DOC PREVIEW
U of I CS 438 - Bridges and LAN Switches

This preview shows page 1-2-15-16-31-32 out of 32 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 32 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Bridges and LAN SwitchesEthernet Backoff revisitedRepeated CollisionsCapture EffectBridges: Building Extended LAN’sBridgesBridges vs. SwitchesUses and Limitations of BridgesBridges with LoopsExample Extended LAN with LOOPSSpanning Tree AlgorithmDefining a Spanning TreeSlide 13Using a Spanning Tree: ForwardingFinding the Tree by a distributed AlgorithmDistributed Spanning Tree AlgorithmSlide 18Slide 19Bridges: LimitationsSlide 21SwitchForwardingSelf learningFiltering/ForwardingSwitch exampleSlide 27Switch: traffic isolationSwitches: dedicated accessMore on SwitchesInstitutional networkSwitches vs. RoutersSummary comparison01/14/19 CS/ECE 438 - UIUC, Fall 2006 1Bridges and LAN Switches01/14/19 CS/ECE 438 - UIUC, Fall 2006 2Ethernet Backoff revisitedAfter N collisions, pick a number k between 0 and 2N-1Wait for k*51.2 usSend frame if no one has started using the channel01/14/19 CS/ECE 438 - UIUC, Fall 2006 3Repeated CollisionsSuppose A, B, and C each have a frame to send, causing a collisionA picks k=0, B and C pick k=1A wins, sends frameAfter A is done, B and C both try to send againCollision againIncrease collision counter01/14/19 CS/ECE 438 - UIUC, Fall 2006 4Capture EffectA and B collideA picks 0, B picks 1A wins, transmits frameSuppose A has another frame to sendA and B collide againA’s collision counter is 1, pick k from 0,1B’s collision counter is 2, pick k from 0,1,2,3A is likely to win againAnd keep winning!01/14/19 CS/ECE 438 - UIUC, Fall 2006 5Bridges: Building Extended LAN’sTraditional LANShared medium (e.g., Ethernet)Cheap, easy to administerSupports broadcast trafficProblemScale LAN conceptLarger geographic area (> O(1 km))More hosts (> O(100))But retain LAN-like functionalitySolutionbridges01/14/19 CS/ECE 438 - UIUC, Fall 2006 6BridgesProblemLANs have physical limitationsEthernet – 1500mSolutionConnect two or more LANs with a bridgeAccept and forwardLevel 2 connection (no extra packet header)A collection of LANs connected by bridges is called an extended LAN01/14/19 CS/ECE 438 - UIUC, Fall 2006 7Bridges vs. SwitchesSwitch Receive frame on input portTranslate address to output portForward frameBridge Connect shared mediaAll ports bidirectionalRepeat subset of trafficReceive frame on one portSend on all other ports01/14/19 CS/ECE 438 - UIUC, Fall 2006 8Uses and Limitations of BridgesBridgesextend LAN conceptLimited scalability to O(1,000) hostsnot to global networksNot heterogeneoussome use of address, butno translation between frame formats01/14/19 CS/ECE 438 - UIUC, Fall 2006 9Bridges with LoopsProblemIf there is a loop in the extended LAN, a packet could circulate foreverSide question: Are loops good or bad?SolutionSelect which bridges should actively forwardCreate a spanning tree to eliminate unnecessary edgesAdds robustnessComplicates learning/forwarding01/14/19 CS/ECE 438 - UIUC, Fall 2006 10Example Extended LAN with LOOPSB9B4BB7B1B5B2AKJIHGFEDCB01/14/19 CS/ECE 438 - UIUC, Fall 2006 11Spanning Tree AlgorithmView extended LAN as bipartite graphLAN’s are graph nodesBridges are also graph nodesPorts are edges connecting LAN’s to bridgesSpanning tree requiredConnect all LAN’sCan leave out bridges01/14/19 CS/ECE 438 - UIUC, Fall 2006 12Defining a Spanning TreeBasic RulesBridge with the lowest ID is the rootFor a given bridgeA port in the direction of the root bridge is the root portFor a given LANThe bridge closest to the root (or the bridge with the lowest ID to break ties) is the designated bridge for a LANThe corresponding port is the designated portBridges with no designated ports and ports that are neither a root port nor a designated port are not part of the tree.01/14/19 CS/ECE 438 - UIUC, Fall 2006 13Spanning Tree AlgorithmB9B4BB7B1B5B2B1DDDDDAKJIHGFEDCBRRRRRDDDDDDRootD – designated port R – root port01/14/19 CS/ECE 438 - UIUC, Fall 2006 14Using a Spanning Tree: ForwardingForwardingEach bridge forwards frames over each LAN for which it is the designated bridge or connected by a root portB4B7B1B5B2B1AKJIHGFEDCB01/14/19 CS/ECE 438 - UIUC, Fall 2006 16Finding the Tree by a distributed AlgorithmBridges run a distributed spanning tree algorithmSelect when bridges should actively forward framesDeveloped by Radia Perlman at DECNow IEEE 802.1 specification01/14/19 CS/ECE 438 - UIUC, Fall 2006 17Distributed Spanning Tree AlgorithmBridges exchange configuration messages(Y,d,X)Y = root noded = distance to root nodeX = originating nodeEach bridge records current best configuration message for each portInitially, each bridge believes it is the rootWhen a bridge discovers it is not the root, stop generating messages01/14/19 CS/ECE 438 - UIUC, Fall 2006 18Distributed Spanning Tree AlgorithmBridges forward configuration messagesOutward from root bridgei.e., on all designated portsBridge assumes It is designated bridge for a LANUntil it learns otherwiseSteady Stateroot periodically send configuration messagesA timeout is used to restart the algorithm01/14/19 CS/ECE 438 - UIUC, Fall 2006 19Spanning Tree AlgorithmExample at bridge B31. B3 receives (B2, 0, B2)2. Since 2 < 3, B3 accepts B2 as root3. B3 adds one to the distance advertised by B2 and sends (B2, 1, B3)4. B2 accepts B1 as root and sends (B1, 1, B2)5. B5 accepts B1 as root and sends (B1, 1, B5)6. B3 accepts B1 as root and stops forwardingB4B7B1B5B2B1AKJIHGFEDCB01/14/19 CS/ECE 438 - UIUC, Fall 2006 20Bridges: LimitationsDoes not scaleSpanning tree algorithm scales linearlyBroadcast does not scaleVirtual LANs (VLAN)An extended LAN that is partitioned into several networksEach network appears separateLimits effect of broadcastSimple to change virtual topology01/14/19 CS/ECE 438 - UIUC, Fall 2006 21Bridges: LimitationsDoes not accommodate heterogeneityNetworks must have the same address formate.g. Ethernet-to-EthernetCautionBeware of transparencyMay break assumptions of the point-to-point protocolsFrames may get droppedVariable latencyReordering Bridges happen!01/14/19 CS/ECE 438 - UIUC, Fall 2006 22SwitchLink layer devicestores and forwards Ethernet framesexamines frame header and selectively forwards frame based on MAC dest addresswhen


View Full Document

U of I CS 438 - Bridges and LAN Switches

Documents in this Course
Routing

Routing

5 pages

TCP

TCP

26 pages

TROLL

TROLL

3 pages

Load more
Download Bridges and LAN Switches
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Bridges and LAN Switches and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Bridges and LAN Switches 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?