Chapter 9

52
Chapter 9 - Ethernet and Token-ring Expansion  © 1996, BICSI LAN Design Manual  - CD-ROM, Issue 1 1 Overview Introduction In earlier chapters, LAN designs were illustrated for a single-floor implementation using Ethernet and Token-ring technologies. As the demand for LAN access grows, it becomes necessary to expand the network to accommodate new users. At this point, there are three options available for expansion. They are as follows: The Repeater Option. With this option, the number of stations attached to the existing network can be increased, up to the maximum number of connections allowed. This solution uses devices called repeaters as needed to overcome excessive signal loss, which occurs as the length of the network cabling increases. The Bridge Option. With this option, multiple networks can be linked to each other using devices called bridges. This solution overcomes the maximum number of connections rule. It offers better performance by linking several small networks together, rather than creating one large LAN. … Introduction, continued 

description

chpa 9

Transcript of Chapter 9

  • 5/21/2018 Chapter 9

    1/51Chapter 9 - Ethernet and Token-ring Expansion

    1996, BICSI LAN Design Manual - CD-ROM, Issue 11

    Overview

    Introduction

    In earlier chapters, LAN designs were illustrated for a single-floor implementation usingEthernet and Token-ring technologies. As the demand for LAN access grows, it becomesnecessary to expand the network to accommodate new users. At this point, there are threeoptions available for expansion. They are as follows:

    The Repeater Option.

    With this option, the number of stations attached to the existing network can beincreased, up to the maximum number of connections allowed. This solution usesdevices called repeaters as needed to overcome excessive signal loss, whichoccurs as the length of the network cabling increases.

    The Bridge Option.

    With this option, multiple networks can be linked to each other using devices calledbridges. This solution overcomes the maximum number of connections rule. Itoffers better performance by linking several small networks together, rather thancreating one large LAN.

    Introduction, continued

  • 5/21/2018 Chapter 9

    2/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 12

    The Backbone Option.

    With this option, multiple stations or networks can be linked to a common backbonenetwork, using either repeaters or bridges. With this optionand using bridgesperformance improves further and an even greater overall number of stations can

    be connected together.In the following pages, each of these implementations will be described for both Ethernet andToken-ring. Such expansions are usually needed for LANs servicing multiple floors of abuilding. Linkages between buildings in a campus environment would be similar in designthe distances, however, would usually be greater.

  • 5/21/2018 Chapter 9

    3/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 13

    LAN expansion - The repeater option

    Introduction

    A repeater operates at the Physical layer of the OSI model. This layer deals solely withlinkages to the physical medium. The repeaters role is to link two cable segments byregenerating the incoming signal from one segment before rebroadcasting it onto the othersegment.

    Because of its relatively simple function, a repeater is incapable of examining an incoming

    message and making decisions based on its content.

    A repeater can, however, be used to extend the physical reach of a LAN by sending theoutgoing signals over a different transmission medium, such as optical fiber cabling.

    A repeater is also able to detect a signal-related malfunction on either of its attachedsegments. If necessary, it can isolate the faulty segment, thus preventing the failure fromdisabling the entire network.

  • 5/21/2018 Chapter 9

    4/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 14

    Ethernet repeaters

    Copper Ethernet repeaters

    Copper repeaters are commonly employed in Ethernet networks when the distances to be

    covered are limited.

    Coaxial cable basedEthernet

    The original Ethernetspecifications, using thickcoaxial cable trunksegments, called for amaximum of five suchsegments between any twonodes. Each segment couldbe a maximum of 500 m

    (1640 ft) in length and thefive segments wereconnected to each otherusing four repeaters.

    FIGURE 9.1:

    ETHERNET USINGCOPPER REPEATERS

    Ethernet repeaters, continued

    Repeater 1

    Repeater 2

    Repeater 3

    Repeater 4

    Trunk segment 1 - Network devices attached

    Trunk segment 3 - Network devices attached

    Trunk segment 5 - Network devices attached

    Trunk segment 2 - No network devices attached

    Trunk segment 4 - No network devices attached

  • 5/21/2018 Chapter 9

    5/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 15

    Ethernet repeaters are used to extend the overall length of the trunk cable. This may benecessary when the floor area to be covered is very large. Repeaters may also be requiredwhen more than 100 transceivers need to be connected to the network.

    A repeater is attached to a transceiver on each of the two trunk cables to be connected

    with an AUI (Attachment Unit Interface) cable. It is considered to be a network device and,therefore, becomes one of the maximum of 100 devices on a trunk cable.

    Some considerations when installing repeaters are as follows:

    Up to five trunk segments may be joined using four repeaters.

    Stations may be connected to only three trunk segments. Other trunk segments areused for distance extension.

    The maximum overall length of connected trunk segments is 2500 m (8200 ft).

    The total number of devices on all trunk segments which have been combined withrepeaters cannot exceed 1024.

    Ethernet repeaters, continued

  • 5/21/2018 Chapter 9

    6/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 16

    With Thinnet (10Base-2) Ethernet, the layout when using repeaters is similar. It has thefollowing characteristics:

    A maximum of five trunk segments can be connected using four repeaters.

