+ All Categories
Home > Documents > Chapter Eight

Chapter Eight

Date post: 20-Jan-2016
Category:
Upload: kapono
View: 54 times
Download: 2 times
Share this document with a friend
Description:
Chapter Eight. Local Area Networks: Internetworking Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition. Introduction. Many times it is necessary to connect a local area network to another local area network or to a wide area network - PowerPoint PPT Presentation
Popular Tags:
46
Chapter Eight Local Area Networks: Internetworking Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition
Transcript
Page 1: Chapter Eight

Chapter Eight

Local Area Networks: Internetworking

Data Communications and Computer Networks: A Business User’s Approach,

Fourth Edition

Page 2: Chapter Eight

2

Introduction

• Many times it is necessary to connect a local area network to another local area network or to a wide area network

• Different ways on how different LANs are connected

• Business Application Cases

(to p3)

(to p41)

Page 3: Chapter Eight

3

Connecting LANs

• 6 types of network interconnection hardware are available:

– see Figure 12.18– a) Hub – use to connect workstations together– b) bridges - use to expand LANs with same protocol– c) switches- work faster since need no dest. address– d) routers- OSI level 3, uses translate dest. address– e) brouters - combination of router and bridges– f) gateways - connect different protocol of LANs– g) use of backbone as a structure for data interchange– h) use of LAN switch to connect to MAN or WAN

(Note: Now we usually use low CPU computer as part of these devices, if programmable)

(to p4)

(to p6)

(to p35)

(to p38)(to p39)

(to p2)

(to p5)

(to p20)

(to p40)

Page 4: Chapter Eight

4

FIGURE 12-18 Network interconnection can occur at various layers of the OSI model. (to p3)

hub

Page 5: Chapter Eight

5

Hubs

• Hub interconnects two or more workstations into a local area network

• When a workstation transmits to a hub, hub immediately resends the data frame out to all connecting links

• Can be managed or unmanaged– A managed hub possesses enough processing

power that it can be managed from a remote location

(to p3)

Page 6: Chapter Eight

6

Bridges• A bridge (or bridge-like device) can be used to connect

two similar LANs, such as two CSMA/CD LANs• Can also be used to connect two closely similar LANs,

such as a CSMA/CD LAN and a token ring LAN• Examines

– destination addressdestination address in a frame and either forwards this frame onto next LAN or does not

– source addresssource address in a frame and places this address in a routing table, to be used for future routing decisions

• Two main types– Transparent Bridge– Remote Bridge

• Spanning tree solution to installing too many bridges when connection LANs together (Optional topic!)

(to p7)

(to p13) (to p12)

(to p9)

(to p3)

Page 7: Chapter Eight

7

Bridges (continued)

or

(to p6)(to p8)

Page 8: Chapter Eight

8

FIGURE 12-21 LANs interconnected with a backbone LAN.

(FDDI)

(to p3)

(to p6)

Page 9: Chapter Eight

9

Transparent Bridge• A bridge observes each frame that arrives at a port,

extracts the source address from the frame, and places that address in the port’s routing table

• A transparent bridge is found with CSMA/CD LANs• Can also convert one frame format to another

– This does not happen too often anymore since most networks are CSMA/CD

– Note that some people / manufacturers call a bridge such as this a gateway or sometimes a router

• Removes headers and trailers from one frame format and inserts (encapsulates) headers and trailers for the second frame format

(to p6)

(to p11)(to p10)

Page 10: Chapter Eight

10

Transparent Bridge (continued)

(to p9)

Page 11: Chapter Eight

11

Transparent Bridge (continued)

(to p9)

Page 12: Chapter Eight

12

Remote Bridge

• Capable of passing a data frame from one LAN to another when the two LANs are separated by a long distance and there is a WAN connecting the two LANs

• Takes frame before it leaves the first LAN and encapsulates the WAN headers and trailers– When the packet arrives at destination remote

bridge, that bridge removes WAN headers and trailers leaving original frame

(to p6)

(to p19)

Page 13: Chapter Eight

13

Spanning Tree Algorithm

• What happens if you have many LANs interconnected with multiple bridges, such as shown in the next slide?– Data that leaves one workstation could travel to a

bridge, across the next network, into the next bridge, and back onto the first network

– A packet may continue to cycle like this forever!

