Networking Essentials: Interconnecting the LANs
Date: Feb 11, 2016
5-1 Introduction
The framework defining the network layers for linking networks together is defined by the OSI model and was introduced in Chapter 1, “Introduction to Computer Networks,” section 1-3. The OSI model provides a framework for networking that ensures compatibility in the network hardware and software. The concepts behind the hardware technologies used to interconnect LANs are presented in sections 5-2 to 5-5. The properties of a networking bridge are defined in section 5-2. The layer 2 switch is examined in section 5-3, and the router is introduced in section 5-4. An example of interconnecting LANs is provided in section 5-5. The chapter concludes with a section on the concept of auto-negotiation, examining the advantages and disadvantages of this network configuration option.
Table 5-1 lists and identifies, by chapter section, where each of the CompTIA Network+ objectives are presented in this chapter. The chapter sections where each objective is presented are identified. At the end of each chapter section is a review with comments of the Network+ objectives presented in that section. These comments are provided to help reinforce the reader’s understanding of a particular Network+ objective. The chapter review also includes “Test Your Knowledge” questions to aid in the understanding of key concepts before the reader advances to the next section of the chapter. The end of the chapter includes a complete set of question plus sample certification type questions.
TABLE 5-1 Chapter 5 CompTIA Network+ Objectives
Domain/Objective Number |
Domain/Objective Description |
Section Where Objective Is Covered |
1.0 |
Network Architecture |
|
1.1 |
Explain the functions and applications of various network devices |
5-3, 5-4 |
1.3 |
Install and configure the following networking services/applications |
5-4 |
1.4 |
Explain the characteristics and benefits of various WAN technologies |
5-4 |
1.7 |
Differentiate between network infrastructure implementations |
5-2 |
1.8 |
Given a scenario, implement and configure the appropriate addressing schema |
5-2, 5-3 |
1.9 |
Explain the basics of routing concepts and protocols |
5-3, 5-5 |
2.0 |
Network Operations |
|
2.6 |
Given a scenario, configure a switch using proper features |
5-4 |
4.0 |
Troubleshooting |
|
4.2 |
Given a scenario, analyze and interpret the output of troubleshooting tools |
5-3 |
4.6 |
Given a scenario, troubleshoot and resolve common network issues |
5-5 |
5.0 |
Industry standards, practices, and network theory |
|
5.2 |
Explain the basics of network theory and concepts |
5-2, 5-4, 5-6 |
5-2 The Network Bridge
A bridge can be used in computer networks to interconnect two LANs together and separate network segments. Recall that a segment is a section of a network separated by bridges, switches, and routers. The bridge is a layer 2 device in the OSI model, meaning that it uses the MAC address information to make decisions regarding forwarding data packets. Only the data that needs to be sent across the bridge to the adjacent network segment is forwarded. This makes it possible to isolate or segment the network data traffic. An example of using a bridge to segment two Ethernet LANs is shown in Figure 5-1. The picture shows that LAN A connects to port 1 of the bridge and LAN B connects to port 2 on the bridge, creating two segments, as shown. There are four computers in LAN A and three computers in LAN B. It is important to note that bridges are now legacy networking devices, but studying these will help you better understand the functionality of switches, especially how data traffic is sent to connected LANs.
FIGURE 5-1 Using a bridge to interconnect two Ethernet LANs.
Bridges monitor all data traffic in each of the LAN segments connected to its ports. Recall that a port is an input/output connection on a networking device. The bridges use the MAC addresses to build a bridging table of MAC addresses and port locations for hosts connected to the bridge ports. A sample bridging table is provided in Table 5-2. The table shows the stored MAC address and the port where the address was obtained.
TABLE 5-2 Bridging Table
MAC Address |
Port |
00-40-96-25-85-BB |
1 |
00-40-96-25-8E-BC |
1 |
00-60-97-61-78-5B |
2 |
00-C0-4F-27-20-C7 |
2 |
The source MAC address is stored in the bridge table as soon as a host talks (transmits a data packet) on the LAN. For example, if computer 1 in LAN A sends a message to computer 2 (see Figure 5-1), the bridge will store the MAC addresses of both computers and record that both of these computers are connected to port 1. If computers 5 or 6 are placing data packets on the network, then the source MAC addresses for 5 and 6 are stored in the bridge table and it is recorded that these computers connect to port 2 on the bridge. The MAC addresses for computers 3 and 4 will not be added to the bridging table until each transmits a data packet.
The bridge monitors the data on its ports to check for an association between the destination MAC address of the Ethernet frames to any of the hosts connected to its ports. An association indicates that the destination MAC address for a host is connected to one of the ports on the bridge. If an association is found, the data is forwarded to that port. For example, assume that computer 1 sends a message to computer 5 (see Figure 5-1). The bridge detects an association between the destination MAC address for computer 5 and port 2. The bridge then forwards the data from computer 1 to computer 5 in LAN B via port 2.
The capability of a bridge to forward data packets only when there is an association is used to isolate data traffic in each segment. For example, assume that computer 1 and computer 2 in LAN A generate a lot of data traffic. The computers in LAN B will not see any of the data traffic as long as there is not an association between the destination MAC addresses of the Ethernet packets and any of the hosts in LAN B (computers 5, 6, and 7).
A potential problem with bridges has to do with the way broadcasts are handled. A broadcast means the message is being sent to all computers on the network; therefore, all broadcasts in a LAN will be forwarded to all hosts connected within the bridged LANs. For example, the broadcast associated with an ARP will appear on all hosts. ARP stands for Address Resolution Protocol, which is a protocol used to map an IP address to its MAC address. In the address resolution protocol, a broadcast is sent to all hosts in a LAN connected to the bridge. This is graphically shown in Figure 5-2. The bridge forwards all broadcasts; therefore, an ARP request broadcasting the message “Who has this IP address?” is sent to all hosts on the LAN. The data packets associated with ARP requests are small, but it requires computer time to process each request. Excessive amounts of broadcasts being forwarded by the bridge can lead to a broadcast storm, resulting in degraded network performance, called a network slowdown.
