CISC SYS TEMS nternetworking Technoogy Overview
Corporate Headquarters P.O Box 3075
1525 OBrien Drive
Menlo Park CA 94026
415 326-1941
800 553-NETS
Customer Order Number DOC-ITO9.2
Cisco Document Assembly Number 83-0127-01
Text Part Number 18-1249-01 in this manual to The products and specifications configurations and other technical information regarding the products contained are subject change without notice All statements technical information and recommendations contained in this manual are believed to be accurate and reliable but are
in this presented without warranty of any kind express or implied and users must take full responsibility for their application of any products specified manual
warranties Some states do not allow limitation or exclusion of liability for consequential or incidental damages or limitation on how long implied last so the above limitations or exclusions may not apply to you This warranty gives Customers specific legal rights and you may also have other rights that vary from state to state
This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause interference to radio communications This equipment has been tested and found to comply with the limits for Class computing device pursuant to
Subpart of Part 15 of FCC Rules which are designed to provide reasonable protection against such interfecence when operated in commercial environment Operation of this equipment in residential area is likely to cause interference in which case the user at his own expense will be required to take whatever measures may be required to correct the interference
The third software be included with will software license following party may your product and be subject to the agreement
The Cisco implementation of TCP header compression is an adaptation of program developed by the University of California Berkeley UCB as part of
UCBs public domain version of the UNIX operating system All rights reserved Copyright 1981 Regents of the University of California
Network Time Protocol David Mills The of Delaware makes about the of this NIP Copyright 1992 University no representations suitability software for any purpose
Point-to-Point Protocol Copyright 1989 Carnegie Mellon University All rights reserved The name of the University may not be used to endorse or
derived from this software without promote products specific prior written permission
Cisco of TN3270 is of the of The implementation an adaptation the tn3270curses and terrncap programs developed by University California Berkeley
domain version of of the of UCB as part of UCBs public the UNIX operating system All rights reserved Copyright 1981-1988 Regents University
California
is Inc California N.C.D XRemote trademark of Network Computing Devices Inc Copyright 1989 Network Computing Devices .Mountain View
about the of this makes no representations suitability software for any purpose
The Window System is trademark of the Massachusetts Institute of Technology Copyright 1987 by Digital Equipment Corporation Maynard
Massachusetts and the Massachusetts Institute of Technology Cambridge Massachusetts All rights reserved
THIS MANUAL CJSCOS SOFTWARE AND THE SOFTWARE OF TIlE ABOVE-LISTED SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRAIITIES EXPRESSED OR IMPLIED INCLUDING THOSE OF MERCHANTABILiTY AND FITNESS FOR PARTICULAR PURPOSE OR ARISING FROM COURSE OF DEALING USAGE OR TRADE PRACTICE
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING WITI-IOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL EVEN IF CISCO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES
Notice of Restricted Rights
Commercial Software Use duplication or disclosure by the Government is subject to restrictions as set forth in subparagraph of the Computer
Software clause at DFARS Restricted Rights clause at FAR 52.227-19 and subparagraph cI ii of the Rights in Technical Data and Computer 252.227-
7013 The information in this manual is subject to change without notice
The and UniverCD trademarks Access Without Compromise CDDI CiscoWorks Cisco Internetwork Operating System Netscape SMARTnet Packet are
and Cisco Systems and the Cisco logo are registered trademarks of Cisco Systems Inc
this document service marks of their All other products or services mentioned in are the trademarks service marks registered trademarks or registered
respective owners
Internetworking Technology Overview
Copyright 1993-1994 Cisco Systems Inc
in All rights reserved Printed USA SOFTWARE LICENSE
READ CAREFULLY BEFORE USING THIS SOFTWARE LICENSE AGREEMENT
PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SOFTWARE BY USING THE SOFTWARE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS LICENSE IF YOU DO NOT AGREE WITH THE TERMS OF THIS LICENSE PROMPTLY RETURN THE UNUSED SOFTWARE MANUAL AND RELATED EQUIPMENT WITH PROOF OF PAYMENT TO THE PLACE OF PURCHASE FOR FULL REFUND
license louse the Cisco software in Cisco Systems Inc Cisco grants to Customer Customer nonexclusive and nontransferable Software object
otherwise embedded in Cisco Customer code form solely on single central processing Unit owned or leased by Customer or equipment provide by may
and notices that on the make one archival copy of the software provided Customer affixes to such copy all copyright confidentiality proprietary appear original
OR MODIFY Except as expressly authorized aboveCUSTOMER SHALL NOT COPY IN WHOLE OR IN PART SOFTWARE DOCUMENTATION THE SOFTWARE REVERSE COMPILE OR REVERSE ASSEMBLE ALL OR ANY PORTION OF THE SOFTWARE OR RENT LEASE DISTRIBUTE SELL OR CREATE DERIVATIVE WORKS OF THE SOFTWARE
Customer that of the licensed the and structure of individual constitute trade secrets andlor agrees aspects materials including specific design programs material in form copyrighted material of Cisco Customer agrees not to disclose provide or otherwise make available such trade secrets or copyrighted any
third without the consent of Cisco Customer to reasonable measures to such trade secrets and to any party prior agrees implement security prolect copyrighted material Title to Software and documentation shall remain solely with Cisco
if used LIIvHTED WARRANTY Cisco warrants that the Software will substantially conform to the published specifications for such Software properly
all in accordance with the Documentation for period of ninety 90 days from the date of shipment To be eligible for remedy Customer must report
within the to the which the Product to Customer or to the Cisco Service Partner if the Software was warranted problems warranty period party supplied exported under the multinational uplift program Ciscos sole and exclusive obligation and Customers exclusive remedy with respect to nonconforming correction workaround for Software upon contact will be at Ciscos option and potentially through the Sales or Service Partner either to provide or
is any reproducible errors or ii to refund to Customer the license fee for the Software in the event that license fee was paid and the other remedy not
that it will available or if the license fee was zero refund the price of the hardware less depreciation calculated on straight-line basis Customer agrees
with Cisco its Sales Service Partner in the environment in which the error occurred Further Customer to supply cooperate or or creating agrees any
for necessary equipment such tests
Limited does not Software which has been authorized has not been installed repaired This Warranty apply to altered except as by Cisco operated unusual or maintained in accordance with any installation handling maintenance or operating instructions supplied by Cisco has been subjected to
electrical is used in ultra hazardous has been used in such that Cisco or its Sales physical or stress misuse negligence or accident activities way
Software has been from the of destination without of an or Partner cannot reasonably reproduce the error exported original country payment uplift
has been misapplied In no event does Cisco warrant that the Software is error free or that Customer will be able to operate its networks without problems
or interruptions
THIS WARRANTY IS IN LIEU OF AND CISCO DISCLAIMS ALL OTHER WARRANTIES EITHER EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR PARTICULAR PURPOSE
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING WITHOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS CISCO SOFTWARE EVEN IF CISCO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES SOME
STATES DO NOT ALLOW LIMITATION OR EXCLUSION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR LIMITATION ON HOW LONG IMPLIED WARRANTIES LAST SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO CUSTOMER
if it This restriction shall survive termination of this Customer will comply with all applicable export laws and regulations exports the products Agreement
the software with all thereof This License is effective until terminated Customer may terminate this License at any time by destroying together copies
if fails with condition hereof termination of this License Cisco may immediately terminate this License the Cuslomer to comply any term or Upon any
Customer shall discontinue use of the Software and shall destroyall copies of the software
with laws Califomia If hereof is found to be void or This License shall be governed by and construed in accordance the of the State of any portion
License constitutes the entire License between the unenforceable the remaining provisions of this License shall remain in full force and effect This parties
with respect to the use of the Software
RIGHTS or disclosure the Restricted Rights Ciscos software and supporting documentation are provided with RESTRICTED Use duplication by
in Commercial Software Restricted clause at 52.227- Government is subject to the restrictions as set forth subparagraph of the Computer Rights FAR DFARS 52.227-7013 19 and subparagraph cl ii of The Rights in Technical Data and Computer Software clause at HARDWARE WARRANTY
Performance Warranty Cisco warrants to Customer for period of from the ninety 90 days shipping date that Hardware purchased under this Agreement will be free from hardware defects in material and To be for workmanship eligible remedy Customer must report all warranted problems within the
warranty period to the party which supplied the Product to Customer or to the Cisco Service Partner if the Hardware was exported under the multinational uplift program
Hardware Remedies In the event of warranted problem with to the Customer respect Hardware must Contact the place it acquired the Hardware or the
Cisco Service Partner if the Hardware was to the multinational exported pursuant uplift program as soon as possible after it becomes aware of the defect Cisco or the Sales or Service Partner as appropriate will supply replacement parts for the products listed in Ciscos recommended list spares Replacement will parts be shipped within five working after of Customers days receipt request Cisco or its Sales or Service Partner will bear the Cost for shipment
of advance replacements to Customer Customer must return all defective boards and assemblies prior to installation of the replacement boards and
assemblies to Cisco or the Sales or Service Partner in accordance with the then current Ciscos sole and exclusive RMA procedures obligation with respect
to defective will at Hardware be Ciscos option and Sales or Service Partner if through necessary to either provide advance replacement service as described the Product above ii replace with Product that does not contain the defect or iii refund the for the Hardware price paid less depreciation calculated on straight-line basis
Exclusions The above does not to Product which warranty apply any has been altered except as authorized by Cisco has not been installed operated or maintained in repaired accordance with any installation handling maintenance or instructions has operating supplied by Cisco been subjected to unusual physical or electrical stress misuse or negligence accident is used in ultra hazardous activities has been used in such away that Cisco cannot reasonably reproduce the Software error or has been exported from the of destination without of original country payment an uplift hi no event does Cisco warrant that Customer wilt be able to its operate networks without problems or interruptions
Disclaimer THIS WARRANTY IS IN LIEU OF AND CISCO DISCLMMS ALL OTHER OF ALL OTHER WARRANTIES EXPRESSED OR INCLUDING THOSE IMPLIED OF MERCHANTABILITY NONINFRINGEMENT AND FITNESS FOR PARTICULAR PURPOSE OR ARISING FROM COURSE OF DEALING
