internetworking - university of colorado colorado springs

23
chow CS522 F96-Internetworking-11/15/99–Page 1- Internetworking Common Types of relays: Layer 1: Repeaters copy individual bits between cable segments Layer 2: Bridges store/forward frames between LAN’s Layer 3: Gateways(routers) store/forward packets between dissimilar networks Layer 4: Protocol Converters provide interfacing in higher layers. Internetworking Requirements 1. provide connections between networks. 2. provide routing and delivery of messages on different networks. 3. provide accounting service and topology/status information. 4. Resolve network differences: l Address schemes. l maximum packet sizes. l network access mechanisms l time-outs. l error recovery l status reporting l routing techniques. l user access control l connection, connectionless

Upload: others

Post on 03-Feb-2022

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 1-

InternetworkingCommon Types of relays:Layer 1: Repeaters copy individual bits between cable segmentsLayer 2: Bridges store/forward frames between LAN’sLayer 3: Gateways(routers) store/forward packets between dissimilar networksLayer 4: Protocol Converters provide interfacing in higher layers.

Internetworking Requirements1. provide connections between networks.2. provide routing and delivery of messages on different networks.3. provide accounting service and topology/status information.4. Resolve network differences:l Address schemes. l maximum packet sizes.l network access mechanisms l time-outs.l error recoveryl status reporting

l routing techniques.l user access controll connection, connectionless

Page 2: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 2-

Protocol Mismatch ProblemsHard Protocol Mismatch Soft Protocol Mismatchcan not be resolved, can be resolved by usingneed higher layer solution common subset of functionalitye.g. performance may degradeidle signal incompatible between e.g.

Digital SW and HDLC, speed difference→use buffer,frame size difference among 802 standards, timer difference,old T1 and ISDN. no equivalent A, C bits in 802.3,

priority.

XISDN terminal

Multimedia terminalRedcom DigitalSwitch

01111111idle signal

01111111illegal HDLC frame

Gateway

Fujitsu

Bellcorehung system

Page 3: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 3-

Frame Format Mismatch in 802

The gray box indicates the standard contains this specific field.

Page 4: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 4-

Protocol Mismatch among 802 Standards

Page 5: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 5-

Why we use bridge?

l reliability. Shield problematic LANs from others.l performance. Bridges can isolate traffic, not relay unnecessary traffic.l security. Not forward sensitive frames outside certain LAN.l geography. Increase total distance, allow > 2.5km for 802.3.

Page 6: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 6-

802.3 to 802.4 LAN Bridge

Page 7: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 7-

Looping problem with redundant bridges

Page 8: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 8-

Spanning Tree Approach

Page 9: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 9-

Spanning Tree BridgeHow to avoid looping of messages? → form a spanning tree among bridges.Every bridge is assigned a ID.There is a special group MAC address - “all bridges on this internetwork”Each port of the bridge is uniquely identified (by the LAN ID it connects to).

Spanning Tree algorithm:1. Elects the root bridge of the spanning tree. (distributed voting problem)2. Determine the root port on all other bridges.

root port is the port of a bridge that pointed to the root bridge (with the lowest root path cost, RPC)

3. Select the designated bridge with the lowest RPC and lowest bridge ID on each LAN.

Page 10: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 10-

Exercise on Spanning Tree BridgeFor the topology below Use hop count as cost, and choose low ID bridge to break

tie.

B101 B107

B106B105B104B103

B102

stationX

stationZ

LAN A

LAN B LAN C

LAN D LAN E LAN F LAN G

Page 11: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 11-

a) Find the spanning tree.