FIGURE 5-2 An example of using a bridge to isolate data traffic.
The MAC address entries stored in a bridge table are temporary. Each MAC address entry to the bridge table remains active as long as there is periodic data traffic activity from that host on its port. However, an entry into the table is deleted if the port becomes inactive. In other words, the entries stored into the table have a limited lifetime. An expiration timer will commence once the MAC address is entered into the bridge table. The lifetime for the entry is renewed by new data traffic by the computer, and the MAC address is reentered.
In a similar manner, all networking devices (for example, computers) contain an ARP cache, a temporary storage of MAC addresses recently contacted. This is also called the ARP table. The ARP cache holds the MAC address of a host, and this enables the message to be sent directly to the destination MAC address without the computer having to issue an ARP request for a MAC address. The following list outlines typical steps of a communication process between computer 1 and computer 2.
- Computer 1 checks its ARP cache to determine if it already has the MAC address of computer 2. If it does, it will skip to the final step; otherwise, it proceeds to the next step.
- Computer 1 generates an ARP request message for computer 2 with its own MAC and IP information included.
- Computer 1 then broadcasts the ARP request message on its local network.
- Every local network device processes the ARP request message. Those computers that are not computer 2 will discard the message.
- Only a match, which is computer 2, generates an ARP reply message and updates its ARP cache with computer 1 MAC and IP information.
- Computer 2 sends an ARP reply message directly to computer 1.
- Computer 1 receives the ARP reply message and updates its ARP cache with the MAC and IP of computer 2.
The ARP cache contents on a Windows computer can be viewed using the arp -a command while in the command prompt, as shown here:
Windows |
Mac OS X |
||
C:\arp -a |
jmac:~mymac$ arp -a |
||
Interface: 10.10.20.2 on Interface x1000002 |
C1.salsa.org (192.168.12.1) at |
||
Internet Address |
Physical Address |
Type |
00-08-a3-a7-78-0c on en1 |
10.10.20.3 |
00-08-a3-a7-78-0c |
dynamic |
[ethernet] |
10.10.20.4 |
00-03-ba-04-ba-ef |
dynamic |
C3.salsa.org (192.168.12.1) at |
00-08-a3-a7-78-0c on en1 |
|||
[ethernet] |
The ARP cache contents on a Mac OS X computer can be viewed using the arp -a command while in the terminal mode.
The following message is generated if all the ARP entries have expired:
c:\arp -a No ARP Entries Found
The name for the type of bridge used to interconnect two LANs running the same type of protocol (for example, Ethernet) is a transparent bridge. Bridges are also used to interconnect two LANs that are operating two different networking protocols. For example, LAN A could be an Ethernet LAN and LAN B could be a token ring. This type of bridge is called a translation bridge. An example is provided in Figure 5-3. The bridge allows data from one LAN to be transferred to another. Also the MAC addressing information is standardized so the same address information is used regardless of the protocol.
FIGURE 5-3 Using a translation bridge to interconnect an Ethernet and token-ring LAN.
A common application today using a bridge is interconnecting LANs using wireless technology. The use of wireless bridges in LANs is a popular choice for interconnecting the LANs when the cost of physically connecting them is prohibitive. Wireless technology and its LAN applications were presented in Chapter 4, “Wireless Networking.”
The use of a bridge is not as common as it used to be except for wireless network applications. New networking technologies are available that provide similar capabilities to the bridge but that are much more powerful. However, the bridge still is useful and has several advantages. Table 5-3 provides a summary of the advantages and disadvantages of a networking bridge.
TABLE 5-3 Summary of the Advantages and Disadvantages of a Bridge for Interconnecting LANs
Advantages |
Disadvantages |
Easy to install |
Works best in low-traffic areas |
Does an excellent job of isolating the data traffic in two segments |
Forwards broadcasts and is susceptible to broadcast storms |
Relatively inexpensive |
|
Can be used to interconnect two LANs with different protocols and hardware |
|
Reduces collision domains (remember how the CSMA/CD protocol works) |
5-3 The Network Switch
The bridge provides a method for isolating the collision domains for interconnected LANs but lacks the capability to provide a direct data connection for the hosts. The bridge forwards the data traffic to all computers connected to its port. This was shown in Figure 5-2. The networking hub provides a technology for sharing access to the network with all computers connected to its ports in the LAN but lacks the capability to isolate the data traffic and provide a direct data connection from the source to the destination computer. The increase in the number of computers being used in LANs and the increased data traffic are making bridges and hubs of limited use in larger LANs. Basically, there is too much data traffic to be shared by the entire network. What is needed is a networking device that provides a direct data connection between communicating devices. Neither the bridge nor the hub provides a direct data connection for the hosts. A technology developed to improve the efficiency of the data networks and address the need for direct data connections is the layer 2 switch.
The layer 2 switch is an improved network technology that addresses the issue of providing direct data connections, minimizing data collisions, and maximizing the use of a LAN’s bandwidth; in other words, that improves the efficiency of the data transfer in the network. The switch operates at layer 2 of the OSI model and therefore uses the MAC or Ethernet address for making decisions for forwarding data packets. The switch monitors data traffic on its ports and collects MAC address information in the same way the bridge does to build a table of MAC addresses for the devices connected to its ports. The switch has multiple ports similar to the hub and can switch in a data connection from any port to any other port, similar to the bridge. This is why the switch is sometimes called a multiport bridge. The switch minimizes traffic congestion and isolates data traffic in the LAN. Figure 5-4 provides an example of a switch being used in a LAN.
FIGURE 5-4 A switch used to interconnect hosts in a LAN.
Figure 5-4 shows a switch being used in the LAN to interconnect the hosts. In this figure, the hub has been replaced with a switch. The change from a hub to a switch is relatively easy. The port connections are the same (RJ-45), and once the connections are changed and the device is powered on, the switch begins to make the direct data connections for multiple ports using layer 2 switching.
