LAN switching and Bridges

Similar documents
Ethernet (LAN switching)

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Level 2 Routing: LAN Bridges and Switches

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

CORPORATE NETWORKING

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Communication Systems Internetworking (Bridges & Co)

Internet Packets. Forwarding Datagrams

Based on Computer Networking, 4 th Edition by Kurose and Ross

IP Multicasting. Applications with multiple receivers

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Instructor Notes for Lab 3

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

ISOM3380 Advanced Network Management. Spring Course Description

Data Communication Networks and Converged Networks

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

The ABCs of Spanning Tree Protocol

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Switching in an Enterprise Network

Layer 3 Network + Dedicated Internet Connectivity

How To Configure InterVLAN Routing on Layer 3 Switches

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

CS335 Sample Questions for Exam #2

Transport and Network Layer

Chapter 3. Enterprise Campus Network Design

Router and Routing Basics

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

Overview of Routing between Virtual LANs

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

The IP Transmission Process. V1.4: Geoff Bennett

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Implementation of Virtual Local Area Network using network simulator

- Hubs vs. Switches vs. Routers -

Layer 3 Routing User s Manual

Leased Line + Remote Dial-in connectivity

COMPUTER NETWORKS - LAN Interconnection

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Configuring a Gateway of Last Resort Using IP Commands

TRILL for Data Center Networks

Technical Support Information Belkin internal use only

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

RARP: Reverse Address Resolution Protocol

June Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Course Contents CCNP (CISco certified network professional)

Portland: how to use the topology feature of the datacenter network to scale routing and forwarding

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

LAN Switching and VLANs

Fundamentals of Switching

Administrative Distance

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Table of Contents. Cisco How Does Load Balancing Work?

Scaling 10Gb/s Clustering at Wire-Speed

Packet Tracer 3 Lab VLSM 2 Solution

Communications and Computer Networks

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

VXLAN: Scaling Data Center Capacity. White Paper

Route Discovery Protocols

Walmart s Data Center. Amadeus Data Center. Google s Data Center. Data Center Evolution 1.0. Data Center Evolution 2.0

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

UPPER LAYER SWITCHING

CCT vs. CCENT Skill Set Comparison

Chapter 10 Link-State Routing Protocols

Link-State Routing Protocols

Cisco 12 CCNA Certification

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

LAN Topologies C H A P T E R. Unicast

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Chapter 4. Distance Vector Routing Protocols

Interconnecting Cisco Networking Devices Part 2

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Bridgewalling - Using Netfilter in Bridge Mode

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Candidates should attempt FOUR questions. All questions carry 25 marks.

TRILL Large Layer 2 Network Solution

Network layer: Overview. Network layer functions IP Routing and forwarding

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

GregSowell.com. Mikrotik Routing

How To Switch In Sonicos Enhanced (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

EECS 489 Winter 2010 Midterm Exam

Internet Control Message Protocol (ICMP)

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Transcription:

LAN switching and s Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging) and routing. Then discusses LAN switching, including learning bridge algorithm, transparent bridging, and the spanning tree protocol. 1 Outline Interconnection devices s/lan switches vs. Routers s Learning s Transparent bridges 2 1

Introduction There are many different devices for interconnecting networks 3 Ethernet Hub Used to connect hosts to Ethernet LAN and to connect multiple Ethernet LANs Collisions are propagated 4 2

s/lan switches We will use the terms bridge and LAN switch (or Ethernet switch in the context of Ethernet) interchangeably. Interconnect multiple LAN, possibly with different type s operate at the Data Link Layer (Layer 2) 5 Ethernet Hubs vs. Ethernet Switches An Ethernet switch is a packet switch for Ethernet frames Buffering of frames prevents collisions. Each port is isolated and builds its own collision domain An Ethernet Hub does not perform buffering: Collisions occur if two frames arrive at the same time. Hub Switch HighSpeed Backplane Input Buffers Output Buffers 6 3

Dual Speed Ethernet hub Dual-speed hubs operate at 10 Mbps and 100 Mbps per second Conceptually these hubs operate like two Ethernet hubs separated by a bridge Dual-Speed Ethernet Hub 7 Routers Routers operate at the Network Layer (Layer 3) Interconnect IP networks 8 4

