Chapter 3 Outline

advertisement
Chapter 3, Network Connections
|1|
Chapter Overview
A.
B.
C.
Bridging
Switching
Routing
Chapter 3, Lesson 1
Bridging
|2|
1.
What Is a Bridge?
A.
|3|
2.
Connecting LANs with a Bridge
A.
B.
C.
D.
|4|
A data-link layer device that
1.
Connects networks
2.
Filters packets
a.
Propagates only packets destined for the other side of the bridge
b.
Can reduce network traffic and collisions
c.
Can lessen delays caused by high traffic levels
E.
Usually a hardware device with two ports
Connects two LANs or splits an existing LAN in half
Bridges operate in promiscuous mode, reading and processing all of
the packets transmitted over the network segments.
1.
Network interface adapters normally process only the packets that are
addressed to them and discard the rest.
Bridge functions
1.
Bridges can read the source and destination addresses in data-link layer
protocol headers.
a.
If the destination address of a packet arriving from one network
segment is that of a computer on the other segment, the bridge
transmits it out through the other port.
b.
If the destination address is that of a computer on the same network
segment as the computer that generated it, the bridge discards the
packet.
2.
The bridge eliminates unnecessary traffic from both segments.
3.
Bridges cannot operate any higher than the data-link layer and cannot
read any part of the packet other than the data-link layer protocol header.
Bridges and collisions
1.
A collision domain is a network (or part of a network) that is constructed
so that a collision occurs when two computers transmit packets at
precisely the same time.
2.
Adding a hub to a LAN increases its size but maintains a single collision
domain because hubs relay signals immediately at the physical layer,
without filtering them.
a.
F.
|5|
|6|
|7|
G.
H.
2
Hubs do not relay packets immediately; they wait until the entire
packet is received.
3.
Because the bridge delays propagation, computers on opposite sides of
the bridge transmitting at the same time do not cause a collision.
4.
Adding a bridge to a LAN splits it into two collision domains, resulting
in fewer collisions and increased efficiency.
Bridges and broadcasts
1.
Terms
a.
A broadcast message is a packet transmitted to all of the computers
on the network.
b.
A unicast message is a packet transmitted to one computer.
c.
A multicast message is a packet transmitted to a group of computers.
d.
A broadcast domain is a group of computers that all receive broadcast
transmissions sent by any computer in the group.
2.
Broadcasts are essential to LANs.
a.
Used by Address Resolution Protocol (ARP), Dynamic Host
Configuration Protocol (DHCP), and other protocols to locate
specific computers on the network
3.
Bridges propagate all broadcast packets without filtering them.
4.
The network segments on either side of a bridge are in the same
broadcast domain, and are therefore still part of the same LAN.
Transparent bridging
1.
Transparent bridging is a method for automatically compiling a bridge’s
address tables.
2.
How do bridges know which computers are located on each network
segment?
a.
Bridges maintain an address table for each of the network segments.
b.
After reading the source and destination addresses of each packet, the
bridge compares them to the tables to determine whether to propagate
them.
3.
Where do the address tables come from?
a.
Originally, administrators had to create the tables manually.
b.
Today’s bridges use a technique called transparent bridging to
compile their own address tables.
c.
As the bridge processes a packet, it adds its source address to the
table for the segment from which it arrived.
d.
When a bridge lacks the information needed to filter a packet, it
propagates the packet by default.
Spanning tree algorithm (STA)
1.
STA is a protocol that bridges use to select one of the bridges to process
packets.
2.
Using multiple bridges to connect two network segments provides fault
tolerance.
3.
Redundancy can cause data loss when bridges have conflicting
information in their tables.
Outline, Chapter 3
Network+ Certification, Second Edition
4.
I.
|8|
3.
Bridge Types
A.
B.
C.
|9|
Multiple bridges can forward broadcasts endlessly, which is called a
bridge loop.
5.
The STA lets the bridges work together to select one bridge to function,
while the others remain idle.
Source route bridging
1.
Token Ring systems use source route bridging instead of transparent
bridging and the STA.
2.
Workstations themselves select the bridge they will use.
a.
Each computer transmits an All Rings Broadcast (ARB) message.
b.
Each bridge receiving the ARB adds a route designator to it,
identifying the bridge and port through which it received the packet.
c.
Each computer receiving an ARB returns it to its source.
3.
Bridges use the route designators to avoid sending packets to the same
bridge twice.
4.
The original source system uses the returned packets to determine which
bridge provides the most efficient route through the network to a given
destination.
D.
The three bridge types are local, translation, and remote.
Local bridge
1.
Connects network segments of the same type and at the same location
2.
Does not modify the data in the packets; it simply passes on the packets
or discards them
Translation bridge
1.
Connects network segments at the same location that use different media
or different protocols
2.
Strips the data-link layer frame off the packets and packages them in a
new frame for transmission on the other segment
3.
Disadvantages:
a.