The LAN shown in Figure 5-5 contains 14 computers and 2 printers connected to 16 ports on the switch, configured in a star topology. If the computer connected to port 1 is printing a file on the laser printer (port 12), the switch will set up a direct connection between ports 1 and 12. The computer at port 14 could also be communicating with the computer at port 7, and the computer at port 6 could be printing a file on the color printer at port 16. The use of the switch enables simultaneous direct data connections for multiple pairs of hosts connected to the network. Each switch connection provides a link with minimal collisions and therefore maximum use of the LAN’s bandwidth. A link with minimal collisions is possible because only the two computers that established the link will be communicating over the channel. Recall that in the star topology each host has a direct connection to the switch. Therefore, when the link is established between the two hosts, their link is isolated from any other data traffic. However, the exception to this is when broadcast or multicast messages are sent in the LAN. In the case of a broadcast message, the message is sent to all devices connected to the LAN. A multicast message is sent to a specific group of hosts on the network.
FIGURE 5-5 A switch used to interconnect the networking devices in a LAN.
Hub–Switch Comparison
An experiment was set up to test the data handling characteristics of a hub and a switch given the same input instructions. The objective of this experiment was to show that data traffic is isolated with a switch but not with a hub. For this experiment, a LAN using a hub and a LAN using a switch were assembled. The LANs are shown in Figure 5-6(a) and (b). Each LAN contains four computers connected in a star topology. The computers are marked 1–4 for reference. The IP addresses are listed for each host.
FIGURE 5-6 (a) The LAN experiment with a hub; (b) the LAN experiment with a switch.
The Hub Experimental Results
In this experiment, computer 1 pinged computer 3. Computer 2 was used to capture the LAN data traffic using a network protocol analyzer. What are the expected results? Remember, a hub is a multiport repeater, and all data traffic input to the hub is passed on to all hosts connected to its ports. See the Ping Command Review section that follows for a brief review of the use of the ping command.
Ping Command Review
The ping command is used to verify that a network connection exists between two computers. The command format for ping is:
ping [ip address] {for this example ping 10.10.10.3}
After a link is established between the two computers, a series of echo requests and echo replies are issued by the networking devices to test the time it takes for data to pass through the link. The protocol used by the ping command is the Internet Connection Message Protocol (ICMP).
The ping command is issued to an IP address; however, delivery of this command to the computer designated by the IP address requires that a MAC address be identified for final delivery. The computer issuing the ping might not know the MAC address of the computer holding the identified IP address (no entry in the ARP cache table); therefore, an ARP request is issued. An ARP request is broadcast to all computers connected in the LAN. The computer that holds the IP address replies with its MAC address, and a direct line of communications is then established.
The data traffic collected by computer 2 when computer 1 pinged computer 3 is provided in Figure 5-7. The first line of the captured data shows the ARP request asking who has the IP address 10.10.10.3. The second line of the captured data shows the reply from 10.10.10.3 with the MAC address of 00-B0-D0-25-BF-48. The next eight lines in the captured data are the series of four echo requests and replies associated with a ping request. Even though computer 2 was not being pinged or replying to the ARP request, the data traffic was still present on computer 2’s hub port. The echo reply is from a Dell network interface card with the last six characters of the MAC address of 25-BF-48. The echo request is coming from a computer with 13-99-2E as the last six hex characters of its MAC address.
FIGURE 5-7 The captured data traffic by computer 2 for the LAN [Figure 5-6(a)] using a hub.
The Switch Experimental Results
The same experiment was repeated for the LAN shown in Figure 5-6(b), this time using a switch to interconnect the computers instead of a hub. This network consists of four computers connected in a star topology using a switch at the center of the network. The ping command was sent from computer 1 to computer 3, ping 10.10.10.3. The ARP cache for computer 1 is empty; therefore, the MAC address for computer 3 is not known by computer 1. An ARP request is issued by computer 1, and computer 3 replies. The series of echo requests and echo replies follow; however, the data traffic captured by computer 2 (Figure 5-8), shows the ARP request asking who has the IP address 10.10.10.3. This is the last of the data communications between computers 1 and 3 seen by computer 2. A direct line of communication between computers 1 and 3 is established by the switch that prevents computer 2 from seeing the data traffic from computers 1 and 3. The only data traffic seen by computer 2 in this process was the broadcast of the ARP request. This is true for any other hosts in the LAN. The results of this experiment show that the use of the switch substantially reduces data traffic in the LAN, particularly unnecessary data traffic. The experiment shows that the broadcast associated with an ARP request is seen by all computers but not the ARP replies in a LAN using a switch. This is because a direct data connection is established between the two hosts. This experiment used pings and ARPs; however, this same advantage of using a switch is true when transferring files, image downloads, file printing, and so on. The data traffic is isolated from other computers on the LAN. Remember, the switch uses MAC addresses to establish which computers are connected to its ports. The switch then extracts the destination MAC address from the Ethernet data packets to determine to which port to switch the data.
FIGURE 5-8 The data traffic captured by computer 2 for the LAN [Figure 5-6(b)] using a switch.
Managed Switches
A managed switch is simply a network switch that allows the network administrator to monitor, configure, and manage certain network features such as which computers are allowed to access the LAN via the switch. Access to the management features for the switch is password protected so that only the network administrators can gain entry. The following information describes some of the features of the managed interface for a Cisco Catalyst 2900 series switch established using the Cisco Network Assistant (CNA). This software can be downloaded from Cisco and provides an easy way to manage the features of the Cisco switches. (Note: The download requires that you have set up a Cisco user account and password. The Cisco Network Assistant provides for a centralized mode for completing various network administration tasks for switches, routers, and wireless networking equipment.)
The start-up menu for a Cisco Catalyst 2960 switch obtained via the CNA is provided in Figure 5-9. The image is showing the current setup for the switch. The assigned IP address for the switch is 192.168.1.1, and a router and a switch are interconnected with the switch. The steps for setting the IP address for an interface on the switch are presented later in this section.