    Stations can be attached to only three of the segments. The remaining segments

    are used for distance extension.

    The maximum segment length is 185 m (607 ft).

    The maximum overall length of the trunks is 925 m (3035 ft).

    There can be a maximum of 30 attachments (including repeaters) per segment.

    The total number of devices on all trunk segments which have been combined withrepeaters cannot exceed 1024.

    Ethernet repeaters, continued

  • 5/21/2018 Chapter 9

    7/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 17

    Multiport repeaters

    In both the Thicknet and Thinnet environments, multiport repeaters can be used to attachmore than one station per attachment to the trunk cable. This type of configuration isshown below.

    FIGURE 9.2:ETHERNET USINGMULTIPORT REPEATERS

    Without such devices, a

    Thicknet trunk cablewould support nomore than 100stations, while aThinnet trunkcable would belimited to 30

    stations.

    Multi-port Repeater

    Transceiver

    AUI cable

    Stations and servers

    Coaxial trunk cable

    Ethernet repeaters, continued

  • 5/21/2018 Chapter 9

    8/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 18

    10Base-T networks

    In 10Base-T networks, where all devices are connected to a central hub, the repeater isphysically a part of the hub. Such a hub may be connected to a thick or thin coaxial trunkcable or it may be connected to another 10Base-T hub. Both are illustrated below.

    FIGURE 9.3:10BASE-T HUBATTACHED

    TO ACOAXIALTRUNK CABLE

    10Base-T hub

    Transceiver

    AUI cable to A UI port on the hub

    Stations and server

    Coaxial trunk cable

    UTP cable

    Ethernet repeaters, continued

  • 5/21/2018 Chapter 9

    9/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 19

    FIGURE 9.4: DAISY-CHAINED 10BASE-T HUBS

    It should be noted that the ANSI/TIA/EIA-568-A standard accepts

    the connection of devices in different telecommunications closets forthe purpose of maintaining a bus or ring topology.

    10Base-T hubs Stationsand server

    UTP cable

    10Base-T hubs Stationsand server

    UTP cable

    UTP or opticalfiber repeater

    cable

    Ethernet repeaters, continued

  • 5/21/2018 Chapter 9

    10/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 110

    Optical fiber Ethernet repeaters

    By using optical fiber, the total length of the network can be extended considerably. Theillustration below shows how optical fiber repeaters may be included in an Ethernetnetwork.

    FIGURE 9.5: ETHERNET USING OPTICAL FIBER REPEATERS

    Repeater

    Segment 1

    Repeater

    Segment 1

    Repeater

    Segment 2

    Repeater

    Optical fiber segment Optical fiber segment

    Ethernet repeaters, continued

  • 5/21/2018 Chapter 9

    11/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 111

    There are three specifications which address the role of optical fiber in such applications.

    FOIRL - Fiber Optic Inter-Repeater Link

    This is the original specification for linking Ethernet segments using optical fiber. FOIRL

    follows the four-repeater limit and specifies a maximum length of 1000 m (3280 ft)between repeaters. This provides for approximately 2500 m (8200 ft) between twosegments located at opposite ends of a network using coaxial trunk cabling.

    10Base-FL

    The Fiber Link specification approved in 1993 replaces FOIRL. It allows for 2 kilometers

    (6560 ft) between repeaters or between an optical fiber NIC and its corresponding hubport, in keeping with structured cabling standards recommendations. As a result, the totaldistance between two stations at opposite ends of the network is extended to4500 m (14760 ft).

    For hub-based networks, there can be a total of five repeatersrather than the fourspecified in FOIRL. This allows five repeater-equipped hubs to be connected to each

    other.

    Ethernet repeaters, continued

  • 5/21/2018 Chapter 9

    12/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 112

    10Base-FB

    Whereas the 10Base-FL specification can be used for repeater or station-to-hub links, theFiber Backbone specification, also approved in 1993, defines specifications for repeaterconnections only. The repeaters can be up to 2 kilometers (6560 ft) apart, and multiple

    repeaters can be connected to each other sequentially.

    The FB specification calls for synchronous signaling between unitsunlike FOIRL and10Base-FL, which use asynchronous signaling. Such signaling improves the timing ofsignals, permitting a greater number of connections between stations located at oppositeends of a network.

    SummaryIn all cases where the repeater option is used to expand the size of a single Ethernet, thelimiting factor is the amount of traffic generated on the resulting network. Although it ispossible to connect hundreds of devices using multiport repeaters, usually this will result ina highly congested network with many collisions and subsequent delays in processing.Such a situation can be avoided by using bridges, discussed later in this chapter.

  • 5/21/2018 Chapter 9

    13/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 113

    Token-ring repeaters

    Copper Token-ring repeaters

    In Token-ring networks, external repeaters are used to increase the overall size of the ring

    connecting one passive MAU to another. The active hubs, or CAUs, use internalrepeaters. For both types of hubs, copper and optical fiber repeaters are available.

    If the ring to be expanded operates at 4 Mbps, two types of copper repeaters are available.These are the following:

    An external unit used with MAUs.

    An internal unit included with CAUs.

    For a 16 Mbps ring, only the second choiceusing CAUsis available.

