09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bridging Functionality<br />

The first LAN <strong>network</strong> bridges <strong>to</strong> be developed were E<strong>the</strong>rnet<br />

transparent bridges. They were created by <strong>the</strong> Digital Equipment<br />

Corporation, one of <strong>the</strong> members of <strong>the</strong> original DIX E<strong>the</strong>rnet<br />

standards consortium. The transparent bridge standard was later<br />

co-opted by <strong>the</strong> IEEE as part of <strong>the</strong> 802.1 standard, which describes<br />

Layer 2 addressing and management concerns. Source route bridges<br />

were developed by IBM. Originally, source route bridging vied with<br />

transparent bridging <strong>to</strong> be <strong>the</strong> 802.1-bridging standard. It lost out,<br />

but later emerged as part of <strong>the</strong> 802.5 Token Ring standard. Source<br />

route bridging is dependent on <strong>the</strong> utilization of <strong>the</strong> Routing<br />

Information Field (RIF), which is an optional field in <strong>the</strong> Token Ring<br />

frame (see Chapter 4, "LAN Inter<strong>network</strong>ing Technologies," for<br />

review). Translating and encapsulation bridges, although <strong>the</strong>y<br />

represent a special type of bridge functionally, can operate as<br />

transparent, source route, or as a hybrid (part transparent and part<br />

source route) bridge. This functionality is largely determined by <strong>the</strong><br />

types of Layer 2 transmission media <strong>the</strong> switch is connecting <strong>to</strong>ge<strong>the</strong>r.<br />

It should also be noted that hybrid-based translating bridges<br />

represent a significant level of complexity because <strong>the</strong>y interconnect<br />

two bridging pro<strong>to</strong>cols that are basically opposed <strong>to</strong> each o<strong>the</strong>r.<br />

Transparent Bridges<br />

The standard transparent bridge consists of two or more LAN media<br />

ports. IEEE 802.1 standard, hardware-based transparent bridges are<br />

plug-and-play and require no configuration. You should recall from<br />

Chapter 1, "<strong>Understanding</strong> Networking Concepts," that after <strong>the</strong><br />

bridge is connected <strong>to</strong> <strong>the</strong> <strong>network</strong>, it "learns" <strong>the</strong> location of <strong>the</strong><br />

end-stations connected <strong>to</strong> its own segment in respect <strong>to</strong> <strong>the</strong><br />

stations'adjacency <strong>to</strong> <strong>the</strong> bridge's ports. The interfaces of <strong>the</strong> bridge<br />

operate in what is known as "promiscuous mode" this is <strong>to</strong> say, <strong>the</strong>y<br />

examine each packet transmitted across <strong>the</strong> wire. During this process,<br />

<strong>the</strong> bridge reads <strong>the</strong> Layer 2 source (MAC) address of <strong>the</strong> packets as<br />

<strong>the</strong>y enter <strong>the</strong> bridge's interfaces. These addresses are <strong>the</strong>n s<strong>to</strong>red in<br />

a list, along with <strong>the</strong> port from which <strong>the</strong> packet was received. This<br />

table is known as <strong>the</strong> Bridge or Source Address Table (BAT or SAT)<br />

depending on who you are talking <strong>to</strong>. The bridge " learning" process is<br />

known as <strong>the</strong> <strong>Back</strong>ward Learning Algorithm (BLA).<br />

NOTE

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!