FIGURE 5-9 The start-up menu of a Cisco Catalyst switch using the Cisco Network Administrator software.
The current connections to the ports on the switch can be viewed by clicking the stacked switch icon at the top of the screen as shown in Figure 5-10. The image of the switch port connections shows ports 1, 2, and 3 are brighter, indicating that there are networking devices connected to the ports. The MAC addresses of the devices connected to the switch ports can be displayed by clicking the MAC address button under the Configure button as shown in Figure 5-11. Four MAC addresses are assigned to port 1, one MAC address is assigned to port 2, and one MAC address is assigned to port 3. Multiple networking devices can be connected to a port if the devices are first connected to another switch or hub and the output of the switch or hub is connected to one switch port. An example showing four devices connected through a hub to port 1 on the switch is shown in Figure 5-12. The output interface information for the MAC Addresses table shows the following information in Figure 5-11:
- FastEthernet 0/1
- FastEthernet 0/2
- FastEthernet 0/3
FIGURE 5-10 The highlighted ports showing the current connections and the location of the stacked switches icon.
FIGURE 5-11 The menu listing the MAC addresses currently connected to the switch.
FIGURE 5-12 An example of a hub connected to a switch port, with four computers connected to the hub.
Notice that the Dynamic Address tab is highlighted. This indicates that this is a listing of the MAC addresses that have been assigned dynamically. Dynamic assignment means that the MAC address was assigned to a port when a host was connected. There is also a tab for Static Addresses. Static addressing indicates that the MAC address has been manually assigned to an interface, and the port assignment does not expire. The Secure tab shows what switch ports have been secured. A secure address means that a MAC address has been assigned to a port, and the port will automatically disable itself if a device with a different MAC address connects to the secured port.
The FastEthernet 0/1, FastEthernet 0/2, FastEthernet 0/3 notation indicates the [Interface Type Slot#/Interface#] on the switch, and FastEthernet indicates that this interface supports 100Mbps and 10Mbps data rate connections.
The “Aging Time” is listed to be 300 seconds. Aging time is the length of time a MAC address remains assigned to a port. The assignment of the MAC address will be removed if there is no data activity within this time. If the computer with the assigned MAC address initiates new data activity, the aging time counter is restarted, and the MAC address remains assigned to the port. The management window shows a switch setting for enabling “Aging.” This switch is used to turn off the aging counter so that a MAC address assignment on a port never expires.
The IP address on a switch interface can be configured using the Cisco Network Assistant software by clicking Configure > Device Properties > IP Addresses. This opens the IP Addresses menu shown in Figure 5-13. Click the area where the IP address should be entered. This opens a text box for entering the IP address. Enter the IP address and click OK to save the IP address.
FIGURE 5-13 Configuring an IP address on an interface.
The benefits of using a network switch are many in a modern computer network. These benefits include less network congestion, faster data transfers, and excellent manageability. It has been shown that a network switch can be used to replace the network hub, and the advantage is that data traffic within a LAN is isolated. The term for this is isolating the collision domains, which is breaking the network into segments. A segment is a portion of the network where the data traffic from one part of the network is isolated from the other networking devices. A direct benefit of isolating collision domains is that there will be an increase in the data transfer speed and throughput. This is due to the fact that the LAN bandwidth is not being shared and chances of data collisions are minimized. As a result, the LAN will exhibit faster data transfers and latency within the LAN will be significantly reduced. Reduced latency means that the data packets will arrive at the destination more quickly.
Switches learn the MAC addresses of the connected networking by extracting the MAC address information from the headers of Ethernet data packet headers of transmitted data packets. The switch will map the extracted MAC address to the port where the data packet came in. This information is stored in Content Addressable Memory (CAM). CAM is a table of MAC address and port mapping used by the switch to identify connected networking devices. The extracted MAC addresses are then used by the switch to map a direct communication between two network devices connected to its ports. The MAC address and port information remain in CAM as long as the device connected to the switch port remains active. A timestamp establishes the time when the mapping of the MAC address to a switch port is established. However, switches limit the amount of time address and port information are stored in CAM. This is called aging time. The mapping information will be deleted from the switch’s CAM if there is no activity during this set time. This technique keeps the mapping information stored in CAM up-to-date.
What happens if the destination MAC address is not stored in CAM? In this case, the packet is transmitted out all switch ports except for the port where the packet was received. This is called flooding.
It has been shown that switches minimize the collision domain due to the fact that a direct switch connection is made between networking devices. However, it is important to remember that switches do not reduce the broadcast domain. In a broadcast domain, any network broadcast sent over the network will be seen by all networking devices in the same network. Broadcasts within a LAN will be passed by switches. Refer to the discussion of Figure 5-7 and 5-8 for an example.
Two modes used in a switch to forward frames: store-and-forward and cut-through.
Store-and-Forward: In this mode, the entire frame of data is received before any decision is made regarding forwarding the data packet to its destination. There is switch latency in this mode because the destination and source MAC addresses must be extracted from the packet, and the entire packet must be received before it is sent to the destination. The term switch latency is the length of time a data packet takes from the time it enters a switch until it exits. An advantage of the store-and-forward mode is that the switch checks the data packet for errors before it is sent on to the destination. A disadvantage is lengthy data packets will take a longer time before they exit the switch and are sent to the destination.
Cut-Through: In this mode, the data packet is forwarded to the destination as soon as the destination MAC address has been read. This minimizes the switch latency; however, no error detection is provided by the switch. There are two forms of cut-through switching—Fast-Forward and Fragment Free.
- Fast-Forward: This mode offers the minimum switch latency. The received data packet is sent to the destination as soon as the destination MAC address is extracted.
- Fragment-Free: In this mode, fragment collisions are filtered out by the switch. Fragment-collisions are collisions that occur within the first 64 bytes of the data packet. Recall from Chapter 1, “Introduction to Computer Networks,” Table 1-1 that the minimum Ethernet data packet size is 64 bytes. The collisions create packets smaller than 64 bytes, which are discarded. Latency is measured from the time the first bit is received until it is transmitted.
