Translate

Monday, October 3, 2016

BRIDGE

BRIDGE
A LAN or MAN is not an isolated entity. An organization may
have more than one type of LAN at a given site to satisfy a spectrum of needs.
An organization may have multiple LANs of the same type at a given site to
accommodate performance or security requirements. Furthermore, an organization
may have LANs and possibly MANS at various sites and may need them to be interconnected
for central control of distributed information exchange.
The simplest approach to extending the range of LAN coverage is the use of
bridges to interconnect a number of individual LANs. A more general solution,
which allows the interconnection of local and wide area networks, is the use of an
internetworking protocol and routers. This latter area is discussed in Lesson 16.
Here, we concentrate on the bridge.
The lesson begins with a discussion of the basic operation of bridges. Then,
we look at the most complex design issues associated with bridges, which is routing.
BRIDGE OPERATION
The early designs for bridges were intended for use between local area networks
(LANs) that use identical protocols for the physical and medium access layers (e.g.,
all conforming to IEEE 802.3 or all conforming to FDDI). Because the devices all
use the same protocols, the amount of processing required at the bridge is minimal.
In recent years, bridges that operate between LANs with different MAC protocols
have been developed. However, the bridge remains a much simpler device than the
router, which is discussed in Lesson 16.
Because the bridge is used in a situation in which all of the LANs have the
same characteristics, the reader may ask why one does not simply use one large
LAN. Depending on circumstance, there are several reasons for the use of multiple
LANs connected by bridges:
Reliability. The danger in connecting all data processing devices in an organization
to one network is that a fault on the network may disable communication
for all devices. By using bridges, the network can be partitioned into selfcontained
units.
Performance. In general, performance on a LAN or MAN declines with an
increase in the number of devices or with the length of the medium. A number
of smaller LANs will often give improved performance if devices can be
clustered so that intra-network traffic significantly exceeds inter-network
traffic.
Security. The establishment of multiple LANs may improve security of communications.
It is desirable to keep different types of traffic (e.g., accounting,
personnel, strategic planning) that have different security needs on physically
separate media. At the same time, the different types of users with different
levels of security need to communicate through controlled and monitored
mechanisms.
Geography. Clearly, two separate LANs are needed to support devices clustered
in two geographically distant locations. Even in the case of two buildings
separated by a highway, it may be far easier to use a microwave bridge
link than to attempt to string coaxial cable between the two buildings. In the
case of widely separated networks, two half bridges are needed (see Figure
14.3, below).
Functions of a Bridge
Figure 14.1 illustrates the operation of a bridge between two LANs, A and B. The
bridge performs the following functions:
* Reads all frames transmitted on A, and accepts those addressed to stations
on B.
* Using the medium access control protocol for B, retransmits the frames
onto B.
* Does the same for B-to-A traffic.
Several design aspects of a bridge are worth highlighting:
1. The bridge makes no modification to the content or format of the frames it
receives, nor does it encapsulate them with an additional header. Each frame
to be transferred is simply copied from one LAN and repeated with exactly
the same bit pattern as the other LAN. Because the two LANs use the same
LAN protocols, it is permissible to do this.
2. The bridge should contain enough buffer space to meet peak demands.
Over a short period of time, frames may arrive faster than they can be
retransmitted.
3. The bridge must contain addressing and routing intelligence. At a minimum,
the bridge must know which addresses are on each network in order to know
which frames to pass. Further, there may be more than two LANs interconnected
by a number of bridges. In that case, a frame may have to be routed
through several bridges in its journey from source to destination.
4. A bridge may connect more than two LANs.
The bridge provides an extension to the LAN that requires no modification to
the communications software in the stations attached to the LANs. It appears to all
stations on the two (or more) LANs that there is a single LAN on which each station
has a unique address. The station uses that unique address and need not explicitly
discriminate between stations on the same LAN and stations on other LANs;
the bridge takes care of that.
