Network Infrastructure

Similar documents
Data Communications. Connecting Devices

Chapter 6 Connecting Device

Medium Access Protocols

Underlying Technologies -Continued-

Summary of MAC protocols

Introduction to LAN Protocols

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

CN [Network Devices]

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

3.5 CONNECTING DEVICES

2. LAN Topologies Gilbert Ndjatou Page 1

CH : 15 LOCAL AREA NETWORK OVERVIEW

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic

Connecting LANs, Backbone Networks, and Virtual LANs

NETWORKING COMPONENTS

Chapter 4 NETWORK HARDWARE

More on LANS. LAN Wiring, Interface

LAN Overview (part 2) Interconnecting LANs - Hubs

Principles behind data link layer services

Principles behind data link layer services:

Principles behind data link layer services:

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10

Local Area Network(LAN)

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Layer 2 functionality bridging and switching

Data Communication and Internet Technology

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

ET4254 Communications and Networking 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Computer Science Department 2 nd semester- Lecture13

NETWORK TOPOLOGIES. Application Notes. Keywords Topology, P2P, Bus, Ring, Star, Mesh, Tree, PON, Ethernet. Author John Peter & Timo Perttunen

Revision of Previous Lectures

What is a Network? A connection of two or more computers so that they can share resources.

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Image courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch

Bridging and Switching Basics

Introduction to LAN Protocols

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Packet Switching on L2 (LAN Level)

A primer on modern LANs

Networks. Distributed Systems. Philipp Kupferschmied. Universität Karlsruhe, System Architecture Group. May 6th, 2009

Chapter 16 Networking

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Interface The exit interface a packet will take when destined for a specific network.

CHAPTER 2 - NETWORK DEVICES

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

CS4700/CS5700 Fundamentals of Computer Networks

Internetworking Part 1

Lecture 4b. Local Area Networks and Bridges

Darshan Institute of Engineering & Technology for Diploma Studies

Local Area Network Overview

Module 16: Distributed System Structures

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Contention Protocols and Networks

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

Networking interview questions

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Configuring Transparent Bridging

Comparison Of Network Topologies For Optical Fiber Communication

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Comp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am

Silberschatz and Galvin Chapter 15

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

CS3600 SYSTEMS AND NETWORKS

Switching & ARP Week 3

KINGS COLLEGE OF ENGINEERING

Computer Networks. Wenzhong Li. Nanjing University

Local Area Networks and the Network Protocol Stack

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

ECE 158A: Lecture 13. Fall 2015

ICMP, ARP, RARP, IGMP

Distributed Queue Dual Bus

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

NetWare Link-Services Protocol

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Full file at

Transparent Bridging and VLAN

IEEE 802 LANs SECTION C

Part3. Local Area Networks (LAN)

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

ECE 333: Introduction to Communication Networks Fall 2001

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Chapter 6 Medium Access Control Protocols and Local Area Networks

Connecting LANs. Required reading: Garcia 6.11 (intro ) CSE 3213, Fall 2010 Instructor: N. Vlajic

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Introducing Campus Networks

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices

CS Networks and Distributed Systems. Lecture 5: Bridging. Revised 1/14/13

Top-Down Network Design

CSCD 330 Network Programming Spring 2017

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

Different network topologies

INTRODUCTION TO ICT.

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

CS610- Computer Network Solved Subjective From Midterm Papers

Transcription:

Network Infrastructure For building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater Physically increases the range of a local area network Hub Connects several computers or local area networks of the same type (to a broadcast network) Bridge Connects several local area networks (possibly of different types) to a large LAN Switch Like a hub, but without broadcast Router Connects several LANs with the same network protocol over large distances Page 1

Infrastructure Components: Hub & Repeater Transmission of data on the physical layer Reception and refreshment of the signal, i.e. the signals received on one port are newly produced on the other(s) Increase of the network range Stations cannot send and receive at the same time One shared channel (Broadcast) Low security, because all stations can monitor the whole traffic Low costs Layer 1 Hub Segment 1 Repeater Hub: one to all Repeater: Linking of 2 networks Segment 2 Page 2

Infrastructure Components: Switch Like a hub, but: Point-to-point communication no broadcast Switch learns the addresses of the connected computers Stations can send and receive at the same time No carrier control necessary Buffer for each individual station/each port Switch Higher costs Layer 2/3/4 Layer 3-Switch : also has functionalities of level 3, i.e. it can e.g. take over the routing. Layer 4-Switch : looks up additionally in the TCPheader, can therefore be used e.g. for load balancing. Page 3

