of all or portions of each routers routing table

Routers - Routing Protocol Routers use these Routing Tables to build a map of the network topology The time it takes for all routers in a network to exchange routing tables is called Convergence Router to Router communication is implemented according to Routing Protocols

Routers - Routing Protocol Design Goals Ideally Routing Protocols would meet all these criteria: Be able to find the optimal path Simple enough algorithm to require a minimum of processing power and overhead Robust enough to function when the unexpected happens, such as hardware failures Rapid convergence - failure to converge quickly can cause (temporary) network outages There a numerous Routing Protocol, each has its strengths and weaknesses

Routers - Routing Protocols Two types of Routing Protocols Distance-Vector Algorithm Link-State Algorithm

Routers - Distance-Vector Algorithm Each router calculates the metric value of the links to all its neighbors Each router then sends a broadcast message containing its entire routing table to its neighboring routers The receiving station then uses its neighbor’s routing table to calculate a new routing table The router then broadcasts its new routing table to its neighbors

Routers - Distance-Vector Algorithm Routers use the metric values received to calculate the shortest path through the network The routers do not know how the network segments are connected This algorithm results in slow convergence The exchange of Routing Tables uses a high amount of bandwidth

Routers - Link State Algorithm Protocols Each router broadcasts the portion of its Routing Table which describes its links to its neighboring routers This description includes links and metric values From this information routers can determine the entire network topology - That is they know how all the segments are connected together

Routers - Link State Algorithm Protocols Router use their knowledge of the network topology to calculate the optimum path though the network When a router detects any changes in network topology it broadcasts an update to other routers Converge faster than Distance Vector protocols More CPU/memory intensive than Distance Vector Protocols

Routers Interior Routers route within an Autonomous System Run Interior Routing Protocols Boarder Gateway Routers route between Autonomous Systems Run Boarder Routing Protocols

Routers - Routing Information Protocol - RIP Distance Vector protocol Interior Gateway Protocol One of the original Routing Protocols - Very widely used

Routers - Routing Information Protocol Sends routing updates at regular intervals Uses a Hop Count for metric value Each Hop usually adds one Hop to the metric value Uses IP address as next hop There is limit of 15 hops between source and destination Prevents routing loops

Routers - Interior-Gateway Routing Protocol IGRP Developed by Cisco Systems Distance Vector Interior routing protocol Uses a combination of Inter-network delay, bandwidth, reliability and load to determine the best path A metric value is assigned to each of these factors The weight of each factor is user definable

Routers - Interior-Gateway Routing Protocol Permits Multi-path routing Lines of equal-bandwidth will be used in equal amounts Lines with unequal bandwidth will be used in proportion to its bandwidth, that is, a line with twice the bandwidth will be given twice the amount of traffic Only routes with metrics within a specified range of the best route will be used as multiple routes

Routers - Interior-Gateway Routing Protocol

Routing updates are sent at regular intervals When a router goes down its neighbors are able to detect this by their failure to receive a routing update The router then recalculates it routing table based on this information - all routes though that router are now invalid The router then sends out its routing table at the scheduled interval

Routers - Interior-Gateway Routing Protocol Network Convergence takes time, during this interval a router which is not aware of the invalid routes will broadcast its routing table containing the now invalid routes, this table can find its way to a router which has already received the data about the downed router. This router now replaces its current routing table with an outdated one.

Routers - Interior-Gateway Routing Protocol Hold Down Time Hold down times are used to prevent a router from using a route which may have gone down Routers “hold down” any changes which may affect routes for a specified period of time Hold down times are usually calculated to be greater than the network convergence time

Routers - Interior-Gateway Routing Protocol

Split Horizon Routers never send information about a route back in the same direction it came from There is no reason for Sue to send Harry information about Bob because Harry is closer to Bob

Routers - Boarder Gateway Protocol BGP Routes between autonomous systems Only exchanges information with other BGP routers When a BGP router first joins the network routers exchange their entire routing table after that they exchange incremental information Responsible for exchanging information about the ability to reach other networks