    CAU base units operate with LAMsthe CAU acts as the repeater, while the LAMsconnect to station NICs. Each CAU counts as three stations for the purpose of limiting theoverall number of devices on a ring, which cannot exceed a 250 device limit, as specifiedby IEEE.

    Token-ring repeaters, continued

  • 5/21/2018 Chapter 9

    14/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 114

    FIGURE 9.6: CAU-BASED TOKEN-RING

    When using Type 1 STP to connect the ports of the CAUs, a distance of 400 m (1312 ft)can exist between two CAUs operating at 4 Mbps and 200 m (656 ft) when operating

    at 16 Mbps.

    CAU

    CAU

    CAU

    CAU

    CAU

    Token-ring repeaters, continued

  • 5/21/2018 Chapter 9

    15/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 115

    Optical fiber Token-ring repeaters

    Optical fiber repeaters are recommended for extended distance links between CAUs orMAUs. This will often be the case where a ring spans multiple buildings on a campus.

    FIGURE 9.7:TOKEN-RING USING

    OPTICAL FIBERREPEATERS

    When using62.5/125 mmultimodeoptical fiberto connecteither CAUs

    or MAUs, adistance of

    2000 m(6560 ft)can existbetween the

    repeaters, at either 4 or 16 Mbps.This is consistent with structured

    cabling standards recommendations for

    such applications.

    Optical fiber cabling

    CAU/MAU

    CAU/MAU

    CAU/MAU

    Opticalfiber

    repeater

    Optical

    fiber

    repeater

    CAU/MAU

    CAU/MAU

    CAU/MAU

    Opticalfiber

    repeater

    Optical

    fiberrepeater

    CAU/MAU

    CAU/MAU

    CAU/MAU

    Optical

    fiberrepeater

    Optical

    fiberrepeater

  • 5/21/2018 Chapter 9

    16/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 116

    LAN expansion - The bridge option

    Introduction

    Each new station functioning on a LANEthernet, Token-ring or any other typeincreasesthe load on the network. Repeaters, which make it possible to connect distant stations to thenetwork, contribute to this congestion. As newer, more complex software is adopted byusers, there is a need to limit the number of stations on the network to maintain acceptableperformance.

    A bridge operates at the Data Link layer of the OSI model. It is used to link two or morenetworks to each other to permit message exchange between stations. Each segment or ringjoined this way stays distinctunlike with repeaters, where one large segment or ring resultsfrom the link.

    Bridges are a better solution for LAN expansions than repeaters. They allow for a largenumber of stations to communicate with each other while maintaining excellent network

    response and performance.There are two broad categories of bridgeslocal and remote. A local bridge linking two

    networks, connects to the cabling system of each. A remote bridge linking two networksconnects to one using its cabling system and to the other using a telecommunications circuit.

    Remote bridging is examined in greater detail in a later chapter. The following sectionsdescribe network expansion using local bridges.

  • 5/21/2018 Chapter 9

    17/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 117

    Ethernet bridges

    Overview

    Since a bridge operates at the Data Link layer of the OSI model, it has no knowledge or

    understanding of the topologies or communications protocols used by the networks itconnects. An Ethernet bridge connecting two or more networks acts as an arbitrator for themessages generated by the devices on each network

    FIGURE 9. 8:ETHERNET BRIDGES

    Bridge B

    LAN B

    LAN A

    OR,

    Ethernet bridges, continued

  • 5/21/2018 Chapter 9

    18/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 118

    Upon connection to the networks to belinked, the bridge proceeds to examinethe source and destination addressesfound in all frames it sees. It thenrapidly builds an internal database

    identifying the network associated witheach device. This activity is performedin seconds and is referred to as thelearning function of a bridge.

    From this point onward, the bridgeforwards all frames whose destination

    devices are on another network andfiltersor discardsall frames whosedestination is another device on thesame network.

    Frames intended for all stations or anunknown station on the linked networks

    are broadcast by the bridgesent to allattached networks. This process isreferred to as flooding.

    Bridge module

    Bridge module

    LAN A

    LAN B

    Ethernet bridges, continued

    T b id i

  • 5/21/2018 Chapter 9

    19/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 119

    Transparent bridging

    As devices are activated on the connected networks, the bridge updates its databasewithout requiring intervention by the network administrator. For this reason, such bridgesare referred to as Transparent bridges.

    When transparent bridging was introduced, there lacked a means of providing multiplepaths from one network to another. This would ensure a greater likelihood of networkavailability in the event of a bridge failure. The problem is illustrated below.

    FIGURE 9.9: TRANSPARENT BRIDGING

    LAN A

    LAN C

    LAN B

    B1

    B2

    B3

    OR,

    Ethernet bridges, continued

  • 5/21/2018 Chapter 9

    20/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 120

    In such a design, bridge B3is a secondary path fromLAN A to LAN C. If active, itwould forward frames from

    LAN A to LAN C. Bridges B1and B2 would do the samething, creating needlessframe duplication and aninefficient use of thechannels linking the

    networks.