Gateways The term Gateway is used with different meanings in different contexts Gateway is a generic term for routers (Level 3) Gateway is also used for a device that interconnects different Layer 3 networks and which performs translation of protocols ( Multi-protocol router ) 9 s versus Routers An enterprise network (e.g., university network) with a large number of local area networks (LANs) can use routers or bridges 1980s: LANs interconnection via bridges Late 1980s and early 1990s: increasingly use of routers Since mid1990s: LAN switches replace most routers 10 5

A Routed Enterprise Network Internet Router Hub FDDI FDDI 11 A Switched Enterprise Network Internet Router Switch 12 6

Example: Univ. of Virginia CS Department Network Design of the network architecture (Spring 2000) There is no router! 350T Gigabit Ethernet Switch 100/Giga Ethernet Switch 350T 350T 350T 350T 350T 100 Mbps Ethernet Switch 350T 350T 350T 350T 350T 13 s versus Routers Routers s Each host s IP address must be configured MAC addresses are hardwired If network is reconfigured, IP addresses may need to be reassigned Routing done via RIP or OSPF Each router manipulates packet header (e.g., reduces TTL field) No network configuration needed No routing protocol needed (sort of) learning bridge algorithm spanning tree algorithm s do not manipulate frames 14 7

Need for Routing What do bridges do if some LANs are reachable only in multiple hops? LAN 2 3 d 4 What do bridges do if the path between two LANs is not unique? 1 LAN 1 LAN 5 5 LAN 3 2 LAN 4 15 Transparent s Three principal approaches can be found: Fixed Routing Source Routing Spanning Tree Routing (IEEE 802.1d) We only discuss the last one in detail. s that execute the spanning tree algorithm are called transparent bridges 16 8

Transparent s Overall design goal: Complete transparency Plug-and-play Self-configuring without hardware or software changes s should not impact operation of existing LANs Three parts to transparent bridges: (1) Forwarding of Frames (2) Learning of Addresses (3) Spanning Tree Algorithm 17 (1) Frame Forwarding Each bridge maintains a forwarding database with entries < MAC address, port, age> MAC address: port: age: host name or group address port number of bridge aging time of entry with interpretation: a machine with MAC address lies in direction of the port number from the bridge. The entry is age time units old. 18 9

(1) Frame Forwarding Assume a MAC frame arrives on port x. Port x Is MAC address of destination in forwarding database for ports A, B, or C? Port A 2 Port B Port C Found? Not found? Forward the frame on the appropriate port Flood the frame, i.e., send the frame on all ports except port x. 19 (2) Address Learning (Learning s) Routing tables entries are set automatically with a simple heuristic: The source field of a frame that arrives on a port tells which hosts are reachable from this port. Src=x, Dest=y Src=x, Dest=y Port 1 Port 2 x is at Port 3 y is at Port 4 Port 4 Port 5 Src=y, Src=x, Dest=x Dest=y Src=x, Dest=y Src=y, Src=x, Dest=x Dest=y Port 3 Port 6 Src=x, Dest=y 20 10

(2) Address Learning (Learning s) Algorithm: For each frame received, the source stores the source field in the forwarding database together with the port where the frame was received. All entries are deleted after some time (default is 15 seconds). Port 1 Port 2 x is at Port 3 y is at Port 4 Port 4 Port 5 Src=y, Dest=x Src=y, Dest=x Port 3 Port 6 21 Example Consider the following packets: (Src=A, Dest=F), (Src=C, Dest=A), (Src=E, Dest=C) What have the bridges learned? 2 2 Port1 Port2 Port1 Port2 LAN 1 LAN 2 LAN 3 A B C D E F 22 11

Danger of Loops Consider the two LANs that are connected by two bridges. Assume host n is transmitting a frame F with unknown destination. What is happening? s A and B flood the frame to LAN 2. B sees F on LAN 2 (with unknown destination), and copies the frame back to LAN 1 A does the same. The copying continues A Where s the problem? What s the solution? F F LAN 2 LAN 1 F host n F B F 23 Spanning Trees / Transparent s A solution is to prevent loops in the topology LAN 2 d IEEE 802.1d has an algorithm that organizes the bridges as spanning tree in a dynamic environment Note: Trees don t have loops s that run 802.1d are called transparent bridges 3 4 1 LAN 5 5 LAN 1 s exchange messages to configure the bridge (Configuration Protocol Data Unit, Configuration BPDUs) to build the tree. LAN 3 2 LAN 4 24 12