The description above has applied to the simplest sort of bridge. More sophisticated
bridges can be used in more complex collections of LANs. These constructions
would include additional functions, such as,
a Each bridge can maintain status information on other bridges, together with
the cost and number of bridge-to-bridge hops required to reach each network.
This information may be updated by periodic exchanges of information
among bridges; this allows the bridges to perform a dynamic routing function.
@ A control mechanism can manage frame buffers in each bridge to overcome
congestion. Under saturation conditions, the bridge can give precedence to en
route packets over new packets just entering the internet from an attached
LAN, thus preserving the investment in line bandwidth and processing time
already made in the en route frame.
Bridge Protocol Architecture
The IEEE 802.1D specification defines the protocol architecture for MAC bridges.
In addition, the standard suggests formats for a globally administered set of MAC
station addresses across multiple homogeneous LANs. In this sublesson, we examine
the protocol architecture of these bridges.
Within the 802 architecture, the endpoint or station address is designated at
the MAC level. Thus, it is at the MAC level that a bridge can function. Figure 14.2
shows the simplest case, which consists of two LANs connected by a single bridge.
The LANs employ the same MAC and LLC protocols. The bridge operates as previously
described. A MAC frame whose destination is not on the immediate LAN
is captured by the bridge, buffered briefly, and then transmitted on the other LAN.
As far as the LLC layer is concerned, there is a dialogue between peer LLC entities
in the two endpoint stations. The bridge need not contain an LLC layer, as it is
merely serving to relay the MAC frames.
Figure 14.2b indicates the way in which data is encapsulated using a bridge.
Data are provided by some user to LLC. The LLC entity appends a header and
passes the resulting data unit to the MAC entity, which appends a header and a
trailer to form a MAC frame. On the basis of the destination MAC address in the
frame, it is captured by the bridge. The bridge does not strip off the MAC fields; its
function is to relay the MAC frame intact to the destination LAN. Thus. the frame
is deposited on the destination LAN and captured by the destination station.
The concept of a MAC relay bridge is not limited to the use of a single bridge
to connect two nearby LANs. If the LANs are some distance apart, then they can
be connected by two bridges that are in turn connected by a communications facility.
For example, Figure 14.3 shows the case of two bridges connected by a point-topoint
link. In this case, when a bridge captures a MAC frame, it appends a link layer
(e.g., HDLC) header and trailer to transmit the MAC frame across the link to the
other bridge. The target bridge strips off these link fields and transmits the original,
unmodified MAC frame to the destination station.
The intervening communications facility can be a network, such as a widearea-
packet-switching network, as illustrated in Figure 14.4. In this case, the bridge
is somewhat more complicated, although it performs the same function of relaying
MAC frames. The connection between bridges is via an X.25 virtual circuit. Again,
the two LLC entities in the end systems have a direct logical relationship with no
intervening LLC entities. Thus, in this situation, the X.25 packet layer is operating
below an 802 LLC layer. As before, a MAC frame is passed intact between the endpoints.
When the bridge on the source LAN receives the frame, it appends an X.25
packet-layer header and an X.25 link-layer header and trailer and sends the data to
the DCE (packet-switching node) to which it attaches. The DCE strips off the linklayer
fields and sends the X.25 packet through the network to another DCE. The
target DCE appends the link-layer field and sends this to the target bridge. The target
bridge strips off all the X.25 fields and transmits the original unmodified MAC
frame to the destination endpoint.

ROUTING WITH BRIDGES
MAC-H
In the configuration of Figure 14.1, the bridge makes the decision to relay a frame
on the basis of destination MAC address. In a more complex configuration, the
bridge must also make a routing decision. Consider the configuration of Figure 14.5.
Suppose that station 1 transmits a frame on LAN A intended for station 5. The
frame will be read by both bridge 101 and bridge 102. For each bridge, the
addressed station is not on a LAN to which the bridge is attached. Therefore, each
bridge must make a decision of whether or not to retransmit the frame on its other
LAN, in order to move it closer to its intended destination. In this case, bridge 101
should repeat the frame on LAN B, whereas bridge 102 should refrain from retransmitting
the frame. Once the frame has been transmitted on LAN B, it will be picked
up by both bridges 103 and 104. Again, each must decide whether or not to forward
the frame. In this case, bridge 104 should retransmit the frame on LAN E, where it
will be received by the destination, station 5.
