Download Bridge Algorithms

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Spanning Tree Protocol wikipedia , lookup

Transcript
Unit 2
Bridging
Overview
Description
The focus of this unit centers on four different types of bridges:
•
Transparent learning bridge.
•
Source route bridge.
•
Translational bridge.
•
Source route Transparent bridge.
The algorithms associated with these bridges will be presented, including a
detailed discussion on the Spanning Tree algorithm.
Unit Table of Contents
This unit contains the following lesson:
Lesson
Pages
Length
Lesson 2-1: Bridge Algorithms
64-96
5 hours
ST0025804A
63
Unit 2: Bridging
Lesson 2-1: Bridge Algorithms
At a Glance
Bridges are data link layer connectivity devices that connect two or more
LANs. They are independent of the OSI upper layers. They may be used
to connect like networks, for example, Ethernet to Ethernet or token ring
to token ring, or they may be used to connect unlike networks, for example,
Ethernet to FDDI. Bridges use the MAC source and destination addresses
to relay frames between connected networks.
Bridges Operate at the Data Link Layer
Sending
Workstation
Receiving
Workstation
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data Link
Data Link
Physical
Physical
Data
Bridges have three basic functions:
•
Forwarding a frame from one segment to another across the bridge.
•
Filtering a frame that does not need to cross the bridge to reach its
destination.
•
Flooding a frame to all ports when the location of the destination
address is unknown.
This lesson describes four types of bridges, transparent learning,
translational, source route, and SRT bridges, including the primary
algorithms employed by bridges to relay packets across a network.
64
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
What You Will Learn
After completing this lesson, you will be able to do the following:
•
Identify the characteristics and operation of transparent learning,
translational, source route, and SRT bridges.
•
Diagram and explain the function of the Spanning Tree algorithm.
•
Identify performance issues in bridging.
ST0025804A
65
Unit 2: Bridging
Tech Talk
66
•
Aging—Within the Spanning Tree algorithm, aging is the technique
that allows addresses maintained in the forwarding table to be removed
if they have not been accessed over a period of time.
•
Blocking—One of four Spanning Tree port states, blocking prevents a
port from sending and receiving data.
•
Bridge Protocol Data Unit—BPDUs are the configuration messages
used by bridges to calculate a Spanning Tree.
•
Flooding—When the forwarding table does not contain a Destination
address for a station on a network, the bridge delivers the frame to all
the interfaces on the network, except the interface (port) that received
the frame.
•
Forwarding—A bridge is able to forward or relay a frame onto an
interface by referring to its forwarding table of stored source addresses.
•
Interface—An interchangeable term for the port on an internetworking
device.
•
Learning—One of four Spanning Tree port states, learning is an
intermediary state when the bridge is building its forwarding tables.
•
Listening—During this Spanning Tree intermediary state, a port is
listening to BPDUs and determines which bridge is the root and
whether the port will go into the blocking or forwarding state.
•
Root bridge—Within the Spanning Tree algorithm, the root bridge has
the lowest priority and MAC address and is responsible for maintaining
a loop-free environment and for maintaining communication to other
bridges in the network.
•
Route Discovery—The route discovery process is used in source-route
bridging where the path from the source to the destination is
discovered by receiving a pre-determined path documented inside the
frame.
•
Routing Information Field—Used in source-route bridging, the RIF is a
field placed just before the information field of a frame. The RIF
contains a table of discovered paths including the ring and bridge
number.
•
Spanning Tree Algorithm—Bridges use the Spanning Tree Algorithm
to ensure a loop-free topology by enabling a single path through the
network.
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Transparent Learning Bridge
Digital Equipment Corporation developed the transparent learning bridge
for transporting frames in an Ethernet network at the data link and
physical layers of the OSI. Both the source and the destination have the
same data link address format.
The transparent learning bridge does not take part in route discovery or
the route selection process. It does keep track of the location of each
workstation on the network by building a forwarding table of each MAC
address and the corresponding interfaces (ports) associated with each
workstation.