Configuration BPDUs 25 What do the BPDUs do? With the help of the BPDUs, bridges can: Elect a single bridge as the root bridge. Calculate the distance of the shortest path to the root bridge Each LAN can determine a designated bridge, which is the bridge closest to the root. The designated bridge will forward packets towards the root bridge. Each bridge can determine a root port, the port that gives the best path to the root. Select ports to be included in the spanning tree. 26 13

Concepts Each bridge as a unique identifier: ID ID = { Priority : 2 bytes; MAC address: 6 bytes} Priority is configured MAC address is lowest MAC addresses of all ports Each port within a bridge has a unique identifier (port ID). Root : The bridge with the lowest identifier is the root of the spanning tree. Root Port: Each bridge has a root port which identifies the next hop from a bridge to the root. 27 Concepts Root Path Cost: For each bridge, the cost of the min-cost path to the root. Assume it is measured in #hops to the root Designated, Designated Port: Single bridge on a LAN that provides the minimal cost path to the root for this LAN: - if two bridges have the same cost, select the one with highest priority - if the min-cost bridge has two or more ports on the LAN, select the port with the lowest identifier Note: We assume that cost of a path is the number of hops. 28 14

Steps of Spanning Tree Algorithm Each bridge is sending out BPDUs that contain the following information: root ID cost bridge ID port ID root bridge (what the sender thinks it is) root path cost for sending bridge Identifies sending bridge Identifies the sending port The transmission of BPDUs results in the distributed computation of a spanning tree The convergence of the algorithm is very quick 29 Ordering of Messages We define an ordering of BPDU messages ID R1 C1 ID B1 M1 ID P1 ID R2 C2 ID B2 ID P2 M2 We say M1 advertises a better path than M2 ( M1<<M2 ) if (R1 < R2), Or (R1 == R2) and (C1 < C2), Or (R1 == R2) and (C1 == C2) and (B1 < B2), Or (R1 == R2) and (C1 == C2) and (B1 == B2) and (P1 < P2) 30 15

Initializing the Spanning Tree Protocol Initially, all bridges assume they are the root bridge. Each bridge B sends BPDUs of this form on its LANs from each port P: B 0 B P Each bridge looks at the BPDUs received on all its ports and its own transmitted BPDUs. Root bridge is the smallest received root ID that has been received so far (Whenever a smaller ID arrives, the root is updated) 31 Operations of Spanning Tree Protocol Each bridge B looks on all its ports for BPDUs that are better than its own BPDUs Suppose a bridge with BPDU: M1 receives a better BPDU: M2 R1 C1 B1 P1 R2 C2 B2 P2 Then it will update the BPDU to: R2 C2+1 B1 P1 However, the new BPDU is not necessarily sent out On each bridge, the port where the best BPDU (via relation << ) was received is the root port of the bridge. 32 16

When to send a BPDU Say, B has generated a BPDU for each port x R Cost B x B will send this BPDU on port x only if its BPDU is better (via relation << ) than any BPDU that B received from port x. In this case, B also assumes that it is the designated bridge for the LAN to which the port connects Port A Port x B Port B Port C And port x is the designated port of that LAN 33 Selecting the Ports for the Spanning Tree Each bridges makes a local decision which of its ports are part of the spanning tree Now B can decide which ports are in the spanning tree: B s root port is part of the spanning tree All designated ports are part of the spanning tree All other ports are not part of the spanning tree B s ports that are in the spanning tree will forward packets (=forwarding state) B s ports that are not in the spanning tree will not forward packets (=blocking state) 34 17

Building the Spanning Tree Consider the network on the right. Assume that the bridges have calculated the designated ports (D) and the root ports (P) as indicated. What is the spanning tree? On each LAN, connect R ports to the D ports on this LAN D LAN 2 D LAN 1 LAN 5 R D R LAN 3 LAN 4 d R D R D 35 Example Assume that all bridges send out their BPDU s once per second, and assume that all bridges send their BPDUs at the same time Assume that all bridges are turned on simultaneously at time T=0 sec. 36 18

Example: BPDU s sent by the bridges 1 2 3 5 6 7 T=0sec T=1sec T=2sec 37 Example: Settings after convergence 1 2 3 5 6 7 Root Port Designated Ports Blocked ports Resulting tree: 38 19