Thus, we see that, in the general case, the bridge must be equipped with a
routing capability. When a bridge receives a frame, it must decide whether or not to
forward it. If the bridge is attached to two or more networks, then it must decide
whether or not to forward the frame and, if so, on which LAN the frame should be
transmitted.
The routing decision may not always be a simple one. In Figure 14.6, bridge
107 is added to the previous configuration, directly linking LAN A and LAN E.
Such an addition may be made to provide for higher overall internet availability. In
this case, if Station 1 transmits a frame on LAN A intended for station 5 on LAN
E, then either bridge 101 or bridge 107 could forward the frame. It would appear
preferable for bridge 107 to forward the frame, as it will involve only one hop,
whereas if the frame travels through bridge 101, it must suffer two hops. Another
consideration is that there may be changes in the configuration. For example, bridge
107 may fail, in which case subsequent frames from station 1 to station 5 should go
through bridge 101. We can say, then, that the routing capability must take into
account the topology of the internet configuration and may need to be dynamically
altered.
Figure 14.6 suggests that a bridge knows the identity of each station on each
LAN. In a large configuration, such an arrangement is unwieldy. Furthermore, as
stations are added to and dropped from LANs, all directories of station location
must be updated. It would facilitate the development of a routing capability if all
MAC-level addresses were in the form of a network part and a station part. For
example, the IEEE 802.5 standard suggests that 16-bit MAC addresses consist of a
7-bit LAN number and an 8-bit station number, and that 48-bit addresses consist of
a 14-bit LAN number and a 32-bit station number.' In the remainder of this discussion,
we assume that all MAC addresses include a LAN number and that routing is
based on the use of that portion of the address only.
A variety of routing strategies have been proposed and implemented in recent
years. The simplest and most common strategy is fixed routing. This strategy is suitable
for small LAN collections and for interconnections that are relatively stable.
More recently, two groups within the IEEE 802 committee have developed specifications
for routing strategies. The IEEE 802.1 group has issued a standard for routing
based on the use of a spanning tree algorithm. The token ring committee, IEEE
802.5, has issued its own specification, referred to as source routing. We examine
these three strategies in turn.

Fixed Routing
Fixed routing was introduced in our discussion of routing for packet-switching networks.
For fixed routing with bridges, a route is selected for each source-destination
pair of LANs in the internet. If alternate routes are available between two LANs,
then typically the route with the least number of hops is selected. The routes are
fixed, or at least only change when there is a change in the topology of the internet.
Figure 14.7 shows a fixed-routing design for the configuration of Figure 14.6.
A central routing matrix shows, for each source-destination pair of LANs, the identity
of the first bridge on the route. So, for example, the route from LAN E to
LAN F begins by going through bridge 107 to LAN A. Again, consulting the matrix,
the route from LAN A to LAN F goes through bridge 102 to LAN C. Finally,
the route from LAN C to LAN F is directly through bridge 105. Thus, the
complete route from LAN E to LAN F is bridge 107, LAN A, bridge 102, LAN C,
bridge 105.
Only one column of this matrix is needed in each bridge for each LAN to
which it attaches. For example, bridge 105 has two tables, one for frames arriving
from LAN C and one for frames arriving from LAN F. The table shows, for each
possible destination MAC address, the identity of the LAN to which the bridge
should forward the frame. The table labeled "From LAN C" is derived from the
column labeled C in the routing matrix. Every entry in that column that contains
bridge number 105 results in an entry in the corresponding table in bridge 105.
Once the directories have been established, routing is a simple matter. A
bridge copies each incoming frame on each of its LANs. If the destination MAC
address corresponds to an entry in its routing table, the frame is retransmitted on
the appropriate LAN.