Transparent Learning Bridges Build Forwarding Tables
01-67-15-cb-63-37
25-a7-d8-16-87-10
Ethernet LAN
Port 1
Bridge
Address
Port
01-67-15-cb-63-37
25-a7-d8-16-87-10
11-e8-71-35-41-f5
33-56-91-62-31-71
1
1
2
2
Port 2
Ethernet LAN
11-e8-71-35-41-f5
33-56-91-62-31-71
The bridge operates in a promiscuous mode in that it receives and
examines every frame transmitted across the networks to which it is
attached. It learns the location of each workstation on the network by
reading the source address of every packet received and noting which
interface (port) the frame was received. The bridge enters this information
into a forwarding table, which the bridge updates constantly. The bridge
either forwards or drops frames based on the information in the forwarding
table.
ST0025804A
67
Unit 2: Bridging
The Basic Forwarding Process
When a bridge receives a frame, it compares the frame’s source and
destination address with the addresses in the forwarding table. Depending
on the results, the bridge performs the following actions:
•
If the source address is not present in the forwarding table, the bridge
adds the source address and corresponding interface to the table. It
then checks the destination address to determine if it is in the table.
•
If the destination address is listed in the table, it determines if the
destination address is on the same LAN as the source address. If it is,
then the bridge drops the frame since all the workstations have already
received the frame.
•
If the destination address is listed in the table but is on a different LAN
than the source address, then the frame is forwarded to that LAN.
•
If the destination address is not listed in the table, then the bridge
forwards the frame to all the LANs except the one that which originally
received the frame. This process is called flooding.
In some bridges, if the bridge has not accessed an address in the
forwarding table over a period of time, the address is removed to free up
memory space on the bridge. This process is referred to as aging.
68
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Spanning Tree Algorithm
The Spanning Tree algorithm is a protocol developed by the IEEE to
enable bridges to have multiple bridge connections between networks and
reduce problems that occur from redundant links or loops in LANs. A
maximum of eight bridges and seven active paths may exist between two
devices using the Spanning Tree algorithm. The algorithm ensures a loopfree topology in a multi-bridge network.
To fully understand how the Spanning Tree algorithm works, it is
necessary to understand how loops occur in transparent bridging.
Steps One Through Six: The Frame is Flooded Across the Network
Host 1
01-67-15-cb-63-37
LAN 1
Port 1
Address
Port
S 01-67-15-cb-63-37 1
D ?
Bridge A
LAN 2
Port 2
Port 1
Address
Port 1
Port
Address
Bridge B
S 01-67-15-cb-63-37 1
D ?
Port 2
Host 2
12-37-41-53-a7-d8
Port
S 01-67-15-cb-63-37 1
D ?
Bridge C
Port 2
LAN 3
= Flooding
S = Source
D = Destination
1. Host 1 sends a frame out over LAN 1. Bridge A receives the frame on
port #1.
2. Bridge A records the source address (01-67-15-cb-63-37) of the frame
and the port number on which the frame was received (port 1).
3. Bridge A then looks for the destination address of the frame. If the
destination address is not in the forwarding table prior to receiving the
frame, the bridge floods the frame onto LAN 2.
4. Both Bridge B and Bridge C receive the frame. Both bridges record the
source address and the port number on which the frame was received
(port 1).
ST0025804A
69
Unit 2: Bridging
5. Since neither bridge has the destination address in their forwarding
table they both flood the frame onto LAN 3. This results in two frames
being sent onto LAN 3.
6. Host 2 receives the frame.
70
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Steps Seven and Eight: Bridge B and C Exchange the Frame
Host 1
01-67-15-cb-63-37
LAN 1
Port 1
Bridge A
LAN 2
Port 2
Port 1
Address
Port 1
Address
Port
Bridge B
S 01-67-15-cb-63-37 1
D ?
Port 2
Host 2
12-37-41-53-a7-d8
Port
S 01-67-15-cb-63-37 2
D ?
Loop
Bridge C
Port 2
LAN 3
= Flooding
S = Source
D = Destination
7. The frame passed on by Bridge B is received not only by Host 2, but
also by Bridge C on its port 2, starting a loop.