Switch: Realization Mostly used: buffered crossbar For each input port, provide buffers for the output ports At any time, only one input port can be connected to an output line Additional speedup possible with small buffers at each cross-point With a buffered switch, nearly no more collisions are possible! Page 4

LANs: Bus Lehrstuhl für Informatik 4 Terminating resistor Ω B Ω Example: Ethernet A Bus Broadcast Network: if station A intends to send data to station B, the message reaches all connected stations. Only station B processes the data, all other stations are ignoring it. Passive coupling of stations - Restriction of the extension and number of stations to connected + Simple, cheap, easy to connect new stations + The breakdown of a station does not influence the rest of the network Page 5

LANs: Star Lehrstuhl für Informatik 4 Star A B Example: Fast Ethernet Designated computer as central station: a message of station A is forwarded to station B via the central station Broadcast network (Hub) or point-topoint connections (Switch) Expensive central station Vulnerability through central station (Redundancy possible) + N connections for N stations + Easy connection of new stations Page 6

LANs: Tree Lehrstuhl für Informatik 4 Branch 1 Branch 2 A B C D Repeater Router Backbone Tree Topology: Connection of several busses or stars Branching elements can be active (Router) or passive (Repeater) + Bridging of large distances + Adaptation to given geographical structure + Minimization of the cable length possible Page 7

LANs: Ring Lehrstuhl für Informatik 4 Example: Token Ring, FDDI B A Ring Broadcast Network Chain of point-to-point connections Active stations: messages are regenerated by the stations (Repeater) Breakdown of the whole network in case of failure of one single station or connection + Large extent possible + Easy connection of new stations +Only N connections for N stations Variant: bidirectional ring stations are connected by two opposed rings Page 8

LANs: Meshed Networks Fully Meshed Network Point-to-Point connections between all stations For N stations, 2 connections are needed Connecting a new station is a costly process + Redundant paths N( N 1) + Maximal connection availability through routing integration Partly meshed network: cheaper, but routing, flow control, and congestion control become necessary (Wide Area Networks) Page 9

LANs: Examples Ethernet (IEEE 802.3, 10 MBit/s) - originally the standard network - available in an immense number of variants Token Ring (IEEE 802.5, 4/16/100 MBit/s) - for a long time the Ethernet competitor - extended to FDDI (Fiber Distributed Data Interface) Fast Ethernet (IEEE 802.3u, 100 MBit/s) - at the moment the most widely spread network - extension of Ethernet for small distances Gigabit Ethernet (IEEE 802.3z, 1,000 MBit/s) - very popular at the moment; 10 GBit/s are already in the planning phase at the moment Page 10

Infrastructure Components: Bridges With bridges, several LANs are connected on the link layer possibly LANs of different types i.e. having different header formats Layer 2 Major tasks: Appropriate forwarding of the data Adaptation to different LAN types Reduction of the traffic in a LAN segment, i.e. packets which are sent from A to C are not forwarded by the bridge to LAN 2. Thus, station D can communicate with E in parallel. Increases physical length of a network Increased reliability through demarcation of the LAN segments A C B 1 D E LAN LAN 2 1 Page 11

Infrastructure Components: Bridges 1) Transparent bridges (e.g. for CSMA and token bus networks) A C B 1 D B ² E LAN LAN 2 LAN 3 1 Characteristics: Coupling of LANs is transparent for the stations (i.e. not visible) Hash tables contain the destination addresses Source and destination LAN are identical frame is rejected by bridge (e.g. B 1 in case of a transmission from A to C) Source and destination LAN are different pass on frames (e.g. in case of a transmission from D to E) Destination LAN unknown pass on frame Page 12

Transparent Bridges To realize transparency, bridges have to learn in which LAN a host is located Each bridge maintains a forwarding database with entries < MAC address, port, age> MAC address: host name port: port number of bridge used to send data to the host age: aging time of entry Assume a MAC frame arrives on port x: Port x Is MAC address of destination in forwarding database for ports A, B, or C? Port A Bridge 2 Port B Port C Found and x? Not found? Found and = x? Forward the frame on the appropriate port Ignore frame Flood the frame, i.e., send the frame on all ports except port x. Page 13

Transparent Bridges - Address Learning Database entries are set automatically with a simple heuristic: the source field of a frame that arrives on a port tells which hosts are reachable from this port. Algorithm: For each frame received, the source stores the source field in the forwarding database together with the port where the frame was received. All entries are deleted after some time (default is 15 seconds). Src=x, Dest=y Port 1 x is at Port 3 Port 4 Src=y, Src=x, Dest=x Dest=y Src=x, Dest=y Port 2 y is at Port 4 Port 5 Src=x, Dest=y Src=y, Src=x, Dest=x Dest=y Port 3 Port 6 Src=x, Dest=y Page 14