    Spanning Tree Algorithm

    To permit efficient redundant links using transparent bridging, the IEEE approved theSpanning Tree Algorithm as the IEEE 802.1D standard. Spanning Tree allows for loops tobe created between networks with Transparent bridges, with the following guidelines:

    One bridge in the group of installed bridges is classified as the Root bridge.

    Each path between bridges is assigned a cost.

    Each bridge then calculates the least cost route to the Root bridge, referred to asthe primary path.

    All redundant paths are classified as Standby or Backup paths. Bridges in suchpaths will not forward frames unless the Primary path develops a failure.

    LAN A

    LAN B

    LAN C

    B1

    B2

    B3

    Ethernet bridges, continued

    S mmar

  • 5/21/2018 Chapter 9

    21/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 121

    Summary

    Bridges linking several Ethernet networks can coexist with repeaters linking severalEthernet segments on a single Ethernet network. This possibility, combined with stationcounts, multiple media, bridge performance and vendor enhancements, makes it difficult toprovide a definite limit on the total number of Ethernet networks that can be linked usingbridges. Rules-of-thumb suggesting a maximum of seven or eight bridges can be used.Ultimately, the deciding factor is network performance, itself a function of traffic load,timing and signal propagation delay.

    Token ring bridges

  • 5/21/2018 Chapter 9

    22/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 122

    Token-ring bridges

    Overview

    Linked Ethernet networks rely on their bridges to decide on the forwarding or filtering of

    frames. In the Token-ring environment, the stations generating the frames are responsiblefor specifying the path to the destination.

    Token-ring bridges do not have internal databasestables are kept by each station andupdated as needed. In this environment, the bridges are referred to as Source Routingbridges. A message can pass through a maximum of seven bridges before reaching itsdestination.

    Token-ring bridges, continued

    Source routing

  • 5/21/2018 Chapter 9

    23/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 123

    Source routing

    When a station has a message to send, it broadcasts a route discovery packet to thedestination station. Each bridge which receives this packet adds its own address andforwards it. Eventually, the destination station receives one or more of these packets,depending on the arrangement of the bridges.

    The destination station picks the packet which took the shortest path to arrive andbroadcasts this information to the sending station, which uses this path for all subsequentmessages to that station.

    FIGURE 9.10: SOURCE ROUTING

    Because of this route-discovery method, Source-Routing bridges can be used to constructmultiple paths between networks. There is no requirementfor unique paths as with Transparent bridging.

    In this example, if LAN B sends a message to LAN D itcan do so using four different routes. These are asfollows:

    Via bridges B2 and B3.

    Via bridges B1 and B4.

    Via bridges B1, B5 and B3.

    Via bridges B2, B5 and B4.

    The route proving to take the shortest time to transmit the message is the one selected forsubsequent transmissions.

    LAN A

    LAN C

    B1

    B2

    LAN DB3

    B4

    B5

    LAN B

    Linking Ethernet and Token-ring

  • 5/21/2018 Chapter 9

    24/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 124

    Linking Ethernet and Token-ring

    Source routing transparent bridging

    Token-ring and Ethernet networks differ in many ways, including frame size, frame format,

    frame content and bridging architecture.In order to permit linking Ethernet and Token-ring networks using bridges, IBM proposed

    the Source Routing Transparent bridging method to the IEEE 802.1 High-Level Interfacecommittee in March 1990.

    As the name implies, such a device allows both the Ethernet and Token-ring bridgingmechanisms described previously to coexist on an internetwork. However, if the message

    is passing from Ethernet to a Token-ring networkor vice versaframe translation is alsorequired. This may be performed by the bridge or software running on the networkstations.

    Linking Ethernet and Token-ring,continued

    FIGURE 9.11: SOURCE ROUTING TRANSPARENT BRIDGING

  • 5/21/2018 Chapter 9

    25/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 125

    FIGURE 9.11: SOURCE ROUTING TRANSPARENT BRIDGING

    Transparent Bridge B

    Ethernet LAN B

    Ethernet LAN A

    Token-ring LAN A Token-ring LAN B

    B

    Source Routing Bridge

    B

    Source Routing

    TransparentBridge

  • 5/21/2018 Chapter 9

    26/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 126

    LAN expansion - The backbone option

    Introduction

    In most cases, the messages sent by a station are destined for a station or server on thesame network segment or ring. There is a rule referred to as the 80/20 rule80% of thenetwork traffic is local and 20% of the traffic is to another network. This rule focuses thedesign on the individual networks, with links to other networks being dealt with as growthoccurs.

    For large-scale networking, where hundreds or thousands of stations are to be able tocommunicate with each other, the design effort must begin with the links between theeventual networks. The individual networks will be configured at a later time.

    This approach is called backbone networking. It uses one or more segments or rings to actas a pathway for inter-network messaging. The individual networks are connected to thebackbone via either repeaters or, more commonly, bridges. Such a design also eliminates, forall practical purposes, the number of stations which can be linked to each other.

    The following sections describe backbone networking in the Ethernet and Token-ring

    environments using both repeaters and bridges. It is not necessary, however, for thebackbone network to use the same technology as the networks it connects. Two high-speed

    technologies, FDDI (Fiber Distributed Data Interface) and ATM (Asynchronous TransferMode) can also be used to construct backbone networks. These technologies are discussedin later chapters.