Adaptive Cut-Through: This is a combination of the store-and-forward mode and cut-through. The cut-through mode is used until an error threshold (errors in the data packets) has been exceeded. The switch mode changes from cut-through to store-and-forward after the error threshold has been exceeded.
Multilayer Switches
Newer switch technologies are available to help further improve the performance of computer networks. The term used to describe these switches is multilayer switches (MLS). An example is a layer 3 switch. Layer 3 switches still work at layer 2 but additionally work at the network layer (layer 3) of the OSI model and use IP addressing for making decisions to route a data packet in the best direction. The major difference is that the packet switching in basic routers is handled by a programmed microprocessor. The layer 3 switch uses application-specific integrated circuits (ASICs) hardware to handle the packet switching. The advantage of using hardware to handle the packet switching is a significant reduction in processing time (software versus hardware). In fact, the processing time of layer 3 switches can be as fast as the input data rate. This is called wire speed routing, where the data packets are processed as fast as they are arriving. Multilayer switches can also work at the upper layers of the OSI model. An example is a layer 4 switch that processes data packets at the transport layer of the OSI model.
5-4 The Router
The router is the most powerful networking device used today to interconnect LANs. The router is a layer 3 device in the OSI model, which means the router uses the network address (layer 3 addressing) to make routing decisions regarding forwarding data packets. Remember from Chapter 1, section 3, that the OSI model separates network responsibilities into different layers. In the OSI model, the layer 3 or network layer responsibilities include handling of the network address. The network address is also called a logical address, rather than being a physical address such as the MAC address. The physical address is the hardware or MAC address embedded into the network interface card. The logical address describes the IP address location of the network and the address location of the host in the network.
Essentially, the router is configured to know how to route data packets entering or exiting the LAN. This differs from the bridge and the layer 2 switch, which use the Ethernet address for making decisions regarding forwarding data packets and only know how to forward data to hosts physically connected to their ports.
Routers are used to interconnect LANs in a campus network. Routers can be used to interconnect networks that use the same protocol (for example, Ethernet), or they can be used to interconnect LANs that are using different layer 2 technologies such as an Ethernet and token ring. Routers also make it possible to interconnect to LANs around the country and the world and interconnect to many different networking protocols.
Routers have multiple port connections for connecting to the LANs, and by definition a router must have a minimum of three ports. The common symbol used to represent a router in a networking drawing is provided in Figure 5-14. The arrows pointing in and out indicate that data enters and exits the routers through multiple ports. The router ports are bidirectional, meaning that data can enter and exit the same router port. Often the router ports are called the router interface, the physical connection where the router connects to the network.
FIGURE 5-14 The network symbol for a router.
The Router Interface: Cisco 2800 Series
Figure 5-15 shows the rear panel view (interface side) of a Cisco 2800 series router.
FIGURE 5-15 The rear panel view of a Cisco 2800 series router.
The following describes the function of each interface:
- USB Interface: The USB ports are used for storage and security support.
- FastEthernet Ports: FE0/0: Fast Ethernet (10/100Mbps) and FE0/1: Fast Ethernet (10/100Mbps).
- Console Input: This input provides an RS-232 serial communications link into the router for initial router configuration. A special cable, called a console cable, is used to connect the console input to the serial port on a computer. The console cable can have RJ-45 plugs on each end and requires the use of an RJ-45 to DB9 adapter for connecting to the computer’s COM1 or COM2 serial port. The console cable can also have an RJ-45 connector on one end and an integrated DB9 connector on the other end.
- Auxiliary Input: This input is used to connect a dial-in modem into the router. The auxiliary port provides an alternative way to remotely log in to the router if the network is down. This port also uses an RJ-45 connection.
Serial Interface: CTRLR T1 1 and CTRLR T1 0.
This is a serial connection, and it has a built-in CSU/DSU. This interface is used to provide a T1 connection to the communications carrier. (Note: The CSU/DSU function is presented in Chapter 8, “Introduction to Switch Configuration.”) This type of connection (RJ-45) replaces the older cabling using V.35 cable (shown later in Figure 5-18). There are three LEDs on this interface:
- AL—alarm
- LP—loop
- CD—Carrier Detect
- Voice Interface Card (VIC2-4FXO): This interface shows four phone line connections. This router can be programmed as a small Private Branch Exchange (PBX) for use in a small office. The PBX function is presented in Chapter 10, “Internet Technologies: Out to the Internet.”
- WAN Interface Card (WIC2AM): This interface has two RJ-11 jacks and two V.90 analog internal modems. These modems can be used to handle both incoming and outgoing modem calls. This interface is listed as modem in Figure 5-15.
- VIC-4FXS/DID: This interface is a four-port FXS and DID voice/fax interface card. FXS is a Foreign Exchange Interface that connects directly to a standard telephone. DID is Direct Inward Dialing and is a feature that enables callers to directly call an extension on a PBX. This interface is listed as FXS/DID in Figure 5-15.
The Router Interface—Cisco 2600 Series
Figure 5-16 shows the rear panel view (interface side) of a Cisco 2600 series router.
FIGURE 5-16 The rear panel view of a Cisco 2600 series router.
The following describes the function of each interface to the network:
- Power On/Off: Turns on/off electrical power to the router.
- Auxiliary Input: Used to connect a dial-in modem into the router. The auxiliary port provides an alternative way to remotely log in to the router if the network is down. This port also uses an RJ-45 connection.
- Console Input: Provides an RS-232 serial communications link into the router for initial router configuration. A special cable, called a console cable, is used to connect the console input to the serial port on a computer. The console cable uses RJ-45 plugs on each end and requires the use of an RJ-45 to DB9 adapter for connecting to the COM1 or COM2 serial port.
- Serial Ports: Provides a serial data communication link into and out of the router, using V.35 serial interface cables.