(to p14)

Page 14: Chapter Eight

14

Spanning Tree Algorithm (continued)

Data confusingareas

(to p15)

Page 15: Chapter Eight

15

Spanning Tree Algorithm (continued)

Solution method

(to p16)

Page 16: Chapter Eight

16

Spanning Tree Algorithm (continued)

• How do we stop this from happening?– Disconnect one of the bridges?

• Maybe we want bridge redundancy in case one bridge fails

– Apply the spanning tree algorithm?• How is the algorithm applied?

(to p17)

(to p6)

Page 17: Chapter Eight

17

Spanning Tree Algorithm (continued)• Step 1: Designate a root bridge• Step 2: Mark one port of each bridge as the root port

– Root port is port with the least-cost path from that bridge to the root bridge

– Root ports are denoted with a star in Figure 8-7(a)• Step 3: Select a designated bridge for each LAN

– Designated bridge has the least-cost path between that LAN and root bridge

– Mark the corresponding port that connects that LAN to its designated bridge with two stars (Figure 8-7(b))

• Step 4: Remove redundant ports– If port has no stars, that port is redundant and can be “removed”– Keep all ports with one or two stars

• Resulting configuration is shown in Figure 8-7(c)• Note there is now only one way to get to any LAN or bridge from

any other LAN or bridge(to p16)

(to p18)

(to p18)

(to p18)

Page 18: Chapter Eight

18

Spanning Tree Algorithm (continued)

(to p17)

(to p17)

(to p17)

Page 19: Chapter Eight

19

Remote Bridge (continued)

(to p12)

Page 20: Chapter Eight

20

Switches

• A combination of hub and bridge• Can interconnect two or more workstations, but

like a bridge, it observes traffic flow and learns• When a frame arrives at a switch, switch

examines destination address and forwards frame out the one necessary connection

• Workstations that connect to a hub are on a shared segment

• Workstations that connect to a switch are on a switched segment

(to p22)

(to p21)

(to p24)

Page 21: Chapter Eight

21

Switches (continued)

• The backplane of a switch is fast enough to support multiple data transfers at one time

• A switch that employs cut-through architecture is passing on frame before entire frame has arrived at switch

• Multiple workstations connected to a switch use dedicated segments– This is a very efficient way to isolate heavy users from the

network• Can allow simultaneous access to multiple servers, or

multiple simultaneous connections to a single server– The use of switches in virtual LANs – Full duplex Switches

(to p26)

(to p31)

(to p33)

(to p3)

(to p25)

Page 22: Chapter Eight

22

Switches (continued)

Or (to p23)

Page 23: Chapter Eight

23

FIGURE 12-19 A switch allows simultaneous connection of LAN segments. (to p3)

(to p20)

Page 24: Chapter Eight

24

Why Segment or Internetwork Local Area Networks?

• To separate / connect one corporate division with another

• To connect two LANs with different protocols• To connect LAN to Internet• To break LAN into segments to relieve traffic

congestion• To provide a security wall between two different

types of users

(to p20)

Page 25: Chapter Eight

25

Switches (continued)

(to p21)

Page 26: Chapter Eight

26

Isolating Traffic Patterns and Providing Multiple Access

• Whether shared or dedicated segments are involved, the primary goal of a switch is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network

• Switches, because of their backplane, can also allow multiple paths of communications to simultaneously occur

• Alternative design (to p29)

(to p28)

(to p27)

Page 27: Chapter Eight

27

Isolating Traffic Patterns and Providing Multiple Access (continued)

(to p26)

Page 28: Chapter Eight

28

Isolating Traffic Patterns and Providing Multiple Access (continued)

