UPPER LAYER SWITCHING



Similar documents
DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

Data Communication Networks and Converged Networks

Ethernet. Ethernet. Network Devices

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Communications and Computer Networks

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Internetworking and IP Address

Computer Networks CS321

Computer Networks Vs. Distributed Systems

LAN Switching and VLANs

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Overview of Computer Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Network Models OSI vs. TCP/IP

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Transport and Network Layer

IMPLEMENTING VOICE OVER IP

The OSI and TCP/IP Models. Lesson 2

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Protocol Data Units and Encapsulation

Based on Computer Networking, 4 th Edition by Kurose and Ross

The OSI Model: Understanding the Seven Layers of Computer Networks

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

INTRODUCTION TO VOICE OVER IP

Selecting a Firewall Gilbert Held

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Data Communication and Computer Network

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Technical Support Information Belkin internal use only

Lecture Computer Networks

Overview of Routing between Virtual LANs

The IP Transmission Process. V1.4: Geoff Bennett

Mathatma Gandhi University

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Communication Systems Internetworking (Bridges & Co)

Exhibit n.2: The layers of a hierarchical network

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

BASIC ANALYSIS OF TCP/IP NETWORKS

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Chapter 9. IP Secure

CSE 3461 / 5461: Computer Networking & Internet Technologies

Computer Networks/DV2 Lab

- Hubs vs. Switches vs. Routers -

IT4405 Computer Networks (Compulsory)

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Transport Layer Protocols

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Protocol Architecture

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

SSVP SIP School VoIP Professional Certification

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Top-Down Network Design

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Internet Security Firewalls

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Chapter 5. Data Communication And Internet Technology

What is VLAN Routing?

Network Models and Protocols

Lab VI Capturing and monitoring the network traffic

Multi-Homing Dual WAN Firewall Router

Network Security TCP/IP Refresher

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Final for ECE374 05/06/13 Solution!!

LANs and VLANs A Simplified Tutorial

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Overview - Using ADAMS With a Firewall

Chapter 2 TCP/IP Networking Basics

The Network Layer Functions: Congestion Control

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Overview - Using ADAMS With a Firewall

Introduction to Network Security Lab 1 - Wireshark

Candidates should attempt FOUR questions. All questions carry 25 marks.

Basic Network Configuration

Understanding Layer 2, 3, and 4 Protocols

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

How To Understand and Configure Your Network for IntraVUE

Review: Lecture 1 - Internet History

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Introduction to computer networks and Cloud Computing

Implementation of Virtual Local Area Network using network simulator

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

IP Filter/Firewall Setup

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CS101 Lecture 19: Internetworking. What You ll Learn Today

Transcription:

52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches to reach the market operated at Layer 2 of the ISO Reference Model. In doing, so they represented a multi-port bridge because they would forward, filter, or flood frames based on the destination MAC address in each frame. Exhibit 1 illustrates a symmetrical 4-by-4 or 16-port LAN switch. As frames reach the switch from either directly connected workstations, servers, or shared media hubs, the switch first checks the destination address of the frame. In doing so, the switch searches its port-address table. The port-address table represents a linear table of MAC addresses associated with each port that the switch learns by noting the source address in each frame. The first time the switch is powered on, its port-address table is empty. Thus, the first frame that arrives at the switch cannot have a match occur between the destination address in the frame and the switch s port-address table. This means the switch will record the source address of the frame in its port-address table and associate that address with the port where the frame entered the switch, flooding the frame onto all ports other than the port where the frame entered the switch. Thus, the switch initially is not too efficient; however, as entries build up into its port-address table, it gains efficiency. For example, the 16-port switch shown in Exhibit 1 has the capability PAYOFF IDEA Over the past decade, LAN switches grew in their use in organizational networks from experimental devices to the point where they have replaced the use of a majority of conventional hubs. At the same time, LAN switches made a significant penetration of organizational networks, and numerous features were added to different vendor products. One of those features that significantly alters the performance capability of a LAN switch is its ability to switch at layers above the media access control (MAC) layer. By understanding how LAN switches can operate above the MAC layer, one can obtain an appreciation for how this additional capability can be used in a network. This, in turn, will enable one to consider if the extra cost of LAN switches that operate at higher layers in the International Standards Organization (ISO) Open System Interconnection (OSI) Reference Model is warranted, or if a switch that operates at a lower layer in the reference model might satisfy one s organizational requirements.