When Bridge C receives the frame on port 2, it compares the source
address and port number to the Host 1 entry in its forwarding table. It
acknowledges the frame has the same source address. However, since the
frame was now received on port 2, the bridge updates its forwarding table
to associate the source address with port 2.
ST0025804A
71
Unit 2: Bridging
Steps Nine and Ten: A Loop is Created
Host 1
01-67-15-cb-63-37
LAN 1
Port 1
Bridge A
Loop
LAN 2
Port 2
Port 1
Port 1
Address
Bridge B
Port 2
Host 2
12-37-41-53-a7-d8
Port
S 01-67-15-cb-63-37 2
D ?
Bridge C
Port 2
LAN 3
= Flooding
S = Source
D = Destination
9. The destination address of Host 2 is still not in Bridge C’s forwarding
table, so the frame is flooded back onto LAN 2, creating a loop.
10. The same events in steps 7-9 occur for Bridge B when it receives the
frame flooded onto LAN 3 by Bridge C.
72
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Steps Eleven through Thirteen: The Frame is Discarded Due to the Loop
Host 1
01-67-15-cb-63-37
LAN 1
Port 1
Address
Port
S 01-67-15-cb-63-37 1
D ?
Bridge A
LAN 2
Port 2
Port 1
Address
Port 1
Port
S 01-67-15-cb-63-37 2
D 12-37-41-53-a7-d8 2
Address
Bridge B
Port 2
Host 2
12-37-41-53-a7-d8
Port
S 01-67-15-cb-63-37 2
D 12-37-41-53-a7-d8 2
Bridge C
Port 2
LAN 3
= Flooding
S = Source
D = Destination
11. When Host 2 replies to the received frame, both bridges record the Host
2 source address in their forwarding tables and associate the address
with their port 2 interface.
12. Then both bridges look at the destination address and find both Host 1
and Host 2 associated with port 2, falsely indicating that both hosts are
located on LAN 3.
13. Both bridges discard the frame, assuming that all workstations on the
same LAN have already received the frame and forwarding is not
necessary.
ST0025804A
73
Unit 2: Bridging
Check Your Understanding
♦ Diagram how a loop is created in a bridge not using the Spanning
Tree algorithm. Explain your diagram in terms of conflicting MAC
addresses and port assignments in the forwarding table.
♦ Without reading ahead, speculate on a method to create a loop-free
bridging environment. What would the bridge have to do to prevent
loops? Or how could the bridge detect that a loop exists and make
adjustments for it rather than dropping the frame altogether?
Creating a Loop-free Environment
The Spanning Tree algorithm ensures loop-free transmissions of frames by:
•
Assigning priorities to each bridge, thereby producing a logical tree
topology out of any physical arrangement of bridges.
•
Enabling a single path throughout a network.
•
Providing automatic reconfiguration of the Spanning Tree topology
around a failed bridge or data path.
In the Spanning Tree algorithm, a root bridge is established that serves as
the top of the logical topology through which all frames must travel.
Initially, all bridges are equal and claim the position of the root bridge by
transmitting a packet known as the Bridge Protocol Data Unit (BPDU).
The BPDU contains information on the bridge priority number, which is
assigned by the network manager, and its MAC address. The bridge with
the lowest priority, which will be explained on the next page, becomes the
root bridge. If the priorities are the same for all bridges, then the bridge
with the lowest MAC address becomes the root bridge.
Once the root bridge is established, all other bridges stop sending BPDUs.
Only the root bridge generates BPDUs and the other bridges update and
forward the packets they receive.
74
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Bridge Priority and MAC Addresses Determine the Root
Host 1
00-21-a7-11-56-68
LAN 1
Port 1
Root
Bridge
Bridge Priority = 1
Bridge A
MAC Address = 0000A2001427
Port 2
LAN 2
Port 1
Port 1
Bridge B
Port 2
Bridge Priority = 2
MAC Address =
0000A280213
Bridge C
Port 2
Bridge Priority = 3
MAC Address =
0000A2001531
LAN 3
Host 2
12-37-41-53-a7-d8
Once the root bridge has been elected, the other bridges determine the
least cost path to the root bridge, establish a root port, and a designated
bridge for each LAN.
