* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download What are the collision domains?
Asynchronous Transfer Mode wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Deep packet inspection wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Computer network wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Internet protocol suite wikipedia , lookup
Nonblocking minimal spanning switch wikipedia , lookup
Spanning Tree Protocol wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Airborne Networking wikipedia , lookup
Network tap wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Virtual LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Prof. Dr. R.Nitsch, FH Darmstadt CCNAv30 – Semester 1 – Module 8 - Ethernet Switching Reiner Nitsch [email protected] Layer 2 switching • A switch is simply a bridge with many ports. • Each port creates its own collision domain. • When only one node is connected to a switch port, the collision domain on the shared media contains only two nodes. • These small physical segments are called microsegments. • When only two nodes are connected to a microsegment and communication is full duplex, a collision domain no longer exists. Theoretically, the bandwidth is doubled when using full duplex. • A switch dynamically builds and maintains a Content-Addressable Memory (CAM) table, holding all of the necessary MAC information for each port. • Content-addressable memory (CAM) is memory that essentially works backwards compared to conventional memory. Entering data into the memory will return the associated address. • Using CAM allows a switch to directly find the port that is associated with a MAC address without using search algorithms. 4.7.2002 Network Layer Prof. Dr. R.Nitsch, FH Darmstadt Segment 3 2 LAN Switch modes Prof. Dr. R.Nitsch, FH Darmstadt • Asymmetric switching provides switched connections between ports of unlike bandwidths, such as a combination of 100 Mbps and 1000 Mbps. • Symmetric switching provides switched connections between ports of equal bandwidths. How a frame is switched to the destination port is a trade off between latency and reliability. • Store and Forward: – The switch receives the entire frame before sending it out the destination port. – The frame is discarded by the switch rather than at the ultimate destination if it contains a CRC error or if it is a runt (less than 64 bytes, including the CRC) or a giant (more than 1518 bytes, including the CRC). • Cut-through switching – The switch starts to transfer the frame as soon as the destination MAC address is received. The MAC address determines the output port! – Results in the lowest latency through the switch. – No error checking is available. Invalid frames are forwarded and waste bandwidth. • Fragment-free Mode: – compromise between the cut-through and store-and-forward modes – The switch starts frame transmission after it reads the first 64 bytes, which includes the frame header, and switching begins before the entire data field and checksum are read. – Runts were detected and discarded. A late collision is when a collision happens after the first 64 bytes of the frame are transmitted. 4.7.2002 Network Layer 3 Spanning-Tree Protocol • Switched networks are often designed with redundant paths to provide for reliability and fault tolerance. • Switching loops can occur by design or by accident, and they can lead to broadcast storms that will rapidly overwhelm a network. • How to avoid switching loops? – Allways arrange multiple switches in a simple hierarchical tree (difficult to administer) – Use switches with the standards-based protocol Spanning-Tree Protocol (STP) activated. • LAN-Switches using STP send special messages called Bridge Protocol Data Units (BPDUs) out all its ports to let other switches know of its existence and to elect a root bridge for the network. The switches then use the Spanning-Tree Algorithm (STA) to resolve and shut down the redundant paths until they are needed. • Each port on a switch using Spanning-Tree Protocol exists in one of the following five states: Blocking, Listening, Learning, Forwarding, Disabled • A port moves through these five states as shown: 4.7.2002 Network Layer Prof. Dr. R.Nitsch, FH Darmstadt blocking initialization disabled forwarding listening learning 4 Layer 2 broadcasts Prof. Dr. R.Nitsch, FH Darmstadt • Protocols use broadcast and multicast frames at Layer 2 of the OSI model. When a node needs to communicate with all hosts on the network, it sends a broadcast frame with a destination MAC address 0xFFFFFFFFFFFF. • This is an address to which each network interface card (NIC) must respond. • Layer-2 devices must flood all broadcast and multicast traffic which is referred to as broadcast radiation. • The circulation of broadcast radiation can saturate the network so that there is no bandwidth left for other application data. • The probability this event, which is also called a broadcast storm, increases as the switched network grows. • Broadcast radiation affects the performance of hosts in the network, because the NIC must interrupt the CPU to process each broadcast or multicast group it belongs to. • The figure shows the effect of broadcast radiation on the CPU performance of a Sun SPARCstation 2 with a standard built-in Ethernet card. • Most often, the host does not benefit from processing the broadcast, as it is not the destination being sought. 4.7.2002 Network Layer 5 Sources of Broadcasts Prof. Dr. R.Nitsch, FH Darmstadt • The three sources of broadcasts and multicasts in IP networks are workstations, routers, and multicast applications. • Workstations broadcast an Address Resolution Protocol (ARP) request every time they need to locate a MAC address that is not in the ARP table. The ARP rate for a typical workstation might be about 50 addresses every two hours or 0.007 ARPs per second. Thus, 2000 IP end stations produce about 14 ARPs per second. • Routing protocols running on routers produce broadcast traffic. The Routing Information Protocol (RIP) broadcasts every 30 seconds the entire RIP routing table to other RIP routers. For a routing table that has a size of 50 packets, 10 RIP routers would generate about 16 broadcasts per second. Conclusion: It's necessary to have devices on a network that control the extent of broadcast domains 4.7.2002 Network Layer 6 Broadcast Domains • A broadcast domain is a grouping of collision domains that are connected by Layer 2 devices. • Broadcasts have to be controlled at Layer 3, as layer-2 and layer-1 devices have no way of controlling them. • It is layer 3 that allows layer-3 devices to limit broadcast domains: Layer-2 information is stripped off before the frame payload is handed over to the layer-3 forwarding processes. Their forwarding decision is based on layer-3 network addresses and not on MAC addresses. • Routers actually work at Layers 1, 2, and 3. • Therefore: Broadcast domains are controlled (or contained) at Layer 3 because routers do not forward layer-2 broadcasts. 4.7.2002 Network Layer Prof. Dr. R.Nitsch, FH Darmstadt What are the collision domains? What are the broadcast domains? 7 Prof. Dr. R.Nitsch, FH Darmstadt So, das war´s erst mal! 4.7.2002 Network Layer 8