EXHIBIT 1 A 16-Port LAN Switch with 8 Simultaneous Cross- Connections to support a maximum of 16/2, or 8 simultaneous conversations on a frame-by-frame basis. If each port is a Fast Ethernet port operating at 100 Mbps, then the maximum throughput of the switch becomes 100 Mbps 8, or 800 Mbps. In comparison, a Fast Ethernet shared hub is limited to a maximum data transfer of 100 Mbps. UPPER LAYER OPERATIONS To obtain an appreciation for the manner in which a LAN switch can be modified to operate at higher layers in the ISO Reference Model requires a review of how higher layer protocols are transported in a LAN frame. Because there are numerous LAN and WAN protocols, the focus here is on the use of Ethernet to transport the TCP/IP protocol suite because these two protocols represent the vast majority of LAN and WAN protocols in use today. Exhibit 2 illustrates the formation of an Ethernet LAN frame to transport the TCP/IP protocol suite. In examining Exhibit 2, note that the TCP/IP protocol suite predated the effort of the International Standards Organization (ISO) in developing its Open System Interconnection Reference Model. Due to the development of the TCP/IP protocol suite prior to the OSI Reference Model, the suite used five layers, with its fifth layer representing Layers 5 through 7 (Session, Presentation, and Application) of the OSI Reference Model. As TCP/IP application data is generated, an applicable transport layer protocol is added. Although TCP and UDP are shown as the transport headers in Exhibit 2, in actuality the protocol suite supports additional transport layer protocols. However, TCP and UDP probably account for in excess of 99 percent of transport layer protocols used in the suite.

EXHIBIT 2 The Transport of the TCP/IP Protocol Suite by an Ethernet LAN Frame

At the transport layer, the destination port number in the TCP or UPD header destination identifies the application being transported. For example, TCP port 21 identifies Telnet, while port 80 identifies HyperText Transport Protocol (HTTP) Web traffic being transported by TCP. As one moves down the TCP/IP protocol suite, the IP header is added at the network layer. The IP header includes both a 32-bit destination address and a 32-bit source address field that identify the recipient and originator of the packet flowing over the WAN. At the local area network (MAC layer), packets are transported via LAN frames. In an Ethernet environment, the LAN header consists of a preamble for synchronization, destination and source MAC addresses, and a length field. The Ethernet payload field is limited to transporting a maximum of 1500 bytes, whereas an IP datagram can be up to 65 Kbytes in length. Therefore, to enable datagrams with a length exceeding 1500 bytes to be transported via an Ethernet LAN, a router is responsible for fragmenting datagrams to ensure they fit within the Ethernet payload. ADDRESS TRANSLATION At Layer 2, MAC addresses are used, with frames delivered based on the destination MAC address contained in a frame. Because IP datagrams are routed based on the destination IP address contained in the IP header, one might be puzzled as to the manner by which an IP datagram is delivered to a destination on an Ethernet network that uses MAC addresses. The answer to this is the Address Resolution Protocol (ARP). When a router receives an IP datagram for delivery onto a LAN, it needs to create a LAN frame with a MAC address that corresponds to the destination IP address in the datagram. The router will first check its cache memory to see if it previously learned the MAC address required for the delivery of the datagram. Assuming that that address was not previously learned, the router will broadcast an ARP frame onto the LAN. This frame will contain the destination IP address of the datagram that is known and set the field of the MAC addresses to all zeroes because that value is not known. The LAN station that has the IP address in the ARP frame will copy that frame off the LAN, insert its MAC address into the frame, and direct the frame back to the router. The ARP response informs the router of the MAC address it needs to use to create a frame to deliver the IP datagram. While this method of address resolution is relatively efficient, when the ARP frame is broadcast and a response flows back to the issuing device, other traffic is precluded from flowing on the network. Thus, a large number of address resolution operations can adversely affect the throughput obtainable on the LAN. Now that one has an appreciation for the manner by which IP datagrams are transported via Ethernet frames and the address translation process, one can focus on how upper layer switching occurs, how different types of upper layer

switches can be used, and the advantages and disadvantages associated with different higher layer switching methods. LAYER 3 SWITCHING The first method of upper layer switching to be incorporated into LAN switches is what is referred to as Layer 3 switching. A Layer 3 switch looks further into each Ethernet frame (see Exhibit 2) to determine the destination IP address being transported. The switch then uses the IP address as a mechanism for the delivery of frames. The key advantage associated with a Layer 3 switch is the fact that it can be configured to route frames based on network segment addressing. For example, if the organization has the Class C IP network address of 205.131.175.0, one might have previously subnetted the network into a number of subnets. If one used eight subnets, one would then reduce the host address portion of the last byte of the network address to 5 bits because 3 bits would be used for the subnet. Using 5 bits for each subnet would enable a maximum of 2 5 2, or 30, devices per subnet because a subnet address of all zeroes and a subnet address of all ones cannot be used. This means one could place a group of up to 30 devices on a conventional hub and connect each hub to one of eight switch ports to enable the switch to route traffic to their applicable destination. Because a Layer 3 switch looks inside each frame to determine the IP address, this eliminates the necessity to perform ARP. In addition, broadcasts are normally restricted to each segment, which further enhances the efficiency of the Layer 3 switch. While the use of a Layer 3 switch can reduce broadcasts and eliminate ARP, its level of overall switching performance is less than that of a Layer 2 switch. This is because a Layer 3 switch must look further into each frame to make its switching decisions based on the destination IP address transported within a frame. In addition, because some IP datagrams can be transported by multiple frames, the Layer 3 switch must keep track of this fact and know that subsequent frames without the IP header are part of a flow and must be routed to the same destination. Needless to say, this adds to the complexity of the software used to perform Layer 3 switching as well as its throughput capability. Another disadvantage associated with a Layer 3 switch is the fact that it is not self-learning. This means one must take the time to configure the switch, with the amount of time required to do so based on the number of ports on the switch and the ease of using its configuration screen setup facility. Although the additional software required to perform switching at the network layer initially resulted in a high premium for Layer 3 switching, today this capability can be included in some Layer 2/3 LAN switches without any additional cost. What the network manager and LAN admin-

