Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Similar documents
Configuring Rapid PVST+

Configuring Rapid PVST+ Using NX-OS

VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology

Troubleshooting Transparent Bridging Environments

Configuring Rapid PVST+

Configuring STP and RSTP

Configuring STP. Understanding Spanning-Tree Features CHAPTER

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

Spanning Tree Protocol(STP)

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP

Token Ring VLANs and Related Protocols

Spanning Tree Protocol

Token Ring VLANs and Related Protocols

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Loop Cutting in the Original and Rapid Spanning Tree Algorithms

Troubleshooting Transparent Bridging Environments

Improving network convergence with Multiple Spanning Tree Protocol

The Spanning Tree Protocol

Mixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Spanning-Tree Protocol

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2

Research paper Measured Capacity of an Ethernet: Myths and Reality

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

Configuring Spanning Tree

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

Spanning Tree Operations. Topology Changes & Topology Change BPDUs

3. Evaluation of Selected Tree and Mesh based Routing Protocols

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

Configuring STP and Prestandard IEEE 802.1s MST

spanning tree exercise

Chapter. Managed Switch Basic Features. In this Chapter...

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Configuring Spanning Tree Protocol

Configuring MLD. Overview. MLD versions. How MLDv1 operates. MLD querier election

NetWare Link-Services Protocol

802.1AS Fast Master Clock Selection

Switching and Forwarding

Bridges. November 21, 2006

Computer Networks Principles LAN - Ethernet

Source-Route Bridging

Configuring Spanning Tree Protocol

Implementing Spanning Tree Protocol

Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub

EEC-484/584 Computer Networks

Mixed-Media Bridging

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept

Transparent Bridging and VLAN

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CSE 461: Bridging LANs. Last Topic

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

Chapter. Managed Switch Software Monitoring. In This Chapter...

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Interface The exit interface a packet will take when destined for a specific network.

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

A Meshed Tree Algorithm for Loop Avoidance in Switched Networks

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38

Configuring Spanning Tree Protocol

II. Principles of Computer Communications Network and Transport Layer

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Advanced Computer Networks

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Lecture 6: Bridges and Switches. CS/ECE 438: Communication Networks Prof. Matthew Caesar February 19, 2010

Spanning Tree Configuration

Bridges. Zartsh Afzal Uzmi and Tariq Mahmood Jadoon, Lahore University of Management Sciences, Pakistan

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

MSTP Technology White Paper

Chapter 4 Configuring Switching

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Problem Max. Points Act. Points Grader

Unit 8. Spanning Tree protocol, Virtual LANs (VLANs) and Access Networks

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

Third Generation Routers

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

MSTP Configuration. Page 1 of 24

Contents. Configuring EVI 1

Packet Switching on L2 (LAN Level)

AppleTalk. Chapter Goals. Introduction CHAPTER

Distributed Queue Dual Bus

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

Table of Contents 1 MSTP Configuration 1-1

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.

The Basics of Wireless Communication Octav Chipara

Session Exam 1. EG/ES 3567 Worked Solutions. (revised)

Packet Switching on L2 (LAN Level)

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7

Understanding Issues Related to Inter VLAN Bridging

Transcription:

ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number of stations is limited. To connect LNs that use different technologies To avoid using more costly routers ridges Various types of bridges No-frills bridges Learning bridges omplete (Spanning Tree) bridges omplete bridges Topology changes Timeout procedure Settable parameters Source routing bridges VLNs No-frills ridges Example of No-frills ridge Serve to extend the size of a single LN segment, i.e. the size of a collision domain. ridge receives packets from all LNs attached to its ports. ridge receives a packet, stores it, and broadcast it to all of its ports when they become idle, except to the port that received the packet. The total network capacity cannot exceed the capacity of a single LN. P PORT R Learning ridges ridge receives packets from all LNs attached to its ports. Whenever a learning bridge receives a packet from some LN, it reads the packet source address and stores the source and the corresponding port into the cache memory. Whenever a bridge receives a packet, it reads the packet destination address, and the port address to which the destination is attached from the cache memory, if the address is available. ridge transmits the packet to the read port, or to all ports except to the receiving one, if the port address is not available. ache entries are deleted after a specified timeout period. Example of Learning ridge Station sends to station PORT