    Ethernet backbones

  • 5/21/2018 Chapter 9

    27/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 127

    Ethernet backbones

    Using repeaters

    Coaxial cable backbonesWith coaxial cable trunk Ethernet, individual segments are connected to a commonbackbone segment using repeaters.

    A message sent by a station onone segment would bebroadcast over the

    backbone to all of theother attached stations. In thismanner, only two repeaters arebetween any two stations wishing tocommunicate over the extendednetwork.

    The maximum number of devicesover the extended network remains1024, since the combined segmentsrepresent only one Ethernet.

    FIGURE 9.12:

    COAXIAL CABLEETHERNET BACKBONE

    Repeater

    Repeater

    Repeater

    Repeater

    Repeater

    Backbone

    Ethernet backbones, continued

    10Base-T and 10Base-FL backbones

  • 5/21/2018 Chapter 9

    28/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 128

    Ethernet backbones can also be created using hubs connected to one another, with eachhub acting as a repeater. If 10Base-FL is used to create the backbone segment, a total offive repeaters can exist between any two stations, as shown below.

    FIGURE 9.13: 10BASE-FL BACKBONE

    Station

    Server

    Repeater 1

    Repeater 2

    Repeater 3

    Repeater 4

    Repeater 5

    Optical Fiber

    Ethernet backbones, continued

    Collapsed backbone

  • 5/21/2018 Chapter 9

    29/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 129

    It is also possible to implement a backbone in a single hub. Such an arrangement isreferred to as a Collapsed Backbone.

    One hub acts as the backbone hub, with all other hubs connected to its ports. With this

    configuration, a maximum ofthree hubs or repeaters isbetween any two stationsneeding to communicate.

    FIGURE 9.14:

    COLLAPSED BACKBONE

    Backbone hub

    Station

    Station

    Server

    Ethernet backbones, continued

    In the most centralized model, the collapsed backbone as well as its connected segments

  • 5/21/2018 Chapter 9

    30/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 130

    are all found in the same hub. Such a device has several backplanes, or paths, to linkvarious hardware modules. Some of these modules connect to stations and servers, whileothers are used for bridging and network management.

    With the ability to connect hundreds of network devices, these hubs are often referred to

    as Enterprise hubsthey have the ability to link together every station in the organizationthrough one chassis.

    FIGURE 9.15: THE ENTERPRISE HUB

    Primary PowerSupply Mo dule

    Secondary (redundant)Power Supply M odule

    Managem entModule

    Ethernetsegment

    #1

    Ethernetsegment

    #2

    Ethernetsegment

    #3

    BackboneEthernet segment

    Ethernet backbones, continued

    Using bridges

  • 5/21/2018 Chapter 9

    31/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 131

    Bridge-based Ethernet backbones are implemented in the same manner as repeater-basedones, in both coaxial trunk and hub configurations.

    Since bridging permits each connected segment to remain a distinct network, the

    maximum-number-of-repeaters rule and the 1024 device limit apply separately to each ofthe segments. This makes large scale networking possible.

    FIGURE 9.16:COAXIAL CABLE BRIDGING

    Backbone

    B

    B

    B B B

    B B

    Ethernet backbones, continued

    FIGURE 9.17: BRIDGING MODULES IN 10BASE-T ETHERNET

  • 5/21/2018 Chapter 9

    32/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 132

    Station

    Station

    Server

    Bridging module

    Token-ring backbones

  • 5/21/2018 Chapter 9

    33/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 133

    Introduction

    Token-ring backbones are created using bridges to link discrete rings to a common

    backbone ring. This is illustrated below.

    FIGURE 9.18:TOKEN-RINGBACKBONE RING

    RI RO

    RI RO

    RI RO

    RI RO

    B

    RI

    RO

    B

    B

    B

    Token-ring backbones, continued

    Each ring, including the backbone, can operate at either 4 or 16 Mbps. When extendeddistances are involved as is the case in some multi building situations the backbone ring

  • 5/21/2018 Chapter 9

    34/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 134

    distances are involved, as is the case in some multi-building situations, the backbone ringcan be made up of MAUs or CAUs located centrally in each building. Optical fiberrepeaters are then used to connect these MAU/CAU clusters together to form thebackbone ring.

    FIGURE 9.19: CAMPUS BACKBONE RING

    Since there is a limitof seven source-routing bridges

    between any tworings, the backbonering can be used tointernetwork morethan eight rings.Rather than passingfrom ring to ring, amessage goes fromits source ring to thebackbone ring andthen to thedestination ring,avoiding all other

    rings which mayexist.

    B

    B

    B

    B

    B

    B

    B

    B

    B

    B

    B

    B

    B

    B

    B

    Building 1 Building 2 Building 3

    Campus backbone ring

    Repeater Repeater

    Token-ring backbones, continued

    Dual backbone rings

  • 5/21/2018 Chapter 9

    35/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 135

    For added protection against backbone failure due to a software, equipment or cable-related fault, a duplicate backbone system can be readily implemented in a Token-ringenvironment. In such systems, two bridges are used on each ring, with each bridgeconnecting to a different backbone ring. Since both backbones are available at all times,

    the failure of one causes no disruption in network availabilitythe second handles allinternetwork traffic until repairs are made.