(to p26)

Page 29: Chapter Eight

29

Isolating Traffic Patterns and Providing Multiple Access (continued)

• Using a pair of routers, it is possible to interconnect to switched segments, essentially creating one large local area network (to p30)

Page 30: Chapter Eight

30

Isolating Traffic Patterns and Providing Multiple Access (continued)

(to p21)

Page 31: Chapter Eight

31

Virtual LANs

• Virtual LAN (VLAN) – logical subgroup within a LAN that is created via switches and software rather than by manually moving wiring from one network device to another

• Even though employees and their actual computer workstations may be scattered throughout the building, LAN switches and VLAN software can be used to create a “network within a network”

(to p32)

Page 32: Chapter Eight

32

Virtual LANs (continued)

• A relatively new standard, IEEE 802.1Q, was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN

• Instead of sending technician to a wiring closet to move a workstation cable from one switch to another, an 802.1Q-compliant switch can be remotely configured by a network administrator

(to p21)

Page 33: Chapter Eight

33

Full-Duplex Switches

• Allow for simultaneous transmission and reception of data to and from a workstation

• This full-duplex connection helps to eliminate collisions

• To support a full-duplex connection to a switch, at least two pairs of wires are necessary– One for the receive operation – One for the transmit operation– Most people install four pairs today, so wiring is

not the problem(to p21)

(to p34)

Page 34: Chapter Eight

34

Full Duplex Switches (continued)

(to p33)

Page 35: Chapter Eight

35

Routers

• Connects a LAN to a LAN, a LAN to a WAN or a WAN to a WAN

• Accepts an outgoing packet, removes any LAN headers and trailers, and encapsulates the necessary WAN headers and trailers

(to p36)

Page 36: Chapter Eight

36

Routers (continued)

• Because a router has to make wide area network routing decisions, router has to dig down into the network layer of the packet to retrieve the network destination address– Thus, routers are often called “layer 3 devices”– They operate at the third layer, or OSI network layer,

of the packet

• Routers often incorporate firewall functions

• An example of a router’s operation is shown on the next slide

(to p37)

Page 37: Chapter Eight

37

Routers (continued)

(to p3)

Page 38: Chapter Eight

38

FIGURE 12-20 Bridges connect networks that use the same protocols. Gateways connect networks that use dissimilar protocols. (to p3)

Page 39: Chapter Eight

39

FIGURE 12-21 LANs interconnected with a backbone LAN.

(FDDI)

(to p3)

Page 40: Chapter Eight

40

FIGURE 12-22 This diagram shows how a LAN switch can be used to connect several LANs together and to connect LANs to a WAN or MAN.

(to p3)

Page 41: Chapter Eight

41

LAN Internetworking In Action: A Small Office Revisited

• Recall the In Action example from Chapter Seven– A small office with 20 workstations in one room

and 15 workstations in another room were connected to a server via 100BaseTX

– One hub was kept in a closet near the 20 workstations while a second hub was near the server

(to p42)

Page 42: Chapter Eight

42

LAN Internetworking In Action: A Small Office Revisited (continued)

(to p43)

Page 43: Chapter Eight

43

LAN Internetworking In Action: A Small Office Revisited (continued)

• Now Hannah wants to connect the LAN to the Internet– She adds a router next to the server and

connects it to the hub

– She connects the router to a high-speed telephone line such as a T-1 service

– She will also have to program the router to perform IP addressing and firewall functions

(to p44)

Page 44: Chapter Eight

44

LAN Internetworking In Action: A Small Office Revisited (continued)

(to p45)

Page 45: Chapter Eight

45

LAN Internetworking In Action: A Small Office Revisited (continued)

• Now network usage is so high that Hannah must consider segmenting the network– She decides to install a database server near the

original server and replace both hubs with switches

(to p46)

Page 46: Chapter Eight

46

LAN Internetworking In Action: A Small Office Revisited (continued)

(to p2)


Recommended