Communication Systems Internetworking (Bridges & Co)



Similar documents
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Based on Computer Networking, 4 th Edition by Kurose and Ross

The Network Layer Functions: Congestion Control

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Overview of Computer Networks

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Overview of Routing between Virtual LANs

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Communication Networks and Converged Networks

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CORPORATE NETWORKING

UPPER LAYER SWITCHING

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Introduction to LAN/WAN. Network Layer (part II)

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Computer Networks Vs. Distributed Systems

Transport Layer Protocols

CSE 3461 / 5461: Computer Networking & Internet Technologies

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Transport and Network Layer

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Communications and Computer Networks

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Exhibit n.2: The layers of a hierarchical network

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Computer Networks CS321

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

The OSI and TCP/IP Models. Lesson 2

Written examination in Computer Networks

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

This course has been retired. View the schedule of current <a href=

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture 8. IP Fundamentals

Architecture and Performance of the Internet

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Chapter 9. IP Secure

Encapsulating Voice in IP Packets

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

High-Level Data Link Control

Network Security TCP/IP Refresher

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Chapter 5. Data Communication And Internet Technology

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

MANAGEMENT INFORMATION SYSTEMS 8/E

- Hubs vs. Switches vs. Routers -

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Data Communication and Computer Network

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

How do I get to

Computer Networks III

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

Ethernet (LAN switching)

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Understanding Layer 2, 3, and 4 Protocols

Lecture Computer Networks

Voice over IP. Presentation Outline. Objectives

ELEC3030 Computer Networks

RARP: Reverse Address Resolution Protocol

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Chapter 2 - The TCP/IP and OSI Networking Models

Mathatma Gandhi University

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

IP - The Internet Protocol

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Distributed Systems 3. Network Quality of Service (QoS)

Post-Class Quiz: Telecommunication & Network Security Domain

Local-Area Network -LAN

November Defining the Value of MPLS VPNs

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Technical Support Information Belkin internal use only

DATA COMMUNICATION AND NETWORKS

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

524 Computer Networks

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Computer Networking: A Survey

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

11/22/

Networking Basics and Network Security

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

SSVVP SIP School VVoIP Professional Certification

Lecture 28: Internet Protocols

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

The OSI Model: Understanding the Seven Layers of Computer Networks

Computer Networking Networks

SSVP SIP School VoIP Professional Certification

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

WAN Data Link Protocols

SBSCET, Firozpur (Punjab), India

Resiliency in Ethernet Based Transport Networks

Transcription:

Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de 11-l3gate_e.fm 1 18.Dezember.02

Scope L5 L4 L3 L2 L1 Complementary Courses: Multimedia Systems, Distributed Systems, Mobile Communications, Security, Web, Mobile+UbiComp, QoS Applications Application Layer (Anwendung) Transport Layer (Transport) Network Layer (Vermittlung) Data Link Layer (Sicherung) Physical Layer (Bitübertragung) & Addressing Transitions P2P Email Files Telnet Internet: TCP, UDP Internet: IP Web LAN, MAN High-Speed LAN, WAN IP-Tel: Signal. H.323 SIP Moblie IP Mobile Communications MM COM - QoS specific Media Data Flow RT(C)P Transport Network Other Lectures of ET/IT & Computer Science Introduction Security 11-l3gate_e.fm 2 18.Dezember.02

Overview 1. Motivation 2. Repeater (Physical Layer) 3. Bridges (Data Link Layer) 11-l3gate_e.fm 3 18.Dezember.02

1. Motivation Many heterogenous networks (in the past, nowadays and in future as well) Heterogeneous network technologies (data link): WAN: telephone networks, ISDN, ATM,... mobile communication: GSM, DECT, satellite networks,... LAN: 802.3, 802.4, 802.5, 802.11,... MAN: FDDI, DQDB,... Heterogeneous protocol architectures: SNA (> 20 000 networks) DECNET (> 2000) TCP/IP (world of Unix, also world of PCs) Novell NCP/IPX, Appletalk (world of PCs in former times) OSI,... Heterogeneous application architectures (with same overall purpose): Email Information access (WWW, WAP) No changes in the near future, because high investments, migration difficult decentralized investment decisions (departments install different networks) constantly new technologies 11-l3gate_e.fm 4 18.Dezember.02

Networks can Differ # Item Service offered Protocols Addressing Multicasting Packet size Quality of service Error handling Flow control Congestion control Security Parameters Accounting Some Possibilities Connection oriented vs. connectionless IP, IPX, SNA, ATM, MPLS, AppleTalk, etc. Flat (802) vs hierarchical (IP) Present or absent (same for broadcasting) Maximum different among nearly any two networks Present or absent; many different flavors Reliable, ordered, unreliable, or unordered delivery Sliding window, rate control, other, or none Leaky bucket, token bucket, RED, choke packets, etc. Privacy rules, encryption, etc. Different timeouts, flow specifications, etc. By connect time, by packet, by byte, or not at all 11-l3gate_e.fm 5 18.Dezember.02

