Virtual LANs
Download
Report
Transcript Virtual LANs
Chapter 15
Connecting LANs,
Backbone Networks,
and Virtual LANs
© 2012 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any
manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
15-1 CONNECTING DEVICES
LANs do not normally operate in isolation they are
connected to one another or to the Internet
To connect LANs, or segments of LANs, we use
connecting devices
Topics discussed in this section:
1.Passive Hub
2.Repeater and Active hub
3.Bridges and Two-Layer Switches
4.Routers and Three-Layer Switches
5.Gateways
15.2
Figure 15.1: Five categories of connecting devices
connecting devices divided into five different categories
based on the layer in which they operate in a network.:
1.Below the physical layer: passive hub
2.At the physical layer: repeater or active hub
3.At the physical and data link layers: bridge or two-layer switch
4.At the physical, data link, network layers: router or three-layer
switch
5.At all five layers: gateway
15.3
Passive Hubs
15.4
Passive Hubs
Passive hub is just a connector.
In a star-topology Ethernet LAN, it is just a point
where signals coming from different stations collide.
The hub is the collision point.
This type of hub is part of the media
its location in the Internet model is below the
physical layer.
15.5
Repeaters
15.6
Repeaters
A repeater operates only in the physical layers
Can extend the physical length of a LAN
Receive the signal before it becomes too weak or
corrupted and regenerates the original bit pattern
Do not actually connect two LANs
connects two segments of the same LAN
segments connected are still part of one single
LAN
A repeater cannot connect two LANs of different
protocols
15.7
Repeaters
Example :
repeater can overcome 10Base5 Ethernet length
restriction
the length of the cable is limited to 500 m
divide the cable into (500 m) sections and connect
them with repeaters
The whole network is still considered one LAN
Portions of the network separated by repeaters are
called segments
Repeaters acts as two-port node
15.8
Repeaters
Repeaters is a regenerator, not an amplifier
15.9
Amplifier
Repeater
Cannot discriminate
between the intended
signal and noise. It
amplifies equally
everything fed into it
regenerates the signal
receives a
weakened or corrupted
signal, creates a copy,
bit for bit, at the
original strength
Function of a Repeater
Location of a repeater on a link is vital
it must placed on the line before the legibility of the
signal becomes lost can still read the signal well
enough to determine the intended voltages and
replicate them in their original form
15.10
Repeater
NOTE
•A repeater connects segments of a LAN.
•A repeater forwards every frame; it has no filtering
capability.
•A repeater is a regenerator, not an amplifier.
15.11
Active Hubs
Actually a multiport repeater
Used to create connections between stations in a
physical star topology
we have seen examples of hubs : 10Base-T
Can also be used to create tree topology to
removes the length limitation of 10Base -T (100 m)
17.12
Bridges
15.13
Bridges
Operates in both the physical and the data link layer
physical layer : regenerates the signal
data link layer : check the physical (MAC) addresses
(source and destination) contained in the frame
Bridge has filtering capability, but repeaters has not.
checks the MAC (physical) address of the destination
when receives a frame, and decide if the frame should
be forwarded or dropped
forwards the new copy only to the segment (specific
port) to which the address belongs
Bridge has a table that maps addresses to the port.
17.14
Bridges
Bridge has a table to:
Maps address to ports.
Used in filtering decisions.
15.15
Bridges: Transparent Bridges
Bridges in which the stations are completely unaware of
the bridge’s existence the stations does not
reconfigured when a bridge is added or deleted.
A system equipped with transparent bridges must meet
three criteria:
1.Frame must be forwarded correctly one station to another.
2.The forwarding table is automatically made by learning frame
movements in the network.
3.Loops in the system must be prevented.
Learning:
early bridges had static forwarding table
Administrated manually enter each table entry
simple, but not practical
better solution
dynamic table management that maps addresses to ports
automatically
bridge gradually learns from the frame movement
15.16
Bridges: Transparent
Bridges Destination physical address: used for the
forwarding decision (table lookup).
Source physical address: used for adding entries to the table
and for updating purposes.
1.A sends frame to D:flooding
2.E sends a frame to A: Forwarding
3.B sends a frame to C :flooding
17.17
Bridges: Transparent Bridges
Loop problem:
bridges are normally installed redundantly to make the
system more reliable
Two LANs may be connected by more than one bridge
they may create a loop packet may be going round and
round
15.18
Bridges: Spanning Tree
Is graph in which there is no loop
Create a topology in which each LAN can be reached
from any other LAN through one path only (no loop)
Create a logical topology that overlays physical
topology which can not be changed
To find the spanning tree we need to Assign a cost
(metric) to each LAN
The interpretation of the cost is left up to network
admin
It may be the path with :
Minimum hops, (shortest distance)
Minimum delay, or maximum bandwidth
17.19
Spanning Tree with Minimum hops
The hop count is normally 1 from a bridge to the LAN
and 0 in the reverse direction.
15.20
Spanning Tree
Finding the spanning tree involves four steps:
1.Select root bridge : bridge which has the smallest built-in
ID
2.Mark one port of each bridge (except for the root bridge)
as the root port
Root port : port with the least-cost (minimum number of hops)
path from the bridge to the root bridge
if two ports have the same least-cost value, choose one
3.Choose a designated bridge for each LAN
The bridge with the least-cost path from the LAN to the root
bridge
The corresponding port is the designated port
4.Mark the root port and designated port as forwarding
port, others as blocking port
15.21
Example 1: Spanning Tree with Minimum hops
15.22
Example1: Spanning Tree with Minimum hops
R.P.
DP
R.P.
BP X
DP
R.P.
