Section 5.7. Network of LANs


5.7. Network of LANs

Increasing the number of interconnected devices and the volume of traffic requires splitting a single large LAN into multiple smaller LANs. Doing so dramatically improves network performance and security but also introduces a new challenge: how to interconnect multiple LANs. LANs may be of different types or may have devices that are not compatible with one another. New protocols need to be developed that allow all partitions of a LAN to communicate with one another.

Multiple LANs can be connected to form a college campus network. The campus backbone serves as a channel between a department and the rest of the campus network and facilitates the connection of the department to the Internet via a gateway router. The campus backbone is an interconnection of routers and switches. Servers used by an entire organization are usually located in a data bank and organization dispatching center.

Devices known as protocol converters are used to interconnect multiple LANs. Depending on the level of interconnection required, layer 1, layer 2, layer 3, and layer 4 protocol converters are available. Two networks can be connected using layer 1 devices referred to as hubs and repeaters . Layer 2 protocol converters have information about the layer 2 protocols on both interconnected LANs and can translate one to the other. At layer 2, bridges and switches can carry out the task as layer 2 devices. At layers 3 and 4, routers and gateways , respectively, are used.

5.7.1. Using Repeaters, Hubs, and Bridges

In Chapter 3, we explained the operations of repeaters, hubs, and bridges. Figure 5.9 shows a situation in which bus LANs are interconnected through repeaters. Users A G are connected to multiple Ethernet LANs. Users of these networks are aware of the existence of repeaters and function as a single large LAN. Any user reads all flowing frames sent by other users but accepts those frames that are specifically addressed to it. Thus, collisions may be possible throughout the network if two or more users try to transmit at the same time.

Figure 5.9. Seven layer 1 users connected through repeaters

Figure 5.10 depicts a network connection using hubs. A hub is similar to a repeater but copies frames and forwards them to all connected users. As in the case of a repeater, collisions may occur if two or more users try to transmit at the same time. Hubs and repeaters have the following limitations.

  • Hubs forward frames to all users. This method of networking results in reduced LAN performance, owing to excess traffic.

  • A large number of users are included in the collision domain.

  • Security cannot be implemented, since a frame is forwarded to all users.

Figure 5.10. Using hubs in layer 1


Bridges

Clearly, using a bridge for networking Ethernet LANs can reduce the possibility of collision, as bridges split a LAN system into different collision domains. Because they can selectively retransmit the frame, bridges also offer a greater level of security than repeaters can. Bridges also facilitate communication across multiple LANs and bridges. Sometimes, a bridge that connects two LANs with nonidentical bit rates must have a buffer. A buffer in a bridge holds frames that arrive from a faster LAN directed to a slower LAN. This introduces transmission delay and has adverse effects on the network, causing the flow-control protocols to time out.

Figure 5.11 shows multiple bus LANs being connected by bridges. Suppose that user 1 wants to transmit a frame to user 5. First, bridge B1 examines the destination address and determines whether the forwarded frame is to be delivered to any of the users on LAN 2. If user 3 is not the destination within its connected LANs, the frame can be either dropped or forwarded on LAN2. Making such decisions is a bridge routing capability and depends on how well the routing table of the bridge is structured. Thus, the bridge decides whether to accept or reject a frame at any time.

Figure 5.11. Connecting LANs through bridges


If it decides to forward a frame on LAN 2, bridge B1 also performs error detection to ensure that the frame is not corrupted. Next, the bridge checks whether LAN 2 and LAN 5 have the same frame format. If they do, the bridge forwards the frame as is. If the frame format is different, it is reformatted to match the frame format of LAN 5. Since a bridge in such scenarios is generally connected to an Ethernet LAN, the bridge has to conform to CSMA/CD while transmitting the frame. When the frame reaches bridges B2 and B3, the same procedure as the one completed in B1 takes place. As a result, B3 rejects the frame, and B2 accepts the frame. The frame is now forwarded on LAN 2. The frame ultimately reaches the destination at user 3 after passing safely over LAN 2, B3, and LAN 3.

A bridge that connects two LANs, such as an Ethernet LAN and a token-ring LAN, has to reformat frames before any transmission. A frame arriving from a token-ring LAN is reformatted to match the Ethernet LAN. As the Ethernet frame format does not contain the priority field, the priority information specified by the token-ring frame is lost. In contrast, a frame arriving from an Ethernet network is assigned a default priority before transmission to the token-ring LAN. Figure 5.12 shows an example in which a LAN using bridges and hubs interconnects a token-ring LAN with several other LANs.

