Date post: | 07-Jul-2018 |
Category: |
Documents |
Upload: | karind4u5636 |
View: | 216 times |
Download: | 0 times |
of 32
8/18/2019 Bridges, Routers and Internet Woking
1/32
Basic’s of Networking
Instructor: Rocco Piro
Office: TSH 205
Phone: Ex. 24421
Email: [email protected]
CCE 570-891
Winter 2000
8/18/2019 Bridges, Routers and Internet Woking
2/32
Bridges, Routers and InternetworkingSession 10
8/18/2019 Bridges, Routers and Internet Woking
3/32
Internetworking
• Organization usually have more than one type of LAN to
satisfy a number of different applications and needs.
• The interconnection and joining of these LANS has come to
be Known as the internetworking
8/18/2019 Bridges, Routers and Internet Woking
4/32
Internetworking
• Communication Network: A facility that provides data
transfer services among stations attached to the network.• Internet: A collection of communication networks
interconnected by bridges and/or routers.
• Sub-network: Refers to a constituent network of the Internet.
• End System: Device attached to one of the sub-network of an
Internet that is used to support end users applications and
services.
8/18/2019 Bridges, Routers and Internet Woking
5/32
Internetworking
• Intermediate Systems(IS): a device used to connect two sub-networks and permit communication between end systems attached
to different sub-networks.
• Bridge: An IS used to connect two LAN's that use similar LAN protocols.
– The bridge acts as an address filter. It delivers packets from one
LAN intended for a destination on another LAN and passes themon. It operates in layer 2 of the OSI model.
• Router: A device used to connect two sub-networks that may ormay not be similar.
– Routers employ Internet protocols present in each router and ineach end system of the network. It operates in layer 3 of the OSImodel.
8/18/2019 Bridges, Routers and Internet Woking
6/32
Routers versus Bridges
• Bridges, in general, take action based upon the MAC addresses, anddo not worry about the Packet Type.
– This means that Bridge's operate at Layer 2 of the OSI model.
– The Bridge does not modify the contents of the packet. Bridgesusually operate between similar LANs.
• Routers, in general, take their action based upon informationcontained in the Datagram portion of the packet, which requiresthem to be aware of the specific protocols they transport.
– Thus Routers operate at Layer 3 of the OSI model.
– Routers can modify the contents of the packet, and can work between two different kinds of networks.
•
8/18/2019 Bridges, Routers and Internet Woking
7/32
Functions of a Bridge
• A bridge is the simplest of internetworking devices. It isimplemented between LAN's of identical protocols and
require minimal processing. Bridges perform the followingfunctions ( in the simplest terms).
1. Read all frames on LAN A, accept those addressed to LAN B.
2. Using MAC on B re-transmit to B.
3. Do the same for B to A traffic.
8/18/2019 Bridges, Routers and Internet Woking
8/32
Functions of a Bridge
The reasons for using bridges are:
• RELIABILITY: Dividing one system into smaller interconnectedsystems can increase the chance that any one device will not be partof a system that is disabled.
• PERFORMANCE: In general, performance will degrade as thenumber of devices increases.
• SECURITY: Keeping specific packets on specific physical medialimits both access and monitoring of traffic by devices that are notauthorized to do so.
• GEOGRAPHY: For distantly connected LAN's (i.e. separate physical buildings).
8/18/2019 Bridges, Routers and Internet Woking
9/32
Functions of a Bridge
Protocol Architecture
• Under the 802 architecture, each node on the network is identifiedat the MAC (Medium Access Control) level.
• At the LLC (Logical Link Control) Level, only the SAP (ServiceAccess Point) Addresses are used.
• Across two Bridged networks, the same MAC and LLC protocolsmust be employed.
• The Bridge need not have any LLC implemented since it is onlyconcerned with the MAC addresses.
• Bridges do not strip MAC frames they just relay them betweenLAN's.
8/18/2019 Bridges, Routers and Internet Woking
10/32
Bridge Connections
8/18/2019 Bridges, Routers and Internet Woking
11/32
Routing with Bridges
• In complex arrangements bridge's must also make some
routing decisions.
