EE281 Chapter 3a
EE281 Chapter 3a
Chapter 3
Internetworking
Chapter 3
Problems
n
n
n
Chapter 3
Chapter Outline
Switching and Bridging
Basic Internetworking (IP)
Routing
Chapter 3
Chapter Goal
Understanding the functions of switches, bridges
and routers
Discussing Internet Protocol (IP) for
interconnecting networks
Understanding the concept of routing
n
n
n
n
Chapter 3
Chapter 3
Switch
A mechanism that allows us to interconnect
links to form a large network
n A multi-input, multi-output device which
transfers packets from an input to one or more
outputs
n
Chapter 3
Star topology
Chapter 3
Chapter 3
Chapter 3
10
Chapter 3
n
n
11
Chapter 3
n
n
12
Chapter 3
Key Idea
n
13
Chapter 3
14
Chapter 3
15
Chapter 3
16
Chapter 3
17
Chapter 3
18
Chapter 3
Connection setup
Data Transfer
Connection setup
n
19
Chapter 3
n
n
n
20
Chapter 3
We also need to ensure that the chosen VCI on a given link is not
currently in use on that link by some existing connection.
21
Chapter 3
A host can send messages into the network to cause the state to be
established
n
22
Chapter 3
23
Chapter 3
Suppose the VCI value 5 is chosen for the link from host A to switch 1
11 is chosen for the link from switch 1 to switch 2
So the switch 1 will have an entry in the VC table
Incoming
Interface
Incoming VCI
Outgoing
Interface
Outgoing VCI
11
24
Chapter 3
VCI of 7 is chosen to identify this connection on the link from switch 2 to switch 3
VCI of 4 is chosen for the link from switch 3 to host B
Switches 2 and 3 are configured with the following VC table
Incoming
Interface
Incoming VCI
Outgoing
Interface
Outgoing VCI
11
Incoming VCI
Outgoing
Interface
Outgoing VCI
25
Chapter 3
26
Chapter 3
27
Chapter 3
n
n
Thus, some sort of signalling is almost always used, even when setting
up permanent VCs
In case of PVCs, signalling is initiated by the network administrator
SVCs are usually set up using signalling by one of the hosts
28
Chapter 3
To start the signalling process, host A sends a setup message into the
network (i.e. to switch 1)
n
The setup message contains (among other things) the complete destination
address of B.
The setup message needs to get all the way to B to create the necessary
connection state in every switch along the way
It is like sending a datagram to B where every switch knows which output to
send the setup message so that it eventually reaches B
Assume that every switch knows the topology to figure out how to do that
29
Chapter 3
n
n
Each switch can pick any number it likes, as long as that number is not
currently in use for some other connection on that port of that switch
This VCI value can be used by B to identify all packets coming from A
30
Chapter 3
31
Chapter 3
32
Chapter 3
Characteristics of VC
n
Since host A has to wait for the connection request to reach the far side
of the network and return before it can send its first data packet, there is
at least one RTT of delay before data is sent
While the connection request contains the full address for host B (which
might be quite large, being a global identifier on the network), each data
packet contains only a small identifier, which is only unique on one link.
n
Also the old one needs to be torn down to free up table storage space in the
switches
The issue of how a switch decides which link to forward the connection
request on has similarities with the function of a routing algorithm
33
Chapter 3
Good Properties of VC
n
By the time the host gets the go-ahead to send data, it knows quite a lot
about the networkn
For example, that there is really a route to the receiver and that the receiver
is willing to receive data
34
Chapter 3
Buffers are allocated to each virtual circuit when the circuit is initialized
The sliding window protocol is run between each pair of nodes along the
virtual circuit, and this protocol is augmented with the flow control to
keep the sending node from overrunning the buffers allocated at the
receiving node
The circuit is rejected by a given node if not enough buffers are available
at that node when the connection request message is processed
35
n
n
The network gives the user some kind of performance related guarantee
n
Chapter 3
Switches set aside the resources they need to meet this guarantee
n
36
Chapter 3
Simpler to design
Enables parallelism
37
ATM
n
Chapter 3
Switch-to-switch format
GFC becomes part of VPI field
38
Chapter 3
ATM Switching
n
ATM uses a hierarchy at the VC: All the circuits with the same
VPI can be treated as a group (a virtual path) and can be
switched together looking at VPI reducing the size of VC
table
CRC-8 is used for error detection and single-bit error
correction on the cell header
ATM uses fixed size cells
n
n
Chapter 3
Chapter 3
41
Chapter 3
Three ways to handle headers for source routting: (a) rotation; (b) stripping;
(c) pointer. The labels are read right to left.