The fixed routing strategy is widely used in commercially available products;
it has the advantage of simplicity and minimal processing requirements. However,
in a complex internet, in which bridges may be dynamically added and in which failures
must be allowed for, this strategy is too limited. In the next two sublessons, we
cover more powerful alternatives.
Spanning Tree Routing
The spanning tree approach is a mechanism in which bridges automatically develop
a routing table and update that table in response to changing topology. The algorithm
consists of three mechanisms: frame forwarding, address learning, and loop
resolution.
Frame Forwarding
In this scheme, a bridge maintains a filtering database, which is based on MAC
address. Each entry consists of a MAC individual or group address, a port number,
and an aging time (described below); we can interpret this in the following fashion.
A station is listed with a given port number if it is on the same side of the bridge as
the port. For example, for bridge 102 of Figure 14.5, stations on LANs C, F, and G
are on the same side of the bridge as the LAN C port; and stations on LANs A, B,
D, and E are on the same side of the bridge as the LAN A port. When a frame is
received on any port, the bridge must decide whether that frame is to be forwarded
through the bridge and out through one of the bridge's other ports. Suppose that a
bridge receives a MAC frame on port x. The following rules are applied (Figure
14.8):
1. Search the forwarding database to determine if the MAC address is listed for
any port except port x.
2. If the destination MAC address is not found, flood the frame by sending it out
on all ports except the port by which it arrived.
3. If the destination address is in the forwarding database for some port y f x,
then determine whether port y is in a blocking or a forwarding state. For reasons
explained below, a port may sometimes be blocked, which prevents it
from receiving or transmitting frames.
4. If port y is not blocked, transmit the frame through port y onto the LAN to
which that port attaches.
Rule (2) is needed because of the dynamic nature of the filtering database.
When a bridge is initialized, the database is empty. Because the bridge does not
know where to send the frame, it floods the frame onto all of its LANs except the
LAN on which the frame arrives. As the bridge gains information, the flooding
activity subsides.
Address Learning
The above scheme is based on the use of a filtering database that indicates the direction,
from the bridge, of each destination station. This information can be preloaded
into the bridge, as in static routing. However, an effective automatic mechanism for
learning the direction of each station is desirable. A simple scheme for acquiring
this information is based on the use of the source address field in each MAC frame
(Figure 14.8).
When a frame arrives on a particular port, it clearly has come from the direction
of the incoming LAN. The source address field of the frame indicates the
source station. Thus, a bridge can update its filtering database for that MAC
address. To allow for changes in topology, each entry in the database is equipped
with an aging timer. When a new entry is added to the database, its timer is set; the
recommended default value is 300 seconds. If the timer expires, then the entry is
eliminated from the database, as the corresponding direction information may no
longer be valid. Each time a frame is received, its source address is checked against
the database. If the entry is already in the database, the entry is updated (the direction
may have changed) and the timer is reset. If the entry is not in the database, a
new entry is created, with its own timer.
The above discussion indicated that the individual entries in the database are
station addresses. If a two-level address structure (LAN number, station number) is
used, then only LAN addresses need to be entered in the database. Both schemes
work the same. The only difference is that the use of station addresses requires a
much larger database than the use of LAN addresses.
Note from Figure 14.8 that the bridge learning process is applied to all frames,
not just those that are forwarded.
Spanning Tree Algorithm
The address learning mechanism described above is effective if the topology of the
internet is a tree; that is, if there are no alternate routes in the network. The existence
of alternate routes means that there is a closed loop. For example in Figure
14.6, the following is a closed loop: LAN A, bridge 101, LAN B, bridge 104, LAN
E, bridge 107, LAN A.
frames on LAN X that will be picked up for retransmission on LAN Y. This process
repeats indefinitely.
To overcome the above problem, a simple result from graph theory is used:
For any connected graph, consisting of nodes and edges connecting pairs of nodes,
there is a spanning tree of edges that maintains the connectivity of the graph but
contains no closed loops. In terms of internets, each LAN corresponds to a graph
node, and each bridge corresponds to a graph edge. Thus, in Figure 14.6, the
removal of one (and only one) of bridges 107,101, or 104, results in a spanning tree.