Loops Consider two LANs that are connected by two bridges. Assume host n is transmitting a frame F with unknown destination. Bridges A and B flood the frame to LAN 2. Bridge B sees F on LAN 2 (with unknown destination), and copies the frame back to LAN 1 Bridge A does the same. The copying continues Solution: Spanning Tree Algorithm F Bridge A F LAN 2 LAN 1 F F Bridge B F host n Page 15

Spanning Tree Bridges Preventing loops: compute a spanning tree from all bridges connected Spanning Tree Algorithm: Determine one root bridge (the bridge with the smallest ID) Determine a designated bridge for each LAN (the bridge which is nearest to the root bridge) Determine root ports (port for the best path to root bridge considering costs for using a path, e.g. number of hops) Bridge 1 LAN 2 Bridge 3 Bridge 4 LAN 1 Bridge 2 LAN 5 d Bridge 5 LAN 3 LAN 4 Page 16

Spanning Tree Algorithm At the beginning, all bridges assume to be root bridge and send out a packet containing their own ID and current costs (initialized with zero) over all of their ports: root ID costs bridge ID port ID e.g. for station B on port P 1 : B 0 B P 1 A bridge receiving such a packet checks the root ID and compares with its own one. Root ID and costs are updated for received packets with smaller ID in the root bridge field, and forwarded. Updating the costs is made by adding the own costs for the station from which the packet was received to the current costs value. When the (updated) packets of all bridges have passed all other bridges, all bridges have agreed on the root bridge. The received packets containing the smallest costs value to the root bridge determine the designated bridge for a LAN and designated ports for the bridges to send out data. Page 17

Spanning Tree Algorithm: Example Network: LAN 1 5 B2 ID=27 8 LAN 4 5 12 B1 ID=93 20 LAN 3 6 B5 ID=9 10 10 5 B3 ID=18 B4 ID=3 10 LAN 5 7 ports LAN 2 ID: bridge ID : designated port Spanning Tree: LAN 1 B1 ID=93 B3 ID=18 LAN 2 B2 ID=27 LAN 3 B4 ID=3 designated bridge for LAN 2 root bridge LAN 4 B5 ID=9 LAN 5 Page 18

Infrastructure Components: Bridges 2) Source Routing Bridges (e.g. for ring networks) A C B 1 FDDI B ² D Ethernet Ethernet Characteristics: Sources must know (or learn), in which network segment the receivers are located Large expenditure for determining the optimal route, e.g. via using a Spanning Tree algorithms or sending out Route Discovery Frames using broadcast All LANs and Bridges on the path must be addressed explicitly Connection-oriented, without transparency for the hosts Page 19

Conclusion Lehrstuhl für Informatik 4 Layer 1 and 2: How to physically transport data reliably from one computer to a neighbored one? Layer 1 defines transmission medium and bit representation on this medium Layer 1 additionally specifies transmission mode, data rate, pin usage of connectors, Layer 2 protects against transmissions errors (mostly CRC) and receiver overload (flow control, sliding window) Layer 2 also defines medium access coordination for broadcast networks Both layers together define how to transfer data from one computer to a directly connected one (maybe over a hub/switch) on that reason both are implemented in one piece of software: the network interface card driver. Bridges in principle allow to connect lots of LANs over long distances is that the Internet? Page 20

Infrastructure Components: Router What are the limitations of bridges? Even though bridges are suitable to connect computers in several networks, there are also some disadvantages, e.g.: Bridges can support only some thousand stations, which especially has the reason that addresses are used which do not have any geographical reference. LANs coupled with bridges already form a large LAN, although a separation often would be desirable (e.g. regarding administration or errors). Bridges pass broadcast frames on to all attached LANs. This can result in Broadcast Storms. Bridges do not communicate with hosts, i.e. they do not hand over information about overload situations or reasons for rejected frames. Router overcome these weaknesses Page 21

Infrastructure Components: Router Prinicipal task of routers : Incoming packets are being forwarded on the best path possible to the destination on the basis of a global address Layer 3 In principle no restriction concerning the number of hosts (hierarchical addressing) Local administration of the networks (ends at the router), Firewalls are possible Broadcasts are not let through by the routers, Multicast depending on the router Communication between host and router improves performance A R R R 1 2 3 B LAN 1 Network 1 Network 2 LAN 2 More details to routers: chapter 3 Page 22