    FIGURE 9.20:DUALBACKBONE

    RINGS B

    B

    B

    B

    B

    B

    B

    B

    B

    B

    Primary Backbone ring Secondary (backup) Backbone ring

    LAN expansion - The switch option

  • 5/21/2018 Chapter 9

    36/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 136

    LAN expansion - The switch option

    Overview

    Traditional LAN environments such as Ethernet and Token-ring have relied on using ashared transmission channel. In the case of Ethernet, the shared channel traditionallyprovided a total bandwidth of 10 Mbps, with 100 Mbps Ethernet currently making anappearance. Token-rings shared either 4 or 16 Mbps total bandwidth.

    As network traffic makes increasing demands on the shared bandwidth, alternatives arebeing considered. Newer applications such as multimedia presentations, video-conferencing, imaging and other graphics and data-intensive software are causing networkcongestion problems. These problems may be indicated by low network throughput, slowedresponse times and in the case of Ethernet, high rates of collisions.

    Possible solutions to network congestion problems include the following:

    Using traditional LAN segmentation by using bridges and/or routers.

    Using higher-speed technologies such as FDDI or 100 Mbps Ethernet.

    Using LAN segmentation, but through switching hubs.

    The first two solutions may improve performance. However, bridge and router-basedenvironments can become complex to administer and can potentially require costlyinvestments. Also, traditional higher-speed technologies still rely on the use of shared

    media.

    Overview, continued

    The use of switching hubs may provide a solution to congested networks. They are capableof providing dedicated links to each attached device giving each device the bandwidth it

  • 5/21/2018 Chapter 9

    37/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 137

    of providing dedicated links to each attached device, giving each device the bandwidth itrequires.

    Switching hub technology is also referred to as port switching. It allows LANs to be divided

    into multiple, smaller independent segmentsmicrosegmentationand then interconnects

    the segments at full network speeds as required.

    The number of stations assigned to a single port on the hub can be as few as one. Or, fordevices producing lighter traffic loads, some of the switching hubs permit multiple devices toaccess a single port. In all cases, switches allow the separation of heavy network trafficproducers from those producing less network traffic.

    FIGURE 9.21:MIXED SWITCHENVIRONMENT Switching hub

    Shared LAN segment

    Dedicated LANsegments

    Overview, continued

    FIGURE 9.22: DEDICATED (PRIVATE) SWITCH ENVIRONMENT

  • 5/21/2018 Chapter 9

    38/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 138

    Many port switching devices also allow stations to be reassigned to different logical LANsegments. This ability to create virtual LANs allows LAN administrators to define logicalworkgroups regardless of the physical LAN to which they are connected.

    Switching hub

    Each device has a dedicated or private link tothe hub. Each link has full network bandwidth.

    Overview, continued

    Switching environments

  • 5/21/2018 Chapter 9

    39/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 139

    Currently most of the switching hubs available are for use in Ethernet environments,although there are some units available for use in Token-ring and FDDI environments. Aswell, there are switching hubs that allow multiple environments to be connected to thesame hub.

    One of the primary advantages associated with switches is the ability to install themtransparently. That is, they do not require any additional changes to be made to thenetwork environment. For example, a 10Base-T Ethernet network administrator whowishes to switch to dedicated 10 Mbps links for all stations needs only to purchase theappropriate switching hubs. The Network Interface Cards and cabling already in place canbe used to provide the dedicated links.

    Switching hubs are generally categorized according to the physical capabilities of thehubthe number of ports and the technology supportedas well as to the style ofimplementation.

    Three categories of hubs are broadly defined. They are as follows:

    Workgroup hubs.

    These are the smallest of the switching hubs. They usually have between 8 and 12ports per hub used to connect stations and the servers these stations need toaccess. If selecting this type of hub, it is important to ensure that there is room forgrowth. That is, that the hub can be connected to other hubs at a later time.

    Departmental hubs.

    These are hubs that work at the same level as workgroup hubsconnectingstations and serverbut have more ports available.

    Overview, continued

    Enterprise hubs.

    These are the larger switching hubs used to connect multiple network segments

  • 5/21/2018 Chapter 9

    40/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 140

    These are the larger switching hubs used to connect multiple network segments,including workgroup and department hubs and switches, and common resourcessuch as backup devices and database servers. These hubs form the basis for the

    collapsed backbone environment.

    Switch operations

  • 5/21/2018 Chapter 9

    41/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 141

    Introduction

    Most switches operate essentially as MAC-layer (or device address) bridges and are even

    referred to by their vendors as multiport bridges.A switch needs to know the MAC-layer address of the destination device to be able to

    forward the data packets. Switching hubs may provide dedicated port switching with asingle MAC address per port or shared port switching where multiple MAC addresses areacceptable per port. The switch learns the MAC addresses associated with a specific portas network packets appear at the port. The addresses are stored in an address database.Therefore, little or no manual administration is required.

    When a data packet arrives at a port, the switch examines the MAC destination address.Depending on what the destination address is, the switch does one of three things:

    If the destination address is local to the incoming port, the packet is filteredit isignored by the switch and not forwarded.

