LAN Hardware

Four hardware devices are used in LANs:

  • Hubs multiport repeaters. Hubs work at the Physical layer (Layer-1) of the OSI Model, repeating signals out of all hub ports.

  • Bridges multiport hubs. Bridges work at the Physical layer (Layer-1) of the OSI Model and operate at the Data-Link layer (Layer-2). Bridges forward data frames based on the destination MAC address using the spanning tree algorithm for path determination.

  • LAN switches multiport bridges. LAN switches connect common broadcast domains, providing frame-level filtering and dedicated port-speed to end-users. LAN switches create Virtual LANs, or VLANs. Like bridges, LAN switches use the spanning tree algorithm for path determination.

  • Routers found at the edge of a LAN providing the interface to a WAN, such as a Frame Relay network or the Internet. Routers operate at the Network layer (Layer-3) of the OSI Model.

Hubs

Hubs connect devices on one shared LAN, as illustrated in Figure 5-14. Because only two devices can be connected with LAN cables, a hub is needed to interconnect two or more devices on a single LAN. The cable termination points are the hub and the LAN device (host).

Figure 5-14. Hub-based Network

graphics/05fig14.gif

Hubs are not smart devices, meaning that they only repeat the data sent from a network host on one port to all other hub ports, without examining the data frame or the frame header. When network hosts are connected by a hub, each hubbed host will hear all conversations across the LAN. Each host examines the message header to determine whether it is the intended recipient.

Backbone hubs are deployed to connect other hubs into a single termination, or root, point. This is known as a multi-tiered design and is illustrated in Figure 5-15.

Figure 5-15. Backbone, or Multi-Tiered, Hub Network

graphics/05fig15.gif

A couple benefits are derived from multi-tiered designs:

  • They provide interdepartmental connections between hubs.

  • They extend the maximum distance between any pair of hosts on the network.

Bridges

Bridges connect LAN segments, lengthening the diameter (across a distance) of the LAN as well as segmenting, or breaking up, collision domains. The four types of LAN bridging are listed here:

  • Transparent bridging Ethernet bridging (see Figure 5-16) connects two or more LAN segments and is transparent to end-devices.

    Figure 5-16. Transparent Bridge Connecting Two Ethernet LAN Segments

    graphics/05fig16.gif

  • Source-route bridging Token Ring bridging (see Figure 5-17) connects Token Ring LAN segments, whereby frames are sent from the originating host with the source-to-destination route, or path, included.

    Figure 5-17. Source-Route Bridge (SRB) Connecting Two Token Ring LAN Segments

    graphics/05fig17.gif

  • Source-route translational bridging Also known as mixed-media bridging, connects networks of two different media (see Figure 5-18), such as Ethernet and Token Ring.

    Figure 5-18. Source-Route Translational Bridge Connecting One Ethernet LAN Segment and One Token Ring LAN Segment

    graphics/05fig18.gif

  • Source-route transparent bridging Token Ring bridging (see Figure 5-19) that will either source-route or transparently bridge a frame depending on the Routing Information Indicator (RII) field.

    Figure 5-19. Source-Route Transparent Bridge Connecting Two Token Ring LAN Segments

    graphics/05fig19.gif

Cisco Note: Cisco Specific Bridging Solutions

Cisco has developed five alternative solutions to the previously discussed bridging options. These five are as follows:

  • Concurrent Routing and Bridging (CRB) Specific protocols can be bridged out from specific interfaces and routed out other interfaces. However, the protocols in question do not interconnect, or "mix."

  • Integrated Routing and Bridging (IRB) Unlike CRB, IRB enables bridged and routed traffic of the same protocol to be interchanged by creating a logical interface, called the Bridge Virtual Identifier (BVI).

  • Virtual Rings for Multi-Port Source Route Bridges Where standard Token Ring bridges have only two ports, Cisco routers can be configured as a multi-port source-route bridge by creating a virtual-ring within the router.

  • Remote Source Route Bridging (RSRB) Instead of forwarding Token Ring frames from one physical interface to another through a virtual-ring, RSRB forwards Token Ring frames from physical Token Ring interfaces to interfaces connected to an IP cloud through a virtual-ring. RSRB provides a method for performing source route bridging over a WAN, such as Frame Relay or ATM.

  • Data-Link Switching Plus (DLSw+) DLSw+ is backwards compatible with Remote Source Route Bridging (RSRB). DLSw+ performs the same functions as RSRB with additional options supported. DLSw+ enables interconnection of transparent bridging (TB), source-route transparent bridging (SRT), source-route translational bridging (SR/TLB), and SDLC-to-LAN Conversion (SDLLC) over an IP backbone.

Spanning-Tree Protocol (IEEE 802.1d)

The Spanning-Tree Protocol (STP) is the protocol used in a bridged or switched environment enabling these devices (bridges and switches) to communicate LAN management information with each other. When multiple bridges or switches are interconnected with multiple paths, a looped topology can be formed. A looped topology often is desirable to provide redundancy, but looped traffic is undesirable and bridged traffic is especially vulnerable to broadcast loops. The STP, IEEE 802.1d, was designed to prevent broadcast loops from being formed. The STP originally was developed for bridges; however, today it also is applied to LAN switch topologies. By applying the STP to a looped bridged or LAN switch topology, all bridged segments will be reachable, but any points where loops can occur will be blocked.

Technical Note: Spanning Tree Port States

The IEEE 802.1d specification defines five port states (in order) for STP:

  • Disabled The port has either been disabled by the switch itself because of physical problems or security, or it has been manually disabled by the network administrator.

  • Blocking The port only listens for BPDUs from other bridges; it does not forward any data frames. In this state, the bridge assumes that it's the root until it exchanges BPDUs with other bridges.