1. The initial BPDU generated by the root bridge has an initial root cost of
zero.
2. As a bridge receives a BPDU from the root bridge, it adds its port path
cost to the BPDU. The cost number for each bridge’s port is determined
and assigned by the network manager. Frequently the cost
corresponds to the speed of the wire, for example, 100 Mbs wire would
have a lower cost than a 10 Mbs wire.
3. The BPDU is then sent to the other bridges across all ports.
4. As each bridge receives the BPDU, they add their path cost to the root
cost of the BPDU and send the BPDU on.
5. The total roots cost values of the BPDUs received on all bridge ports
are compared, and the port with the lowest cost path to the root bridge
is designated as the root port. Once a bridge establishes its root port,
the bridge blocks its redundant ports. Blocked ports will not forward or
accept frames.
6. Next a designated bridge for each LAN must be established. The
designated bridge for a LAN is the bridge with the lowest cost path to
the root bridge.
ST0025804A
75
Unit 2: Bridging
Bridge C is the Designated Bridge for LAN 1
LAN 1
10
10
Designated
Bridge for
LAN 1
Port 1
Bridge C
LAN 2
10
Port 1
Bridge A
Bridge B
Port 2
Port 2
10
Path
Cost
20
10
10
Port 2
Root Port
15
Port 1
Port 1
= Blocked Port
5
Bridge D
Port 2
10
Root Bridge
LAN 3
Port 1
Bridge E
Port 2
LAN 4
In the illustration above, the path cost from Bridge B to the root bridge,
Bridge E, using port 2 is 20. Using port 1 on Bridge B and transmitting
via Bridge C, the path cost is reduced to 15. The root port for Bridge B is
then designated as port 1 since the total path cost is lower. The same
holds true for Bridge A on LAN 1. Bridge C becomes the designated bridge
for LAN 1 since the path cost is lowest. Port 2 on both Bridge A and B is
blocked, based on path cost, to avoid a loop in the spanning tree.
As the Spanning Tree algorithm progresses, all the bridge ports are in one
of the following states:
•
Blocking—The port is prevented from sending or receiving frames.
•
Listening—The port is listening to BPDUs and determines which
bridge is the root and whether the port will go into the blocking or
forwarding state.
•
Learning—The bridge forwarding table is being built while the port is
listening.
•
Forwarding—The port is allowed to receive or transmit frames.
Once the Spanning Tree algorithm has completed, all the bridge ports are
in either the blocking or forwarding state. Loops are prevented since a
path has been established and ports not used in the path are blocked from
receiving or transmitting frames.
76
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Check Your Understanding
♦ In the diagram, label the following:
1. Root Bridge
2. Designated Bridge
3. Root port or ports
4. Port Costs
5. Total path cost
♦ After labeling the diagram, draw arrows indicating the path a
frame would take from one of the LANs to the root bridge.
LAN 1
Port 1
Bridge C
Port 1
Port 1
Bridge A
Bridge B
Port 2
Port 2
Path
Cost
LAN 2
Port 2
Port 1
Bridge D
Port 2
LAN 3
Port 1
Bridge E
Port 2
LAN 4
ST0025804A
77
Unit 2: Bridging
Translational Bridges
Translational bridges are a type of transparent bridge that connects LANs
that use different protocols at the data link and physical layers, for
example, FDDI and Ethernet.
Translational Bridge
Bridge
FDDI
Ring
Ethernet LAN
Source Route Bridges
Source route bridging is used in token ring networks. A source route
bridge links two or more rings together. There are fundamental
characteristics in how a source route bridge transmits a frame between
rings. A source route bridge does not create and maintain forwarding
tables. The decision to forward or drop a frame is based on information
provided in the frame.
The destination station is responsible for maintaining routing tables that
define a route to all workstations on the network. The source workstation
is responsible for determining the path of a frame to its destination. If no
route information is available, then the source station has the ability to
perform route discovery to learn the potential paths that can be taken.