Figure 5.12. Using bridges and hubs

A bridge does not have a global view of its outside network but rather has knowledge only of immediate neighbors. Bridge routing is a process of deciding where to forward received frames. Bridges have this information stored in a table called the routing table . Each bridge has multiple subrouting tables for corresponding to all its existing surrounding connected LANs. The routing table consists of the destination address and the destination LAN.

Example.

Table 5.1 provides a bridge routing table for B2 and B3 in Figure 5.11. Table 5.2 gives more detail of a routing table for bridge B1. B1 has one routing table for LAN 1 and another routing table for LAN 2. For example, if a frame arrives on LAN 1, the bridge parses the frame for the destination address and looks up the routing table for source LAN 1. If the destination is user 1, the LAN does not need to forward the frame. However, for destinations at user 2, user 3, and user 5, the bridge forwards the frame to LAN 2. For the destination at user 5, the bridge forwards the frame to LAN 4. LAN 1 has five users, LAN 2 has four computers, and LAN 3 has LAN 2 users. Port 1 of the bridge connects to LAN 1, Port 2 of the bridge connects to LAN 2, and port 3 of the bridge connects to LAN 3.

Table 5.1. Routing table for two bridges (B1 and B3) of Figure 5.11

Dest. from LAN 1

Next LAN from LAN 1

Dest. from LAN 2

Next LAN from LAN 2

Dest. from LAN 1

Next LAN from LAN 1

Dest. from LAN 2

Next LAN from LAN 2

User 1

User 1

LAN 1

User 1

User 1

LAN 2

User 2

LAN 2

User 2

User 2

User 2

LAN 2

User 3

LAN 2

User 3

User 3

LAN 4

User 3

User 4

LAN 2

User 4

User 4

User 4

User 5

L2

User 5

User 5

LAN 4

User 5


Table 5.2. Bridge routing table for bridge B2 in Figure 5.11

Destination MAC Address

Next LAN

00-40-33-25-85-BB

LAN 1

00-40-33-25-85-BC

LAN 1

00-61-97-44-45-5B

LAN 2

00-C0-96-25-45-C7

LAN 2


In a static network, connections are fixed, so the routing table entries can be programmed into the bridge: fixed routing . In case of any changes to the network, the table entries need to be reprogrammed. This solution is not scalable for large, dynamic networks having frequent user addition and removal. Hence, such networks use an automatic update of the routing tables.

In Figure 5.13, for example, if user 1 on LAN 1 sends a frame to user 5 on LAN 1, any corresponding bridge, such as B1 or B5 can figure out that both user 1 and user 5 belong to LAN 1 and forward the frame within LAN 1. Bridge B1 or B2 has the MAC addresses of both user 1 and user 5. Similarly, if user 10 is transmitting a frame to user 11, bridge B5 records the MAC addresses of users 10 and 11 and LAN 3 in its routing table. Each bridge must parse the destination address of an incoming frame in its routing table to determine the association between the destination MAC address and the MAC addresses of the devices connected to its LAN. The bridge scans the routing table to determine whether an association exists and forwards the frame if an entry is in the routing table.

Figure 5.13. Bridging in local area networks


Bridges that update their routing tables are called transparent bridges and are typically equipped with the IEEE 802.1d standard. These bridges act as plug-and-play devices and have the capability to build their own routing tables instantaneously. A transparent bridge also has the intelligence to learn about any change in the topology and to update its routing table. This type of bridge can dynamically build the routing table, based on the information from arriving frames. By parsing the source address of a received frame, a bridge can determine how it can access the local area network of the arriving frame. Based on this information, the bridge updates its routing table.

Example.

Suppose that frames from user 1 move from LAN 1 to LAN 2 in Figure 5.11. If user 1 transmits a frame to user 2 located in LAN 2, bridge B4 examines its routing table and discovers that the direction on which it received the frame from user 1 is not the same as what it has in its routing table. Hence, bridge B4 updates its routing table.