What is desired is to develop a simple algorithm by which the bridges of the internet
can exchange sufficient information to automatically (without user intervention)
derive a spanning tree. The algorithm must be dynamic. That is, when a topology
change occurs, the bridges must be able to discover this fact and automatically
derive a new spanning tree.
The algorithm is based on the use of the following:
1. Each bridge is assigned a unique identifier; in essence, the identifier consists
of a MAC address for the bridge plus a priority level.
2. There is a special group MAC address that means "all bridges on this LAN."
When a MAC frame is transmitted with the group address in the destination
address field, all of the bridges on the LAN will capture that frame and interpret
it as a frame addressed to itself.
3. Each port of a bridge is uniquely identified within the bridge, with a port
identifier.
With this information established, the bridges are able to exchange routing
information in order to determine a spanning tree of the internet. We will explain
the operation of the algorithm using Figures 14.10 and 14.11 as an example. The following
concepts are needed in the creation of the spanning tree:
Root bridge. The bridge with the lowest value of bridge identifier is chosen to
be the root of the spanning tree.
Path cost. Associated with each port on each bridge is a path cost, which is the
cost of transmitting a frame onto a LAN through that port. A path between
two stations will pass through 0 or more bridges. At each bridge, the cost of
transmission is added to give a total cost for a particular path. In the simplest
case, all path costs would be assigned a value of 1; thus, the cost of a path
would simply be a count of the number of bridges along the path. Alternatively,
costs could be assigned in inverse proportion to the data rate of the corresponding
LAN, or any other criterion chosen by the network manager.
Root port. Each bridge discovers the first hop on the minimum-cost path to
the root bridge. The port used for that hop is labeled the root port. When the
cost is equal for two ports, the lower port number is selected so that a unique
spanning tree is constructed.
Root path cost. For each bridge, the cost of the path to the root bridge with
minimum cost (the path that starts at the root port) is the root path cost for
that bridge.
@ Designated bridge, designated port. On each LAN, one bridge is chosen to be
the designated bridge. This is the bridge on that LAN that provides the minimum
cost path to the root bridge. This is the only bridge allowed to forward
frames from the LAN for which it is the designated bridge toward the root
bridge. The port of the designated bridge that attaches the bridge to the LAN
is the designated port. For all LANs to which the root bridge is attached, the
root bridge is the designated bridge. All internet traffic to and from the LAN
passes through the designated port.
In general terms, the spanning tree is constructed in the following fashion:
I. Determine the root bridge.
2. Determine the root port on all other bridges.
3. Determine the designated port on each LAN. This will be the port with the
minimum root path cost. In the case of two or more bridges with the same root
path cost, the highest-priority bridge is chosen as the designated bridge. If the
designated bridge has two or more ports attached to this LAN, then the port
with the lowest value of port identifier is chosen.
By this process, when two LANs are directly connected by more than one
bridge, all of the bridges but one are eliminated. This cuts any loops that involve
two LANs. It can be demonstrated that this process also eliminates all loops involving
more than two LANs and that connectivity is preserved. Thus, this process discovers
a spanning tree for the given internet. In our example, the solid lines indicate
the bridge ports that participate in the spanning tree.
The steps outlined above require that the bridges exchange information. The
information is exchanged in the form of bridge protocol data units (BPDUs). A
BPDU transmitted by one bridge is addressed to and received by all of the other
bridges on the same LAN. Each BPDU contains the following information:
The identifier of this bridge and the port on this bridge
The identifier of the bridge that this bridge considers to be the root
The root path cost for this bridge
To begin, all bridges consider themselves to be the root bridge. Each bridge
will broadcast a BPDU on each of its LANs that asserts this fact. On any given
LAN, only one claimant will have the lowest-valued identifier and will maintain its
belief. Over time, as BPDUs propagate, the identity of the lowest-valued bridge
identifier throughout the internet will be known to all bridges. The root bridge will
regularly broadcast the fact that it is the root bridge on all of the LANs to which it
is attached; this allows the bridges on those LANs to determine their root port and
the fact that they are directly connected to the root bridge. Each of these bridges in
turn broadcasts a BPDU on the other LANs to which it is attached (all LANs
except the one on its root port), indicating that it is one hop away from the root
bridge. This activity is propagated throughout the internet. Every time that a bridge
receives a BPDU, it transmits BPDUs, indicating the identity of the root bridge and
the number of hops to reach the root bridge. On any LAN, the bridge claiming to
be the one that is closest to the root becomes the designated bridge.