    If the destination address is associated with another port, the packet is forwardedto the other port.

    If the destination address is unknown, the packet is broadcastit is sent to everyport other than the incoming port.

    In an environment where devices are assigned to dedicated ports, communications withother devices is done via the switchs backplane. It allows the devices to communicate at

    network speeds.

    Switch operations, continued

    An advantage that switches have over traditional bridges is a high-performance backplanethat supports very high throughput. The total throughput of the backplane can be as high

  • 5/21/2018 Chapter 9

    42/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 142

    as the number of paths through the switch multiplied by the throughput of each individuallink.

    EXAMPLE 9.1: SWITCH THROUGHPUT

    A workgroup consisting of 12 users will be installing an Ethernet switch providingdedicated 10 Mbps links to each user. Users want to be able to communicate with eachother at maximum possible network speed. What would the minimum acceptablebackplane throughput be for the switch?

    A 12-port hub could provide for a maximum of 6 links at one time. Each of the links could

    transmit at a maximum of 10 Mbps. Therefore, the maximum backplane throughput wouldbe as follows:

    Backplane throughput = 6 links x 10 Mbps per Link

    Backplane throughput = 60 Mbps

    With a backplane throughput of 60 Mbps, 6 links could each support 10 Mbps throughput.

    Large switches, such as those found in Enterprise hubs, can have backplane throughputmeasured in Gbpsespecially those switches providing ports operating at 100 Mbps.

    Well-designed, switch-based networks can benefit from aggregated total throughput.Additional switches can add to total network throughput and improve overall performance.

    Switch operations, continued

    Switching methods

    When packets arrive at an incoming port on the switch they must be directed to the

  • 5/21/2018 Chapter 9

    43/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 143

    When packets arrive at an incoming port on the switch, they must be directed to theappropriate outgoing port leading to the destination device. The traditional mechanismused is known as store-and-forward while a newer mechanism used by some switchinghubs is referred to as cut-through.

    Store-and-forward

    The store-and-forward method is a technology used in high-speed bridges. Switchesbased on this technology wait for the entire data packet to arrive before processing canbegin. Before sending the packet to its destination, error checking is performed on thepacket using a Cyclic Redundancy Check (CRC). If the packet is determined to be error-

    free, it is forwarded to its destination.

    Store-and-forward type switches may have additional features. Some have the ability toperform packet filteringthey can be programmed to ignore certain packets received fromcertain device addresses. Also, some of these switches provide for low-level routing. Thisallows networks to be logically segmented from a single location. It should be noted thateach added feature can slow network performance, which can be problematic in large

    networks.

    Switch operations, continued

    Cut-through

    The cut-through method of switching represents a newer technology It is based on the

  • 5/21/2018 Chapter 9

    44/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 144

    The cut through method of switching represents a newer technology. It is based on thepremise that there is no need for the switch to wait for the arrival of the complete packet.The switch waits only long enough to read the destination address on the packet before it

    begins forwarding the packet to its destination.

    Network performance may or may not be significantly improved with such a technology,depending on the packet size used and the protocol used. It has been found that networkprotocols requiring an acknowledgment of every packet sent benefit from this method. Inaddition, networks configured to use packet sizes greater than 1024 bytes do not see asgreat an increase in performance as those using smaller packet sizes.

    Also of concern is the lack of error checking done on the packets. Malformed packets and

    corrupt packets are also passed on by the switch, resulting in a propagation of errors. Thiscan adversely affect network performance by requiring retransmission of these badpackets.

    Full-duplex Ethernet

    Associated with dedicated port switching is the introduction of full duplex Ethernet This

  • 5/21/2018 Chapter 9

    45/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 145

    Associated with dedicated port switching is the introduction of full-duplex Ethernet. Thistechnology allows for signals to be transmitted and received at full network speeds at thesame time. That is, full-duplex 10 Mbps Ethernet permits 10 Mbps transmission to happen inboth directions at the same time, resulting in a total throughput of 20 Mbps.

    Full-duplex Ethernet is possible with a dedicated connection since there is no need fordevices to listen for collisions. Without the danger of a collision, connections can operate in

    both directions at the same time.

    Most station applications receive more network traffic than they transmit, making full-duplextransmission seem to be unnecessary. However, having an additional transmission channelallows acknowledgments and other housekeeping traffic to be transmitted while the station isstill receiving data.

    The greatest benefit of full-duplex Ethernet is found in those environments where the trafficflow is balanced in the two directions. This is seen mostly in server-to-switch connectionsand in video-conferencing situations.

    It should be noted that full-duplex Ethernet requires full-duplex Network Interface Cards and

    special full-duplex switch ports.