  • Listening The port listens for frames to detect available paths to the root bridge but will not take any source MAC addresses of end-stations and place them into the bridge's address table. Also in this state, the bridge will not forward any user frames.

  • Learning The port examines data frames for the source MAC address and places these addresses in the bridge's address table. Like the listening state, no user data frames are forwarded while the port is in this state.

  • Forwarding The port is now placed into a forwarding state, where the bridge performs its normal functioning. The bridge learns source MAC addresses, updates the bridge's CAM table, and forwards frames through the bridge itself.

When a bridge or LAN switch port is activated, it proceeds through three spanning tree states: listening, learning, and forwarding. If the port is the highest cost path to the root bridge in a looped topology, it enters the blocking state. By default, all bridge ports go through the first two states: learning and listening. Based on the information obtained during these states, the interface enters either the forwarding or blocking state.

The spanning tree algorithm takes 50 seconds to calculate a new topology. The transition time for each state is as follows:

  • From blocking to listening 20 seconds

  • From listening to learning 15 seconds

  • From learning to forwarding 15 seconds

Latency, in addition to normal operation, is incurred when the ports go through the different states due to a network change, such as a failed path, addition of a new bridge or switch, or enabling a bridge or switch port. Cisco uses a default value of 15 seconds for the Forward Delay time, which is used to measure the time a port stays in a specific state.

Switches

LAN switches connect common broadcast domains and provide frame-level filtering as well as dedicated port speed to end-users. Some switches have limited routing capabilities and can provide Layer-3 routing functions at the most basic level. Some benefits of using switches are higher bandwidth to the desktop and ease of configuration. Switches are deployed often to replace hubs and bridges as more bandwidth-intensive applications are implemented within an organization.

NOTE

Virtual LANs (VLANs) are implemented in switched environments and can keep broadcast traffic within a specific domain of network users.

Switch Operations

Switches carry network traffic by receiving data frames from a source host (connected to a switch port) and forwarding these frames through a different switch port (based on the frame header information). Traditional Layer-2 switching works by looking at the Media Access Control (MAC) address information in the data frame's header and forward the data according to the switch, or Content Addressable Memory (CAM) table. If the switch looks at the MAC address information and cannot determine which port to send the frames, the switch will broadcast (flood) the frames out from all ports. This broadcast process is known as flooding and is used to determine the destination port of a host (based on the destination information in the frame header). When the destination address is found, the associated port information is added to the switching table for future reference.

Switches give network users the ability to transfer data traffic in a network environment without collisions or bandwidth contention. Deploying LAN switches in an existing network environment requires minimal configuration and no changes to existing wiring closets, hubs, LAN cabling, or NICs.

There are several types of switching technologies that enable quick and scalable network transmission.

Switching Types

These four types of LAN switching are found today:

  • Store and Forward Switching This is one of the two common types of LAN switching. A Store and Forward switch works by reading and copying the entire data frame into its buffers. The switch performs error checking, looks up the destination address in the MAC address table, and forwards the frame to the appropriate destination.

  • Cut-through Switching This is the other common LAN switching type. A Cut-through switch copies the destination address and a small portion of the frame into its buffers before checking for the destination address interface in its MAC address table. When the destination port is determined, the frame is sent out the appropriate switch port. Cut-through switching increases switching speed because the switch does not copy the entire frame to the switch buffers.

  • Fast Switching This is the process of copying data frames into a memory buffer. The switch determines the switching path to the destination port by looking up the location of the destination port in the fast-switching cache. After the destination host path is determined, subsequent data frames use that switching path, thereby reducing path determination time.

  • Layer-3 Switching This uses routing functions, such as network layer addressing. Switches can be configured like routers regarding an addressing mechanism, but are still bound by a flat-network addressing scheme (no hierarchical addressing is supported). Switches that operate at Layer-3 currently do not support special features such as path optimization and load balancing.

NOTE

Layer-3 switching differs from the traditional Layer-2 switching by enabling data frames to be switched based on network addressing information. Traditional Layer-2 switching will look at the frames for the MAC address information for the destination address.

Routers

Routers are hardware devices that enable communications between networks. Routers are protocol-specific in that they must support the network-layer protocol used by each data packet. For example, for a router to support Internet connections, it must be able to support IP traffic; or for support of a Novell Netware implementation, the router must support IPX.

Routers often are found connecting a LAN to a WAN, such as a Frame Relay network or to the Internet. Routers can support multiple networks, limited only to the number of network interfaces (serial ports) that are available on the particular unit in question.

Routers are available in several sizes, for example:

  • SOHO (Cisco 700/1600 Series)

  • Small (Cisco 26xx Series)

  • Medium (Cisco 3600/4500 Series)

  • Large (Cisco 7x00 Series)

  • Very Large (Cisco 12000 Series)

Routers examine and evaluate each packet arriving from and/or sending to each of the networks to which the router is attached. The router decides which network provides the best path, or route, to the packet's intended destination. The router can make this decision because the router has direct knowledge about each network to which it is connected and the protocols each network supports.

Routers forward packets by maintaining a list of each network and its connected hosts. This list is called a routing table and is maintained (and updated) by the use of routing protocols. Routing protocols are a suite of protocols, such as Open Shortest Path First (OSPF); Border Gateway Protocol, version 4 (BGP4); or Routing Information Protocol (RIP). These routing protocols each use a different method to learn the routes to networks and hosts. In the event there are multiple routes to a specific network/host, each routing protocol uses a different algorithm to determine which route is the best choice to the targeted destination network/host.



Network Sales and Services Handbook
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net