8/18/2019 Bridges, Routers and Internet Woking
12/32
Routing with Bridges
• For a packet that is traveling from host 1 to host 6, the packet istransmitted on LAN A, all of the nodes and bridges ignore the packetexcept for the bridge linking LAN A and LAN B.
– This bridge re-transmits the packet onto LAN B, on which all
nodes and devices ignore the packet except for the bridge linkingLAN B and LAN C.
– This bridge re-transmits the packet on LAN C where it is received by host 6 the intended recipient.
• For a packet that is traveling between host 2 and host 8, there are twooptions.
– One option goes through one bridge, and the other goes throughtwo bridges.
– The packet should get directed down the shortest path (in terms ofnumber of HOPS), unless that path is down or congested.
8/18/2019 Bridges, Routers and Internet Woking
13/32
Routing with Bridges
• There are three basic strategies for carrying out routing they
are:
1. Fixed Routing ( 802.3 Ethernet)
2. Transparent Bridging (802.3 Ethernet)
3. Source Routing ( 802.5 Token Ring)
8/18/2019 Bridges, Routers and Internet Woking
14/32
Routers
• It should be clear that as network complexity increases, the
basic Bridge does not have enough functionality or capability
to achieve all possible Internet Working requirements.
• These requirements can be summed up as:
– Link networks both Physically and with LC (Link control).
– Route and Delivery Data across networks.
– Track use of network resources and monitor their Status.
– Do the above without requiring any modification of the
nodes on the networks, while hiding all of the differences
between the networks.
8/18/2019 Bridges, Routers and Internet Woking
15/32
Routers
• Due to differences between networks, routers function takingthe following in account:
– Different Addressing Schemes
– Different Maximum Packet Sizes (using segmentation)
– Different Network Interfaces.
– Different Time-Outs
– Error Recovery
– Status reporting
– Routing Techniques
– Access Control
8/18/2019 Bridges, Routers and Internet Woking
16/32
Routing Protocol Architecture
• Routing depends on the Internet Protocol (IP) of TCP/IP which
operates at the OSI Layer 3.
• For two nodes to communicate across a Router, they must
share the same protocol above IP (in layer 4).
• The resulting Datagram represents a form of messageencapsulation of the original protocol.
8/18/2019 Bridges, Routers and Internet Woking
17/32
Routing Protocol Architecture
8/18/2019 Bridges, Routers and Internet Woking
18/32
Routing Protocol Architecture
When ES 1 wants to send something to ES 2, the IP module of ES
1 constructs a Datagram with the global address of ES 2.
1. This Datagram is then sent.
2. The Datagram gets passed down to LLC and is sent to the router
using MAC level addressing.
3. The packet travels across the LAN to the Router.
8/18/2019 Bridges, Routers and Internet Woking
19/32
Routing Protocol Architecture
4. The router removes the MAC and LLC parts of the packet and
analyses the IP Header.
5. The router sends the datagram to the destination network or
router.
6. The datagram gets encapsulated into a packet to match the
MAC type that corresponds to the destination
LAN.
7. Segmentation may be needed to achieve step 6.
8/18/2019 Bridges, Routers and Internet Woking
20/32
Routing Protocol Architecture
• Routing is accomplished by maintaining tables in each end
system (ES) that gives, for each possible destination, the next
router in the Internet that the datagram should be sent to.
• The tables can be both static and dynamic.
• When routers go down neighbouring routers send status
reports to other routers on the internet allowing for updates of
these tables so that traffic can be diverted away from a
downed router.
8/18/2019 Bridges, Routers and Internet Woking
21/32
Routing Protocol Architecture
Datagram Lifetime:
• By imposing the number of hops ( 1 hop is one passingthrough a router) assures that the datagram won't circulate the
internet indefinitely if destinations are not found. This is an
actual field which is part of the datagram.
• See TCP/IP datagram Frame (next slide). This field gets
decremeted every time it crosses a router by that router.
• When the value of the field reaches zero the datagram is
discarded.
8/18/2019 Bridges, Routers and Internet Woking
22/32
Routing Protocol Architecture
8/18/2019 Bridges, Routers and Internet Woking
23/32
Routing Protocol Architecture
Segmentation and Reassembly:
• To accommodate the different packet sizes allowed ondifferent networks - the datagram may have to go through a
process of segmentation and reassembly.• Once a packet is segmented by a router it will not get
reassembled until it reaches its destination.