Source Route Bridge
Bridge
Token
Ring
Token
Ring
Bridge
Token
Ring
78
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Route Discovery
A process called route discovery is used to determine the path of the frame
across a multiple token ring network. The process of route discovery is
based on the requirement that a pre-determined path between the source
and destination station must be established before a frame may be
transmitted. The path guides the frame from the source station to the
destination station.
A discovery frame, or explorer frame, is sent over the network by the
source station. A discovery frame is similar to other MAC frames, but
includes a routing information field (RIF). The discovery frame gathers
information on the path taken to the destination as it passes through the
network.
ST0025804A
79
Unit 2: Bridging
All Routes Explorer Frames (ARE)
Host 6
Bridge D
Ring 2
Bridge E
Ring 3
ARE#3
ARE#2
Bridge C
Ring 3
ARE#1
Bridge A
Bridge B
Ring 1
ARE transmitted
Al l Rout es
Expl orer
Fr ames
Host 1
There are two types of explorer frames:
•
All Routes Explorer Frames—These are multiple explorer frames sent
across the network at the same time by the source station. Each frame
collects path information and the first frame to return to the source
becomes the path of choice to the destination.
•
Single Route Explorer Frame—A single frame is sent across the
network via a specific bridge, designated by the user during the NIC
set-up. Multiple SREs are generated, one for each bridge. The frame to
reach the destination first becomes the path of choice.
Single Route Explorer Frames (SRE)
Host 2
Bridge C
Ring 2
Ring 3
Bridge B
Bridge A
Ring 1
Host 1
80
SRE to 6
USE Bridge A
ST0025804A
Si n gl e
Ro u t e
Ex p l or er
Fr ame
Routing
Lesson 2-1: Bridge Algorithms
A typical discovery process might go as follows:
1. The source station determines that the destination for a frame is not on
the local ring.
2. The source station checks its routing tables for route information to the
destination. The routing table maintains information on the ring and
bridge pair identification.
3. If the destination station does not know the route, the source station
sends an explorer frame on to the network with the ring number the
station is attached to.
4. The bridge accepts the explorer frame and adds the assigned bridge
number, and the number of the ring to which the frame is then
forwarded.
5. The bridge then forwards the frame to all adjacent bridges except the
ring from which it received the frame.
6. Each bridge along the path adds its bridge number and the number of
the ring to which the frame is then forwarded.
Each Bridge Adds Information to the Discovery Frame
Source
Bridge 1
Token
Ring 1
Token
Ring 2
Frame
Information
Added
R1B1R2
Frame
Informa tion
Added
R1B1R2 B2R3
Bridge 2
Token
Ring 3
Destination
7. Once the frame arrives at the destination, the frame contains the route
it took to get there. The destination station returns the frame with a
bit set telling the frame to use the same route in reverse.
8. Each bridge that receives the frame uses the route information in the
frame to forward the frame to the next ring.
ST0025804A
81
Unit 2: Bridging
9. When the source station receives the response to its explore frame, it
updates its routing tables and uses that route information for all
further transmissions with that destination.
Routing Information Field
The routing information field (RIF) is the part of the frame that contains
the routing information needed by the bridge to forward the frame. The
RIF is an optional section of the frame and only used if the frame must
leave the local ring.
Each time a frame is sent to a previously discovered destination on a
separate token ring, the path is copied to the routing information field of
the frame. The RIF is 2-18 bytes in length and is placed at the beginning of
the frame data field. The path includes the type of path (ARE/SRE) and
each ring and bridge used to reach the destination. The location of the
destination device is represented as a bridge with the identification of "0”.
Source Route Transparent Bridges (SRT)
Source route transparent bridges are transparent bridges that combine the
capabilities of the source route and the transparent bridge. When a SRT
bridge receives a frame with a RIF, the bridge handles the frame just as a
source route bridge would. If the bridge receives a frame without a RIF, it
handles the frame the same as a transparent bridge would. Source Route
Transparent bridges are commonly used in small token ring environments
where transparently bridging token ring frames is faster and requires less
processing, additionally as Layer 2 switches came into play the SRT
algorithm was used in high speed SRT switches to combine multiple token
rings into a virtual token ring by using transparent bridging between
combined rings and still offering SRB to rings that required route
discovery.