Example of Learning ridge Station sends to station PORT Example of Learning ridge Station sends to station PORT Example of Learning ridge Station sends to station PORT Example of Learning ridge Station sends to station PORT Example of Learning ridge Example of ultiple Learning ridges Station sends to station PORT K T PORT T K PORT LN LN LN3 K T

Topology with Loops Learning ridges with Loops 3 LN LN ll three bridges receive a packet, note that station is on LN, and queue the packet for transmission. Say bridge 3 is the first to transmit the packet onto LN. ridges and view the packet as it is transmitted on LN, note that is now on LN, and queue the packet. Say bridge now transmit the first received packet onto LN. ridge 3 note that the packet is on LN and queue the packet. The number of packets transmitted on the network exponentially increases. omplete ridges Spanning Tree (ST) lgorithm omplete bridges are defined by IEEE 80. standard. They run spanning tree algorithm to exclude loops. tree comprising bridges is calculated, and these bridges send messages toward the tree root. Tree is formed in a distributed way, each bridge sends configuration messages, and each bridge forwards only the best configuration message. The procedure stops when all bridges forward the same configuration message. ased on the information from the configuration messages, bridges calculate the spanning tree. ridges choose the bridge to be the tree root. ridges calculate the number of hops to the tree root. For each LN, the designated bridge is determined, which forwards packets to the root. esignated bridge determines the root port through which it forwads packets to the root. onfiguration essage onfiguration message format estination Source SP SSP configuration message SP=SSP=000000 onfiguration message comprises tree root I, cost of forwarding (the number of hops from the tree root), transmitting bridge I, port I at the transmitting bridge, settable parameters. est onfiguration essage The best configuration message has the lowest root I. If multiple messages have the same root I, the best message has the lowest cost. If multiple messages have the same root I, and the same cost, the best message has the lowest transmitting bridge I. If multiple messages have these three values the same, the best one has the lowest port I on the transmitting bridge. Port Port Port 3 Root 5 ost 93 85 3 ridge 5 40 7 Port becomes a root port, and forwards messages to ports and 3 3

est onfiguration essage Port Port Port 3 Root 5 ost 93 85 3 ridge Root bridge is, given bridge becomes designated bridge for LNs attached to its ports and 3, the bridge port becomes a root port, and forwards configuration messages to ports and 3, cost (the number of hops) is incremented by becoming 86 and updated in the configuration message which is then forwarded. 5 40 7 Example of ST lgorithm ridge 9 receives the configuration messages 8.0.8 9 PORT PORT 4 4.9.5 4..35 4.. 4.3.90 primljene poruke Example of ST lgorithm ridge 9 receives the configuration messages 9 PORT PORT 4 8.0.8 4.9.5 4..35 4.. 4.3.90 4.3.9 4.3.9 Refinements of ST lgorithm hanges of the topology because of failures or new equipment are announced with the special messages. Upstream bridges acknowledge those notifications. hanges of topology should not introduce loops. For this reason preforwarding time is introduced. Failures of the links or bridges must be detected by the downstream bridges. Root bridge sends configuration messages reapetedly. onfiguration messages have age, and maximum age. ache values with the positions of the stations should be regularly updated. So, cache is deleted after timeout period. Notification of Topology hange Topology changes when a bridge or a link fails, or a new bridge or a new link is added to the network. ridge that notices the topology change sends the topology change notification message on its root port to the upstream bridge, once per hello time, until the upstream bridge acknowledges the receipt of the topology change notification message. Topology change notification messages are propagated in this way bridges in the tree to the root bridge. Root then sets topology change flag in the configuration messages that it sends downstream. voiding Loops as Topology hanges Loops can be formed in transient intervals when there are topology changes. When topology changes a new tree is calculated. Some bridges might turn on before the others turn off, and loop can be formed. efore some bridge start forwarding, it waits during the time interval sufficient for all bridges to get the information about new spanning tree. Waiting time is divided into listening and forwarding intervals. uring the listening interval, the bridge only forwards configuration messages. uring the learning interval, the bridge receives messages only to learn about the positions of the stations, but does not forward them. 4

