Ethernet (LAN switching)



Similar documents
Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Level 2 Routing: LAN Bridges and Switches

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

IP Multicasting. Applications with multiple receivers

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Communication Systems Internetworking (Bridges & Co)

Internet Packets. Forwarding Datagrams

CS335 Sample Questions for Exam #2

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

CORPORATE NETWORKING

VXLAN: Scaling Data Center Capacity. White Paper

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Switching in an Enterprise Network

The ABCs of Spanning Tree Protocol

Bridgewalling - Using Netfilter in Bridge Mode

DG Forwarding Algorithm

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Layer 3 Routing User s Manual

Chapter 3. Enterprise Campus Network Design

IP - The Internet Protocol

Routing Protocols OSPF CHAPTER. The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3

June Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2

Software Defined Networking (SDN) - Open Flow

Portland: how to use the topology feature of the datacenter network to scale routing and forwarding

Instructor Notes for Lab 3

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Communication Networks and Converged Networks

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

RARP: Reverse Address Resolution Protocol

TRILL Large Layer 2 Network Solution

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Router and Routing Basics

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Based on Computer Networking, 4 th Edition by Kurose and Ross

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

04 Internet Protocol (IP)

Interconnecting Cisco Networking Devices Part 2

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Fundamentals of Switching

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

The IP Transmission Process. V1.4: Geoff Bennett

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

ISOM3380 Advanced Network Management. Spring Course Description

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

"Charting the Course...

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

How To Switch In Sonicos Enhanced (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

Improving the Security and Efficiency of Network Clients Using OpenFlow

Technical Support Information Belkin internal use only

UPPER LAYER SWITCHING

- Hubs vs. Switches vs. Routers -

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Packet Tracer 3 Lab VLSM 2 Solution

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Table of Contents. Cisco How Does Load Balancing Work?

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Communications and Computer Networks

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

TRILL for Data Center Networks

Introduction to IP Multicast Routing

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

How To Learn Cisco Cisco Ios And Cisco Vlan

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Administrative Distance

GregSowell.com. Mikrotik Routing

Building Secure Network Infrastructure For LANs

Link-State Routing Protocols

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Contents. Load balancing and high availability

: Interconnecting Cisco Networking Devices Part 2 v1.1

Chapter 4. Distance Vector Routing Protocols

Virtual LANs. or Raj Jain

- Multiprotocol Label Switching -

Overview of Routing between Virtual LANs

Course Contents CCNP (CISco certified network professional)

Transport and Network Layer

LAN Topologies C H A P T E R. Unicast

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Multi-site Datacenter Network Infrastructures

Chapter 9. IP Secure

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Configuring a Gateway of Last Resort Using IP Commands

8.2 The Internet Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Internet Protocol version 4 Part I

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

IP Addressing Introductory material.

ENTERASYS WEBVIEW WEB-BASED MANAGEMENT FOR THE VH-2402S/VH-2402S2 WEB MANAGEMENT GUIDE

Route Discovery Protocols

Transcription:

Ethernet ( switching) 1 Outline Interconnection devices Bridges/ switches vs. Routers Bridges Learning Bridges Transparent bridges 2 1

Bridges/ switches Interconnect multiple, possibly with different type Bridges operate at the Data Link Layer (Layer 2) The term switches and Bridges are synonymous Bridge Token-ring IP LLC Bridge LLC IP LLC 802.3 MAC 802.3 MAC 802.5 MAC 802.5 MAC 3 Routers Routers operate at the Network Layer (Layer 3) Interconnect different subnetworks Router Subnetwork Subnetwork Subnetwork Router Application Application TCP TCP IP IP protocol IP IP protocol IP IP protocol IP Network Access Data Link Network Access Network Access Data Link Network Access Network Access Data Link Network Access Host Router Router Host 4 2

Bridges versus Routers An enterprise network (e.g., university network) with a large number of local area networks (s) can use routers or bridges Until early 1990s: most s were interconnected by routers Since mid1990s: switches replace most routers 5 A Routed Enterprise Network Internet Router switch FDDI FDDI 6 3

A Switched Enterprise Network Internet Router Switch 7 Example: Univ. of Virginia CS Department Network Design of the network architecture (Spring 2000) There is no router! 350T Gigabit Ethernet Switch 100/Giga Ethernet Switch 350T 350T 350T 350T 350T 100 Mbps Ethernet Switch 350T 350T 350T 350T 350T 8 4