82
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Source Route Transparent Bridge (SRT)
SRT
Bridge
Token
Ring
SRT
Bridge
Token
Ring
Token
Ring
ST0025804A
83
Unit 2: Bridging
Performance Issues in Bridging
This lesson is one in a series about routers. So the first question asked is,
“Why discuss bridging in the first place?” Placing bridges and routers in
perspective relative to each other is important to understand why routers
are replacing bridges in networks.
There are several constraints in bridging.
•
Transparent bridges use only a subset of the network topology,
facilitated by the Spanning Tree algorithm. They do not maintain a
routing table to reference the best path from the source to the
destination. Changes in the topology cause the slow process of
reconfiguration.
•
Destination workstations in source route bridging do maintain route
tables, but these tables are lost each time the system is shut down.
•
The number of interconnected bridges is limited, thus placing a limit on
the size of the network.
•
Bridges drop packets that are too large to forward. They are not able to
break packets into smaller sections or reassemble packets once
received.
•
Bridges do not assign priority to packets. All packets are treated the
same and forwarded as equals. This leads to network congestion.
•
Bridges do not provide error checking.
In the lessons to follow, the advantages of routers over bridges will become
apparent. Each of the constraints in bridging is resolved in routing.
84
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Try It Out
Create a Bridging Game
Most of the information presented in the Routing course will be somewhat
intangible, in that much of the operation of routers and bridges cannot be
seen. Everything happens behind the scenes.
The challenge in this activity is to create a viable game that demonstrates
the operation of either a transparent learning bridge or a source route
bridge. The game must address the problems associated with successful
packet delivery and their solutions, for example, Spanning Tree Algorithm
or Discovery Route.
Materials Needed:
•
Windows 95 PC
•
Any Word Processor (e.g., MS Word)
•
Pen/Pencil and Paper
It is best to work in-groups for this activity, since teamwork allows the
group to tap into the strengths of many. Everyone has strengths and
weaknesses. Some people are great organizers, others can draw, others
can research, and others are fantastic writers. Teams of developers create
all the popular software computer games sold on today’s market.
Criteria for the game:
1. The focus of the game must be on either transparent learning or source
route bridging.
2. The design of the game must have an end result of increasing game
participants’ understanding of the type of bridging addressed in the
game.
3. Objectives must be stated for the expected outcomes of knowledge after
playing the game.
4. There must be at least one assessment component to the game to
document if participants understood more about bridging after using
the game (for example, a point system for successful progression
through the game).
5. The basic design of the game may be one of various designs (for
example, board game, role-playing, trivial pursuit).
ST0025804A
85
Unit 2: Bridging
6. Creativity, clarity, attractive appearance, and engaging and fun
activities are a must.
7. Fellow students (not involved in the game design) must test the game.
Revisions are to be made to address problems discovered in the game.
Rubric: Suggested Evaluation Criteria and Weightings
86
Criteria
%
Clear objectives and assessments
10
Creativity, clarity, and attractive appearance
30
Quality of activities: engaging and fun
40
Cooperative group teamwork
20
TOTAL
100
ST0025804A
Your Score
Routing
Lesson 2-1: Bridge Algorithms
Stretch Yourself
Spanning
Spanning Tree Poetry
Algorhyme
I think that I shall never see
A graph more lovely than a tree.
A tree whose crucial property
Is loop-free connectivity.
A tree that must be sure to span
So packets can reach every LAN.
First, the root must be selected.
By ID, it is elected.
Least cost paths from root are traced.
In the tree, these paths are placed.
A mesh is made by folks like me,
Then bridges find a spanning tree.
R. Perlman, INTERCONNECTIONS (poem entitled “Algorhyme”-page 54).
 1992 by Addison Wesley Publishing Company. Reprinted by permission
of Addision Wesley Longman.