Interconnecting Different Networks Host 802.11 LAN G LAN-LAN 802.5 LAN 802.3 LAN G LAN-WAN ATM WAN WAN-WAN Why is it desirable to connect (heterogeneous) networks? resource sharing (CPU, data bases, programs, mailboxes,...) increased availability... G G G SNA-WAN LAN-WAN-LAN 802.3 LAN 11-l3gate_e.fm 6 18.Dezember.02

Connecting Networks by "Relays" 11-l3gate_e.fm 7 18.Dezember.02 End system 5 4 3 2 1 Intermediate system Gateway Router Bridge Repeater End system Layer 1: Repeater / Hub copies bits between cable segments works solely as a repeater (does not modify the information) does not influence the traffic between networks example: connecting 802.3 cable segments (larger range) Layer 2: Bridge / Switch relays frames between LANs (MAC level) minor frame modifications, increases the number of stations example: 802.x to 802.y 5 4 3 2 1 Application Layer Transport Layer Network Layer Data link Layer Physical Layer

Connecting Networks by "Relays" (2) Layer 3: Router (or Layer 3 Gateway) relays packets between different networks (modifies the packets) (converts different addressing concepts) (example: X.25 to SNA) Layer 4-5: Gateway (or Protocol Converter) converts one protocol into another one (usually no 1-to-1 mapping of functions) example: TCP in ISO Transport Protocol, OSI Mail (MOTIS) in ARPA Internet Mail (RFC 822) change of media encoding (transcoding) Note: names (in products) are often intermixed e.g. bridge and switch Basic components 2 or more network connections connection entity control entity 2 Paths control path and data path 11-l3gate_e.fm 8 18.Dezember.02

2. Repeater (Physical Layer) example: IEEE 802.3 configuration Function to amplify the electrical signals to increase the range 11-l3gate_e.fm 9 18.Dezember.02 Repeater

3. Bridges (Data Link Layer) Tasks: coupling of different LANs scalability of networks to increase capacity to cover larger distances B B B B Backbone- LAN File Server 2,5km to increase reliability bridge serves as "fire door" to improve security stations can work in a promiscuous mode, i.e., read all frames on the network bridge placement limits the spreading of information to offer independence from protocols (IP, OSI,...) in opposite to routers Important goal: to achieve TRANSPARENCY change attachment point without changes to HW, SW, configuration tables machines on any two segments should be able to communicate without regard to types of LANs used (directly or indirectly) B LAN 2,5km 802.3 LAN 11-l3gate_e.fm 10 18.Dezember.02

3.1 Connecting 2 Different Networks: IEEE 802.x - Bridges Example: 802.11 (Wireless LAN) and 802.3 (Ethernet) Network LLC MAC Physical 802.11 Host A Pkt Pkt Pkt 802.11 Pkt 802.11 Wireless LAN Pkt 802.11 Pkt 802.11 Pkt Bridge Approach LLC as common layer frames are routed to the respective MAC bridge contains its own implementation for each different MAC for each physical layer the corresponding implementation Pkt 802.3 Pkt 802.3 Pkt 802.3 802.3 Pkt Ethernet LAN Host B Pkt Pkt Pkt 802.3 Pkt 11-l3gate_e.fm 11 18.Dezember.02

802.x 802.y: Tasks Some different 802.x frame formats: there are even more different frame formats... some fields are technically necessary in one case but useless in another duration of 802.11 802.3 802.4 802.5 Preamble Frame control Start delimiter Access control Frame Destination Source End control address address Length Data Pad Checksum delimiter Duration Addr 1 Addr 2 Addr 3 Addr 4 802.11 Seq Data Checksum Frame status 11-l3gate_e.fm 12 18.Dezember.02

802.x 802.y: Tasks (2) Different transmission rates (4/10/11/16/100/1000/... Mbps) bridge between fast LAN and slow LAN (or several LANs to one) link can be overloaded buffering frames which cannot be transmitted immediately potentially many frames must be buffered within bridge (end-to-end) retransmission timer (at higher level) tries n*retransmissions but then reports that end system is not available Different frame lengths 802.3: 1518 bytes, 802.4: 8191 bytes, 802.5: unlimited, 802.11: 2346 bytes 802 does not support segmentation not the task of this layer (at least typically seen this way) frames that are too long are dropped loss of transparency 11-l3gate_e.fm 13 18.Dezember.02

