Network Sales and Services Handbook (Cisco Press Networking Technology)

Four hardware devices are used in LANs:

Hubs

Hubs connect devices on one shared LAN, as illustrated in Figure 5-14. Because only two devices can be connected with LAN cables, a hub is needed to interconnect two or more devices on a single LAN. The cable termination points are the hub and the LAN device (host).

Figure 5-14. Hub-based Network

Hubs are not smart devices, meaning that they only repeat the data sent from a network host on one port to all other hub ports, without examining the data frame or the frame header. When network hosts are connected by a hub, each hubbed host will hear all conversations across the LAN. Each host examines the message header to determine whether it is the intended recipient.

Backbone hubs are deployed to connect other hubs into a single termination, or root, point. This is known as a multi-tiered design and is illustrated in Figure 5-15.

Figure 5-15. Backbone, or Multi-Tiered, Hub Network

A couple benefits are derived from multi-tiered designs:

Bridges

Bridges connect LAN segments, lengthening the diameter (across a distance) of the LAN as well as segmenting, or breaking up, collision domains. The four types of LAN bridging are listed here:

Cisco Note: Cisco Specific Bridging Solutions

Cisco has developed five alternative solutions to the previously discussed bridging options. These five are as follows:

  • Concurrent Routing and Bridging (CRB) Specific protocols can be bridged out from specific interfaces and routed out other interfaces. However, the protocols in question do not interconnect, or "mix."

  • Integrated Routing and Bridging (IRB) Unlike CRB, IRB enables bridged and routed traffic of the same protocol to be interchanged by creating a logical interface, called the Bridge Virtual Identifier (BVI).

  • Virtual Rings for Multi-Port Source Route Bridges Where standard Token Ring bridges have only two ports, Cisco routers can be configured as a multi-port source-route bridge by creating a virtual-ring within the router.

  • Remote Source Route Bridging (RSRB) Instead of forwarding Token Ring frames from one physical interface to another through a virtual-ring, RSRB forwards Token Ring frames from physical Token Ring interfaces to interfaces connected to an IP cloud through a virtual-ring. RSRB provides a method for performing source route bridging over a WAN, such as Frame Relay or ATM.

  • Data-Link Switching Plus (DLSw+) DLSw+ is backwards compatible with Remote Source Route Bridging (RSRB). DLSw+ performs the same functions as RSRB with additional options supported. DLSw+ enables interconnection of transparent bridging (TB), source-route transparent bridging (SRT), source-route translational bridging (SR/TLB), and SDLC-to-LAN Conversion (SDLLC) over an IP backbone.

Spanning-Tree Protocol (IEEE 802.1d)

The Spanning-Tree Protocol (STP) is the protocol used in a bridged or switched environment enabling these devices (bridges and switches) to communicate LAN management information with each other. When multiple bridges or switches are interconnected with multiple paths, a looped topology can be formed. A looped topology often is desirable to provide redundancy, but looped traffic is undesirable and bridged traffic is especially vulnerable to broadcast loops. The STP, IEEE 802.1d, was designed to prevent broadcast loops from being formed. The STP originally was developed for bridges; however, today it also is applied to LAN switch topologies. By applying the STP to a looped bridged or LAN switch topology, all bridged segments will be reachable, but any points where loops can occur will be blocked.

Technical Note: Spanning Tree Port States

The IEEE 802.1d specification defines five port states (in order) for STP:

  • Disabled The port has either been disabled by the switch itself because of physical problems or security, or it has been manually disabled by the network administrator.

  • Blocking The port only listens for BPDUs from other bridges; it does not forward any data frames. In this state, the bridge assumes that it's the root until it exchanges BPDUs with other bridges.

  • Listening The port listens for frames to detect available paths to the root bridge but will not take any source MAC addresses of end-stations and place them into the bridge's address table. Also in this state, the bridge will not forward any user frames.