DSU Port: This T1 controller port connection is used to make the serial connection to Telco. This module has a built-in CSU/DSU module. There are five LEDs next to the RJ-45 jack. These LEDs are for the following:
- TD—Transmit Data
- P—Loop
- D—Receive Data
- D—Carrier Detect
- L—Alarm
- Ethernet Port: This connection provides a 10/100Mbps Ethernet data link.
- Analog Modem Ports: This router has a 16-port analog network module.
A media converter is used to convert the 15-pin AUI port to the 8-pin RJ-45 connector. Figure 5-17 shows an example of an AUI to RJ-45 media converter. Media converters are commonly used in computer networks to adapt layer 1 or physical layer technologies from one technology to another. For example:
- AUI to twisted pair (RJ-45) AUI to fiber
- RJ-45 to fiber
FIGURE 5-17 A CentreCom 210TS AUI to RJ-45 media converter.
Figure 5-18 shows a Cisco 7200 series router, which provides adaptable interfaces for connecting to many physical layer technologies such as FastEthernet, gigabit Ethernet, ATM, and FDDI.
FIGURE 5-18 A Cisco 7200 series router (courtesy of Cisco Systems).
5-5 Interconnecting LANs with the Router
The previous section introduced the function of a router in a network. A router routes data based on the destination network address or logical address rather than the physical address used by layer 2 devices, such as the switch and the bridge. Information exchanged with bridges and layer 2 switches requires that the MAC address for the hosts be known. Routed networks such as most enterprise and campus networks use IP addressing for managing the data movement. Enterprise network is a term used to describe the network used by a large company. The use of the network or logical address on computers allows the information to be sent from a LAN to a destination without requiring that the computer know the MAC address of the destination computer. Remember, delivery of data packets is based on knowing the MAC address of the destination.
An overview of the router interface was presented in section 5-4. The router interface provides a way to access the router for configuration either locally or remotely. Interfaces are provided for making serial connections to the router and to other devices that require a serial communications link. For example, interfaces to wide area networking devices require a serial interface. RJ-45 ports are provided on the router interface for connecting the router to a LAN. Older routers can require the use of an AUI port to establish an Ethernet connection to a UTP cable. This port provides a 10Mbps data connection to Ethernet (10Mbps) networks. The RJ-45 connection is used to connect both Ethernet (10Mbps), FastEthernet (100Mbps), Gigabit Ethernet (1000Mbps), and 10 Gigabit Ethernet (10G) to a LAN. The RJ-45 connection can also support gigabit and 10G Ethernet, but high-speed data networks can also use a fiber connection.
This section introduces the information needed to design, manage, and configure campus networks. An example of a small interconnected LAN is provided in Figure 5-19. This example shows four Ethernet LANs interconnected using three routers. The LANs are configured in a star topology using switches at the center of the LAN. The LANs are labeled LAN A, LAN B, LAN C, and LAN D. The routers are labeled RouterA, RouterB, and RouterC (router naming protocols are discussed in Chapter 7, “Introduction to Router Configuration”). Connection of the routers to the LANs is provided by the router’s FastEthernet port (FA0/0, FA0/1, FA0/2, . . . ). Look for the FA label in Figure 5-19.
FIGURE 5-19 A small interconnected LAN.
The interconnections for the routers and the LANs are summarized as follows:
- Router A connects directly to the LAN A switch via FastEthernet port FA0/0. RouterA also connects directly to RouterB via the FastEthernet port FA0/1 and connects to RouterC via FastEthernet port FA0/2.
- Router B connects directly to the LAN B switch via FastEthernet port FA0/0. RouterB connects to the LAN C switch via FastEthernet port FA0/1. RouterB connects directly to RouterA via FastEthernet port FA0/2 and connects to RouterC via FastEthernet port FA0/3.
- Router C connects directly to the LAN D switch via the FastEthernet port FA0/0. Connection to RouterB is provided via Ethernet port FA0/1. RouterC connects to RouterA via FastEthernet port FA0/2.
The serial ports (S0/0, S0/1, S0/2,...) are not being used to interconnect the routers in this sample campus network. The serial interfaces are typically used to interconnect LANs that connect through a data communications carrier such as a telephone company (Telco).
The network configuration provided in Figure 5-19 enables data packets to be sent and received from any host on the network after the routers in the network have been properly configured. For example, computer A1 in LAN A could be sending data to computer D1 in LAN D. This requires that the IP address for computer D1 is known by the user sending the data from computer A1. The data from computer A1 will first travel to the switch where the data is passed to RouterA via the FA0/0 FastEthernet data port. RouterA will examine the network address of the data packet and use configured routing instructions stored in routing tables to decide where to forward the data. RouterA determines that an available path to RouterC is via the FA0/2 FastEthernet port connection. The data is then sent directly to RouterC. RouterC determines that the data packet should be forwarded to the FA0/0 port to reach computer D1 in LAN D. The data is then sent to D1. Alternatively, RouterA could have sent the data to RouterC through RouterB via Router A’s FA0/1 FastEthernet port. Path selection for data packets is examined in Chapter 9, “Routing Protocols.”
Delivery of the information over the network was made possible by the use of an IP address and routing tables. Routing tables keep track of the routes used for forwarding data to its destination. RouterA used its routing table to determine a network data path so computer A1’s data could reach computer D1 in LAN D. RouterA determines that a path to the network where computer D1 is located can be obtained via RouterA’s FA0/2 FastEthernet port to the FA0/2 FastEthernet port on RouterC. RouterC determines that computer D1 is on LAN D, which connects to RouterC’s FA0/0 FastEthernet port. An ARP request is issued by RouterC to determine the MAC address of computer D1. The MAC address is then used for final delivery of the data to computer D1.
If RouterA determines that the network path to RouterC is down, RouterA can route the data packet to RouterC through RouterB. After RouterB receives the data packet from RouterA, it uses its routing tables to determine where to forward the data packet. RouterB determines that the data needs to be sent to RouterC, and it uses the FA0/3 FastEthernet port to forward the data.
