Lecture 9: Switched Ethernet Features: STP and VLANs

Similar documents
Switched Ethernet Virtual LANs

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

3.5 CONNECTING DEVICES

Data Communications. Connecting Devices

Chapter 6 Connecting Device

Computer Networking. December 2004 CEN CN

Underlying Technologies -Continued-

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)

Switching & ARP Week 3

The following steps should be used when configuring a VLAN on the EdgeXOS platform:

VLANs Level 3 Unit 9 Computer Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Lecture 8: Switched Ethernet and Collision Domains

Table of Contents 1 VLAN Configuration 1-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

- Hubs vs. Switches vs. Routers -

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).

Catalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide

Computer Networks. Routing

LAN Overview (part 2) Interconnecting LANs - Hubs

CMPE 150 Winter 2009

Configuring VLANs. Understanding VLANs CHAPTER

Private and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee

LOCAL AREA NETWORKS Q&A Topic 4: VLAN

Principles behind data link layer services:

Transparent Bridging and VLAN

Principles behind data link layer services:

Introduction to LAN Protocols

Top-Down Network Design

Configuring VLANs. Understanding VLANs CHAPTER

Introduction to OSPF

Distributed Queue Dual Bus

Medium Access Protocols

Chapter 4 Configuring Switching

Introduction to Ethernet. Guy Hutchison 8/30/2006

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Layer 2 functionality bridging and switching

What LinkSec Should Know About Bridges Norman Finn

Connecting to the Network

Principles behind data link layer services

Configuring BPDU tunneling

Objectives. 1. Introduction:

EVOLUTION OF VLAN. Manisha Barse Department of E&TC, D. Y. Patil College of Engineering, Akurdi, Pune, India.

Hubs, Bridges, and Switches (oh my) Hubs

CSCI Computer Networks

Introducing Campus Networks

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Configuring Transparent Bridging

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Summary of MAC protocols

Switching and Forwarding Reading: Chapter 3 1/30/14 1

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

Monitor Commands. monitor session source, page 2 monitor session destination, page 4

Configuring VLANs. Understanding VLANs CHAPTER

Unicasts, Multicasts and Broadcasts

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

ECE 4450:427/527 - Computer Networks Spring 2017

Additional Slides (Basics) Intermediate Systems

Image courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch

Configuring VLANs. Understanding VLANs CHAPTER

Understanding Issues Related to Inter VLAN Bridging

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

VLAN Configuration. Understanding VLANs CHAPTER

2. LAN Topologies Gilbert Ndjatou Page 1

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

Antonio Cianfrani. Virtual LAN (VLAN)

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Configuring Private VLANs

Traditional network management methods have typically

Cisco Systems, Inc. Norman Finn. July 9, /12. Class of Service in Class of Service in Norman Finn Cisco Systems

Some portions courtesy Srini Seshan or David Wetherall

Configuring your VLAN. Presented by Gregory Laffoon

Junos Enterprise Switching

Yildiz Technical University Computer Engineering Department BLM 6196 Computer Networks And Communication Protocols.

Configuring VLANs. Understanding VLANs CHAPTER

Introduction to LAN Protocols

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

A primer on modern LANs

Computer Science Department 2 nd semester- Lecture13

Configuring MAC Address Tables

We are going to see a basic definition of the devices you can find in a corporate wired network, so you can understand basic IT engineering jargon.

Configuring VLANs. Understanding VLANs CHAPTER

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

CHAPTER 2 - NETWORK DEVICES

Token Ring VLANs and Related Protocols

4th Slide Set Computer Networks

Network Infrastructure

The Spanning Tree Protocol

Configuring IGMP Snooping and MVR

Configuring VLANs. Understanding VLANs CHAPTER

Starting Interface Configuration (ASA 5505)

Chapter 4 NETWORK HARDWARE

ALB-W en WHITE PAPER. White Paper. Bridging vs Routing in wireless PtmP networks. May 2010 Rev A1

Overview. About the Catalyst 2820 and Catalyst 1900 Switches CHAPTER

Managed Ethernet Switch User s Manual

Configuring VLANs. Understanding VLANs CHAPTER

Transcription:

Lecture 9: Switched Ethernet Features: STP and VLANs Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Ethernet Switch Features The following features in modern Ethernet switches are quite useful to the network administrator: 1. Self-learning (backwards-learning) 2. Spanning Tree Protocol (STP) IEEE 802.1D 3. Virtual LAN (VLAN) IEEE 802.1Q 2 1

