Source Route Bridging

Similar documents
Source-Route Bridging

Mixed-Media Bridging

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks

Teldat Router. Bridge

Transparent Bridging and VLAN

Packet Switching on L2 (LAN Level)

Mixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER

Token Ring VLANs and Related Protocols

Configuring Source-Route Bridging

Network Infrastructure

Configuring Transparent Bridging

Path MTU Discovery in Bridged Network

Packet Switching on L2 (LAN Level)

Token Ring VLANs and Related Protocols

Priority list number you specified in the sap-priority-list command.

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Mobile Communications. Ad-hoc and Mesh Networks

LLC and Bridges. Raj Jain. Professor of CIS. The Ohio State University

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

IP over ATM. IP over ATM. Agenda. IP over ATM : Solving the Problem I.

Using VLAN & Bridge APPENDIX

Outline. Assumptions. Key Features. A Content-Based Networking Protocol For Sensor Networks (Technical Report 2004)

802.1D/Q Compliance and Spatial Reuse

Madge Training TRN-02A

Spatially aware sublayer support of VRRP. Marc Holness, Nortel Networks IEEE WG b SG San Antonio, Texas November, 2004

Configuring Banyan VINES

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Configuring VLANs. Understanding VLANs CHAPTER

Internetworking Part 1

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda

Configuring the Catalyst 3920

Configuring Token Ring Inter-Switch Link

Master of Technology

Configuring VLANs. Understanding VLANs CHAPTER

The following steps should be used when configuring a VLAN on the EdgeXOS platform:

Troubleshooting IBM. DLSw SDLC CHAPTER

Network Working Group Request for Comments: 1434 IBM March Data Link Switching: Switch-to-Switch Protocol

Bridging. Robert Castellano David James Bob Sultan Spencer Dawkins. 1/22/2002 rc_brdg_02.pdf

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Lecture 9: Switched Ethernet Features: STP and VLANs

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

2] Chapter 2 Cisco IOS Commands traceroute mac

Local Addresses and SAS

Agenda L2 versus L3 Switching IP Protocol, IP Addressing IP Forwarding ARP and ICMP IP Routing First Hop Redundancy

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

isco Understanding Spanning Tree Protocol Topology Chan

Improving Bandwidth Efficiency When Bridging on RPR. November 2001

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs

Upon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Session Exam 1. EG/ES 3567 Worked Solutions. (revised)

4 Spanning Tree Protokoll 802.1D-2004

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density

VLAN - SP6510P8 2013/4. Copyright 2011 Micronet Communications, INC

Overview of Bridging

Configuring Fast Switching

CS3600 SYSTEMS AND NETWORKS

Extending Switched Networks with Virtual LANs. 2000, Cisco Systems, Inc. 7-1

Configuring VLANs. Understanding VLANs CHAPTER

SEP Technology White Paper

Configuring VLANs. Finding Feature Information. Prerequisites for VLANs

Summary of MAC protocols

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

What LinkSec Should Know About Bridges Norman Finn

Configuring VLANs. Understanding VLANs CHAPTER

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

Configuring the Catalyst 1800 Switch

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

Networking interview questions

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic

CS4700/CS5700 Fundamentals of Computer Networks

Configuring your VLAN. Presented by Gregory Laffoon

Configuring VLANs. Understanding VLANs CHAPTER

NETWORKING COMPONENTS

Switches running the LAN Base feature set support only static routing on SVIs.

XNS Commands. Not all Cisco access servers support XNS. For more information, refer to the release notes for the release you are running. Note.

Part3. Local Area Networks (LAN)

Configuring VLANs. Understanding VLANs CHAPTER

VLAN. Mario Baldi. Pietro Nicoletti. Politecnico di Torino. Studio Reti

VXLAN Overview: Cisco Nexus 9000 Series Switches

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER

Multiple I-tag Registration Protocol

Telecom Systems Chae Y. Lee. Contents. Overview. Issues. Addressing ARP. Adapting Datagram Size Notes

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Advanced Computer Networks

Routing Protocols in MANET: Comparative Study

Bridging Commands. December Cisco IOS Bridging Command Reference BR-1

Behavior of Cisco Discovery Protocol between Routers and Switches

LECTURE 9. Ad hoc Networks and Routing

Configuring Spanning Tree

Encapsulated Bridging Support of November 2001

Computer Networking. December 2004 CEN CN

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

Networking TCP/IP routing and workload balancing

Note: Use two 2960 switches for ALS1 and ALS2 and two 3560 switches for DLS1 and DLS2

Transcription:

Source Route Bridging Source Route Bridging Principles and Procedures method developed by IBM for coupling several Rings with Source Route Bridges (SR) end system must explicitly insert routing information into the frame (RII = 1; Routing Info) takes care about routing upon layer 2 SR bridges provide relaying (switching) tasks routing information in a frame is used by SR Bridge to pass on this frame Source Route Bridging, v3.4 1 Source Route Bridging, v3.4 3 Agenda Source Route Bridging Introduction and Routing Information All Routes Broadcast Single Route Broadcast Source Routing bridge with Bridge-ID 2 Source Route Bridging, v3.4 2 Source Route Bridging, v3.4 4 Page 25-1 Page 25-2

Source Routing Bridging end systems must know about the network topology SR bridges are not transparent for the end systems SR bridges introduce ring topology information ring number and bridge ID route determination is done by discovering (exploring) the path (source route) in the discovery process both parties are involved end systems and all intermediate SR-bridges Routing Info (RII = 1) Format Routing Info Routing Control Routing Designators RT LEN D LF res. RD 1 RD 2 RD 3... RD n 3 5 1 3 4 16 16 16 16 bits RT... Routing Type LEN... length bits D... Direction bit LF... Largest Frames bits RDx... Routing Designator res.... reserved Source Route Bridging, v3.4 5 Source Route Bridging, v3.4 7 Source Route Bridging advantages: meshed topology can improve reliability and provide load balancing without need of a protocol (like STP) SR-bridges are built simple (e.g. using PCs); only frames with RII = 1 must be processed by the SR-bridges drawbacks: discovery method causes additional and extensive network-traffic, which is not acceptable for big networks for example SRB applied on the topology of the Internet: a discovery initiation would terminate after 108 years Source Route Bridging, v3.4 6 Routing Control RT (Routing Type): specifies if soure routed frame or discovery frame 0 x x... Non-Broadcast (NB; Route completely specified by RDs) 1 0 x... All-Routes-Broadcast (ARB; for discovery process) 1 1 x... Single-Route-Broadcast (SRB; for modified discovery process using Spanning Tree) LEN (Length) length of routing information in bytes (2-30) RI can hold 14 RD at maximum therefore 13 SR bridges in sequence are possible Source Route Bridging, v3.4 8 Page 25-3 Page 25-4

Routing Control D (Direction): tells SR-bridges how to interpret path information 0... Routing Designators are interpreted from left to right 1... Routing Designators are interpreted from right to left LF (Largest Frame) specifies the maximal allowed frame size between two stations 000... 516 Byte (ISO 8473) 100... 8191 Byte (TB) 001... 1500 Byte (E) 101... 11407 Bytes (TR,16) 010... 2052 Byte (3270) 110... 17800 Byte (TR,16) 011... 4471 Byte (TR,4) 111... 65535 Byte Agenda Introduction and Routing Information All Routes Broadcast Single Route Broadcast Source Route Bridging, v3.4 9 Source Route Bridging, v3.4 11 Routing Designators RDx (Routing Designators) 12 bit Ring-ID and 4 bit Bridge ID marks the route from source to the destination these IDs are maintained by the bridges and inserted (in the RDs) during discovery in the discovery frames by the bridges Ring-IDs unique in the whole Source Route Bridging network Bridge-IDs different only if two or more bridges connect two rings in parallel Basic Steps of Source Routing to generate routing information the end-system sends special LLC-frame (XID or Test) with MAC- DA = destination address frist trial with RII = 0 to reach destination system on the local ring second trial with RII = 1, with RT either set as All- Routes-Broadcast (ARB) or Single-Route-Broadcast (SRB), with LEN = 2, D = 0 and LF according to the frame size all bridges connected to the local ring receives and process this frame because RII = 1 Source Route Bridging, v3.4 10 Source Route Bridging, v3.4 12 Page 25-5 Page 25-6

Local Test -> ARB 2 -> DA=B RII=0, SA=A LLC+data DA=B RII=1, SA=A RT=ARB LEN=6 D=0 DA=B RII=1, SA=A RD1 = TR 1, RD2 = TR 2, SRB 0 RT=ARB LEN=6 D=0 RD1 = TR 1, RD2 = TR 4, SRB 0 Discovery Method is done for example with LLC Type 1 XID-frames Source Route Bridging, v3.4 13 Source Route Bridging, v3.4 15 ARB 1 -> ARB 3 -> DA=B RII=1, SA=A RT=ARB LEN=2 D=0 LLC+data Source Route Bridging, v3.4 14 DA=B RII=1, SA=A RT=ARB LEN=8 D=0 RD1 = TR 1, RD2 = TR 4, DA=B RII=1, SA=A RT=ARB LEN=8 D=0 RD1 = TR 1, RD2 = TR 2, Source Route Bridging, v3.4 16 Page 25-7 Page 25-8