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL INCLUDING DAMAGES WITHOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS CISCO SOFTWAP.E EVEN IF CISCO HAS BEEN ADVTSED OF THE POSSIBILITY OF SUCH DAMAGES SOME STATES DO NOT ALLOW LIMITATION OR EXCLUSION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR LIMITATION ON HOW LONG IMPLIED WARRANTIES LAST SO THE ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO CUSTOMER TABLE OF CONTENTS
About This Manual xxi
Document Objectives xxi
Audience xxi
Document Organization xxi
Document Conventions xxii
PART Interuetworking Basics
Chapter Introduction to Internetworking 1-1
Introduction 1-1
OSI Reference Model Introduction 1-1
Hierarchical Communication 1-1
Information Formats 1-3
Compatibility Issues 1-4
OSI Layers 1-4
Application Layer 1-4 Presentation Layer 1-4 Session Layer 1-4
Transport Layer 1-5
Network Layer 1-5 Link Layer 1-5
Physical Layer 1-5
Important Terms and Concepts 1-5
Addressing 1-5
Frames Packets and Messages 1-6
Key Organizations 1-6
Chapter Routing Basics 2-1
Background 2-1
Routing Components 2-1
Path Determination 2-1
Switching 2-2
Routing Algorithms 2-3
Design Goals 2-4
Optimality 2-4
Simplicity 2-4
Robustness 2-4
Rapid Convergence 2-4
Flexibility 2-5
Types 2-5
Static or Dynamic 2-5
Single-Path or Multipath 2-6
Flat or Hierarchical 2-6
Table of Contents Host-Intelligent or Router-Intelligent 2-6
Intradomain or Interdomain 2-6
Link State or Distance Vector 2-7
Metrics 2-7
Path Length 2-7
Reliability 2-7
Delay 2-8
Bandwidth 2-8
Load 2-8
Communication Cost 2-8
Routed vs Routing Protocols 2-8
Chapter Bridging Basics 3-1
Background 3-1
Internetworking Device Comparison 3-1
Technology Basics 3-2
Types of Bridges 3-3
Chapter Network Management Basics 4-1
Background 4-1
Network Management Architecture 4-1
The ISO Network Management Model 4-2 Performance Management 4-2
Configuration Management 4-3 Accounting Management 4-3 Fault Management 4-4
Security Management 4-4
PART Media-Access Technooges
Chapter Ethernet/IEEE 802.3 5-1
Background 5-1
Ethernet/IEEE 802.3 Comparison 5-1
Physical Connections 5-2
Frame Formats 5-3
Chapter Token Ring/IEEE 802.5 6-1
Background 6-1
Token Ring/IEEE 802.5 Comparison 6-1
Token Passing 6-2
vi Internetworking Technology Overview Physical Connections 6-3
Priority System 6-3
Fault Management Mechanisms 6-4
Frame Format 6-4
Tokens 6-4 Data/Command Frames 6-5
7-1 Chapter Fiber Distributed Data Interface
Background 7-1
Technology Basics 7-1
FDDI Specifications 7-2
Physical Connections 7-2
Traffic Types 7-3
Fault-Tolerant Features 7-4
Frame Format 7-6
Interface 8-i Chapter High-Speed Serial
Background 8-1
Technology Basics 8-1
9-1 Chapter Point-to-Point Protocol
Background 9-1
PPP Components 9-1
General Operation 9-2
Physical-Layer Requirements 9-2
The PPP Link Layer 9-2
The PPP Link Control Protocol 9-3
10-1 Chapter 10 Integrated Services Digital Network
Background 10-1
Components 10-1
Services 10-2
Layer 10-3
Layer2 10-4
Layer 10-4
Table of Contents vii Chapter 11 Synchronous Data Link Control and Derivatives 11-1
Background 11-I
Technology Basics 11-1
Frame Format 11-2
Derivative Protocols 11-4
HDLC 11-4
LAPB 11-5
IEEE 802.2 11-5
QLLC 11-6
PART Packet-Swftchhig Technoogies
Chapter 12 X.25 12-1
Background 12-1
Technology Basics 12-1
Frame Format 12-3
Layer 12-3 Layer 12-4 Layer 12-5
Chapter 13 Frame Relay 13-1
Background 13-1
Technology Basics 13-1
LMI Extensions 13-2
Frame Format 13-3
LMI Message Format 13-4
Global Addressing 13-5
Multicasting 13-6
Network Implementation 13-6
Chapter 14 Switched Multimegabit Data Service 14-1
Background 14-1
Technology Basics 14-1
Addressing 14-2
Access Classes 14-3
SMDS Interface Protocol SIP 14-3
CPE Configurations 14-4
SIP Levels 14-4
viii lnternetworking Technology Overview Level 14-5
Level2 14-6
Level 14-7
Network Implementation 14-8
Chapter 15 Asynchronous Transfer Mode 15-1
Background 15-1
Technology Basics 15-2
ATM Physical Layer 15-3 ATM Layer 15-3
ATM Adaptation Layers 15-5
AAL3/4 15-6
AAL5 15-7
ATM Architectures 15-8 ATM Permanent Virtual Connection PVC Service 15-9 ATM Switched Virtual Connection SVC Service 15-10 ATM Connectionless Service 15-11
PART Routed Protocols
Chapter 16 AppleTalk 16-1
Background 16-1
Technology Basics 16-1
Media Access 16-2
Network Layer 16-3
Protocol Address Assignment 16-3
Network Entities 16-4
Datagram Delivery Protocol DDP 16-5 Routing Table Maintenance Protocol RTMP 16-6
Transport Layer 16-7 AppleTalk Transaction Protocol ATP 16-7 AppleTalk Data Stream Protocol ADSP 16-7
Upper-Layer Protocols 16-8
Chapter 17 DECnet 11-1
Background 17-1
Digital Network Architecture DNA 17-1
Media Access 17-2
Network Layer 17-2 DECnet Phase IV Routing Frame Format 17-3
Addressing 17-4
Table of Contents ix Routing Levels 17-5
Transport Layer 17-6
Upper-Layer Protocols 17-6
Chapter 18 Internet Protocols 18-1
Background 18-1
Network Layer 18-2
Addressing 18-4
Internet Routing 18-6
ICMP 18-7
IRDP 18-7
Transport Layer 18-8 Transmission Control Protocol TCP 18-8 User Datagram Protocol UDP 18-9
Upper-Layer Protocols 18-9
Chapter 19 NetWare Protocols 19-1
Background 19-1
Technology Basics 19-1
Media Access 19-2
Network Layer 192
Transport Layer 19-4
Upper-Layer Protocols 19-4
Chapter 20 OSI Protocols 20-1
Background 20-1
Technology Basics 20-1
Media Access 20-1
Network Layer 20-2
Connectionless Service 20-2
Connection-Oriented Service 20-3
Addressing 20-3
Transport Layer 20-4
Upper-Layer Protocols 20-5 Session Layer 20-5
Presentation Layer 20-5 Application Layer 20-5
Internetworking Technology Overview Chapter 21 Banyan VINES 21-1
Background 21-1
Technology Basics 21-1
Media Access 21-2
Network Layer 21-2 VINES Internetwork Protocol VIP 21-2 Routing Table Protocol RTP 21-5 Address Resolution Protocol ARP 21-6 Internet Control Protocol ICP 21-6
Transport Layer 21-7
Upper-Layer Protocols 21-7
Chapter 22 Xerox Network Systems 22-1
Background 22-1
Technology Basics 22-1
Media Access 22-2
Network Layer 22-2
Transport Layer 22-4
Upper-Layer Protocols 22-4
PART Routing ProtocWs
Chapter 23 Routing Information Protocol 23-1
Background 23-1
Routing Table Format 23-1
Packet Format IP Implementations 23-2
Stability Features 23-3
Hop-Count Limit 23-3 Hold-Downs 23-4
Split Horizons 23-4
Poison Reverse Updates 23-4
Chapter 24 Interior Gateway Routing Protocol and Enhanced Interior Gateway Routing Protocol 24-1
Background 24-1
Technology 24-1
Stability Features 24-2
Hold-Downs 24-2
Split Horizons 24-2
Table of Contents xi Poison Reverse Updates 24-3 Timers 24-3
EIGRP 24-3
Compatibility with IGRP 24-4
EIGRP Technology 24-4 Packet Types 4-5
Neighbor Tables 24-5
Topology Tables 24-6
Route States 24-6
Route Tagging 24-6
Chapter 25 Open Shortest Path First 25-1
Background 25-1
Technology Basics 25-1
Routing Hierarchy 25-2
The SPF Algorithm 25-4
Packet Format 25-4
Additional OSPF Features 25-5
Chapter 26 Exterior Gateway Protocol 26-1
Background 26-1
Technology Basics 26-1
Packet Format 26-2
Message Types 26-3
Neighbor Acquisition 26-3
Neighbor Reachability 26-3 Poll 26-3
Routing Update 26-3
Error 26-4
Chapter 27 border Gateway Protocol 27-1
Background 27-1
Technology Basics 27-1
Packet Format 27-2
Messages 27-2 Open 27-2 Update 27-3
Notification 27-3
Keepalive 27-3
xii Internetworking Technology Overview Chapter 28 OSI Routing 28-1
Background 28-1
Terminology 28-1
ES-IS 28-2
IS-IS 28-3
Routing Hierarchy 28-3
Inter-ES Communication 28-4
Metrics 28-4
Packet Format 28-4
Integrated IS-IS 28-5
Interdomain Routing Protocol IDRP 28-6
PART Bridging Technologies
Chapter 29 Transparent Bridging 29-1
Background 29-1
Technology Basics 29-1
Bridging Loops 29-2
Spanning-Tree Algorithm STA 29-3
Frame Format 29-4
Chapter 30 Source-Route Bridging 30-1
Background 30-1
SRB Algorithm 30-1
Frame Format 30-3
Chapter 31 Mixed-Media Bridging 31-1
Background 31-1
Technology Basics 31-1
Translation Challenges 31-2
Translational Bridging 31-3
Source-Route Transparent Bridging 31-5
Table of Contents xiii PART Network Management
Chapter 32 Simple Network Management Protocol 32-1
Background 32-1
Technology Basics 32-1
Management Model 32-2
Command Types 32-3
Data Representation Differences 32-3
Management Database 32-3
Operations 32-4
Message Format 32-5
Chapter 33 IBM Network Management 33-1
Background 33-1
Functional Areas of Management 33-1 Configuration Management 33-2
Performance and Accounting Management 33-2
Problem Management 33-3
Operations Management 33-3
Change Management 33-3
Principal Management Architectures and Platforms 33-4
The Open Network Architecture Framework 33-4 System View 33-5
NetView 33-5
LAN Network Manager 33-5 SNMP 33-5
Appendix
Appendix References and Recommended Reading A-i
Books and Periodicals A-l
Technical Publications and Standards A-3
Undex
xiv Internetworking Technology Overview Ii OF FGURES
Figure 1-1 Communication Between Two Computer Systems 1-2
Figure 1-2 Relationship Between Adjacent Layers in Single System 1-2
Figure 1-3 Headers and Data 1-3
Figure 2-1 Destination/Next Hop Routing Table 2-2
Figure 2-2 Switching Process 2-3
2-5 Figure 2-3 Slow Convergence and Routing Loops
Figure 3-1 Internetworking Product Functionality 3-2
Figure 3-2 Local and Remote Bridging 3-3
Figure 3-3 IEEE 802.3/IEEE 802.5 Bridging 3-4
Figure 4-1 Typical Network Management Architecture 4-2
Figure 5-1 IEEE 802.3 Physical-Layer Name Components 5-2
Figure 5-2 Ethernet and IEEE 802.3 Frame Formats 5-3
Figure 6-1 IBM Token Ring Network/IEEE 802.5 Comparison 6-2
Figure 6-2 IBM Token Ring Network Physical Connections 6-3
Figure 6-3 IEEE 802 .5/Token Ring Frame Formats 6-4
Figure 7-1 FDDI Standards 7-2
Figure 7-2 FDDI Nodes DAS SAS and Concentrator 7-3
Figure 7-3 FDDI DAS Ports 7-3
Figure 7-4 Station Failure Ring Recovery Configuration 7-4
Figure 7-5 Failed Wiring Ring Recovery Configuration 7-5
Figure 7-6 Use of Optical Bypass Switch 7-6
Figure 7-7 FDDI Frame Format 7-7
Figure 8-1 HSSIs Four Loopback Tests 8-3
Figure 9-1 PPP Frame Format 9-2
Figure 10-1 Sample ISDN Configuration 10-2
Figure 10-2 ISDN Physical-Layer Frame Formats 10-3
Figure 10-3 LAPD Frame Format 10-4
Figure 10-4 ISDN Circuit-Switched Call Stages 10-5
Figure 11-1 SDLC Frame Format 11-2
11-4 Figure 11-2 Typical SDLC-Based Network Configuration
Figure 12-1 X.25 Model 12-2
Figure 12-2 X.25 and the OSI Reference Model 12-2
Figure 12-3 X.25 Frame 12-3
Figure 12-4 X.121 Address Format 12-4
List of Figures xv Figure 12-5 LAPB Frame 12-5
Figure 13-1 Frame Relay Frame 13-3
13-2 Frame Figure Relay Addressing 13-3
Figure 13-3 LMI Message Format 13-4
13-4 Figure Global Addressing Exchange 13-5
Figure 13-5 Hybrid Frame Relay Network 13-6
14-1 Figure SMDS Internetworking Scenario 14-2
Figure 14-2 and Single-CPE Multi-CPE Configurations 14-4
14-3 Figure Encapsulation of User Information by SIP Levels 14-5
Figure 14-4 SIP Level PDU 14-5
Figure 14-5 SIP Level PDU 14-6
15-1 and Figure TDM ATM Multiplexing Techniques 15-2
Figure 15-2 ATM Cell 15-4
15-3 Virtual Figure Connections Through an ATM Switch 15-5
15-4 Figure AAL3/4 Treatment of Payload Frame 15-6
15-5 Figure AAL3/4 SAR Sublayer State Diagram 15-7
15-6 Figure AAL5 Treatment of Payload Frame 15-7
15-7 AAL5 Figure Convergence Sublayer State Diagram 15-8
Figure 15-8 Practical ATM Architecture 15-9
Figure 15-9 ATM PVC Service 15-10
Figure 15-10 ATM SVC Service 15-10
Figure 15-11 ATM Connectionless Service 15-11
16-1 Figure AppleTalk and the OSI Reference Model 16-2
16-2 Figure AppleTalk Address Selection Process 16-3
Figure 16-3 AppleTalk Entities 16-5
16-4 Figure Sample AppleTalk Routing Table 16-6
Figure 16-5 Sample AppleTalk ZIT 16-7
17-1 Figure DNA and the OSI Reference Model 17-2
17-2 Figure DNA Phase IV Routing Layer Header 17-3
Figure 17-3 DECnet Phase IV Routing Protocol Cost Calculation 17-4
Figure 17-4 DECnet Addresses 17-4
17-5 Figure DECnet Level and Level Routers 17-5
Figure 18-1 Internet Protocol Suite and the OSI Reference Model 18-2
Figure 18-2 IP Packet Format 18-3
xvi Internetworking Technology Overview Figure 18-3 Class and Address Formats 18-4
Figure 18-4 Subnet Addresses 18-5
Figure 18-5 Sample Subnet Mask 18-5
Figure 18-6 Internet Architecture 18-6
Figure 18-7 IP Routing Table 18-7
Figure 18-8 TCP Packet Format 18-8
Figure 19-1 NetWare and the OSI Reference Model 19-2
Figure 19-2 IPX Packet Format 19-3
Figure 19-3 Ethernet IEEE 802.3 and IPX Encapsulation Formats 19-4
Figure 20-1 OSI Primitives 20-3
Figure 20-2 OSI Address Format 20-4
Figure 20-3 Principal OSI Upper-Layer Protocols 20-5
Figure 21-1 VINES Protocol Stack 21-1
Figure 21-2 NINES Address Format 21-2
Figure 21-3 VINES Address Selection Process 21-3
Figure 21-4 VINES Routing Algorithm 21-4
Figure 21-5 VIP Packet Format 21-5
Figure 22-1 XNS and the 051 Reference Model 22-2