Slower than local bridging
b.
Hardware more expensive
4.
Rarely used
Remote bridge
1.
Connects network segments at remote locations, using a wide area
network (WAN) link
2.
Advantage: reduces the amount of traffic passing over the WAN link
Chapter 3, Lesson 2
Switching
|10|
1.
Switch Characteristics
A.
B.
C.
Data-link layer device
Replaces bridges, and in many cases, routers
Similar in appearance to a hub
Outline, Chapter 3
Network+ Certification, Second Edition
3
1.
D.
E.
F.
G.
H.
2.
Installing Switches
A.
|12|
B.
C.
D.
E.
|13|
4
Some manufacturers make hubs and switches that are identical except
for their markings.
A switch forwards incoming traffic out to the destination port only, as
opposed to a hub, which forwards traffic out through all ports.
Converts a shared network medium to a dedicated one
1.
Each packet takes a dedicated path from the source computer to the
destination.
2.
Each pair of computers forms its own collision domain.
3.
The switch forwards broadcast messages out through all ports, but not
unicasts or multicasts.
4.
No computers receive messages destined for other systems.
5.
No collisions occur during unicast transmissions.
Advantages
1.
Reduces network traffic congestion more efficiently than a bridge does
2.
Allows each pair of computers to use the full bandwidth of the network
Some switches can operate in full-duplex mode.
1.
Computers can transmit and receive at the same time.
2.
Effectively doubles the bandwidth of the network
In general, switches are more expensive than hubs and less expensive
than routers.
Switches are typically used to replace routers and bridges.
1.
A switch generally is not needed to replace a hub on a small LAN.
Replacing the routers on a backbone internetwork with switches can
dramatically reduce traffic congestion.
1.
On a routed network, the backbone carries all Internet traffic.
2.
On a switched network, any computer can open a dedicated connection
to any other computer.
3.
Collisions are dramatically decreased.
It is not necessary to replace all of the routers on a network with
switches at once.
1.
You can replace either a workgroup hub or a backbone router with a
switch, depending on whether the network has more intranetwork or
internetwork traffic.
Replacing routers with switches on an internetwork creates one large
broadcast domain.
1.
Each computer must process more unnecessary broadcasts.
There are several ways to address the broadcast problem, including
1.
Virtual LANs (VLANs)
a.
A VLAN is a subnet on a switched network that exists only in the
switches.
b.
You specify the addresses of computers that belong in a specific
subnet.
Outline, Chapter 3
Network+ Certification, Second Edition
c.
2.
|14|
|15|
3.
Computers in a VLAN can be located anywhere because the subnet is
independent of the physical network.
d.
Broadcasts transmitted by a computer go only to the other computers
in the VLAN.
e.
All communications within a VLAN are switched.
f.
Communications between subnets can be routed or switched.
Layer 3 switching
a.
A variation on the VLAN concept that minimizes the amount of
routing needed between the VLANs
b.
When communication between systems on different VLANs is
required, a router establishes a connection between the systems and
then the switches take over.
c.
Routing occurs only when absolutely necessary.
Switch Types
A.
B.
Cut-through switch
1.
Forwards packets immediately
a.
Does not wait for the entire packet to arrive
2.
Most cut-through switches use a technique called matrix switching or
crossbar switching.
a.
Uses a grid of input/output (I/O) circuits that enable data to enter and
leave the switch through any port
3.
Advantages:
a.
Relatively inexpensive
b.
Minimizes latency (the delay that occurs when the switch processes
the packets)
Store-and-forward switch
1.
Waits until the entire packet arrives before forwarding it
2.
Can be either
a.
A shared-memory switch, which uses a common memory buffer to
store incoming data from all ports, or
b.
A bus architecture switch, which uses individual buffers for each
port, connected by a bus
3.
While the data is buffered, the switch
a.
Performs a cyclical redundancy check (CRC)
b.
Checks for data-link layer protocol faults such as runts, giants, and
jabber
4.
Disadvantages:
a.
Slower
b.
More expensive than cut-through switching
Outline, Chapter 3
Network+ Certification, Second Edition
5
Chapter 3, Lesson 3
Routing
|16|
1.
Router Characteristics
A.
B.
C.
|17|
2.
Router Functions
A.
B.
C.
3.
C.
6
Routers forward packets to the destination network.
1.
When a computer on a LAN wants to transmit data to a computer on
another LAN, the system sends its packets to a router on the local
network and the router forwards them to the destination network.
2.
If the destination system is not located on an adjacent network, the
router must forward the packets to another router.
3.
On a large internetwork, such as the Internet, packets might pass through
a dozen or more routers on the way to their destination.
Routers strip the data-link layer frame off incoming packets and add a
new frame for the outgoing network interface.
Routers fragment packets when necessary, depending on the
properties of the outgoing network.
Packet Routing
A.
B.
|18|
Routers are hardware or software devices that connect networks to
form an internetwork.
