Professional Documents
Culture Documents
Lecture 3
Lecture 3 #1
Interconnecting LANs
Q: Why not just one big LAN?
Limited amount of supportable traffic: on single
Lecture 3 #2
Hubs
Physical Layer devices: essentially repeaters
Lecture 3 #3
Hubs (more)
Each connected LAN referred to as LAN segment
Hubs do not isolate collision domains: node may collide
Lecture 3 #4
Hub limitations
single collision domain results in no increase in max
throughput
multi-tier throughput same as single segment
throughput
individual LAN restrictions pose limits on number
of nodes in same collision domain and on total
allowed geographical coverage
cannot connect different Ethernet types (e.g.,
10BaseT and 100baseT) Why?
Lecture 3 #5
Bridges
Link Layer devices: operate on Ethernet
Bridges (more)
Bridge advantages:
Isolates collision domains resulting in higher
total max throughput, and does not limit the
number of nodes nor geographical coverage
Backbone Bridge
Lecture 3 #8
Lecture 3 #9
Lecture 3 #10
Bridge Filtering
learn which hosts can be reached through
which interfaces: maintain filtering tables
when frame received, bridge learns location of
sender: incoming LAN segment
records sender location in filtering table
filtering table entry:
(Node LAN Address, Bridge Interface, Time Stamp)
stale entries in Filtering Table dropped (TTL can be
60 minutes)
bridges
Lecture 3 #11
Bridge Operation
bridge procedure(in_MAC, in_port,out_MAC)
Set filtering table (in_MAC) to in_port /*learning*/
lookup in filtering table (out_MAC) receive out_port
if (out_port not valid) /* no entry found for destination */
then flood; /* forward on all but the interface on
which the frame arrived*/
if (in_port = out_port) /*destination is on LAN on which
frame was received */
then drop the frame
Otherwise (out_port is valid) /*entry found for destination */
then forward the frame on interface indicate
Lecture 3 #12
Lecture 3 #13
Lecture 3 #14
A , 12
A , 12
1
A
Lecture 3 #15
C,??
C,??
1
A
Lecture 3 #16
B,2
B,1
1
A
Lecture 3 #17
Note: redundant paths are good, active redundant paths are bad
(they cause loops)
Lecture 3 #18
bridges
MAC address
Bridge id + port number
Lecture 3 #19
Lecture 3 #20
bridge
default is 1
Lecture 3 #21
Lecture 3 #22
Lecture 3 #23
Lecture 3 #24
Protocol operation:
B7
B2
3.
B1
B6
1.
2.
Picks a root
For each LAN,
picks a designated bridge
that is closest to the root.
All bridges on a LAN
send packets towards the
root via the designated
bridge.
B4
Lecture 3 #25
Spanning Tree:
B3
B5
B1
root
port
B2
B7
B2
B4
B5
B7
B1
Root
B6
B8
Designated
Bridge
B4
Lecture 3 #26
Lecture 3 #27
Lecture 3 #28
Lecture 3 #29
(lowest ID/cost/priority)
Lecture 3 #30
Forwarding/Blocking State
forward
frames to and from their attached LANs
All other ports are in the blocking state
Root and designated bridges will
Lecture 3 #31
B2
(B1,root=B1,dist=0)
B6
(B6, Root=B1dist=1)
B1
(B1,root=B1, dist=0)
B4
(B4, root=B1, dist=1)
Lecture 3 #32
Lecture 3 #33
Lecture 3 #34
Lecture 3 #35
Ethernet Switches
layer 2 (frame) forwarding,
Lecture 3 #36
Ethernet Switches
cut-through switching: frame forwarded
Lecture 3 #37
Shared
Lecture 3 #38
Lecture 3 #39
MAC protocol
unlicensed frequency spectrum: 900Mhz, 2.4Ghz
wireless hosts
Ad Hoc Networks
Ad hoc network: IEEE 802.11 stations can
Lecture 3 #42
Vector
802.11 frame has
Lecture 3 #44
channel reservation
sender: send short
RTS: request to send
receiver: reply with
short CTS: clear to
send
CTS reserves channel for
sender, notifying
(possibly hidden) stations
avoid hidden station
collisions
Lecture 3 #45
Lecture 3 #46
Lecture 3 #48
PPP non-requirements
no error correction/recovery
no flow control
out of order delivery OK
no need to support multipoint links (e.g.,
polling)
Lecture 3 #50
error detection
Lecture 3 #51
Byte Stuffing
data transparency requirement: data field must
Byte Stuffing
flag byte
pattern
in data
to send
Lecture 3 #53
Lecture 3 #54
Ethernet
hubs, bridges, switches
IEEE 802.11 LANs
PPP
Lecture 3 #56