Figure 22-2 IDP Packet Format 22-3
Figure 23-1 Typical RIP Routing Table 23-1
Figure 23-2 RIP Packet Format 23-2
Figure 23-3 Count-To-Infinity Problem 23-3
Figure 23-4 Split Horizons 23-4
Figure 24-1 Split Horizons 24-2
Figure 25-1 Hierarchical OSPF Internetwork 25-3
Figure 25-2 OSPF Header Format 25-4
Figure 26-1 EGP and the ARPANET 26-1
Figure 26-2 EGP Packet Format 262
Figure 27-1 BGP Packet Format 27-2
Figure 28-1 Hierarchies in OSI Internetworks 28-2
Figure 28-2 ESH and ISH Packet Formats 28-3
Figure 28-3 IS-IS Logical Packet Format 28-4
Figure 28-4 IS-IS Common Header Format 28-5
Figure 29-1 Transparent Bridging Table 29-1
List of Figures xvii Figure 29-2 Inaccurate Forwarding and Learning in Transparent Bridging Environments 29-2
Figure 29-3 Transparent Bridge Network Before Running STA 29-3
Figure 29-4 Transparent Bridge Network After Running STA 29-4
Figure 29-5 Transparent Bridge Configuration Message Format 29-5
Figure 30-1 Sample SRB Network 30-2
Figure 30-2 IEEE 802.5 RIP 30-3
31-1 Figure Bridging Between Transparent Bridging and SRB Domains 31-1
Figure 31-2 Frame Conversion Between IEEE 802.3 and Token Ring 31-4
31-3 Frame Figure Conversion Between Ethernet Type II and Token Ring SNAP 31-4
Figure 31-4 Frame Conversion Between Ethernet Type II 0x80D5 Format and Token Ring 31-5
Figure 32-1 SNMP Management Model 32-2
Figure 32-2 Tree 32-4
Figure 32-3 SNMP Message Format 32-5
Figure 33-1 OSI and IBM Network Management Functions 33-2
Figure 33-2 ONA Framework 33-4
xviii Internetworking Technology Overview OF TABLES
Table 5-1 Ethernet Version and IEEE 802.3 Physical Characteristics 5-2
Table 8-1 HSSI Technical Characteristics 8-2
Table 14-1 Segment Type Values 14-7
Table 15-1 BISDN Service Classes 15-6
Table 18-1 Internet Protocol/Application Mapping 18-9
Table 26-1 EGP Message Types 26-2
ListofTables xix xx Internetworking Technology Overview About This Manual
This section discusses the objectivesaudience organizationand conventions of the Internetworking
Technology Overview publication
Document Objectves
This publication provides technical information on Cisco-supported internetworking technologies It
is designed for use in conjunction with other Cisco manuals or as standalone reference
The Internetworking Technology Overview is not intended to provide all possible information on the
included technologies Because primary goal of this publication is to help network administrators
configure Cisco products the publication emphasizes Cisco-supported technologies however
inclusion of technology in this publication does not necessarily imply Cisco support for that
technology
Audence
The Internetworking Technology Overview is written for anyone who wants to understand
Cisco that readers will information in this internetworking technologies anticipates many use
publication to help configure Cisco products but others also may find it useful
Readers will better understand the material in this publication if they are familiar with networking
terminology Ciscos Internetworking Terms andAcronyms publication is useful reference for those
with minimal knowledge of networking terms
Document Organizaton
This publication is divided into seven parts Each part is concerned with introductory material or
major area of internetworking technology and comprises chapters describing related tasks or functions
Part Internetworking Basics presents concepts basic to the understanding of internetworking
and network management
Part Media-Access Technologies describes standard protocols used for accessing network
physical media
Part Packet-Switching Technologies describes standard protocols used to implement packet-
switching
Part Routed Protocols describes several standard networking protocol stacks that can be
routed through an intemetwork
About This Manual xxi Document Conventions
Part Routing Protocols describes protocols used to route information through an internetwork
Part Bridging Technologies describes protocols and technologies used to provide layer connectivity between subnetworks
Part Network Management describes network management protocols architectures and technologies
Document Conventons
In this publication the following conventions are used
Commands and keywords are in boldface
New important terms are italicized when accompanied by definition or discussion of the term
Protocol names are italicized at their first use in each chapter
Note Means reader take note Notes contain helpful suggestions or references to materials not
contained in this manual
xxii Internetworking Technology Overview
ntroduction to nternetworking
ntroducton
here readers This chapter explains basic intemetworking concepts The information presented helps who are new to internetworking comprehend the technical material that makes up the bulk of this and publication Sections on the OSI reference model important terms and concepts key
organizations are included
OS Reference Mode Mntroduction
Moving information between computers of diverse design is formidable task In the early 1980s
the International Organization for Standardization ISO recognized the need for network model
that would help vendors create interoperable network implementations The Open Systems
Interconnection OSI reference model released in 1984 addresses this need
The OSI reference model quickly became the primary architectural model for intercomputer
communications Although other architectural models mostly proprietary have been created most
network vendors relate their network products to the OSI reference model when they want to educate
users about their products Thus the model is the best tool available to people hoping to learn about network technology
Herarchca Communication
The OSI reference model divides the problem of moving information between computers over
network medium into seven smaller and more manageable problems Each of the seven smaller solved problems was chosen because it was reasonably self-contained and therefore more easily without excessive reliance on external information
devices Each of the seven problem areas is solved by layer of the model Most network implement
all seven layers To streamline operations however some network implementations skip one or more
layers The lower two OSI layers are implemented with hardware and software the upper five layers
are generally implemented in software
The OSI reference model describes how information makes its way from application programs such
in as spreadsheets through network medium such as wires to another application program
another computer As the information to be sent descends through the layers of given system it
looks less and less like human language and more and more like the ones and zeros that computer understands
As an example of OSI-type communication assume that System in Figure 1-1 has information to
send to System The application program in System communicates with System As layer the
top layer which communicates with System As layer which communicates with System As
Introduction to Internetworking 1-1 OSI Reference Model Introduction
layer and so on until System As layer is reached Layer is concerned with putting information
on and taking information oft the physical network medium After the information has traversed
the physical network medium and been absorbed into System it ascends through System Bs
layers in reverse order first layer then layer and so on until it finally reaches System Bs
application program
System System
Network
Figure 1-1 Communication Between Two Computer Systems
Although each of System As layers communicates with its adjacent System layers its primary
is communicate with its in That the of objective to peer layer System is primary objective layer
in System is to communicate with layer in System layer in System communicates with
in This is because each in has certain tasks it layer System and so on necessary layer system
communicate with its in the other must perform To perform these tasks it must peer layer system
The models in different OSI layering precludes direct conmiunication between peer layers systems
Each layer in System must therefore rely on services provided by adjacent System layers to help
achieve between in communication with its System peer The relationship adjacent layers single
system is shown in Figure 1-2
Service user Service user OSI x1 layer layer x1 protocol layer x1 protocol
______I
Service provider OSI layerx layer protocol
cJ
Service access points
Figure 1-2 Relationship Between Adjacent Layers in Single System
1-2 Internetworking Technology Overview OSI Reference Model Introduction
Assume layer in System must communicate with layer in System To do this layer in
System must use the services of layer in System Layer is said to be the service user while
layer is the service provider Layer services are provided to layer at service access point
is location which services As the SAP which simply at layer can request layer figure shows
layer can provide its services to multiple layer entities
Unformation Formats
How does layer in System know what layer in System wants Layer 4s specific requests are
in block called header that is stored as control information which is passed between peer layers
prepended to the actual application information For example assume System wishes to send the
following text called data or information to System
The small grey cat ran up the wall to try to catch the red bird
This text is passed from the application program in System to System As top layer System As
application layer must communicate certain information to System Bs application layer so it This prepends that control information in the form of coded header to the actual text to be moved
information unit is passed to System As layer which may prepend its own control information
The information unit grows in size as it descends through the layers until it reaches the network
where the original text and all associated control information travels to System where it is
absorbed by System slayer System slayer strips the layer header reads it and then knows
information unit The smaller infonnation unit is to which how to process the slightly passed layer
strips the layer header analyzes the header for actions layer must take and so forth When the
in it contains the information unit finally reaches the application program System simply original text
of the The concept of header and data is relative depending on the perspective layer currently
analyzing the information unit For example to layer an information unit consists of layer
header and the data that follows Layer 3s data however can potentially contain headers from
layers and Further layer 3s header is simply data to layer This concept is illustrated in
Figure 1-3 Finally not all layers need to append headers Some layers simply perform
readable their transformation on the actual data they receive to make the data more or less to adjacent
layers
System Information units System
Header4 Dataj ______
Header Data
Header Data
Data
cJ
Network CD
Figure 1-3 Headers and Data
Introduction to Internetworking 1-3 OSI Reference Model Introduction
Compatibility Issues
The OSI reference model is not network implementation Instead it specifies the functions of each
layer In this way it is like blueprint for the building of ship After ship blueprint is complete
the ship must still be built Any number of shipbuilding companies can be contracted to do the actual
work just as any number of network vendors can build protocol implementation from protocol
specification And unless the blueprint is extremely impossibly comprehensive ships built by
different shipbuilding companies using the same blueprint will differ from each other in at least
the for it is that the rivets will be in different minor ways At very least example likely places
What accounts for the differences between implementations of the same ship blueprint or protocol
specification In part the differences are due to the inability of any specification to consider every
possible implementation detail Also different implementors will no doubt interpret the blueprint in
slightly different ways And finally the inevitable implementation errors will cause different
implementations to differ in execution This explains why one companys implementation of
protocol does not always interoperate with another companys implementation of that protocol
OSI Layers
Now that the basic features of the OSI layered approach have been described each individual OSI
layer and its functions can be discussed Each layer has predetermined set of functions it must