Topology hange ue to Failures Root transmits configuration messages with age equal to 0 once per each hello time. Root also specifies the maximum age. Each bridge increments message age field in each slot of a specified duration. It sends this message every hello time. When the message age exceeds the maximum age, the bridge discards the configuration message in question, and recalculates the spanning tree. Example of Failure onfiguration message at root port 4 expires, and port 3 becomes a root port. 4.3.9 4.3.9 9 PORT PORT 4 4..35 4.. 4.3.90 4.3.9 Example of Failure onfiguration message at root port 3 expires, and port 5 becomes a root port. 9 PORT PORT 4 Example of Failure onfiguration message at root port 5 expires, and bridge 9 becomes a root bridge. 9 PORT PORT 4 4.4.9 4.4.9 4..35 4.. 4.3.90 4.4.9 4.4.9 9.0.9 9.0.9 4..35 4.. 4.3.90 9.0.9 9.0.9 9.0.9 ache uration ecause placement of stations changes, the cache entries linking stations and ports should be deleted occassionaly, after the cache timeout period. ache timeout period should be as long as several minutes. ut, when the bridges get the configuration messages with the topology change flag set, they set the cache timeout period to the forwarding delay. Settable Parameters ridge and the port priorities: two and one octet respectively. Hello time: the time that elapses between two consecutive configuration messages, or between consecutive topology change notification messages. Recommended s. ax age: the configuration message age value for which it is discarded as too old. Recommended value 0s, s per hop. 5

Settable Parameters Forward delay: the duration of the listening modes, and the learning mode before a bridge starts forwarding data. It is half the time needed for the topology information to spread. Recommended value 30s. Long cache timer: recommended 5min. Path cost: the cost to be added to the cost field at some bridge. onfiguration essage Format broj okteta 8 Topology hange 4 ck 8 Flag protocol identifier version message type T reserved T root I cost of path to root bridge I port I message age max age hello time forward delay Topology hange Flag Topology hange Notification essage Format broj okteta protocol identifier version message type Problems of ridging The probability of packet loss increases. The delay increases. Error rate increases when R is changed. Packet reordering when the tree is reconfigured. Packet duplication because of temporary loops. Stations cannot use the maximum packet size. LN specific information such as priority may be lost. Unexpected packet format conversion may occur. Remote ridges One bridge must inform the other if it ignores its packets. Packet format has to be agreed upon. Each bridge has to be connected to all bridges on WN separately. They have to have individual network addresses because multicasting is not supported. Source Routing ridges It is optional in IEEE 80.. Packet header carries the information about the path that it should follow. ontrol packets, all path explorers or spanning tree explorers, discover a path from the source to the destination that want to communicate. Routes are deleted from the station cache after a timeout period. 6

Packet Format estination Source RI ata Route information (RI): Type (3bits): specifically routed, all paths explorer, spanning tree explorer Length (5bits) of RI in bytes irection (bit) Largest frame (3bits): 56bytes-65535bytes Route: a sequence of bytes fields, bits for LN number and 4bits for bridge number. Finding a Route ll path explorer packets are sent like in learning bridges, while spanning tree explorers are sent like in transparent bridges. There are several possible ways to find a route. Source sends all path explorer, and destination gets multiple copies of it, it sends each of the copies back along its route. They collect the route and the maximum packet length on the paths. The packet that is the fastest to return back determines the route. lternatively, destination may choose a path, and reply with the specifically routed packet. Source may first send spanning tree explorer to check the availability of the destination. estination may respond with the reply to the spanning tree explorer, and/or all path explorer. Virtual LN (VLN) VLN is equivalent to the broadcast domain. otivations for VLNs are: separation of broadcast domains, moving stations without changing their IP addresses, security. ultiple VLNs can be attached to one packet switch. Stations attached to one port may belong to one or more VLNs. Packet travelling between switches have VLN tag comprising bytes. References Radia Perlman, Interconnections: ridges, Routers, Switches and Internetworking Protocols, ddison-wesley January 000. HOEWORK: Problems 5,7, in Section 3 Transparent ridges. 7