X
DP
DP
Note: B3 ID( has 3 ports) > B4 ID
X: blocked port
15.23
X BP
BP
R.P.
Spanning Tree with Minimum hops
There is only one single path from any LAN to any
other LAN
15.24
Bridges: Source Routing Bridges
Another way to prevent loops in a system is to use
source routing bridges
In source routing, filtering frames ( forwarding and
blocking) is performed by the source station
Sending station defines the bridges that the frame
must visit.
The addresses of these bridges are included in the
frame.
The frame contain the source and destination
address, and the address of all the bridges to be
visited
Used with Token Ring LANs( Not very common today)
15.25
Bridges Connecting Different LANs
Theoretically a bridge should be able to connect LANs using
different protocols at the data link layer
There are many issues to be considered:
Frame format
Each LAN type has its own frame format. Compare an Ethernet
frame with wireless LAN frame
Maximum data size
Needs fragmentation/reassembly
No protocol at the data link layer allows the
fragmentation/reassembly
fragmentation/reassembly is allowed in the network layer
Bridge discard any frames too large for its system
Data rate
each LAN type has its own data rate
Bridge must buffer the frame to compensate for this difference
15.26
Bridges: Bridges Connecting Different LANs
Bit order
Each LAN type has its own strategy in sending of
bits. Some send the MSB in a byte first; others the
LSB first
Security
Some LANs such as wireless, implement security
measurements in the data link layer. Other LANs,
such as Ethernet ,do not
Multimedia support
Some LANS support multimedia and the quality of
services needed for this type ; others do not.
15.27
Two-Layer Switch
15.28
Two-Layer Switch
Performs at the physical and data link layers.
Is a bridge with many ports (multi port bridge) Design
that allows better (faster) performance
No collision
Filtering based on the MAC address of the frame it
received (like bridge)
Builds switching table by “learning” MAC host addresses
from source addresses of incoming packets
Unknown destination addresses are flooded out other
ports
Broadcast frames are flooded out other ports.
New two-layer switches (called cut-through switches):
have been designed to forward the frame as soon as they
check the MAC addresses in the header of the frame( first
6-bytes).
15.29
Routers
15.30
Routers
Three-layer devices that routes packets based on their logical
addresses (IP)
Connects LANs and WANs in the Internet.
Has a routing table that is used for making decisions about the
route.
Routing table are dynamic and updated using routing protocol.
Builds routing table by neighbor routers using routing protocols
15.31
Three layer switch
Is a router, but a faster and more sophisticated.
•The switching fabric in a three-layer switch allows
faster table lookup and forwarding.
•We can use the terms router and three-layer switch
interchangeably.
15.32
Gateway
Normally a computer that operates in all five layers of the
Internet or seven layers of OSI model.
It takes an application message, reads it, and interrupts it
It used as connecting device between two internetworks
that use different models.
Can provide security( filter unwanted application-layer
messages)
15.33
Backbone Networks
Backbone network allows several LANs to be
connected
No station is directly connected to the backbone
It is itself a LAN that uses a LAN protocol such as
Ethernet
Discuss only the two most common :
Bus Backbone
Star Backbone
15.34
Bus Backbone
The topology of the backbone is a bus.
Backbone itself can use one of the protocols that support a
bus topology such as 10Base5 or 10Base2
normally used as a distribution backbone to connect different
buildings in an organization
example : one that connect buildings on a campus
15.35
Star Backbone
Topology is a star : sometimes called a collapsed or
switched backbone
It is just one switch that connects the LANs
Mostly used as a distribution backbone inside a multifloor
building
15.36
Connecting Remote LANs
Another common application for a backbone network
useful when a company has several offices with LANs and
needs to connect them
connection can be done through bridges, sometimes called
remote bridges
connect LANs and point-to-point networks (leased
telephone lines or ADSL lines)
point-to-point link can use a protocol such as PPP
15.37
NOTE
A point-to-point link acts as a LAN in a
remote backbone connected by remote
bridges
15.38
Virtual LANs
In a switched LAN, change the work group mean physical
changes in the network configuration.
What happens if we need
a virtual connection between
two stations belonging to two
different physical LANs?
Virtual LANs
15.39
Virtual LANs
A network of stations that behave as if they are connected to the same
LAN even though they may actually be physically located on different
segments of a LAN
VLANs are configured through software rather than hardware, which
makes them extremely flexible
the whole idea of VLAN technology : divide a LAN into logical, instead
of physical, segments
a LAN can be divided into several logical LANs called VLANs
each VLAN is a workgroup in the organization.
One of the biggest advantages is that when a station moves from one
group to another, without any hardware reconfiguration.
15.40
Virtual LANs
One of the biggest advantages is that when a station moves
from one group to another, without any hardware
reconfiguration.
15.41
NOTE :
VLANs create broadcast domains
15.42
Virtual LANs
All members belonging to a VLAN can receive broadcast
messages sent to that particular VLAN
stations in a VLAN communicate with one another as though they
belonged to a physical segment
VLAN technology even allows the grouping of stations connected to
different switches in a VLAN
peoples in different buildings (LAN) could be in the same workgroup
15.43
Virtual LANs Membership
Membership is characterized by:
Port numbers,
MAC addresses,
IP addresses,
Multicast IP addresses
A combination of the above
15.44
Advantages of VLAN
1.Cost and time reduction:
Can reduce the migration cost of stations from one
group to another
physical reconfiguration takes time and is costly
it is much easier and quicker to move it using
software
2.Creating virtual workgroup
3.Security:
provide an extra measure of security : people belonging
to the same group can send broadcast messages with
the guaranteed assurance that users in other groups
will not receive these messages
15.45