Bridges versus Routers Routers Bridges Each host s IP address must be configured MAC addresses are hardwired If network is reconfigured, IP addresses may need to be reassigned Routing done via RIP or OSPF Each router manipulates packet header (e.g., reduces TTL field) No network configuration needed No routing protocol needed (sort of) learning bridge algorithm spanning tree algorithm Bridges do not manipulate frames 9 Need for Routing What do bridges do if some s are reachable only in multiple hops? 2 Bridge 3 d Bridge 4 What do bridges do if the path between two s is not unique? Bridge 1 1 5 Bridge 5 3 Bridge 2 4 10 5

Routing for Bridges Overall design goal: Complete transparency Plug-and-play Self-configuring without hardware or software changes Bridges should not impact operation of existing s Three parts to transparent bridges: (1) Forwarding of Frames (2) Learning of Addresses (3) Spanning Tree Algorithm 11 (1) Frame Forwarding Each bridge maintains a forwarding database with entries < MAC address, port, age> MAC address: port: age: host name or group address port number of bridge aging time of entry with interpretation: a machine with MAC address lies in direction of the port number from the bridge. The entry is age time units old. 12 6

(1) Frame Forwarding Assume a MAC frame arrives on port x. Port x Is MAC address of destination in forwarding database for ports A, B, or C? Port A Bridge 2 Port B Port C Found? Not found? Forward the frame on the appropriate port Flood the frame, i.e., send the frame on all ports except port x. 13 (2) Address Learning (Learning Bridges) Routing tables entries are set automatically with a simple heuristic: The source field of a frame that arrives on a port tells which hosts are reachable from this port. Src=x, Dest=y Src=x, Dest=y Port 1 Port 2 x is at Port 3 y is at Port 4 Port 4 Port 5 Src=y, Src=x, Dest=x Dest=y Src=x, Dest=y Src=y, Src=x, Dest=x Dest=y Port 3 Port 6 Src=x, Dest=y 14 7

(2) Address Learning (Learning Bridges) Algorithm: For each frame received, the bridge stores the source field in the forwarding database together with the port where the frame was received. All entries are deleted after some time (default is 15 seconds). Port 1 Port 2 x is at Port 3 y is at Port 4 Port 4 Port 5 Src=y, Dest=x Src=y, Dest=x Port 3 Port 6 15 Example Consider the following packets: (Src=A, Dest=F), (Src=C, Dest=A), (Src=E, Dest=C) What have the bridges learned? 16 8

Danger of Loops Consider the two s that are connected by two bridges. Assume host n is transmitting a frame F with unknown destination. What is happening? Bridges A and B flood the frame to 2. Bridge B sees F on 2 (with unknown destination), and copies the frame back to 1 Bridge A does the same. The copying continues Where s the problem? What s the solution? F Bridge A F 2 1 F host n F Bridge B F 17 Spanning Trees / Transparent Bridges A solution is to prevent loops in the topology IEEE 802.1d has an algorithm that builds and maintains a spanning tree in a dynamic environment using a distributed spanning tree (SPT) algorithm Bridges that run 802.1d are called transparent bridges Bridges exchange messages to configure the bridge (Configuration Bridge Protocol Data Unit, Configuration BPDUs) to build the tree. 18 9

Building the Spanning Tree Result of the SPT algorithm: One bridge is elected as the root bridge. Each bridge selects a root port ( R ), which is the port that leads to the shortest path to the root bridge For each there is one bridge that has a designated port ( D ) for this All port of a bridge that are neither the root port, nor a designated port, are blocked. Bridges never forward traffic on blocked ports. Question: What is the spanning tree in the figure? How does this algorithm prevent loops? R Bridge Bridge D D 2 D 1 Bridge 5 Bridge Bridge 3 4 d R R D R D 19 Details of the IEEE 802.1d SPT algorithm Bridges connected to the same exchange messages to configure the bridge (Configuration Bridge Protocol Data Unit, Configuration BPDUs) to build the tree. With the help of the BPDUs, bridges can: Elect a single bridge as the root bridge. Calculate the distance of the shortest path to the root bridge Each can determine a designated bridge, which is the bridge closest to the root. The designated bridge will forward packets towards the root bridge. Each bridge can determine a root port, the port that gives the best path to the root. Select ports to be included in the spanning tree. 20 10