  • Learning The port examines data frames for the source MAC address and places these addresses in the bridge's address table. Like the listening state, no user data frames are forwarded while the port is in this state.

  • Forwarding The port is now placed into a forwarding state, where the bridge performs its normal functioning. The bridge learns source MAC addresses, updates the bridge's CAM table, and forwards frames through the bridge itself.

When a bridge or LAN switch port is activated, it proceeds through three spanning tree states: listening, learning, and forwarding. If the port is the highest cost path to the root bridge in a looped topology, it enters the blocking state. By default, all bridge ports go through the first two states: learning and listening. Based on the information obtained during these states, the interface enters either the forwarding or blocking state.

The spanning tree algorithm takes 50 seconds to calculate a new topology. The transition time for each state is as follows:

Latency, in addition to normal operation, is incurred when the ports go through the different states due to a network change, such as a failed path, addition of a new bridge or switch, or enabling a bridge or switch port. Cisco uses a default value of 15 seconds for the Forward Delay time, which is used to measure the time a port stays in a specific state.

Switches

LAN switches connect common broadcast domains and provide frame-level filtering as well as dedicated port speed to end-users. Some switches have limited routing capabilities and can provide Layer-3 routing functions at the most basic level. Some benefits of using switches are higher bandwidth to the desktop and ease of configuration. Switches are deployed often to replace hubs and bridges as more bandwidth-intensive applications are implemented within an organization.

NOTE

Virtual LANs (VLANs) are implemented in switched environments and can keep broadcast traffic within a specific domain of network users.

Switch Operations

Switches carry network traffic by receiving data frames from a source host (connected to a switch port) and forwarding these frames through a different switch port (based on the frame header information). Traditional Layer-2 switching works by looking at the Media Access Control (MAC) address information in the data frame's header and forward the data according to the switch, or Content Addressable Memory (CAM) table. If the switch looks at the MAC address information and cannot determine which port to send the frames, the switch will broadcast (flood) the frames out from all ports. This broadcast process is known as flooding and is used to determine the destination port of a host (based on the destination information in the frame header). When the destination address is found, the associated port information is added to the switching table for future reference.

Switches give network users the ability to transfer data traffic in a network environment without collisions or bandwidth contention. Deploying LAN switches in an existing network environment requires minimal configuration and no changes to existing wiring closets, hubs, LAN cabling, or NICs.

There are several types of switching technologies that enable quick and scalable network transmission.

Switching Types

These four types of LAN switching are found today:

NOTE

Layer-3 switching differs from the traditional Layer-2 switching by enabling data frames to be switched based on network addressing information. Traditional Layer-2 switching will look at the frames for the MAC address information for the destination address.

Routers

Routers are hardware devices that enable communications between networks. Routers are protocol-specific in that they must support the network-layer protocol used by each data packet. For example, for a router to support Internet connections, it must be able to support IP traffic; or for support of a Novell Netware implementation, the router must support IPX.

Routers often are found connecting a LAN to a WAN, such as a Frame Relay network or to the Internet. Routers can support multiple networks, limited only to the number of network interfaces (serial ports) that are available on the particular unit in question.

Routers are available in several sizes, for example:

Routers examine and evaluate each packet arriving from and/or sending to each of the networks to which the router is attached. The router decides which network provides the best path, or route, to the packet's intended destination. The router can make this decision because the router has direct knowledge about each network to which it is connected and the protocols each network supports.

Routers forward packets by maintaining a list of each network and its connected hosts. This list is called a routing table and is maintained (and updated) by the use of routing protocols. Routing protocols are a suite of protocols, such as Open Shortest Path First (OSPF); Border Gateway Protocol, version 4 (BGP4); or Routing Information Protocol (RIP). These routing protocols each use a different method to learn the routes to networks and hosts. In the event there are multiple routes to a specific network/host, each routing protocol uses a different algorithm to determine which route is the best choice to the targeted destination network/host.

Категории