perform for communication to occur
Application Layer
The application layer is the OSI layer closest to the user It differs from the other layers in that it does services other OSI but rather outside the not provide to any layer to application processes lying of the OSI model of such include scope Examples application processes spreadsheet programs
word-processing programs banking terminal programs and so on
The application layer identifies and establishes the availability of intended communication partners
synchronizes cooperating applications and establishes agreement on procedures for error recovery
and control of data integrity Also the application layer determines whether sufficient resources for the intended communication exist
Presentation Layer
The presentation layer ensures that information sent by the application layer of one system will be
readable by the application layer of another system If necessary the presentation layer translates
between multiple data representation formats by using common data representation format
The presentation layer concerns itself not only with the format and representation of actual user data
but also with data structures used by programs Therefore in addition to actual data format
transformation if necessary the presentation layer negotiates data transfer syntax for the
application layer
Session Layer
terminates sessions between As its name implies the session layer establishes manages and
applications Sessions consist of dialogue between two or more presentation entities recall that the
session layer provides its services to the presentation layer The session layer synchronizes dialogue
between presentation layer entities and manages their data exchange In addition to basic regulation
class of of conversations sessions the session layer offers provisions for data expedition service
and exception reporting of session-layer presentation-layer and application-layer problems
1-4 Internetworking Technology Overview Important Terms and Concepts
Transport Layer
The boundary between the session layer and the transport layer can be thought of as the boundary
between application-layer protocols and lower-layer protocols Whereas the application
presentation and session layers are concerned with application issues the lower four layers are
concerned with data transport issues
The service shields the transport layer attempts to provide data transport that upper layers from
transport implementation details Specifically issues such as how reliable transport over an
is reliable internetwork accomplished are the concern of the transport layer In providing service the
transport layer provides mechanisms for the establishment maintenance and orderly termination of
virtual circuits transport fault detection and recovery and information flow control to prevent one
system from overrunning another with data
Network Layer
The network layer is complex layer that provides connectivity and path selection between two end
systems that may be located on geographically diverse subnetworks subnetwork in this instance
is cable called essentially single network sometimes segment
Because substantial geographic distance and many subnetworks can separate two end systems
desiring communication the network layer is the domain of routing Routing protocols select
optimal paths through the series of interconnected subnetworks Traditional network-layer protocols
then move information along these paths
Link Layer
The link layer formally referred to as the data link layer provides reliable transit of data across
physical link In so doing the link layer is concerned with physical as opposed to network or
will the logical addressing network topology line discipline how end systems use network link
error notification ordered delivery of frames and flow control
Physical Layer
The physical layer defines the electrical mechanical procedural and functional specifications for
activating maintaining and deactivating the physical link between end systems Such maximum characteristics as voltage levels timing of voltage changes physical data rates
transmission distances physical connectors and other similar attributes are defined by physical
layer specifications
mportant Terms and Concepts
Internetworking like other sciences has terminology and knowledge base all its own
Unfortunately because the science of internetworking is so young universal agreement on the
meaning of networking concepts and terms has not yet occurred Definitions of internetworking
terms will become more rigidly defined and used as the internetworking industry matures
Addressing
Locating computer systems on an internetwork is an essential component of any network system
There are various addressing schemes used for this purpose depending on the protocol family being
used In other words AppleTalk addressing is different from TCP/IP addressing which in turn is
different from OSI addressing and so on
Introduction to Internetworking 1-5 Key Organizations
and addresses Two important types of addresses are link-layer addresses network-layer Link-layer
for each network addresses also called physical or hardware addresses are typically unique connection In fact for most local-area networks LANs link-layer addresses are resident in the
defined the standard interface circuitry and are assigned by the organization that protocol network represented by the interface Because most computer systems have one physical
and other connected to connection they have only single link-layer address Routers systems
their multiple physical networks can have multiple link-layer addresses As name implies link-layer
addresses exist at layer of the OSI reference model
of the OSI Network-layer addresses also called virtual or logical addresses exist at layer address reference model Unlike link-layer addresses which usually exist within fiat space mail which network-layer addresses are usually hierarchical In other words they are like addresses address describe persons location by providing country state zip code city street an on
the street and finally name One good example of flat address space is the U.S social security
social number numbering system where each person has single unique security
Hierarchical addresses make address sorting and recall easier by eliminating large blocks of
logically similar addresses through series of comparison operations For example we can
eliminate all other countries if an address specifies the country Ireland Easy sorting and recall is one
reason that routers use network-layer addresses as the basis for routing
but use Network-layer addresses differ depending on the protocol family being used they typically Some of these similar logical divisions to find computer systems on an internetwork logical
network is divisions are based on physical network characteristics such as the segment system
basis the located on others are based on groupings that have no physical for example AppleTalk zone
Frames Packets and Messages
Once addresses have located computer systems information can be exchanged between two or more
units of of these systems Networking literature is inconsistent in naming the logically grouped information that move between computer systems The termsframepacket protocol data unit of those write PDU segment message and others have all been used based on the whim who
protocol specifications
and destination is In this publication the term frame denotes an information unit whose source
and destination is link-layer entity The term packet denotes an information unit whose source
unit whose and network-layer entity Finally the term message denotes an information source
used refer lower- destination entity exists above the network layer Message is also to to particular
layer information units with specific well-defined purpose
Key Organzatons would be Without the services of several key standards organizations the world of networking
substantially more chaotic than it is currently Standards organizations provide forums for
discussion help turn discussion into formal specifications and proliferate the specifications once
they complete the standardization process
formal standards Most standards organizations have specific processes for turning ideas into
similar in that Although these processes differ slightly between standards organizations they are
draft they all iterate through several rounds of organizing ideas discussing the ideas developing
the standards voting on all or certain aspects of the standards and finally formally releasing
completed standard to the public
1-6 Internetworking Technology Overview Key Organizations
Some of the better-known standards organizations are
International Organization for Standardization ISOAn international standards organization
responsible for wide range of standards including those relevant to networking This
organization is responsible for the OSI reference model and the OSI protocol suite
American National Standards Institute ANSIThe coordinating body for voluntary standards
within the United States ANSI is member of ANSIs best-known groups ISO communications
standard is FDDI
Electronic Industries Association EIAA group that specifies electrical transmission
standards EIAs best-known standard is RS-232
Institute of Electrical and Electronic Engineers IEEE professional organization that defines
network standards IEEE LAN standards including IEEE 802.3 and IEEE 802.5 are the best-
known IEEE communications standards and are the predominant LAN standards in the world today
Consultative Committee for International Telegraph and Telephone CCITT An international
organization that develops communication standards CCITTs best-known standard is X25
Internet Activities Board lAB group of internetwork researchers who meet regularly to
discuss issues pertinent to the Internet This board sets much of the policy for the Internet through
decisions and assignment of task forces to various issues Some Request for Comments RFC
documents are designated by the lAB as Internet standards including Transmission Control
Protocol/Internet Protocol TCP/IP and the Simple Network Management Protocol SNMP
Introduction to Internetworking 1-7 Key Organizations
1-8 Internetworking Technology Overview Routing Basics
Background
internetwork from to destination the at Routing is moving information across an source Along way which least one intermediate node is typically encountered Routing is often contrasted with bridging
difference between the two is that seems to accomplish precisely the same thing The primary
the reference while occurs at bridging occurs at layer the link layer of OSI model routing layer
the network layer This distinction provides routing and bridging with different information to
in of information from source to destination.As result routing and bridging use the process moving several different kinds of and accomplish their tasks in different ways and in fact there are routing Basics bridging For more information on bridging see Chapter Bridging
literature for two but The topic of routing has been covered in computer science over decades
The for this time routing only achieved commercial popularity in the mid-1980s primary reason lag
is the nature of networks in the l970s During this time networks were fairly simple homogeneous
has environments Only recently large-scale internetworking become popular
Rout ng Components
determination of and the of Routing involves two basic activities optimal routing paths transport
internetwork In this the latter information groups typically called packets through an publication
of these is referred to as switching Switching is relatively straightforward Path determination on
the other hand can be very complex
Path Determnaton
is used metric is standard of measurementfor example path lengththat by routing
aid the of determination algorithms to determine the optimal path to destination To process path which contain route information Route routing algorithms initialize and maintain routing tables
information varies depending on the routing algorithm used
Destination/next Routing algorithms fill routing tables with variety of information hop
the associations tell router that particular destination can be gained optimally by sending packet
the final destination When router to particular router representing the next hop on the way to and to associate this address receives an incoming packet it checks the destination address attempts table with next hop Figure 2-1 shows an example of destination/next hop routing
Routing Basics 2-1 Routing Components
To reach network Send to