We can trace some of this activity with the configuration in Figure 14.10. At
startup time, bridges 1,3, and 4 all transmit BPDUs on LAN 2, each claiming to be
the root bridge. When bridge 3 receives the transmission from bridge 1, it recognizes
a superior claimant and defers. Bridge 3 has also received a claiming BPDU
from bridge 5 via LAN 5. Bridge 3 recognizes that bridge 1 has a superior claim to
be the root bridge; it therefore assigns its LAN 2 port to be its root port, and sets
the root path cost to 10. By similar actions, bridge 4 ends up with a root path cost
of 5 via LAN 2; bridge 5 has a root path cost of 5 via LAN 1; and bridge 2 has a root
path cost of 10 via LAN 1.
Now consider the assignment of designated bridges. On LAN 5, all three
bridges transmit BPDUs, attempting to assert a claim to be designated bridge.
Bridge 3 defers because it receives BPDUs from the other bridges that have a lower
root path cost. Bridges 4 and 5 have the same root path cost, but bridge 4 has the
higher priority and therefore becomes the designated bridge.
The results of all this activity are shown in Figure 14.11. Only the designated
bridge on each LAN is allowed to forward frames. All of the ports on all of the
other bridges are placed in a blocking state. After the spanning tree is established,
bridges continue to periodically exchange BPDUs to be able to react to any change
in topology, cost assignments, or priority assignment. Anytime that a bridge
receives a BPDU on a port, it makes two assessments:
1. If the BPDU arrives on a port that is considered the designated port, does the
transmitting port have a better claim to be the designated port?
2. Should this port be my root port?
Source Routing
The IEEE 802.5 committee has developed a bridge routing approach referred to as
source routing. With this approach, the sending station determines the route that
the frame will follow and includes the routing information with the frame; bridges
read the routing information to determine if they should forward the frame.
Basic Operation
The basic operation of the algorithm can be described by making reference to the
configuration in Figure 14.12. A frame from station X can reach station Z by either
of the following routes:
* LAN 1, bridge B1, LAN 3, bridge B3, LAN 2
* LAN 1, bridge B2, LAN 4, bridge B4, LAN 2
Station X may choose one of these two routes and place the information, in the
form of a sequence of LAN and bridge identifiers, in the frame to be transmitted.
When a bridge receives a frame, it will forward that frame if the bridge is on the designated
route; all other frames are discarded. In this case, if the first route above is
specified, bridges B1 and B3 will forward the frame; if the second route is specified,
bridges B2 and B4 will forward the frame.
Note that with this scheme, bridges need not maintain routing tables. The
bridge makes the decision whether or not to forward a frame solely on the basis of
the routing information contained in that frame. All that is required is that the
bridge know its own unique identifier and the identifier of each LAN to which it is
attached. The responsibility for designing the route falls to the source station.
For this scheme to work, there must be a mechanism by which a station can
determine a route to any destination station. Before addressing this issue, we need
to discuss various types of routing directives.
Routing Directives and Addressing Modes
The source routing scheme developed by the IEEE 802.5 committee includes four
different types of routing directives. Each frame that is transmitted includes an indicator
of the type of routing desired. The four directive types are
0 Null. No routing is desired. In this case, the frame can only be delivered to
stations on the same LAN as the source station.
Nonbroadcast. The frame includes a route, consisting of a sequence of LAN
numbers and bridge numbers, that defines a unique route from the source station
to the destination station. Only bridges on that route forward the frame,
and only a single copy of the frame is delivered to the destination station.