42
Chapter 3
Source Routing
n
Chapter 3
Source Routing
Source Routing is useful in the following
situations
Mapping of the network: used in traceroute
(tracert in MS Windows) to find all the routes
between two points
n Troubleshooting: e.g., trying to find out from
point A why F cannot talk to L
n Performance: network manager might decide
to use a slower but less congested route
n Hacking: direct packets through a specific
machine
n
44
Chapter 3
An alternative would be to put a node between the two Ethernets and have
the node forward frames from one Ethernet to the other
n
n
45
Chapter 3
Repeaters only move bits, not frames, and just blindly copy bits from
one interface to another
Bridges fully implement the Ethernets collision detection and media
access protocol on each interfaces.
n
Therefore, the Ethernet length and number-of-host restriction, which are all about
managing collisions, would not apply
Operates in promiscuous mode, accepting all frames transmitted on one interface
and forwarding them to the other.
Accept LAN frames on their inputs and forward them out to all other
outputs
Used by early bridges
Learning Bridges
n
Observe that there is no need to forward all the frames that a bridge
receives
46
Chapter 3
How does a bridge come to learn on which port the various hosts
reside?
47
Chapter 3
-------------------A
Port 1
Port 2
Bridge
Port
Human
n
48
Chapter 3
Yes
How
n
n
n
n
n
n
Each bridge inspects the source address in all the frames it receives
Record the information at the bridge and build the table
When a bridge first boots, this table is empty
Entries are added over time
A timeout is associated with each entry
The bridge discards the entry after a specified period of time
n
To protect against the situation in which a host is moved from one network to
another
Chapter 3
50
Chapter 3
Solution
n
51
Chapter 3
Spanning tree keeps all the vertices of the original graph but
throws out some of the edges
Chapter 3
Each bridge decides the ports over which it is and is not willing to
forward frames
n
53
Chapter 3
Main idea
n
Each bridge selects the ports over which they will forward the
frames
54
Chapter 3
n
n
Elect the bridge with the smallest id as the root of the spanning
tree
The root bridge always forwards frames out over all of its ports
Each bridge computes the shortest path to the root and notes
which of its ports is on this path
n
55
Chapter 3
Each LANs designated bridge is the one that is closest to the root
If two or more bridges are equally close to the root,
n Then select bridge with the smallest id
Each bridge is connected to more than one LAN
n
56
n
n
Chapter 3
Because B5 and B7 have the same distance from LAN B to B1 but B5 has
smaller ID
57
Chapter 3
58
Chapter 3
2.
3.
Chapter 3
60
Chapter 3
The bridge discards the old information and saves the new information
It first adds 1 to the distance-to-root field
61
Chapter 3
62
Chapter 3
Consider the situation when the power had just been restored to the
building housing the following network
63
Chapter 3
64
1.
2.
3.
4.
5.
6.
Chapter 3
65
Chapter 3
Even after the system has stabilized, the root bridge continues to
send configuration messages periodically
n
When a bridge fails, the downstream bridges will not receive the
configuration messages
After waiting a specified period of time, they will once again claim to
be the root and the algorithm starts again
Note
n
66
Chapter 3
n
n
Current practice
Chapter 3
Do not scale
n
n
68
Chapter 3
69