27 Node
57 Node
17 Node
24 Node
52 Node
16 Node
26 Node
Figure 2-1 Destination/Next Hop Routing Table
tables also contain other Routing can information such as information about the desirability of Routers metrics determine path compare to optimal routes Metrics differ depending on the design
of the routing algorithm being used variety of common metrics will be introduced and described
later in this chapter
Routers communicate with one another and maintain their routing tables through the transmission of of The variety messages routing update message is one such message Routing updates
consist of all generally or portion of routing table By analyzing routing updates from all routers router build detailed can picture of network topology link-state advertisement is another of example message sent between routers Link-state advertisements inform other routers of the
state of the senders links Link information can also be used to build complete picture of network Once the topology network topology is understood routers can determine optimal routes to network destinations
Switch ug
Switching algorithms are relatively simple and are basically the same for most routing protocols In host most cases determines that it must send packet to another host Having acquired routers address by some means the source host sends packet addressed specifically to routers physical Access Media Control MAC-layeraddress but with the protocol network-layer address of the destination host
On the examining packets destination protocol address the router determines that it either knows does know how or not to forward the packet to the next hop If the router does not know how to
forward the it packet typically drops the packet If the router knows how to forward the packet it the destination changes physical address to that of the next hop and transmits the packet
The next or not be the ultimate destination If the hop may may host not next hop is usually another which the router executes same switching decision process As the packet moves through the
its address but its address remains internetwork physical changes protocol constant This process is illustrated in Figure 2-2
2-2 Internetworkirig Technology Overview Routing Algorithms
Source host Packet PC
To Destination host Protocol address Router Physical addJ
Packet
To Destination host Protocol address Router Physical address
To Destination host Protocol address Router Physical address
Packet
To
Destination host Protocol address Destination host Physical address
Destination host Packet PC
Figure 2-2 Switching Process
and destination end The The preceding discussion describes switching between source system
hierarchical that International Organization for Standardization ISO has developed terminology
network devices without the to is useful in describing this process Using this terminology ability while network devices with forward packets between subnetworks are called end systems ESs
further divided into those that these capabilities are referred to as intermediate systems ISs ISs are
that communicate both within can communicate within routing domains intradomain ISs and those
is considered to be and between routing domains interdomain ISs routing domain generally
set of portion of an internetwork under common administrative authority regulated by particular
With certain administrative guidelines Routing domains are also called autonomous systems but intradomain protocols routing domains may also be divided into routing areas routing
protocols are still used for switching both within and between areas
Rout ng AHgorthms
characteristics the Routing algorithms can be differentiated based on several key First particular Second there goals of the algorithm designer affect the operation of the resulting routing protocol
different network and router are various types of routing algorithms Each algorithm has impact on
metrics that affect calculation of resources Finally routing algorithms use variety of optimal attributes routes The following sections analyze these routing algorithm
Routing Basics 2-3 Routing Algorithms
Des gn Goals
Routing algorithms often have one or more of the following design goals
Optimality
Simplicity and low overhead
Robustness and stability
Rapid convergence
Flexibility
Optimality
Optimality refers to the ability of the routing algorithm to select the best route The best route
depends on the metrics and metric weightings used to make the calculation For example one
routing algorithm might use number of hops and delay but might weight delay more heavily in the calculation Naturally routing protocols must strictly define their metric calculation algorithms
Simplicity
Routing algorithms are also designed to be as simple as possible In other words the routing
algorithm must offer its functionality efficiently with minimum of software and utilization
overhead Efficiency is particularly important when the software implementing the routing
algorithm must run on computer with limited physical resources
Robustness
Routing algorithms must be robust In other words they should perform correctly in the face of
unusual or unforeseen circumstances such as hardware failures high load conditions and incorrect
implementations Because routers are located at network junction points they can cause
considerable problems when they fail The best routing algorithms are often those that have
withstood the test of time and proven stable under variety of network conditions
Rapid Convergence
Routing algorithms must converge rapidly Convergence is the process of agreement by all routers on When network optimal routes event causes routes to either go down or become available
routers distribute routing update messages Routing update messages penneate networks recalculation of stimulating optimal routes and eventually causing all routers to agree on these
routes that Routing algorithms converge slowly can cause routing loops or network outages
Figure 2-3 shows routing ioop In this case packet arrives at Router at time ti Router has
already been updated and so knows that the optimal route to the destination calls for Router to be the Router therefore next stop forwards the packet to Router Router has not yet been updated
and believes that the so optimal next hop is Router Router therefore forwards the packet back
to Router The packet will continue to bounce back and forth between the two routers until
Router receives its routing update or until the packet has been switched the maximum number of times allowed
2-4 Internetworking Technology Overview Routing Algorithms
rXPacket to
ti
table Routing table Routing
Send to Dest Sendto flDt
Already updated Not yet updated
Figure 2-3 Slow Convergence and Routing Loops
Flexibility
should and Routing algorithms should also be flexible In other words routing algorithms quickly
network circumstances For assume that network accurately adapt to variety of example segment select has gone down Many routing algorithms on becoming aware of this problem will quickly
that can be the next-best path for all routes normally using segment Routing algorithms network router network and other programmed to adapt to changes in bandwidth queue size delay variables
Types be Routing algorithms can be classified by type For example algorithms can
Static or dynamic
Single-path or multipath
Flat or hierarchical
Host-intelligent or router-intelligent
Intradomain or interdomain
Link state or distance vector
Static or Dynamic
all Static table are established Static routing algorithms are hardly algorithms at routing mappings unless the by the network administrator prior to the beginning of routing They do not change and work network administrator changes them Algorithms that use static routes are simple to design
is well in environments where network traffic is relatively predictable and network design relatively
simple
network are considered Because static routing systems cannot react to changes they generally
unsuitable for todays large constantly changing networks Most of the dominant routing algorithms
in the 1990s are dynamic
network circumstances do this Dynamic routing algorithms adjust in real time to changing They
indicates that network has by analyzing incoming routIng update messages If the message change sends These occurred the routing software recalculates routes and out new routing update messages
their and their messages permeate the network stimulating routers to rerun algorithms change
routing tables accordingly
Routing Basics 2-5 Routing Algorithms
be Dynamic routing algorithms may supplemented with static routes where appropriate For
router last example of resort router to which all unroutable packets are sent may be designated
This router acts as repository for all unroutable packets ensuring that all messages are at least handled in some way
SinglePath or Multipath Some sophisticated routing protocols support multiple paths to the same destination These
multipath algorithms permit traffic multiplexing over multiple lines single-path algorithms do not The of advantages multipath algorithms are obvious they can provide substantially better
throughput and reliability
Flat or Hierarchical
Some routing algorithms operate in flat space while others use routing hierarchies In flat routing
system all routers are peers of all others In hierarchical routing system some routers form what
amounts to routing backbone Packets from nonbackbone routers travel to the backbone routers
where they are sent through the backbone until they reach the general area of the destination At this
point they travel from the last backbone router through one or more nonbackbone routers to the final destination
often Routing systems designate logical groups of nodes called domains autonomous systems or
areas In hierarchical systems some routers in domain can communicate with routers in other while others domains can only communicate with routers within their domain In very large networks additional hierarchical levels may exist Routers at the highest hierarchical level form the routing backbone
The primary advantage of hierarchical routing is that it mimics the organization of most companies
and therefore their supports traffic patterns very well Most network communication occurs within small company groups domains Intradomain routers only need to know about other routers within
their their domain so routing algorithms can be simplified Depending on the routing algorithm
being used routing update traffic can be reduced accordingly
Host-lDtelligent or RouterluteUIigent
Some routing algorithms assume that the source end-node will determine the entire route This is referred usually to as source routing In source-routing systems routers merely act as store-and- forward devices mindlessly sending the packet to the next stop
Other algorithms assume that hosts know nothing about routes In these algorithms routers
determine the the internetwork based their calculations path through on own In the first system the hosts have the routing intelligence In the latter system routers have the routing intelligence
The trade-off between host-intelligent and router-intelligent routing is one of path optimality versus
traffic overhead Host-intelligent systems choose the better routes more often because they typically
discover all the possible routes to destination before the packet is actually sent They then choose
the best based that path on particular systems definition of optimal The act of determining all often routes however requires substantial discovery traffic and significant amount of time
Iritradomain or luterdomain
Some routing algorithms work only within domains others work within and between domains The nature of these two algorithm types is different It stands to reason therefore that an optimal intradomain routing algorithm would not necessarily be an optimal interdomain routing algorithm
2-6 Internetworking Technology Overview Routing Algorithms
Link State or Distance Vector
flood information to all Link state algorithms also known as shortest path first algorithms routing
of the table that nodes in the internetwork However each router sends only that portion routing
describes the state of its own links Distance vector algorithms also known as Bellman-Ford
but to its algorithms call for each router to send all or some portion of its routing table only while distance vector neighbors In essence link state algorithms send small updates everywheie routers algorithms send larger updates only to neighboring
link are somewhat less to routing loops Because they converge more quickly state algorithms prone