802.x 802.y: Tasks (3) Security 802.11 provides some data link layer encryption 802.3 does not Quality of Service / Priorities supported (in various forms) by both 802.4 and 802.5 NOT supported by 802.3 kind of in 802.11 (PCF / DCF) Acknowledgements supported by 802.4 (temporary token handoff) supported by 802.5 (C+A bits) not supported by 802.3 11-l3gate_e.fm 14 18.Dezember.02

3.2 Connecting Several Networks: Transparent Bridges Transparency: bridges not visible as such for the other components of the network simplifies other components Principle: transparent bridge bridge works in promiscuous mode (receives every frame of each connected LAN) Bridge 1 Bridge 2 bridge manages table: station LAN (output line) LAN 3 C Bridge1: A LAN 1 B LAN 2 C LAN 2 D LAN 2 Decision procedure 1. source and destination LANs identical frame dropped 2. source and destination LANs differ frame rerouted to destination LAN 3. destination unknown flooding LAN 1 LAN 2 LAN 4 A B D 11-l3gate_e.fm 15 18.Dezember.02

Transparent Bridges Bridge table initially empty use flooding for unknown destination Learning process: backward learning bridge works in promiscuous mode: receives any frame on any of its LANs bridge receives frames with source address Q on LAN L Q can be reached over L create table entry accordingly Adaptation to changes in topology entry associated with timestamp (frame arrival time) timestamp of an entry (Z, LAN, TS) is updated when frame received from Z table scanned periodically and old entries purged (if no update for some time, usually several minutes) e.g., because system moved and reinserted at different position flooding is used if machine was quiet for some minutes 11-l3gate_e.fm 16 18.Dezember.02

3.3 Transparent Bridges: Spanning Tree Increase reliability: connect LANs via various bridges in parallel Problem this creates a loop in the topology frames with unknown destination are flooded frame is copied again and again LAN 2 LAN 1 F Frame copied by B1 Initial frame F 1 F 2 Bridge Frame copied by B2 Solution: Communication among bridges Overlay actual topology by spanning tree reaching every LAN exactly one path from any LAN to every other LAN B1 B2 11-l3gate_e.fm 17 18.Dezember.02

Transparent Bridges: Spanning Tree (2) Example A B C 1 2 3 4 LAN 5 D G E H I J 8 9 6 7 Algorithm root of tree selection all bridges broadcast their serial number, lowest wins generation of spanning tree (from the root to every bridge and LAN) configured with bridges representing the nodes within the tree thereby avoiding loops adaptation if configuration is changed (bridge or LAN) LAN Drawback: ignores some potential connections between LANs i.e., not all bridges are necessarily present in the tree F Bridge Bridges between LANs Bridge that is part of the spanning tree A B C 1 2 3 D 5 6 H 8 9 E 7 A Spanning Tree J 4 F Bridge that is not part of the spanning tree 11-l3gate_e.fm 18 18.Dezember.02

3.4 Source Routing Bridges Has been proposed (and used) as alternative to transparent bridges Principle the frame s sender defines path bridge routes the frame Prerequisite LAN has a unique address (12 bit) bridge at the respective LAN is also unique (4 bit) then sender flags the frame (top bit of its own address = 1), if destination address is not reachable in LAN bridge routes only frames that have been flagged in such a way Determining Path sender sends discovery frames as broadcast each bridge reroutes these (reaches every LAN) during return (route) the complete path is copied and transmitted to sender problem: high traffic Conclusion: usually transparent bridges are used 11-l3gate_e.fm 19 18.Dezember.02

3.5 Connecting Two Equal Networks: Encapsulation Remote bridge Example: Interconnect different sites of one organization Bridge Point-to-point line LAN 1 LAN 2 LAN 3 Principle 1. incoming data unit is packaged as payload, 2. transmitted and 3. then fed into the destination network Properties certain protocol on point-to-point lines, e.g. PPP, i.e. MAC frame in PPP only station at the destination network can be reached (but for example not the network being bridged) simple 11-l3gate_e.fm 20 18.Dezember.02

3.6 Repeaters, Hubs, Bridges, Switches Repeaters & Hubs (L1): one collision domain Bridges (L2): connects two or more LANs (potentially different types) each line is its own collision domain typically store-and-forward and (traditionally) CPUbased Switches (L2) typically connects two or more computers each port / line is its own collision domain (no collisions) typically cut-through switching devices begin forwarding as soon as possible when destination header has been detected, before rest of frame arrived hardware-based Bridges vs. Switches sometimes difference seems to be more a marketing issue than technical one A B C D E F G Hub H A B C D Bridge LAN Host E F G H A B C D Switch E F G H 11-l3gate_e.fm 21 18.Dezember.02