    Overview .................................................................................. 1

    CHA

  • 5/21/2018 Chapter 9

    46/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 146

    Overview .................................................................................. 1

    Introduction ....................................................................................... 1

    LAN expansion - The repeater option ................................. 3

    Introduction ....................................................................................... 3

    Ethernet repeaters ........................................................................... 4Copper Ethernet repeaters................................................................ 4

    Coaxial cable based Ethernet ......................................................... 4Multiport repeaters .......................................................................... 710Base-T networks ......................................................................... 8

    Optical fiber Ethernet repeaters ...................................................... 10FOIRL - Fiber Optic Inter-Repeater Link .......................................1110Base-FL ...................................................................................... 1110Base-FB .................................................................................... 12

    Summary ......................................................................................... 12

    Token-ring repeaters ..................................................................... 13

    Copper Token-ring repeaters........................................................... 13Optical fiber Token-ring repeaters................................................... 15

    APTER

    9-ETHERNET

    AND

    TOKEN

    -RINGEXPANSION

    TABLE

    OFCONTENTS

    T

    ABLE

    OF

    CO

    NTENTS

    LAN expansion - The bridge option .................................. 16

    CHA

  • 5/21/2018 Chapter 9

    47/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 147

    Introduction ..................................................................................... 16

    Ethernet bridges............................................................................. 17Overview ......................................................................................... 17

    Transparent bridging ....................................................................... 19Spanning Tree Algorithm ................................................................ 20Summary ......................................................................................... 21

    Token-ring bridges ......................................................................... 22Overview ......................................................................................... 22Source routing ................................................................................. 23

    Linking Ethernet and Token-ring ................................................ 24Source routing transparent bridging ................................................ 24

    LAN expansion - The backbone option ............................ 26

    Introduction ..................................................................................... 26

    Ethernet backbones ...................................................................... 27

    Using repeaters ............................................................................... 27Coaxial cable backbones .............................................................. 2710Base-T and 10Base-FL backbones........................................... 28Collapsed backbone ...................................................................... 29

    Using bridges .................................................................................. 31

    Token-ring backbones .................................................................. 33Introduction...................................................................................... 33

    Dual backbone rings ........................................................................ 35

    APTER

    9-ETHERNET

    AND

    TOKEN

    -RINGEXPANS

    ION

    TABLE

    OFCONTENTS

    TABLE

    OF

    CO

    NTENTS

    LAN expansion - The switch option ..................................36

    CHA

  • 5/21/2018 Chapter 9

    48/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 148

    LAN expansion The switch option ..................................36

    Overview .......................................................................................... 36Switching environments .................................................................. 39

    Switch operations .......................................................................... 41Introduction...................................................................................... 41Switching methods .......................................................................... 43

    Store-and-forward ......................................................................... 43Cut-through ................................................................................... 44

    Full-duplex Ethernet ...................................................................... 45

    APTER

    9-ETHERNET

    AND

    TOKEN

    -RINGEXPANS

    ION

    TABLE

    OFCONTENTS

    TABLE

    OF

    CO

    NTENTS

    Example 9 1: Switch throughput 42

    CHA

  • 5/21/2018 Chapter 9

    49/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 149

    Example 9.1: Switch throughput .............................................. 42APTER

    9-ETHERNET

    AND

    TOKEN

    -RINGEXPANS

    ION

    EXAMPLE

    S

    EXAMPL

    ES

    EXAMP

    LES

    Figure 9.1: Ethernet using copper repeaters ........................... 4

    Figure 9 2: Ethernet using multiport repeaters 7

    CHA

  • 5/21/2018 Chapter 9

    50/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 150

    Figure 9.2: Ethernet using multiport repeaters ........................ 7

    Figure 9.3: 10Base-T hub attached to a coaxial trunk cable .. 8

    Figure 9.4: Daisy-chained 10Base-T hubs .............................. 9

    Figure 9.5: Ethernet using optical fiber repeaters ................. 10

    Figure 9.6: CAU-based Token-ring ......................................... 14

    Figure 9.7: Token-ring using optical fiber repeaters .............. 15

    Figure 9.8: Ethernet bridges .................................................... 17

    Figure 9.9: Transparent bridging ............................................. 19

    Figure 9.10: Source Routing ..................................................... 23

    Figure 9.11: Source routing transparent bridging ................... 25

    Figure 9.12: Coaxial cable Ethernet backbone ...................... 27

    Figure 9.13: 10Base-FL backbone .......................................... 28

    Figure 9.14: Collapsed backbone ........................................... 29

    PTER

    9-ETHERNET

    AND

    TOKEN

    -RINGEXPANS

    ION

    FIGURES

    FIGURES

    F

    IGURES

    FIGURES

    Figure 9.15: The Enterprise Hub ............................................ 30

    CHAP

    S

  • 5/21/2018 Chapter 9

    51/51

    Chapter 9 - Ethernet and Token-ring Expansion 1996, BICSI LAN Design Manual - CD-ROM, Issue 151

    Figure 9.16: Coaxial cable bridging ........................................ 31

    Figure 9.17: Bridging modules in 10Base-T Ethernet .......... 32Figure 9.18: Token-ring backbone ring .................................. 33

    Figure 9.19: Campus backbone ring ...................................... 34

    Figure 9.20: Dual backbone rings ........................................... 35

    Figure 9.21: Mixed switch environment .................................. 37

    Figure 9.22: Dedicated (private) switch environment ........... 38

    PTER

    9-ETHERNET

    AND

    TOKEN

    -RINGEXPANS

    ION

    FIGURES

    FIGURES

    F

    IGURES

    F

    IGURES