Radia Perlman is the creator of the Spanning Tree Algorithm, and is a
well-known authority on the subject of bridges and routers. She wrote the
poem “Algorhyme” as a spoof of Joyce Kilmer’s (1886-1918) poem, “Trees.”
(Spurgeon, 1997)
ST0025804A
87
Unit 2: Bridging
Materials Needed:
•
Windows 95 PC
•
Any Word Processor (e.g., MS Word)
•
Pen/Pencil and Paper
•
Color Pencils or Color Markers
1. Write an interpretation of Ms. Perlman’s poem referencing the actual
events that occur in the Spanning Tree Algorithm line by line.
Rubric: Suggested Evaluation Criteria and Weightings
Criteria
%
Overall analysis and synthesis
50
Correct referencing of Spanning Tree events with
each line in the poem.
50
TOTAL
100
Your Score
2. Illustrate an impressionistic Spanning Tree that can accompany Ms.
Perlman’s poem, in which the topology accurately represents the
algorithm. The tree must be accurate, but the illustration should be
creative, colorful, and with an impressionistic flare, actually look like a
tree.
Rubric: Suggested Evaluation Criteria and Weightings
88
Criteria
%
Use of creative impressionism
40
Accurate representation of the Spanning Tree
Algorithm
40
Quality illustration suitable for reproduction
20
TOTAL
100
ST0025804A
Your Score
Routing
Lesson 2-1: Bridge Algorithms
Network Wizards
Comparing Source Route Bridges and Routers
Source route bridges operate very similarly to routers. Some references
even go as far as to say that source route bridges really are routers in
disguise, so to speak.
The confusion over networking terms is enough to frustrate even the most
experienced network managers. Often different names or terms are used
to represent the same thing. Joseph Bardwell said it quite well in his
poem, “Making the Connection”. (Optimized Engineering Corporation,
1999)
Making the Connection
Sometimes it amazes me
that routers work at Layer 3
when switches very well could do
the job at simply Layer 2.
But switches work at Layer 3.
Oh, how confusing this can be
when bridges work at Layer 2
and routers can be bridges too!
And when you hope there’d be no more
you find a switch at Layer 4.
So Layer 4, and 2, and 3
imply OSI conformity.
But these are simply building blocks
in what we’ll call an “Interconnect Box”.
Poem “Making the Connection” by Joseph Bardwell, copyright  1995-1999
by Optimizing Engineering Corporation, reprinted with permission.
ST0025804A
89
Unit 2: Bridging
Materials Needed:
•
Windows 95 PC
•
Any Word Processor (e.g., MS Word)
•
Pen/Pencil and Paper
1. Jump ahead and research the main characteristics of a router.
2. Compare your router research to the information in this lesson on
source route bridges.
3. Write an explanation as to why some network experts say that source
route bridges should really be considered routers.
4. Document your resources.
Rubric: Suggested Evaluation Criteria and Weightings
Criteria
%
Analysis and synthesis of research
40
Well thought out comparison
40
Resources
20
TOTAL
100
Your Score
Summary
In this lesson, you learned the following:
90
•
The characteristics and operation of transparent learning,
translational, source route, and SRT bridges.
•
How to diagram and explain the function of the Spanning Tree
Algorithm.
•
The performance issues in bridging.
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
Review Questions
Name___________________
Lesson 2-1: Bridge Algorithms
Part A
1. A transparent learning bridge builds a forwarding table by:
a. reading the source MAC address of every received frame and noting
which port the frame was received on.
b. reading the destination MAC address of every received frame and
noting which port the frame was transmitted on.
c. reading the source logical network address of every received frame
and noting which port the frame was received on.
d. reading the destination logical network address of every received
frame and noting which interface the frame was transmitted on.
2. When a transparent learning bridge receives a frame, it compares the
frame’s destination address with addresses in the forwarding table.
What will happen if there is no match?
a. The frame will be dropped.
b. The frame will be flooded.
c. The frame will be broadcast out all ports.
d. The frame’s destination address will be added to the forwarding
table and then the frame will be flooded.