istrator must consider is if the lower rate of frame processing, typically expressed in frames per second for frame lengths of 128, 256, 512, and 1526 bytes, is sufficient to support the application. Unless the organization is transporting real-time voice where any additional delay can be critical to the capability to reconstruct digitized voice, the additional delay associated with the use of Layer 3 switching is essentially transparent to FTP and Web traffic. Two examples of popular Layer 3 switches are the 3Com Switch 4005 and the Cisco Systems Catalyst 4000. The 3Com Switch 4005 represents a low-cost, high-performance modular switch in a 14-slot chassis. The switch can be configured to support up to 24 Gigabit Ethernet or 96 Fast Ethernet ports and supports IP routing at Layer 3 of the OSI Reference Model. The Cisco 4000 provides a similar capability by supporting 24 Gigabit Ethernet or 96 Fast Ethernet connections. Both vendors also manufacture numerous additional Layer 3 switches that extend the support of IP switching to ATM, Token Ring, and even FDDI transports by looking into the Layer 2 frames to make Layer 3 switching decisions. LAYER 4 SWITCHING One of the limitations associated with Layer 3 switching is the fact that it does not include the capability to recognize applications and act upon the application being transported. Layer 4 switching solves this limitation by looking further into the frame so that it reads the transport header, such as the TCP header or the UDP header. As previously noted, the TCP and UDP headers include a destination port field, the value of which identifies the application being transported. By reading further into the LAN frame, a Layer 4 switch obtains the ability to be configured to route or switch frames based on the application being transported. For example, a Layer 4 switch could be configured to route all FTP traffic to one port, all Telnet traffic to a second port, all Web traffic to a third port, etc. By itself, a Layer 4 switch is not too practical. However, additional software in the form of load balancing has resulted in Layer 4 switches being referred to as an application layer switch that performs certain functions to include load balancing. Because a Layer 4 switch looks further into a LAN frame, its frame processing rate is a bit slower (no pun intended) than a Layer 3 switch. In addition, similar to a Layer 3 switch, a Layer 4 switch must be configured. However, the biggest disadvantage of a Layer 4 switch is the fact that for many organizations its use is not practical. The reason for a Layer 4 switch being impractical for many organizations results from the fact that many organizations commonly run multiple FTP and Web servers and until recently were forced to purchase expensive load balancing hardware that would route frames based on both the contents of the destination port in the TCP or UDP header, previously routed traffic, and the

total number of configured servers. Because many organizations that maintained multiple servers and a load balancer also used LAN switches, the addition of load balancing to a Layer 4 LAN switch represented a natural evolution of LAN switching. Such switches are now commonly referred to as application layer switches, of which load balancing represents one of several popular applications. Other applications included in certain Layer 4 LAN switches include authentication, authorization, and accounting (AAA), which were previously performed by a separate server connected to a LAN. RECOMMENDED COURSE OF ACTION Similar to any hardware product, the selection of an applicable LAN switch should be based on an organization s requirements. If the organization needs to transport time-critical frames, one will probably want to use a Layer 2 switch. If the organization needs to move frames directly onto different networks, one will probably want to consider a Layer 3 switch. If the organization requires the routing of traffic based on the application being transported, a Layer 4 switch should be considered. However, as noted earlier in this article, one may wish to support a specific application within a Layer 4 switch, such as load balancing. In this event, the use of an application layer LAN switch should be considered. By matching organizational requirements against the capabilities of different types of LAN switches, the selection process will result in a device best suited to satisfy organizational requirements. Gilbert Held is an award-winning lecturer and author. Gil is the author of over 40 books and 400 technical articles. Some of Gil s published titles include High Speed LAN Switching, published by John Wiley & Sons, and Internetworking Voice and Data Networks, 3rd edition, published by Osborne McGraw-Hill. Gil can be reached via email at gil_held@yahoo.com.