than distance vector algorithms On the other hand link state algorithms require more Cpu power
and memory than distance vector algorithms Link state algorithms can therefore be more expensive both well in most to implement and support Despite their differences algorithm types perform
circumstances
Metrics
select the best route But Routing tables contain information used by switching software to how
tables built What is the nature of the information they contain specifically are routing specific others How do routing algorithms determine that one route is preferable to
the best route Routing algorithms have used many different metrics to determine Sophisticated
selection metrics them in single hybrid routing algorithms can base route on multiple combining
metric All of the following metrics have been used
Path length
Reliability
Delay
Bandwidth
Load
Communication cost
Path Length
allow network Path length is the most common routing metric Some routing protocols
link In this is the sum of administrators to assign arbitrary costs to each network case path length define metric that the costs associated with each link traversed Other routing protocols hop count
as routers that packet must specifies the number of passes through internetworking products such
take en route from source to destination
Reliability
refers to the usually described in terms Reliability in the context of routing algorithms reliability down more often than others of the bit-error rate of each network link Some network links may go than other links Once down some network links may be repaired more easily or more quickly Any
in the of reliability ratings Reliability ratings reliability factors can be taken into account assignment
links network administrators are typically arbitrary are usually assigned to network by They numeric values
Routing Basics 2-1 Routed vs Routing Protocols
Delay
Routing delay refers to the length of time required to move packet from source to destination
through the internetwork Delay depends on many factors including the bandwidth of intermediate network the each links port queues at router along the way network congestion on all intermediate
network links and the physical distance to be travelled Because it is conglomeration of several
important variables delay is common and useful metric
Bandwidth
Bandwidth refers the to available traffic capacity of link All other things being equal lOMbps Ethernet link would be preferable to 64-kbps leased line Although bandwidth is rating of the maximum attainable throughput on link routes through links with greater bandwidth do not
better necessarily provide routes than routes through slower links If for example faster link is much the actual busier time required to send packet to the destination may be greater through the fast link
Load
Load refers to the to which network degree resource such as router is busy Load may be
calculated in of utilization variety ways including CPU and packets processed per second Monitoring these parameters on continual basis can itself be resource intensive
Communication Cost
Communication cost is another metric important Some companies may not care about performance as much as care about they operating expenditures Even though line delay might be longer they will
send packets over their own lines rather than lines that will through public cost money for usage time
Routed vs Routng Protocos
Confusion about the terms routed protocol and routing protocol is common Routed protocols are
that routed protocols are over an internetwork Examples of such protocols are the Internet Protocol DECnet IP AppleTalk NetWare OSI Banyan VINES and Xerox Nttwork System XNS Routing that protocols are protocols implement routing algorithms Put simply they route routed protocols an internetwork through Examples of these protocols include Interior Gateway Routing Protocol IGRPEnhanced Interior Gateway Routing Protocol EIGRP Open Shortest Path First OSPF Exterior Gateway Protocol EGPBorder Gateway Protocol BGP OSI RoutingAdvanced Peer to-Peer Intermediate Networking System to Intermediate System IS-IS and Routing Information Protocol Routed and RIP routing protocols are discussed in detail later in this publication
2-8 Internetworking Technology Overview CHAPTER
Bridging Basics
Background
Bridges became commercially available in the early 1980s At the time of their introduction bridges
connected and enabled packet forwarding between homogeneous networks More recently bridging
between different networks has also been defined and standardized
Several kinds of bridging have emerged as important Transparent bridging is found primarily in
Ethernet environments Source-route bridging is found primarily in Token Ring environments
Translational bridging provides translation between the formats and transit principles of different combines the media types usually Ethernet and Token Ring Source-route transparent bridging
algorithms of transparent bridging and source-route bridging to allow communication in mixed
EthernetlToken Ring environments
in routers has taken The diminishing price and the recent inclusion of bridging capability many
that have survived include features substantial market share away from pure bridges Those bridges and such as sophisticated filteringpseudo-intelligent path selection high throughput rates Although
an intense debate about the benefits of bridging versus routing raged in the late 1980s most people
now agree that each has its place and that both are often necessary in any comprehensive
internetworking scheme
nternetworking Device Comparison
network There Internetworking devices offer communication between local area LAN segments and These are four primary types of internetworking devices repeaters bridges routers gateways which devices can be differentiated very generally by the Open System Interconnection OS layer at
they establish the LAN-to-LAN connection Repeaters connect LANs at OSI layer bridges connect
LANs at layer routers connect LANs at layer and gateways connect LANs at layers through and the Each device offers the functionality found at its layers of connection uses functionality
of all lower layers This idea is portrayed graphically in Figure 3-1
Bridging Basics 3-1 Technology Basics
End node __ I__End node End__ node End node ______I______I______Bridge ______Repeater ______I______
End node End node End node Gateway End node ___ I___ I___ I______Router ______ri I__I______
3-1 Figure Internetworking Product Functionality
TechnoHogy Bascs
Bridging occurs at the link which controls data layer flow handles transmission errors provides
physical as to and opposed logical addressing manages access to the physical medium Bridges provide these functions various by using link-layer protocols that dictate specific flow control error handling and media-access addressing algorithms Examples of popular link-layer protocols include Ethernet Token Ring and FDDI
Bridges are not devices complicated They analyze incoming frames make forwarding decisions based information on contained in the frames and forward the frames toward the destination In
some cases for example source-route bridging the entire path to the destination is contained in each frame In other cases for example transparent bridging frames are forwarded one hop at time toward the destination See Chapter 30 Source-Route Bridging and Chapter 29 Transparent Bridging respectively for more information source-route on bridging and transparent bridging
Upper-layer protocol transparency is of Because primary advantage bridging bridges operate at the link are not to examine layer they required upper-layer information This means that they can
forward traffic rapidly representing any network-layer protocol It is not uncommon for bridge to
move AppleTalk DECnet TCP/IP XNS and other traffic between two or more networks
are of frames based Bridges capable filtering on any layer fields For example bridge can be
to all programmed reject not forward frames sourced from particular network Since link-layer information often includes reference to an upper-layer protocol bridges can usually filter on this
filters can be parameter Further helpful in dealing with unnecessary broadcast and multicast packets
3-2 Internetworking Technology Overview Types of Bridges
several By dividing large networks into self-contained units bridges provide advantages First
diminishes the traffic because only some percentage of traffic is forwarded the bridge experienced
by devices on all connected segments Second the bridge acts as firewall for some potentially between number of damaging network errors Third bridges allow for communication larger extend devices than would be supported on any single LAN connected to the bridge Fourth bridges
stations that not the effective length of LAN permitting attachment of distant were previously connected
Types of Brdges
characteristics Bridges can be grouped into categories based on various product Using one popular
direct connection classification scheme bridges are either local or remote Local bridges provide
between multiple LAN segments in the same area Remote bridges connect multiple LAN segments
shown in in different areas usually over telecommunications lines These two configurations are
Figure 3-2
Ethernet
bridging
Figure 3-2 Local and Remote Bridging
One of these is the difference Remote bridging presents several unique internetworking challenges between LAN and wide area network WAN speeds Although several fast WAN technologies are
are often an now establishing presence in geographically dispersed internetworks LAN speeds
order of magnitude faster than WAN speeds Vastly different LAN and WAN speeds sometimes from over the WAN prevent users running delay-sensitive LAN applications
for Remote bridges cannot improve WAN speeds but can compensate speed discrepancies through
transmission rate wishes to sufficient buffering capability If LAN device capable of 3-Mbps
communicate with device on remote LAN the local bridge must regulate the 3-Mbps data stream
the data in so that it does not overwhelm the 64-kbps serial link This is done by storing incoming
serial link accommodate This on-board buffers and sending it over the serial link at rate the can the can be achieved only for short bursts of data that do not overwhelm bridges buffering capability
divided the OSI link into two The Institute of Electrical and Electronic Engineers IEEE has layer Media Control and the link control separate sublayers the Access MAC sublayer logical LLC token sublayer The MAC sublayer permits and orchestrates media access for example contention flow passing or others while the LLC sublayer is concerned with framing control error control
and MAC-sublayer addressing
networks Some bridges are MAC-layer bridges These devices bridge between homogeneous for
different example IEEE 802.3 and IEEE 802.3 Other bridges can translate between link-layer The basic mechanics of such translation are protocols for exampleIEEE 802.3 and IEEE 802.5
shown in Figure 3-3
Bridging Basics 3-3 Types of Oridges
Host Host
Bridge
LLC PKT
Link MAC 802.3 PKTW8O2.5 PKT
Physical
CJ
Figure 3-3 IEEE 802.3/IEEE 002.5 BrIdging
In the figure the IEEE 802.3 host Host formulates packet containing application information
and encapsulates the packet in an IEEE 802.3compatible frame for transit over the IEEE 802.3
medium to the bridge At the bridge the frame is stripped of its IEEE 802.3 header at the MAC of the link sublayer layer and is subsequently passed up to the LLC sublayer for further processing
After this processing the packet is passed back down to an IEEE 802.5 implementation which
encapsulates the packet in an IEEE 8025 header for transmission on the IEEE 802.5 network to the IEEE 802.5 host Host
bridges translation between networks of different types is never perfect because it is likely that
network will one support certain frame fields and protocol functions not supported by the other network Many bridging translation issues are discussed in more detail in Chapter 31 Mixed-Media Bridging
3-4 Internetworkirig Technology Overview iSc TE
Network Management Basics
Background
in the of network As companies The early 1980s saw tremendous expansion area deployment
realized the cost benefits and productivity gains created by network technology they began adding network technologies and networks and expanding existing networks almost as rapidly as new
the from this expansion were being felt products were introduced By mid-1980s growing pains
that had different and incompatible network especially by those companies deployed many