• The frames are reassembled by using the following fields inthe datagram:
– Data unit identifier
– Data length offset
– More flag
(See text page 520 for detailed explanation)
8/18/2019 Bridges, Routers and Internet Woking
24/32
Internet Protocol
• The most widely used Internet protocol is the TCP/IP protocol suite.
• The protocol allows the interconnection of individual networks togive the appearance of a single unified internet in which all systemscan freely exchange data with each other as if directly connected to
one another.
• TCP/IP includes a number of alternative routing protocols that can be use to communicate with end systems and with other routers to perform routing functions and to relay user data through the internet.
• The routing protocols that are used depend on the size andcomplexity of the internet.
• Large TCP/IP Internet's are divided into what are called autonomoussystems. Some routing protocols are designed to route traffic within
single autonomous systems, while others are designed to route traffic between individual autonomous systems.
8/18/2019 Bridges, Routers and Internet Woking
25/32
Autonomous Systems
• A TCP/IP internet is made up of one or more autonomous
systems.
• An autonomous system consists of a set of computer systems
and data links, making up one or more physical networks(subnetworks), administered by one authority.
• Routers are frequently referred to as gateways in TCP/IP
literature.
• Routers within autonomous systems are called Interior
Gateway using Interior Gateway Protocols (IGP).
• Routers that connect one autonomous system to another arecalled Exterior Gateways using Exterior Gateway Protocol.
8/18/2019 Bridges, Routers and Internet Woking
26/32
Autonomous Systems
8/18/2019 Bridges, Routers and Internet Woking
27/32
Interior Gateway Protocols
• A common IGP used with routers within an autonomous
system is the Open Shortest Path First Protocol (OSPF).
• The OSPF protocol, as the name implies, computes a route
that incurs the least cost.
• Costs being based on delays, data rates and actual dollar costs
of other factors.
8/18/2019 Bridges, Routers and Internet Woking
28/32
Interior Gateway Protocols
• The protocol uses a link state algorithm in which each routerknows the complete topology of the internet in term ofexistence of other routers and the links between them.
• Each router broadcast information about the routers it isattached to and the status of the datalinks between them.
• A router takes this information and constructs a map of therelevant internet consisting of a graph with routers as systems
and links as edges.
• Routers can then calculate routes based on this graph usinganother algorithm known as the least-cost algorithm or Dijkstra shortest path algorithm ( see page 538 - 539 for
detailed explanation - if interested!).
8/18/2019 Bridges, Routers and Internet Woking
29/32
Interior Gateway Protocols
8/18/2019 Bridges, Routers and Internet Woking
30/32
Exterior Gateway Protocol (EGP)
• In order for data to flow between two autonomous systems inlarge TCP/IP internets, a router in one system must
communicate with a router in the other system. A widely used
and standardized EGP is the Border Gateway Protocol (BGP).
• EGP packets are used to perform three basic functions:
– Exchange of routing information with another autonomous
system.
– Check to see if a router in another autonomous system is
still responding.
– Obtaining routing information from another autonomous
system.
8/18/2019 Bridges, Routers and Internet Woking
31/32
Exterior Gateway Protocol (EGP)
• BGP is based on a system of exchanging messages.These messagescan be summarized as follows:
– Open - used to open a neighbour relationship with anotherrouter.
– Update - Used exchange information about routes beingwithdrawn.
– Keepalive - Used to acknowledge messages and existingrelationship between routers.
– Notification- Used to for exchange of error messages.
• Routers are considered to be neighbours if they share the same
subnetwork.
8/18/2019 Bridges, Routers and Internet Woking
32/32
Exterior Gateway Protocol (EGP)
• The functional procedures that are carried out by the BGP are asfollows:
– Neighbour Acquisition - The process of agreeing to exchangeinformation with another router in an autonomous system. Onerouter sends an "open" message to the other router whichresponds with a keepalive.
– Neighbour Reachability - periodic exchange of "keepalive"messages for ongoing confirmation of the relationship.
– Network Reachability - Each router keeps a database or lookuptables of subnets and the routes for reaching a particular subnet.These entries are continually updated by the broadcasting of
"update" messages.