Configuration BPDUs Destination MAC address Source MAC address Configuration Message protocol identifier version message type flags root ID Cost bridge ID port ID Set to 0 Set to 0 Set to 0 lowest bit is "topology change bit (TC bit) ID of root Cost of the path from the bridge sending this message ID of bridge sending this message Time between BPDUs from the root (default: 1sec) message age maximum age hello time forward delay Time between recalculations of the spanning tree (default: 15 secs) priority of configurable interface (used for loop detection) time since root sent a message on which this message is based 21 Concepts Each bridge as a unique identifier: Bridge ID = <MAC address + priority level> Note that a bridge has several MAC addresses (one for each port), but only one ID Each port within a bridge has a unique identifier (port ID). Root Bridge: The bridge with the lowest identifier is the root of the spanning tree. Root Port: Each bridge has a root port which identifies the next hop from a bridge to the root. 22 11

Concepts Root Path Cost: For each bridge, the cost of the min-cost path to the root. Assume it is measured in #hops to the root Designated Bridge, Designated Port: Single bridge on a that provides the minimal cost path to the root for this : - if two bridges have the same cost, select the one with highest priority - if the min-cost bridge has two or more ports on the, select the port with the lowest identifier Note: We assume that cost of a path is the number of hops. 23 Steps of Spanning Tree Algorithm 1. Determine the root bridge 2. Determine the root port on all other bridges 3. Determine the designated port on each Each bridge is sending out BPDUs that contain the following information: root ID cost bridge ID/port ID root bridge (what the sender thinks it is) root path cost for sending bridge Identifies sending bridge 24 12

Ordering of Messages We can order BPDU messages with the following ordering relation << : M1 ID R1 C1 ID B1 < ID R2 C2 ID B2 If (R1 < R2) M1<< M2 elseif ((R1 == R2) and (C1 < C2)) M1 << M2 elseif ((R1 == R2) and (C1 == C2) and (B1 < B2)) M1 << M2 M2 25 Determine the Root Bridge Initially, all bridges assume they are the root bridge. Each bridge B sends BPDUs of this form on its s: B 0 B Each bridge looks at the BPDUs received on all its ports and its own transmitted BPDUs. Root bridge is the smallest received root ID that has been received so far (Whenever a smaller ID arrives, the root is updated) 26 13

Calculate the Root Path Cost Determine the Root Port At this time: A bridge B has a belief of who the root is, say R. Bridge B determines the Root Path Cost (Cost) as follows: If B = R : Cost = 0. If B R: Cost = {Smallest Cost in any of BPDUs that contains root ID R} + 1 B s root port is the port from which B received the lowest cost path to R (in terms of relation << ). Knowing R and Cost, B can generate its BPDU (but will not necessarily send it out): R Cost B 27 Calculate the Designated Bridge Determine the Designated Port At this time: B has generated its BPDU R Cost B B will send this BPDU on one of its ports, say port x, only if its BPDU is lower (via relation << ) than any BPDU that B received from port x. In this case, B also assumes that it is the designated bridge for the Port x to which the port connects. Bridge B Port A Port B Port C 28 14

Selecting the Ports for the Spanning Tree At this time: Bridge B has calculated the root, the root path cost, and the designated bridge for each. Now B can decide which ports are in the spanning tree: B s root port is part of the spanning tree All ports for which B is the designated bridge are part of the spanning tree. B s ports that are in the spanning tree will forward packets (=forwarding state) B s ports that are not in the spanning tree will not forward packets (=blocking state) 29 Example network Bridge ID 7 Bridge ID 5 port A port B port C port A port B port C Bridge ID 3 port A port B Ethernet0/0 10.0.3.2/24 port A port B Bridge ID 1 port A port C port B Bridge ID 2 port B port C port A port D Bridge ID 6 30 15

Example Assume that all bridges send out their BPDU s once per second, and assume that all bridges send their BPDUs at the same time. Assume that all bridges are turned on simultaneously at time T=0 sec. Use the following table to write the BPDUs which are sent by the bridges. For each cell, include: the BPDU (For each BPDU, only provide the <root, cost, bridge> fields) the ports on which the BPDUs is transmitted (write none if the BPDU is not sent on any of the ports) See next page. 31 Table for example Bridge 1 Bridge 2 Bridge 3 Bridge 5 Bridge 6 Bridge 7 T=0sec 1,0,1 2,0,2 3,0,3 5,0,5 6,0,6 7,0,7 T=1sec 1,0,1 2,0,2 1,1,3 1,1,5 1,1,6 1,1,7 T=2sec 1,0,1 1,2,2 1,1,3 1,1,5 1,1,6 1,1,7 32 16

Results for example Bridge 1 Bridge 2 Bridge 3 Bridge 5 Bridge 6 Bridge 7 Root Port Designated Ports / A,B A / B A,C A B,C B D B / Blocked ports / B / / A,C A,C 33 17