3. In the Spanning Tree algorithm, a designated bridge is:
a. the bridge with the highest path cost to the root bridge.
b. the bridge with the lowest path cost to the root bridge.
c. the bridge with the root port.
d. the bridge with the lowest priority and MAC address.
ST0025804A
91
Unit 2: Bridging
4. The type of bridge used only to connect two or more token rings is:
a. transparent bridge
b. learning bridge
c. source route bridge
d. translational bridge
e. SRT bridge
5. The type of bridge that provides a network connection between LANs
that use different protocols at the physical and data link layers is
called:
a. transparent bridge
b. learning bridge
c. source route bridge
d. translational bridge
e. SRT bridge
6. The bridge that links FDDI networks to networks using different
protocols is called:
a. transparent bridge
b. learning bridge
c. source route bridge
d. translational bridge
e. SRT bridge
92
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
7. Source-route bridges use what process to determine the path of a
frame?
a. Spanning Tree algorithm
b. Address Resolution Protocol
c. Route Discovery
d. Encapsulation
8. Bridges operate at what level of the OSI model?
a. Physical layer
b. Network layer
c. Data link layer
d. Application layer
e. Transport layer
9. As a discovery frame travels from ring to ring and crosses bridges, it
records the path in the:
a. Routing table
b. Routing information field
c. MAC frame
d. Logical network address
10. Which of the following is responsible for determining the path that a
SRB frame will use in order to reach a destination?
a. Source route bridge
b. destination station
c. source station
d. repeater
ST0025804A
93
Unit 2: Bridging
Part B
Diagram each of the following types of bridges, including descriptive labels.
1. Transparent Learning Bridge
2. Source Route Bridge
3. Translational Bridge
4. SRT Bridge
Part C
1. Diagram how the Spanning Tree algorithm functions to create a loopfree bridge topology. Include in your diagram descriptive labels.
2. Write an explanation of your Spanning Tree diagram.
Part D
Indicate each statement as either True (T) or False (F).
94
1.
All bridges use routing tables to select a path to a
workstation.
2.
Bridges do not assign priority to the packets they transmit.
3.
The number of interconnected bridges is limited.
4.
Bridges break large packets into smaller segments to allow
forwarding of the packet.
5.
Bridges provide error checking when there is a problem in
the network
ST0025804A
Routing
Lesson 2-1: Bridge Algorithms
the network.
6.
Transparent bridges use only a subset of the network
topology.
7.
All packets are examined and treated differently when
forwarded.
8.
Destination workstations maintain routing tables in source
route bridging.
9.
The routing tables in source route bridging must be rebuilt
each time the system is booted.
10.
The size of a network using bridges is unlimited.
Scoring
Rubric: Suggested Evaluation Criteria and Weightings
Criteria
%
Part A: Identify the characteristics and
operation of transparent learning,
translational, source route, and SRT bridges.
20
Part B: Identify the characteristics and
operation of transparent learning,
translational, source route, and SRT bridges.
20
Part C: Diagram and explain the operation of
the Spanning Tree Protocol.
40
Part D: Identify performance issues in
bridging.
20
TOTAL
100
Try It Out
100
Stretch Yourself
100
Network Wizards
100
FINAL TOTAL
400
ST0025804A
Your Score
95
Unit 2: Bridging
Resources
Intel Corporation. (1999). Intel Technology Glossary. Available On-line:
http://www.206.204.30.82/olc/glossary.cfm.
Keshav, S. (1997). An Engineering Approach to Computer Networking:
ATM Networks, the Internet, and the Telephone Network. Addison-Wesley
Publishing Company, Reading, Massachusetts.
Optimized Engineering Corporation. (1999). Network Interconnect Devices:
Repeaters, Bridges, Switches, Routers. Available On-line:
http://www.optimized.com/COMPENDI/L1-Inter.html#MakeConn.
Perlman, R. (1992). Interconnections: Bridges and Routers. . AddisonWesley Publishing Company, Reading, Massachusetts.
Spurgeon, Charles E. (1997). Practical Networking With Ethernet,
International Thomson Computer Press, Boston, Massachusetts.
96
ST0025804A
Routing