Gateway Address
The term gateway is used to describe the address of the networking device that enables the hosts in a LAN to connect to networks and hosts outside the LAN. For example, for all hosts in LAN A, the gateway address will be 10.10.10.250. This address is configured on the host computer. Any IP packets with a destination outside the LAN will be sent to the gateway address.
Network Segments
The network segment defines the networking link between two LANs. There is a segment associated with each connection of an internetworking device (for example, router—hub, router—switch, router—router). For example, the IP address for the network segment connecting LAN A to the router is 10.10.20.0. All hosts connected to this segment must contain a 10.10.20.x because a subnet mask of 255.255.255.0 is being used. Subnet masking is fully explained in Chapter 6.
Routers use the information about the network segments to determine where to forward data packets. For example, the network segments that connect to RouterA include
- 10.10.20.0
- 10.10.200.0
- 10.10.100.0
The computers in LAN A will have a 10.10.20.x address. All the computers in this network must contain a 10.10.20.x IP address. For example, computer A1 in LAN A will have the assigned IP address of 10.10.20.1 and a gateway address of 10.10.20.250. The computers in LAN B are located in the 10.10.10.0 network. This means that all the computers in this network must contain a 10.10.10.x IP address. The x part of the IP address is assigned for each host. The gateway address for the hosts in LAN B is 10.10.10.250.
5-6 Configuring the Network Interface—Auto-Negotiation
Most modern networking internetworking technologies (for example, hubs, switches, bridges, and routers) now incorporate the auto-negotiation protocol. The protocol enables the Ethernet equipment to automate many of the installation steps. This includes automatically configuring the operating speeds (for example, 10/100/1000Mbps) and the selection of full- or half-duplex operation for the data link. The auto-negotiation protocol is defined in the IEEE Ethernet standard 802.3x for FastEthernet.
The auto-negotiation protocol uses a fast link pulse (FLP) to carry the information between each end of a data link. Figure 5-20 shows a data link. The data rate for the fast link pulses is 10Mbps, the same as for 10BASE-T. The link pulses were designed to operate over the limited bandwidth supported by CAT3 cabling. Therefore, even if a link is negotiated, there is no guarantee that the negotiated data rate will work over the link. Other tests on the cable link must be used to certify that the cable can carry the negotiated data link configuration (refer to Chapter 2, “Physical Layer Cabling: Twisted Pair”).
FIGURE 5-20 The two ends of a data link negotiating the operating parameters.
Auto-Negotiation Steps
Each link partner shares or advertises its data link capabilities with the other link partner. The two link partners then use the advertised capabilities to establish the fastest possible data link rate for both links. In the example of the link partners shown in Figure 5-22, computer 1 advertises that its interface supports 10Mbps. The switch advertises that it supports both 10Mbps and 100Mbps. The network interfaces on each link partner are set for auto-negotiation; therefore, the 10Mbps operating mode is selected. This is the fastest data rate that can be used in this data link. The data rate is limited by the 10Mbps capabilities of the computer’s network interface.
Full-Duplex/Half-Duplex
Modern network interfaces for computer networks have the capability of running the data over the links in either full- or half-duplex mode. As noted previously, full-duplex means that the communications device can transmit and receive at the same time. Half-duplex means the communications device can transmit or receive, but not at the same time.
In full-duplex operation (10/100Mbps), the media must have separate transmit and receive data paths. This is provided for in CAT6/5e/5 cable with pairs 1–2 (transmit) and pairs 3–6 (receive). Full-duplex with gigabit and 10 gigabit data rates require the use of all four wire pairs (1–2, 3–6, 4–5, 7–8). An important note is that the full-duplex mode in computer network links is only for point-to-point links. This means that there can only be two end stations on the link. The CSMA/CD protocol is turned off; therefore, there can’t be another networking device competing for use of the link. An example of networking devices that can run full-duplex are computers connected to a switch. The switch can be configured to run the full-duplex mode. This also requires that each end station on the link must be configurable to run full-duplex mode.
In half-duplex operation, the link uses the CSMA/CD protocol. This means only one device talks at a time, and while the one device is talking, the other networking devices “listen” to the network traffic. Figure 5-21(a) and (b) shows examples of networks configured for full- and half-duplex mode. In full-duplex operation [Figure 5-21(a)], CSMA/CD is turned off and computers 1, 2, and the switch are transmitting and receiving at the same time. In half-duplex mode [Figure 5-21(b)], CSMA/CD is turned on, computer 1 is transmitting, and computer 2 is “listening” or receiving the data transmission.
FIGURE 5-21 (a) Computer 1 transmits and receives at the same time; (b) computer 1 transmits; others listen.
Figure 5-22(a) and (b) provides an example of the port management features available with the Cisco switch using the Cisco Network Administrator software. The settings for the speed are shown in Figure 5-22(a). An example of setting the switch for auto, half-, and full-duplex are shown in Figure 5-22(b). The auto setting is for auto-negotiate.
FIGURE 5-22 An example of the port management options available with a Cisco switch: (a) 100Mbps auto-negotiation; (b) 10Mbps half-/full-duplex option.
Table 5-4 provides a summary of the advantages and disadvantages of the auto-negotiation protocol.
TABLE 5-4 Summary of the Auto-negotiation Protocol
Advantages |
Disadvantages |
Useful in LANs that have multiple users with multiple connection capabilities. |
Not recommended for fixed data links such as the backbone in a network. |
The auto-negotiation feature can maximize the data links’ throughput. |
A failed negotiation on a functioning link can cause a link failure. |
Summary
This chapter has established how LANs are interconnected. The need for careful documentation was addressed in this chapter. The importance of this will become more relevant as the complexity in network topics increases from chapter to chapter. Internetworking hardware such as bridges, switches, and routers were discussed and examples of using these technologies presented.