All-routes broadcast. The frame will reach each LAN of the internet by all
possible routes. Thus, each bridge will forward each frame once to each of its
ports in a direction away from the source node, and multiple copies of the
frame may appear on a LAN. The destination station will receive one copy of
the frame for each possible route through the network.
Single-route broadcast. Regardless of the destination address of the frame,
the frame will appear once, and only once, on each LAN in the internet. For
this effect to be achieved, the frame is forwarded by all bridges that are on a
spanning tree (with the source node as the root) of the internet. The destination
station receives a single copy of the frame.
Let us first examine the potential application of each of these four types of
routing, and then examine the mechanisms that may be employed to achieve these
procedures. First, consider null routing. In this case the bridges that share the LAN
with the source station are told not to forward the frame; this will be done if the
intended destination is on the same LAN as the source station. Nonbroadcast routing
is used when the two stations are not on the same LAN and the source station
knows a route that can be used to reach the destination station. Only the bridges on
that route will forward the frame.
The remaining two types of routing can be used by the source to discover a
route to the destination. For example, the source station can use all-routes broadcasting
to send a request frame to the intended destination. The destination returns
a response frame on each of the routes, using nonbroadcast routing, followed by the
incoming request frame. The source station can pick one of these routes and send
future frames on that route. Alternatively, the source station could use single-route
broadcasting to send a single request frame to the destination station. The destination
station could send its response frame via all-routes broadcasting. The incoming
frames would reveal all of the possible routes to the destination station, and the
source station could pick one of these for future transmissions. Finally, single-route
broadcasting could be used for group addressing, as discussed below.
Now consider the mechanisms for implementing these various routing directives.
Each frame must include an indicator of which of the four types of routing is
required. For null routing, the frame is ignored by the bridge. For nonbroadcast
routing, the frame includes an ordered list of LAN numbers and bridge numbers.
When a bridge receives a nonbroadcast frame, it forwards the frame only if the
routing information contains the sequence LAN i, Bridge x, LAN j, where
LAN i = LAN from which the frame arrived
Bridge x = this bridge
LAN j = another LAN to which this bridge is attached
For all-routes broadcasting, the source station marks the frame, but includes
no routing information. Each bridge that forwards the frame will add its bridge
number and the outgoing LAN number to the frame's routing information field.
Thus, when the frame reaches its destination, it will include a sequenced list of all
LANs and bridges visited. To prevent the endless repetition and looping of frames,
a bridge obeys the following rule. When an all-routes broadcast frame is received,
the bridge examines the routing information field. If the field contains the number
of a LAN to which the bridge is attached, the bridge will refrain from forwarding
the frame on that LAN. Put the other way, the bridge will only forward the frame
to a LAN that the frame has not already visited.
Finally, for single-route broadcasting, a spanning tree of the internet must be
developed. This can either be done automatically, as in the 802.1 specification, or
manually. In either case, as with the 802.1 strategy, one bridge on each LAN is the
designated bridge for that LAN, and is the only one that forwards single-route
frames.
It is worth noting the relationship between addressing mode and routing
directive. There are three types of MAC addresses:
* Individual. The address specifies a unique destination station.
* Group. The address specifies a group of destination addresses; this is also
referred to as multicast.
e AM-stations. The address specifies all stations that are capable of receiving
this frame; this is also referred to as broadcast. We will refrain from using this
latter term as it is also used in the source routing terminology.
In the case of a single, isolated LAN, group and all-stations addresses refer to
stations on the same LAN as the source station. In an internet, it may be desirable
to transmit a frame to multiple stations on multiple LANs. Indeed, because a set of
LANs interconnected by bridges should appear to the user as a single LAN, the
ability to do group and all-stations addressing across the entire internet is
mandatory.