A bridge initializes its routing tables by using the flooding algorithm. When none of the users in the network have routing table entries, a frame is flooded across the network to all users. If a frame arrives on a bridge that does not have the routing table entry for the destination, the frame is flooded across all users. As more and more frames are flooded through the network, all bridges will eventually have routing table entries.

Example.

Interconnection of multiple LANs via bridges can potentially result in the frames circulating indefinitely. One such situation is illustrated in Figure 5.13, where multiple routes are possible between user 1 and user 9. User 1 can reach user 9 via route LAN 1-B1-LAN 4-B2-LAN 2. user 1 can also reach user 9 via LAN 1-B5-LAN 2. With flooding algorithm, a frame released from user 1 being transmitted to user 9 via route LAN 1-B1-LAN 4-B2-LAN 2 can be transmitted back to user 1 via bridge B5, resulting in an infinite loop and hence network congestion.

Spanning-Tree Algorithm

The spanning-tree algorithm is used to overcome the problem of infinite loops in networks with bridges. A spanning tree generates a subset of bridges to be used in the network to avoid loops . The algorithm is as follows

Begin Spanning-Tree Algorithm
  1. Each link from a bridge to a LAN is assigned a cost. This link cost is inversely proportional to the link's bit rate. A higher bit rate implies a lower cost.

  2. Any bridge with the lowest ID is selected as root. A spanning tree is constructed originating from the root bridge. To build the spanning tree, all bridges send a special frame, called a bridge protocol data unit (BPDU), comprising a bridge ID and the aggregate cost, from a sender to a receiving user.

  3. A receiving bridge compares the sender's bridge ID with its own ID. If the sender's bridge ID is lower, the BPDU is not forwarded. If the sender's bridge ID is higher, the BPDU is stored and forwarded to other users after incrementing the cost. Thus, the bridge determines that it is not the root bridge and stops sending BPDU advertising for the lowest bridge ID. Over a period of time, all bridges, excluding the bridge with the lowest ID, stop sending BPDUs. When the bridge receives no other BPDUs, it declares itself the root bridge.

  4. Based on the comparison of all the stored BPDUs, each of the involving bridges determines e least-cost path to the root bridge with an identified port number. This port is called the root port, and any bridge communicates with the root bridge through the root port.

  5. Every LAN determines a designated bridge through which it forwards frames. To determine the designated bridge, each bridge sends BPDUs to all LANs to which it is connected. Bridges connected to a particular LAN compare the respective costs to reach the root bridge. The bridge with the lowest cost is designated the root bridge. In case of a tie, the lowest bridge ID determines the designated bridge.

Example.

Figure 5.14 shows that every component of a LAN system is assigned an IP address. Every piece of a LAN cable, including the ones that connect a bridge to a bus, takes an IP address.

Figure 5.14. A LAN system and the assignment of IP addresses

5.7.2. Layers 2 and 3 Switches

As the complexity of the network system grows, layer 2 devices are not adequate to meet the needs of networks. Users on LANs connected by layer 2 switches have a common MAC broadcast address. Hence, a frame with a broadcast MAC address is forwarded to all users on the network. In a large network, this is considered a large overhead and may result in network congestion. Another issue with layer 2 switches is that to avoid closed loops, there can be only one path between two users. This poses a significant limitation on the performance of large networks. The limitations are overcome by splitting the network into subnets.

Routers, known as layer 3 switches, implement the switching and forwarding functions at the network layer of the protocol stack. The routers are capable of handling heavy traffic loads. Routers are also used to connect multiple subnets in LANs. Routers are sophisticated devices that permit access to multiple paths among users. A router uses software to forward packets or frames. However, the use of software significantly reduces the speed of forwarding frames. But high-speed LANs and high-performance layer 2 switches can operate on millions of frames per second, which mandates layer 3 devices to match the load.

Figure 5.15 shows a typical network scenario in a large organization. The network is split up into subnets, each having a number of desktop systems connected to a layer 2 switch. A layer 3 switch acts as the backbone and connects layer 2 switches through higher-speed links. Servers are connected to either the layer 2 or the layer 3 switch. A software-based router provides the WAN connection.

Figure 5.15. A network with layers 2 and 3 switches




Computer and Communication Networks
Computer and Communication Networks (paperback)
ISBN: 0131389106
EAN: 2147483647
Year: 2007
Pages: 211
Authors: Nader F. Mir

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net