technologies
associated with network are network operation The primary problems expansion day-to-day network each new network technology management and strategic growth planning Specifically
and maintain In the 1980s strategic planning for the requires its own set of experts to operate early alone for large growth of these networks became nightmare The staffing requirements managing
created crisis for Automated network management heterogeneous networks many organizations network across diverse including what is typically called capacity planning integrated
environments became an urgent need
to most network architectures and This chapter describes technical features common management
functional of as defined by the International protocols It also presents the five areas management
Organization for Standardization ISO
Network Management Architecture
and set of End Most network management architectures use the same basic structure relationships and other network devices run software stations managed devices such as computer systems
Problems are recognized when one or allowing them to send alerts when they recognize problems these entities are more user-determined thresholds are exceeded Upon receiving alerts management
all of of actions including programmed to react by executing one several or group
Operator notification
Event logging
System shutdown
Automatic attempts at system repair
stations check the values of certain variables Polling can Management entities can also poll end to these are be automatic or user initiated Agents in the managed devices respond to polls Agents
about the devices in which they reside store software modules that compile information managed
and it or reactively to management this information in management database provide proactively via network Well-known entities within network management systems management protocol Network Protocol and network management protocols include the Simple Management SNMP
Network Management Basics 4-1 The ISO Network Management Model
Common Management Information Protocol CMIP Management proxies are entities that provide
management information on behalf of other entities typical network management architecture is
shown in Figure 4-1
Network management system
4qKtty
Network management
protocol
Managed devices
Figure 4-1 Typical Network Management Architecture
The SO Network Management ModeD
The ISO has contributed great deal to network standardization .Their network management model
is the for primary means understanding the major functions of network management systems This model consists of five conceptual areas
Performance management
Configuration management
Accounting management
Fault management
Security management
Performance Management
The of is to and make available goal performance management measure various aspects of network
performance so that internetwork performance can be maintained at an acceptable level Examples
of variables that be include network performance might provided throughput user response times
and line utilization
4-2 lnternetworking Technology Overview The ISO Network Manaqement Model
Performance management involves several steps
Gather performance data on those variables of interest to network administrators
Analyze the data to determine normal baseline levels
thresholds for each variable such that exceeding Determine appropriate performance important of these thresholds indicates network problem worthy of attention
When threshold is Management entities continually monitor performance variables performance
exceeded an alert is generated and sent to the network management system
of the to reactive When performance Each of the steps just described is part process setup system exceeded user-defined the reacts by sending becomes unacceptable by virtue of an threshold system methods For network message Performance management also permits proactive example will affect metrics Such simulation can be used to project how network growth performance
so that counteractive simulation can effectively alert administrators to impending problems
measures can be taken
ConfiglJraton Management
network and information The goal of configuration management is to monitor system configuration versions of hardware and software elements can so that the effects on network operation of various elements have be tracked and managed Because all hardware and software operational quirks
information is to flaws or both that might affect network operation such important maintaining
smooth-running network
associated with it For an Each network device has variety of version information example follows engineering workstation might be configured as
Operating system version 3.2
Ethernet interface version 5.4
TCP/IP software version 2.0
NetWare software version 4.1
NFS software version 5.1
Serial communications controller version 1.1
X.25 software version 1.0
SNMP software version 3.1
information in database for access When Configuration management subsystems store this easy
clues that solve the problem occurs this database can be searched for might help problem
Accountng Management
that individual is to measure network utilization so The goal of accounting management parameters network be Such regulation minimizes network or group uses of the can regulated appropriately be out based on resource capacities and problems because network resources can apportioned
maximizes the fairness of network access across all users
is to the first toward accounting management As with performance management step appropriate of the results insight into measure utilization of all important network resources Analysis provides
be set at this Some correction will be required to current usage patterns Usage quotas can point
Network Management Basics 4-3 The ISO Network Management Model
reach optimal access practices From that point on ongoing measurement of resource use can yield
billing information as well as information used to assess continued fair and optimal resource utilization
Fault Management
The goal of fault management is to detect log notify users of and to the extent possible
automatically fix network problems in order to keep the network running effectively Because faults downtime can cause or unacceptable network degradation fault management is perhaps the most widely implemented of the ISO network management elements
Fault management involves several steps
Determine problem symptoms
Isolate the problem
Fix the problem
Test the fix on all important subsystems
Record the problems detection and resolution
Security Management
The goal of security management is to control access to network resources according to local
guidelines so that the network cannot be sabotaged intentionally or unintentionally and sensitive
information cannot be accessed by those without appropriate authorization For example security
management subsystem can monitor users logging onto network resource refusing access to those
who enter inappropriate access codes
Security management subsystems work by partitioning network resburces into authorized and unauthorized For areas some users access to any network resources is inappropriate Such users are usually company outsiders For other internal network users access to information originating
from particular department is inappropriate For example access to human resource files is
inappropriate for most users outside the human resource department
Security management subsystems perform several functions
Identify sensitive network resources including systems files and other entities
Determine mappings between sensitive network resources and user sets
Monitor access points to sensitive network resources
Log inappropriate access to sensitive network resources
4-4 Internetworking Technology Overview
Ethernet/i EEE 8023
Background
in the 1970s Ethernet was developed by Xerox Corporations Palo Alto Research Center PARC released Ethernet was the technological basis for the IEEE 802.3 specification which was initially and in 1980 Shortly thereafter Digital Equipment Corporation Intel Corporation Xerox
and released Ethernet that is Corporation jointly developed an specification Version 2.0 Ethernet and IEEE 8023 maintain the substantially compatible with IEEE 802.3 Together currently
share of local-area network the term Ethernet is often greatest market any LAN protocol Today that used to refer to all carrier sense multiple access/collision detection CSMA/CD LANs 802.3 generally conform to Ethernet specifications including IEfiE
middle between low- When it was developed Ethernet was designed to fill the ground long-distance
networks data at for speed networks and specialized computer-room carrying high speeds very
limited distances Ethernet is well suited to applications where local communication medium must
traffic at data rates carry sporadic occasionally heavy high peak
EthernetflEEE 802.3 Compar son
Stations on Ethernet and IEEE 802.3 specify similar technologies Both are CSMA/CD LANs
CSMA/CD LAN can access the network at any time Before sending data CSMA/CD stations
transmit waits If listen to the network to see if it is already in use If it is the station wishing to
stations listen for the network is not in use the station transmits collision occurs when two
and transmit In this both transmissions are network traffic hear none simultaneously case determine when the damaged and the stations must retransmit at some later time Backoff algorithms know when must colliding stations retransmit CSMA/CD stations can detect collisions so they they
retransmit
Both Ethernet and IEEE 802.3 LANs are broadcast networks In other words all stations see all
station must examine frames regardless of whether they represent an intended destination Each
station is destination If the frame is to received frames to determine if the so passed higher
protocol layer for appropriate processing
Differences between Ethernet and IEEE 802.3 LANs are subtle Ethernet provides services
while IEEE 802.3 the corresponding to layers and of the OSI reference model specifies physical
the link but does not define logical layer layer and the channel-access portion of layer layer
in hardware the link control protocol Both Ethernet and IEEE 802.3 are implemented Typically
interface card in host or on physical manifestation of these protocols is either an computer circuitry
primary circuit board within host computer
Ethernet/IEEE 802.3 5-1 Physical Connections
Physical CoDnections
IEEE 802.3 specifies several different physical layers whereas Ethernet defines only one Each
IEEE 802.3 physical layer protocol has name that summarizes its characteristics The coded
components of an IEEE 802.3 physical-layer name are shown in Figure 5-1
Figure 5-1 IEEE 802.3 Physical-Layer Name Components
of summary Ethernet Version and IEEE 802.3 characteristics appears in Table 5-1
Table 5-1 Ethernet Version and IEEE 802.3 Physical Characteristics
Ethernet IEEE 802.3 Values Characteristic Value lOBaseS lOBase2 lUaseS lOBaseT lOBroad36
Data rate 10 10 10 10 10 Mbps
Signaling Baseband Baseband Baseband Baseband Baseband Broadband method
Maximum segment 500 500 185 250 100 1800
length Unshielded
twisted pair
Media 50-ohm 50-ohm 50-ohm Unshielded Unshielded 75-ohm
coax thick coax thick coax thin twisted pair twisted pair coax
Topology Bus Bus Bus Star Star Bus
Ethernet is most similar to IEEE 8023 lOBaseS Both of these protocols specify bus topology
network with connecting cable between the end stations and the actual network medium In the
case of Ethernet that cable is called transceiver cable The transceiver cable connects to
transceiver device attached to the physical network medium The IEEE 8023 configuration is much
the that the cable is referred attachment unit and same except connecting to as an interface AUI the transceiver is called medium attachment unit MAU In both cases the connecting cable
attaches to an interface board or interface circuitry within the end station
5-2 Internetworking Technology Overview Frame Formats
Frame Formats
Ethernet and IEEE 802.3 frame formats are shown in Figure 5-2
Ethernet
Field length
in bytes 46-1500
IEEE 802.3
Field length
in bytes 46-1 500
Destination Source 802.2 header Preamble Length FCS address address and data
Cl
SOF Start-of-frame delimiter FCS Frame check sequence
Figure 5-2 Ethernet and IEEE 802.3 Frame Formats
Both Ethernet and IEEE 802.3 frames begin with an alternating pattern of ones and zeros called
preamble The preamble tells receiving stations that frame is coming
802.3 frame is The byte before the destination address in both an Ethernet and IEEE start-of-