1.
Are network layer devices
2.
Connect LANs running different data-link layer protocols, as long as
they are running the same network-layer protocol
IP performs most of the routing on networks today.
Transmission Control Protocol/Internet Protocol (TCP/IP) documents
often use the term “gateway” when referring to a router.
1.
A gateway can also refer to a hardware or software device that operates
at the application layer to provide an interface between two programs.
D.
Routers do not forward broadcasts, except in specific circumstances.
Routers forward packets based on the destination address in the
network layer protocol header.
Routers use routing tables to determine where to send packets.
1.
Every router has an internal table called a routing table, which contains
information about nearby networks.
2.
When a packet is addressed to a computer on a network the router is
directly connected to, the router transmits it to the destination.
3.
When a packet is addressed to a computer on a distant network, the
router looks up the destination in its routing table to locate an
appropriate router for the next hop.
4.
Routers select the most efficient path to the destination.
Routing process example
1.
The computers on each segment use the router connecting the segment
to the backbone as their default gateway.
Outline, Chapter 3
Network+ Certification, Second Edition
2.
E.
|19|
F.
4.
Routing to the Internet
A.
|20|
5.
The computers transmit all of the packets they generate to either a
specific system on the local network or the default gateway.
3.
The default gateway router strips the data-link layer frame off each packet
and reads the destination address from its network layer protocol header.
4.
Using the information in its routing table, the gateway determines which
router it must use to access the network the destination system is located on.
5.
The gateway then constructs a new frame for the packet, using the
backbone’s data-link layer protocol and specifying the router leading to
the destination network as the data-link layer destination address.
6.
When the packet reaches the next router, the process repeats itself,
except that the next router’s table indicates that the destination system is
on the segment the router is attached to.
a.
The router can therefore construct a frame that transmits the packet
directly to the destination system.
Each router that processes a packet is referred to as a hop.
1.
The efficiency of a given path through the internetwork is often
calculated by the number of hops required to reach the destination.
Routers also can connect networks at remote locations by using WAN
links.
1.
Because only packets destined for the other network pass over the WAN,
WAN traffic is minimized.
The most common use for WAN routers is connecting a network to an
Internet service provider (ISP), giving the computers on the network
access to the Internet.
1.
To connect your LAN to the Internet, you install a router that can
connect to an ISP, using any type of WAN link.
2.
The router is configured to forward all traffic not destined for the local
network to the ISP, which relays it to the Internet.
Understanding Routing Tables
A.
B.
C.
Routing tables are essential to the router operation and functions.
1.
Unlike bridges and switches, routers cannot compile their own routing
tables from the incoming packets.
Static routing
1.
Manual creation of a routing table by an administrator
2.
Practical on small networks only
a.
On a large network, static routing would require too much work.
3.
Cannot accommodate changes in network status
Dynamic routing
1.
Automatic creation of routing table entries by using a specialized routing
protocol
a.
Routers use the specialized protocols to exchange routing table
information.
Outline, Chapter 3
Network+ Certification, Second Edition
7
b.
2.
6.
Routing Metrics
A.
B.
C.
|21|
7.
B.
C.
Routers can be stand-alone hardware devices or software running on a
computer.
Hardware routers
1.
Large enterprise networks use expensive rack-mounted routers to
connect LANs into an internetwork.
2.
Lower-priced router devices enable you to connect a small network to
the Internet.
Software routers include
1.
Microsoft Windows 2000 Internet Connection Sharing (ICS)
2.
Windows 2000 Routing and Remote Access
Chapter Summary
A.
B.
C.
8
Networks often have more than one route to a particular destination.
Routers use a metric to evaluate the efficiency of each route.
Routers choose the most efficient route available by selecting the one
with the lowest metric.
1.
The metric can be based on the number of hops or on more complex
computations.
2.
The lowest metric is best.
Router Types
A.
|22|
Routers have direct information only about the networks they are
connected to.
c.
Sharing information with other routers enables all of the routers to
build a picture of the network.
Routing protocols enable routers to
a.
Build their tables automatically, with no participation by an
administrator
b.
Update their tables when the network changes, such as when a router
malfunctions
Bridging
1.
Bridges selectively relay packets between network segments, depending
on their data-link layer destination addresses.
2.
Bridges maintain a single broadcast domain and create separate collision
domains.
Switching
1.
Switches improve on the function of bridges by forwarding packets only
to their destination systems.
2.
Switches reduce the collisions on a network and increase the bandwidth
available to each computer.
Routing
1.
Routers are used to connect networks together at the network layer of the
OSI reference model.
Outline, Chapter 3
Network+ Certification, Second Edition
2.
3.
Routers strip away the data-link layer frame of incoming packets and
build a new frame using the data-link layer protocol of the outgoing
network.
Routing tables can be created manually by a network administrator or
automatically by a routing protocol.
Outline, Chapter 3
Network+ Certification, Second Edition
9
Download