A technique for internetworking the LANs using routers has been presented. In addition, the purpose of a router and its hardware interface has been defined. The use of switches and hubs to connect to the routers has been demonstrated. The purpose of a gateway has been explained and demonstrated. The concept of a network segment has been examined.
The concepts the student should understand from this chapter are the following:
- How bridges are used to interconnect separate LANs
- How a switch is used in a network and why the switch improves network performance
- Understand and be able to identify the various connections on a the router interface
- How a router is used to interconnect LANs
- The purpose of a gateway in a computer network
- The concept of a network segment
- The concept of auto-negotiation
Questions and Problems
Section 5-2
What is a bridge?
Define a segment.
What information is stored in a bridge table?
What is an association on a bridge, and how is it used?
What are excessive amounts of broadcasts on a network called?
Which command is used on a computer to view the contents of the ARP cache?
An empty ARP cache indicates what?
Why do entries into the bridging table have a limited lifetime?
Which of the following are advantages of using a bridge to interconnect LANs?
- Works best in low traffic areas
- Relatively inexpensive
- Can be used to route data traffic
- Easy to install
- Reduces collision domains
Section 5-3
The network switch operates at which layer of the OSI model?
Another name for a switch is
- multiport repeater
- multiport bridge
- multiport router
- multiport hub
How does a switch provide a link with minimal collisions?
The link for a switch connection is isolated from other data traffic except for what type of messages?
Explain what data traffic is sent across a network when a computer pings another computer and a hub is used to interconnect the computers.
Explain what data traffic is seen by computer 3 when computer 1 pings computer 2 in a LAN. A switch is used to interconnect the computers.
Explain the concept of dynamic assignment on a switch.
Define aging time on a switch.
Explain how a switch learns MAC addresses, and where a switch stores the address.
What happens if a MAC address is not stored in CAM on a switch?
Which two modes are used by a switch to forward frames?
Which switch mode offers minimum latency?
What is error threshold, and which mode is it associated with?
Explain the difference in store-and-forward and the cut-through mode on a switch.
How does a layer 3 switch differ from a layer 2 switch?
What is meant by the term wire-speed routing?
Section 5-4
A router uses the network address on a data packet for what purpose?
What is the logical address?
The physical connection where a router connects to the network is called the
- router port
- network port
- network interface
- router interface
The connection to the router’s console input is typically which of the following?
- RS-232
- RJ-45
- DB9
- RJ-11
AUI stands for
- Auxiliary Unit Input
- Attachment Unit Interconnect
- Auxiliary Unit Interface
- Attachment Unit Interface
The AUI port on a router connects to which networking protocol?
- 100BASE-T
- 10BASE-T
- Token Ring
- Ethernet
Section 5-5
Define enterprise network.
The router interface most commonly used to interconnect LANs in a campus network is
- serial
- console port
- Ethernet
- ATM
Serial interfaces on a router are typically used to
- interconnect routers
- interconnect hubs
- connect to communication carriers
- connect to auxiliary ports
The designation E0 indicates
- Ethernet port 0
- Ethernet input
- External port 0
- Exit port 0
Routing tables on a router keep track of
- port assignments
- MAC address assignments
- gateway addresses of LANs
- routes to use for forwarding data to its destination
The convention used for naming of the serial port 0 on a router is
- S0
- System 0
- Serial interface 0
- Serial AUI 0
Define the term gateway.
Section 5-6
What is the purpose of the fast link pulse?
Define full-duplex.
Define half-duplex.
Which of the following is a disadvantage of the auto-negotiation protocol?
- Only useful in LANs that have multiple connection capabilities.
- A failed negotiation on a functioning link can cause a link failure.
- It’s recommended for use in critical network data paths.
- It works at 10Mbps.
Critical Thinking
Describe how a network administrator uses the OSI model to isolate a network problem.
Why is auto-negotiation not recommended for use in critical network data paths?
What would happen if the local network devices do not have local ARP cache?
Certification Questions
Which of the following best defines a bridging table?
- A list of MAC addresses and port locations for hosts connected to the bridge ports
- A list of IP addresses and port locations for hosts connected to the bridge ports
- A list of IP addresses and port locations for hosts connected to the hub ports
- A list of MAC addresses and port locations for hosts connected to the hub ports
Which of the following best defines aging time?
- The length of time a MAC address remains assigned to a port
- The length of time an IP address remains assigned to a port
- The length of time a MAC address remains assigned to a hub
- The length of time an IP address remains assigned to a hub
Dynamic assignment on a switch implies which of the following? (Select all that apply.)
- MAC addresses are assigned to a port when a host is connected.
- IP addresses are assigned to a port when a host is connected.
- MAC addresses are assigned to a switch when a host is connected.
- IP addresses are assigned to a switch when a host is connected.
Which of the following terms is used to describe that a MAC address has been manually assigned?
- Dynamic assignment
- ARP assignment
- DHCP assignment
- Static assignment
What is the purpose of the secure tab on a switch?
- The switchport will use port discovery to assign a MAC address to the port.
- The switchport will automatically disable itself if a device with a different MAC address connects to the port.
- The switchport will use a different MAC address than the one connected to the port.
- This enables the switch to select what networking devices have a selectable IP address.
What is the length of time an IP address is assigned to a switchport called?
- Delay time
- Enable time
- Aging time
- Access time
Which of the following is a table of MAC addresses and port mapping used by the switch to identify connected network devices?
- CAM
- ARP
- ARP-A
- ipconfig /all
Which of the following best defines store-and-forward relative to switch operation?
- The frame is stored in CAM and the forward to the source for confirmation.
- The frame is stored in CAM and the forward to the destination for confirmation.
- The header is received before forwarding it to the destination.
- The entire frame is received before a decision is made regarding forwarding to its destination.
In which switch mode is the data packet forwarded to the destination as soon as the MAC address has been read?
- Store-and-forward
- Adaptive fast-forward
- Cut-through
- Fast-forward
Which switch mode offers the minimum switch latency?
- Cut-through
- Fast-forward
- Store-and-forward
- Adaptive cut-through