Table 14.1 summarizes the relationship between routing specification and
addressing mode. If no routing is specified, then all addresses refer only to the
immediate LAN. If nonbroadcast routing is specified, then addresses may refer to
any station on any LAN visited on the nonbroadcast route. From an addressing
point of view, this combination is not generally useful for group and all-stations
addressing. If either the all-routes or single-route specification is included in a
frame, then all stations on the internet can be addressed. Thus, the total internet
acts as a single network from the point of view of MAC addresses. Because less traffic
is generated by the single-route specification, this single-network characteristic
is to be preferred for group and all-stations addressing. Note also that the singleroute
mechanism in source routing is equivalent to the 802.1 spanning tree
approach. Thus, the spanning tree approach supports both group and all-stations
addressing.

Route Discovery and Selection

With source routing, bridges are relieved of the burden of storing and using routing
information. Thus, the burden falls on the stations that wish to transmit frames.
Clearly, some mechanism is needed by which the source stations can know the route
by which frames are to be sent. Three strategies suggest themselves:
1. Manually load the information into each station. This is simple and effective
but has several drawbacks. First, anytime that the configuration is changed,
the routing information at all stations must be updated. Secondly, this
approach does not provide for automatic adjustment in the face of the failure
of a bridge or LAN.
2. One station on a LAN can query other stations on the same LAN for routing
information about distant stations. This approach may reduce the overall
amount of routing messages that must be transmitted, compared to options
3 or 4, below. However, at least one station on each LAN must have the
needed routing information, so this is not a complete solution.
3. When a station needs to learn the route to a destination station, it engages in
a dynamic route discovery procedure.
Option 3 is the most flexible and the one that is specified by IEEE 802.5; as
was mentioned earlier, two approaches are possible. The source station can transmit
an all-routes request frame to the destination. Thus, all possible routes to the
destination are discovered. The destination station can then send back a nonbroadcast
response on each of the discovered routes, allowing the source to choose which

route to follow in subsequently transmitting the frame. This approach generates
quite a bit of both forward and backward traffic, and requires the destination station
to receive and transmit a number of frames. An alternative is for the source station
to transmit a single-route request frame. Only one copy of this frame will reach
the destination. The destination responds with an all-routes response frame, which
generates all possible routes back to the source. Again, the source can choose
among these alternative routes.
Figure 14.12 illustrates the latter approach. Assume that the spanning tree
that has been chosen for this internet consists of bridges B1, B3, and B4. In this
example, station X wishes to discover a route to station Z. Station X issues a singleroute
request frame. Bridge B2 is not on the spanning tree and so does not forward
the frame. The other bridges do forward the frame, and it reaches station Z. Note
that bridge B4 forwards the frame to LAN 4, although this is not necessary; it is simply
an effect of the spanning tree mechanism. When Z receives this frame, it
responds with an all-routes frame. Two messages reach X: one on the path LAN 2,
B3, LAN 3, El, LAN 1, and the other on the path LAN 2, B4, LAN 4, B2, LAN 1.
Note that a frame that arrived by the latter route is received by bridge B1 and forwarded
onto LAN 3. However, when bridge B3 receives this frame, it sees in the
routing information field that the frame has already visited LAN 2; therefore, it
does not forward the frame. A similar fate occurs for the frame that follows the first
route and is forwarded by bridge B2.
Once a collection of routes has been discovered, the source station needs to
select one of the routes. The obvious criterion would be to select the minimum-hop
route. Alternatively, a minimum-cost route could be selected, where the cost of a
network is inversely proportional to its data rate. In either case, if two or more
routes are equivalent by the chosen criterion, then there are two alternatives:
1. Choose the route corresponding to the response message that arrives first.
One may assume that that particular route is less congested than the others as
the frame on that route arrived earliest.
2. Choose randomly. This should have the effect, over time, of leveling the load
among the various bridges.
Another point to consider is how often to update a route. Routes should certainly
be changed in response to network failures and should perhaps be changed in
response to network congestion. If connection-oriented logical link control is used
(see Lesson 6). then one possibility is to rediscover the route with each new
connection. Another alternative, which works with either connection-oriented or
connectionless service, is to associate a timer with each selected route, and to rediscover
the route when its time expires.

No comments:

Post a Comment

silahkan membaca dan berkomentar