ARB Steps <-SR1 SR bridges append their RDs consisting of input ring number RN, their Bridge-ID and output-ring number and emit that frame on the other port Bridge-ID at the output ring = 0 one XID-frame of the source end system triggers several XID-frames to get to the destination by using all possible paths every XID-frame is confirmed with a XID-response-frame with RT = 0xx (route exists, NB) by the destination source receives all XID-response-frames as NB-frames and selects a route for its future communication to that destination Source Route Bridging, v3.4 17 RD1 = TR 1, RD2 = TR 4, RD1 = TR 1, RD2 = TR 2, Source Route Bridging, v3.4 19 ARB Steps <-SR2 commonly, source end systems selects the route of the first received XID-frame then all following LLC-frames from source to destination end system are transmitted with RII =1, RT = Non-Broadcast Route (NB) and appropriate RDs informations about all determinated paths can be stored in a local cache of the source end system to deal fast with new connection requests location change of end-systems can be noticed by an aging-mechanism and thereby solved automatically Source Route Bridging, v3.4 18 RD1 = TR 1, RD2 = TR 4, RD1 = TR 1, RD2 = TR 2, Source Route Bridging, v3.4 20 Page 25-9 Page 25-10

<-SR3 ARB Filtering RD1 = TR 1, RD2 = TR 4, RD1 = TR 1, RD2 = TR 2, Source Route Bridging, v3.4 21 filters this frame RT=ARB LEN=10 D=0 RD1 = TR 1, RD2 = TR 2, RD3 = TR 3, RD4 = TR 4, SRB 0 filters this frame RT=ARB LEN=10 D=0 RD1 = TR 1, RD2 = TR 4, RD3 = TR 3, RD4 = TR 2, SRB 0 Source Route Bridging, v3.4 23 ARB Unwanted Effects, Filtering in our example and must forward ARB-XID-frame received from the other bridge from TR3 to TR2 or TR4 only SRB1 and SRB3 can filter these frames generic rule for filtering of frames ARB- and SRB-frames if RD-sequence already contains a ring number which is equal to the outgoing ring number of a bridge, then this frame must be filtered loops are avoided SR-frames if RD-sequence contains no combination Ring number/bridge- ID/ring number which is equal to the ingoing-ring number/ own Bridge-ID/outgoing ring number, then this frame must be filtered Agenda Introduction and Routing Information All Routes Broadcast Single Route Broadcast Source Route Bridging, v3.4 22 Source Route Bridging, v3.4 24 Page 25-11 Page 25-12

Single Route Broadcast (SRB) disadvantage of ARB generate unwanted frames even for non-existing destinations could be improved by SRB source sends XID-frame with SRB DA=B RII=1, SA=A RT=SRB LEN=6 D=0 DA=B RII=1, SA=A RT=SRB LEN=6 D=0 RD1 = TR 1, RD2 = TR 2, SRB 0 this frame will be passed on by only one bridge in each ring, thereby marking an unique path to the destination spanning tree for explorer frames to implement this spanning tree either configured statically by network administrator or dynamically by spanning tree protocol RD1 = TR 1, RD2 = TR 4, SRB 0 Source Route Bridging, v3.4 25 Source Route Bridging, v3.4 27 DA=B RII=1, SA=A RT=SRB LEN=2 D=0 LLC+data DA=B RII=1, SA=A RT=SRB LEN=8 D=0 RD1 = TR 1, RD2 = TR 2, inactive because of spanning tree Source Route Bridging, v3.4 26 Source Route Bridging, v3.4 28 Page 25-13 Page 25-14

Single Route Broadcast (SRB) SRB 5 destination replies with a ARB-XID-frame; this frame will be processed by all bridges hence source receives several ARB-XID-frames; every frame contains RDs which mark its route information about all possible routes and can select an appropriate one advantage of SRB method ARB with unwanted effects (flooding the whole net along all paths with frames) happens only on the way back and only if destination device resides on this net Source Route Bridging, v3.4 29 RT=ARB LEN=6 D=0 RD1 = TR 3, RD2 = TR 4, SRB 0 RT=ARB LEN=6 D=0 RD1 = TR 3, RD2 = TR 2, SRB 0 Source Route Bridging, v3.4 31 <- SRB 6 RT=ARB LEN=8 D=0 RD1 = TR 3, RD2 = TR 2, RD3 = TR 1, SRB 0 RT=ARB LEN=2 D=0 LLC+data RT=ARB LEN=8 D=0 RD1 = TR 3, RD2 = TR 4, RD3 = TR 1, SRB 0 RT=ARB LEN=2 D=0 LLC+data Source Route Bridging, v3.4 30 Source Route Bridging, v3.4 32 Page 25-15 Page 25-16