B101 B107

B106B105B104B103

B102

stationX

stationZ

d

d

r r

d d d

r r

r r

d

rootbridge

LAN A

LAN B LAN C

LAN D LAN E LAN F LAN G

Page 12: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 12-

B101

B107

B106B105

B104B103 B102

stationX

stationZ

dd

r r

d d

d

r r

r r

d

rootbridge

LAN ALAN B

LAN CLAN D LAN E

LAN F LAN G

d

Page 13: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 13-

Source Routing Bridges 802.5The host machine of the source is responsible to identify the non-local msg and

compute the exact path to the destination.If a host does not have enough topology information, it broadcasts the discovery

frame and the optimal path is encoded in the acknowledge message coming back.

The path is encoded in (bridge ID, LAN ID, bridge ID, LAN ID,....) form and attached to the header of a non-local msg.

Four Routing Directivesl NullNo routing (with the same LAN).l NonbroadcastUsing the above path encoded form, follow a specific path

to destination.l All-route broadcastframe will deliver by all possible routes to destination.l Single-route broadcastusing spanning tree algorithm, frame only deliver

one copy to each LAN.

Page 14: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 14-

Route Discovery ExampleFor station X attached to LAN D to discover the route to station Z attached to LAN

G using the single-route broadcast and all-route broadcast response, how many messages will be generated?

B101

B107

B106

B105B104

B102stationX

stationZ

LAN ALAN B LAN CLAN D

LAN E

LAN GB103

LAN F

Single-route broadcast: requires 7 messages. Each LAN is delivered one message.

All-route broadcast response: requires 10 messages.

B101

B107

B106

B105

B104

B102station

Xstation

Z

LAN ALAN B LAN CLAN D

LAN E

LAN GB103

LAN F

Page 15: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 15-

FDDI: Fiber Distributed Data Interfacel 100Mbps, 200km, 1K stations, error rate=4x10-9. Often used as a backbone

network.l MA protocol like 802.5 but releases token right after data is sent (multiple

token mode).l The synchronous frames generated by a master station every 125µsec.

Page 16: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 16-

FDDI/Token Ring ComparisonFDDI 802.5 Token Ring

Data Rate 100 Mbits/sec 4 or 16 Mbits/sec

Media Fiber (multi-mode) Twisted (shield) pair

Encoding 4B/5B–80% efficient+-10% DC offset

Manchester-50% efficientNo DC offset

Clocking Distributed receive & transmit clocks

Centralized active ring monitor

Max. Frame Size 4500 Bytes No Limit

Frame Format FC Frame Controldifferentiate token & frame

Has AC–Access Control field

Priority Handling Uses station priority Uses ring (ppp&rrr bits)

Priority Levels Sync & Optional 8 levels 8 levels

Transmission Process

Byte level manipulationRequires half duplex

Bit level manipulationRequires full duplex

Token Transfer early token release single token mode

Page 17: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 17-

FDDI with two CounterRotating Rings

Page 18: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 18-

Fast Ethernet

Name CableMax.

Segment

Advantages DisadvantageClockRate

100Base-T4 Twisted pair

100 m Uses category 3 UTP

4 pairsupstream only 33.3Mbps

25MHz

100Base-TX Twisted pair

100 m Full duplex at 100Mbps

2 pairs 125MHz

100Base-F Fiber optics

2000m Full duplex at100Mbps; long runs

expensivetwo strandsmultimode fiber

125MHz?

Page 19: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 19-

Gigabit Ethernet

l http://www.gigabit-ethernet.org/technology/whitepapers/index.html

Page 20: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 20-

Gigabit Ethernet Function Elements

Page 21: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 21-

Network Backbone Connection Prices

Page 22: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 22-

Fibre Channell Use in Mainframe, super computers.

l Recently it was used in Storage Area Network (SAN) for connecting Storage devices and servers.

Page 23: Internetworking - University of Colorado Colorado Springs

chow CS522 F96-Internetworking-11/15/99–Page 23-

Homework #7For the topology in Figure 11.9,a) Find the spanning tree.b) For station X attached to LAN D to discover the route to station Z attached to

LAN G using the single-route broadcast and all-route broadcast response, how many messages will be generated?

Problems 32 and 41, pp.338.