UNH-IOL BFC Knowledgebase Bridging
UNH-IOL BFC Knowledgebase Bridging
Destination
Source LAN Switch 2 LAN
Switch 1 Server
Switch 3
Transparent Bridging
The transparent bridging method follows the plug and
play philosophy.
Each bridge contains one (or more) Filtering Databases
that learn and remember MAC addresses on its networks.
Forwarding decisions are then made with consultation of
the Filtering Database. If a destination MAC address has
been learned, the packet is then forwarded out of that
port.
These addresses then will be cleared from the Filtering
Database if they are not active for a specific amount of
time. This range is defined by Aging Time, which can be
set in the management.
Filtering Database
One database Entry
1
MAC Addr
0800900A2580
Port
1
active
yes
contains MAC 2
3
002034987AB1
00000C987C00
1
2
yes
yes
addresses, which 4 00503222A001 2 yes
addresses not
12
Shared LAN
Switch 1
The Permanent Database
Upon Bridge Initialization, a reserved block of Multicast
Addresses is transferred to the Filtering Database
Assignment Value
Bridge Group Address (Span. Tree) 01 80 C2 00 00 00
IEEE Std. 802.3, Full Duplex Pause Operation 01 80 C2 00 00 01
Slow Protocols Multicast Address 01 80 C2 00 00 02
Reserved for future standardization 01 80 C2 00 00 03
To
01 80 C2 00 00 0F
-Radia Perlman
What is a Spanning Tree?
Only one active path
exists between any
two devices.
Resembles a family
tree. (problems arise in both
when loops occur)
Why Spanning Tree?
The purpose of Spanning Tree is to
have bridges dynamically discover a
subset of the topology that is loop-free
and yet has just enough connectivity so
that there is a path between every pair
of nodes in the LAN.
How does Spanning Tree work?
The basic idea behind the Spanning
Tree Protocol is that bridges transmit
special messages to each other that
allow them to calculate a spanning tree
Configuration Bridge Protocol Data
Units (BPDUs)
Sometimes referred to a Config. BPDUs
STP Example
Root
A B
C D E F
Port States
Bridge ports operate the Spanning Tree
Algorithm using the following states:
Blocking incoming frames are discarded
Listening incoming frames are discarded, but the
port is in the process of transitioning to Learning
Learning incoming frames are discarded, but
their source addresses and ports are placed in the
Filtering Database
Forwarding incoming frames are forwarded,
source addresses are learned
Disabled the port is disabled by management
Configuration BPDUs
The Configuration BPDU contains enough info so
that bridges can do the following:
1) Elect a single bridge to be Root Bridge
2) Calculate the distance of the shortest path from
themselves to the Root Bridge
3) Elect a Designated Bridge for each LAN segment,
which is the bridge in the LAN segment closest to the
Root Bridge, to forward packets from that LAN
segment toward the Root Bridge.
4) Choose the port, called the root port, that gives the
best path from themselves to the Root Bridge.
5) Select ports to be included in the spanning tree.
These include only root ports and designated ports.
Inside Config BPDUs
Destination MAC Address: 01 80 C2 00 00 00
Special Multicast address for Spanning
Tree
Root ID
ID of the bridge assumed to be root
Bridge ID
ID of the bridge transmitting BPDU
Cost
Cost of least-cost path to the root from
LAN Connection
A B
Incoming broadcast
frame
Performance Issues
Two properties make bridge
performance crucial:
1) Lack of receipt of BPDUs causes bridges
to add connectivity. If a bridge does not
receive any Configuration BPDUs on
some port it will take over as the
Designated Bridge on that port.
2) Extra connectivity will cause loops
What affects Bridge Performance?
Network Congestion
Bridge will discard packets before looking
at them if CPU cant keep up
Bridge must be able to transmit BPDUs
no matter how congested the network is
This involves being able to move BPDUs to
the front of the queue
VLANs (Virtual Local Area Network)
A means by which LAN users on different
physical LAN segments are afforded priority
access privileges across the LAN backbone in
order that they appear to be on the same
physical segment on an enterprise-level logical
LAN. VLAN solutions, which are priority in
nature, are implemented in LAN switches, and
VLAN membership is defined by the LAN
administrator on the basis of either port address
or MAC address.
Definition of VLAN from Newtons Telecom Dictionary.
How VLANs work:
1) LAN Bridge receives tagged data from workstation
2) Bridge reads current tag, and forwards data with a VLAN
ID (tag) corresponding to the VLAN the data came from
(explicit tagging)
OR
1) LAN Bridge receives untagged data from workstation
2) Bridge determines the VLAN membership of data by
noting the port on which it arrives (implicit tagging)
Basic VLAN Concepts
Port-based VLANs
Each port on a switch is in one and only one VLAN
(except trunk links)
Tagged Frames
VLAN ID and Priority info is inserted (4 bytes)
Trunk Links
Allow for multiple VLANs to cross one link
Access Links
The edge of the network, where legacy devices attach
Hybrid Links
Combo of Trunk and Access Links
Basic VLAN Concepts (cont.)
Priority-tagged frame
tag header carries priority info., but no
VLAN ID
VLAN-tagged frame
tag header carries both VLAN ID and
priority info.
Port VLAN ID (PVID)
provides the VID for untagged and priority-
tagged frames received on that Port
Trunk Link
Vendors (current):
Cisco Systems, 3Com
and Hewlett Packard
Several others are
developing working
implementations also.
Industry Implementation Example
3Com manufactures Network Interface Cards that take
advantage of GVRP
Accessed via the Control Panel (DynamicAccess )
E E
S S
RED E E GOLD
THE END
Any Questions?