Ethernet Switch is Transparent Switches were designed to mimic hubs, so they are transparent to the Ethernet machines attached to them. In other words, a switch acts like a shared medium, but without the possibility of collisions. When a frame arrives at one port of a switch, the switch forwards that frame to all ports exceptthe one that the frame arrived on. This behavior is known as flooding. It makes the switch look like a shared medium. 3 Ethernet Switch is Transparent Remember: Ports on the switch do NOT have MAC addresses (nor IP address). A switch is not like a router. Each interface on a router has its own MAC address and IP address (see later). An exception is if the switch has a controller inside it to allow the administrator to control the switch. In such case, only the controller (which shows a Web page sometimes) has a MAC address, not the switch ports themselves. 4 2

Advanced Switch: Forwarding Floodingmakes sure that each frame is seen by all machines on the Ethernet LAN, but wastes resources since most communications are unicast (intended to one destination). Forwardingwas introduced in newer switches. The switch forwards the frame to only one port where the destination machine is connected (not to all ports). The switch (Layer 2 device) can read the unicast destination address (DA) in the frame and decide where to send the frame based on this DA. Forwarding (rather than flooding) reduces the number of packets processed by each switch port (and station), and enhances privacy. 5 Self-Learning (or Backward-Learning) Switches Problem: How can the switch know the MAC address (global or local) of each machine the administrator connects to its ports? Table lookup of MAC addresses connected to each of the switch ports. Configuring an Ethernet switch with a static table by the administrator is: Time consuming. Error prone. Moving a station from one LAN to another LAN requires maintenance of the tables. 6 3

Self-Learning Algorithm When the switch boots, its self-learning hash table is empty. When the switch receives a frame to forward, the switch inspects the DA and SA of the frame: DA: If the switch knows the port belonging to the DA the switch forwards only to that port; otherwise the switch floods(i.e., forwards to all ports except the one that the frame arrived on). SA: The hash table is updated by the SA information. Hash tables are treated as cache entries: New information overrides old information Each entry is assigned a timeout, after which it is erased. 7 Example Event Port 0 List Port 1 List Port 2 List Bridge Action Bridge boots - - - Empty Tables U sends to V - U - Flood (to Ports 0 and 2) V sends to U - U, V - Discard Z broadcasts - U, V Z Flood (to Ports 0 and 1) Y sends to V - U, V Z, Y Forward to Port 1 Y sends to X - U, V Z, Y Flood (to Ports 0 and 1) X sends to W - U, V Z, Y, X Flood (to Ports 0 and 1) W sends to Z - U, V, W Z, Y, X Forward to Port 2 8 4

Spanning Tree Protocol (STP) Avoids Loops LAN 2 Frame copied by S1 S1 Switc hes Frame copied by S2 S2 Z LAN 1 A Initial frame: DA = MAC Z SA = MAC A 9 10 5

Virtual LANs (VLANs) All hosts connected to an Ethernet LAN (consisting of one or more switches) are in the same broadcast domain. If one host connected to the LAN sends a broadcast, all of the other hosts receive the broadcast, wasting bandwidth. For some protocols, a broadcast received by a host results in that same host transmitting a broadcast of its own. Then when all the hosts receive the first broadcast, they all end up transmitting even more broadcasts. All these broadcasts snowball into a broadcast storm. Typically few hosts on each LAN really need to broadcast to each other. VLANs isolate broadcast domains by splitting an Ethernet switch into multiple virtual switches. This reduces overall traffic, avoids broadcast storms, improves security by isolating traffic, and improves privacy. All is done by software. 11 Virtual LANs (VLANs) 12 6

13 VLAN: Administrator Power Most switches require assigning a number to a VLAN when it is created, such as VLAN 10, VLAN 20, etc. No traffic is able to go from one VLAN to another. By default, there will be no inter-vlan traffic on the switch, unless a router (Layer 3 device) is involved (probably along with a firewall for security). When using VLANs, Ethernet frames contain the optional IEEE 802.1Q tag to identify to which VLAN it belongs. Common approaches to assigning VLAN membership: Static VLANs(port-based VLANs): assigns ports on a switch to a VLAN. The device automatically assumes the VLAN of the port. Dynamic VLANs: created through a software package (VLAN Management Policy Server), where an administrator assigns VLANs dynamically based on information such as the source MAC address of the device connected to the port or the username used to log onto that device, etc. 14 7

15 8