frame delimiter This byte ends with two consecutive one bits which serve to synchronize the frame
reception portions of all stations on the LAN
the destination and Immediately following the preamble in both Ethernet and IEEE 802.3 LANs are
source address fields Both Ethernet and IEEE 802.3 addresses are six bytes long Addresses are
contained in hardware on the Ethernet and IEEE 802.3 interface cards The first three bytes of the
last three addresses are specified by the IEEE on vendor-dependent basis while the bytes are unicast specified by the Ethernet or IEEE 802.3 vendor The source address is always single node address while the destination address may be unicast multicast group or broadcast all nodes
This field In Ethernet frames the 2-byte field following the source address is type field specifies
the upper-layer protocol to receive the data after Ethernet processing is complete
which indicates In IEEE 802.3 frames the 2-byte field following the source address is length field
field the number of bytes of data that follow this field and precede the frame check sequence FCS
and Following the type/length field is the actual data contained in the frame After physical-layer
In the link-layer processing is complete this data will eventually be sent to an upper-layer protocol IEEE case of Ethernet the upper-layer protocol is identified in the type field In the case of 802.3
If data in the the upper-layer protocol must be defined within the data portion of the frame if at all
inserted frame is insufficient to fill the frame to its minimum 64-byte size padding bytes are to
ensure at least 64-byte frame
value The After the data field is four-byte FCS field containing cyclic redundancy check CRC
CRC is created by the sending device and recalculated by the receiving device to check for damage
that might have occurred to the frame in transit
Ethernet/iEEE 802.3 5-3 Frame Formats
5-4 Internetworking Technology Overview Token Ring/H EEE 8O25
Background
The Token Ring network was originally developed by IBM in the 970s It is still IBMs primary
local-area network LAN technology and is second only to Ethernet/IEEE 802.3 in general LAN
popularity The IEEE 802.5 specification is almost identical to and completely compatible with
IBMs Token Ring network In fact the IEEE 802.5 specification was modeled after IBM Token
Ring and continues to shadow IBMs Token Ring development The term Token Ring is generally
used to refer to both IBMs Token Ring network and IEEE 802.5 networks
Token Ring/il EEE 8O25 Comparison
Token Ring and IEEE 802.5 networks are basically quite compatible although the specifications
with all end stations differ in relatively minor ways IBMs Token Ring network specifies star attached to device called multistation access unit MSAU whereas IEEE 802.5 does not specify Other topology although virtually all IEEE 802.5 implementations also are based on star while differences exist including media type IEEE 802.5 does not specify media type IBM Token
Ring networks use twisted pair and routing information field size Figure 6-1 summarizes IBM
Token Ring network and IEEE 802.5 specifications
Token Ring/IEEE 802.5 6-1 Token Passing
IBM Token Ring network IEEE 802.5
Data rates 4.16 Mbps 4.16 Mbps
260 shielded
twisted pair Stations/segment 250 72 unshielded
twisted_pair
Topology Star Not specified
Media Twisted pair Not specified
Signaling Baseband Baseband
Access method Token passing Token passing
Differential Differential Encoding Manchester Manchester
Figure 6-1 IBM Token Ring Network/IEEE 802.5 Comparison
Token Passing
Token Ring and IEEE 802.5 are the primary examples of token-passing networks Token-passing
networks move small frame called token around the network Possession of the token grants the
right to transmit If node receiving the token has no information to sendit simply passes the token
to the next end station Each station can hold the token for maximum period of time
If station possessing the token does have information to transmit it seizes the token alters one bit
of the token which turns the token into start-of-frame sequence appends the information it
wishes to transmit and finally sends this information to the next station on the ring While the
information frame is circling the ring there is no token on the network unless the ring supports early
token release so other stations wishing to transmit must wait Therefore collisions cannot occur in
Token Ring networks If early token release is supported new token can be released when frame
transmission is completed
The information frame circulates the ring until it reaches the intended destination station which
copies the information for further processing The information frame continues to circle the ring and
is finally removed when it reaches the sending station The sending station can check the returning
frame to see whether the frame was seen and subsequently copied by the destination
Unlike CSMAICD networks such as Ethernet token-passing networks are deterministic In other
it is calculate the maximum time that will before end station words possible to pass any will be able
to transmit This feature and several reliability features which are discussed in Fault Management
Mechanisms later in this chapter make Token Ring networks ideal for applications where delay
must be predictable and robust network operation is important Factory automation environments
are examples of such applications
6-2 Internetworking Technology Overview Physical Connections
Physicab Connections
IBM Token Ring network stations are directly connected to MSAUs which can be wired together
to form one large ring as shown in Figure 6-2 Patch cables connect MSAUs to adjacent MSAUs
Lobe cables connect MSAUs to stations MSAUs include bypass relays for removing stations from
the ring
Figure 6-2 IBM Token Ring Network Physical Connections
Priority System
that certain Token Ring networks use sophisticated priority system permits user-designated high- Token frames have two fields that control priority stations to use the network more frequently Ring
priority the priority field and the reservation field
value contained in token can seize Only stations with priority equal to or higher than the priority stations with that token Once the token is seized and changed to an information frame only
the token for the next priority value higher than that of the transmitting station can reserve pass of the around the network When the next token is generated it includes the higher priority reserving the after their station Stations that raise tokens priority level must reinstate previous priority
transmission is complete
Token Ring/IEEE 802.5 6-3 Fault Management Mechanisms
FauR Management Mechaffisms
Token Ring networks employ several mechanisms for detecting and compensating for network
faults For example one station in the Token Ring network is selected to be the active monitor This
which can be station the station potentially any on network acts as centralized source of timing
information for other ring stations and performs variety of ring maintenance functions One of
these functions is the removal of continuously circulating frames from the ring When sending
device its frame continue circle fails may to the ring This can prevent other stations from
their frames and transmitting own essentially lock up the network The active monitor can detect such them from the frames remove ring and generate new token
The IBM Token networks Ring star topology also contributes to overall network reliability Since
all information in Token Ring network is seen by active MSAUs these devices can be programmed
to check for and problems selectively remove stations from the ring if necessary
Token called Ring algorithm beaconing detects and tries to repair certain network faults
Whenever station detects serious problem with the network such as cable break it sends beacon frame The beacon frame defines failure domain which includes the station reporting the
failure its nearest active upstream neighbor NAUN and everything in between Beaconing initiates process called autoreconfiguration where nodes within the failure domain automatically
perform diagnostics in an attempt to reconfigure the network around the failed areas Physically the
MSAU can accomplish this through electrical reconfiguration
Frame Format
Token Ring networks define two frame types tokens and data/command frames Both formats are
shown in Figure 6-3
Data/command frame Field length nbytes
Start Access Frame Destination End Source address Data FCS delimiter control control address delimiter
Token
Start Access End
delimiter control delimiter
Figure 6-3 IEEE 802.5/Token Ring Frame Formats
Tokens
Tokens are three bytes in length and consist of start delimiter an access control byte and an end delimiter
The start delimiter serves to alert each station to the arrival of token or data/command frame
This field includes signals that distinguish the byte from the rest of the frame by violating the
encoding scheme used elsewhere in the frame
6-4 Internetworking Technology Overview Frame Format
The access control byte contains the priority and reservation fields as well as token bit used to
differentiate token from data/command frame and monitor bit used by the active monitor to
determine whether frame is circling the ring endlessly
Finally the end delimiter signals the end of the token or data/command frame It also contains bits
to indicate damaged frame and frame that is the last in logical sequence
Data/Command Frames
frames Data/command frames vary in size depending on the size of the information field Data carry and information for upper-layer protocols command frames contain control information have no
data for upper-layer protocols
In data/command frames frame control byte follows the access control byte The frame control
byte indicates whether the frame contains data or control information In control frames this byte
information specifies the type of control
Following the frame control byte are the two address fields which identify the destination and
source stations As with IEEE 8023 addresses are six bytes in length
The data field follows the address fields The length of this field is limited by the ring token holding time which defines the maximum time station may hold the token
This field is filled the Following the data field is the frame check sequence FCS field by source
destination station recalculates station with calculated value dependent on the frame contents The
in transit If the frame is the value to determine whether the frame may have been damaged so discarded
As with the token the end delimiter completes the data/command frame
Token Ring/IEEE 802.5 6-5 Frame Format
6-6 Internetworking Technology Overview CHAPTER
Fiber Distributed Data nter1ace
Background
The Fiber Distributed Data Interface FDDI standard was produced by the ANSI X3T9 .5 standards
committee in the mid-i 980s During this period high-speed engineering workstations were
beginning to tax the capabilities of existing local-area networks LANs primarily Ethernet and
needed that could these workstations and their Token Ring new LAN was easily support new
distributed applications At the same time network reliability was becoming an increasingly
important issue as system managers began to migrate mission-critical applications from large
computers to networks FDDI was developed to fill these needs
After completing the FDDI specification ANSI submitted FDDI to the International Organization
for Standardization ISO ISO has created an international version of FDDI that is completely
compatible with the ANSI standard version
Today although FDDI implementations are not as common as Ethernet or Token Ring FDDI has
gained substantial following that continues to increase as the cost of FDDI interfaces diminishes
FDDI is frequently used as backbone technology as well as means to connect high-speed
computers in local area
TechnoHogy Bascs
transmission medium FDDI specifies 100-Mbpstoken-passing dual-ring LAN using fiber-optic
It defines the physical layer and media-access portion of the link layer and so is roughly analogous
to IEEE 802.3 and IEEE 802.5 in its relationship to the OSI reference model
networks Although it operates at faster speeds FDDI is similarin many ways to Token Ring The two
share many features including topology ring media-access technique token passing reliability features beaconing for example and others Refer to Chapter Token Ring/IEEE 802.5 for more information on Token Ring and related technologies
medium One of FDDIs most important characteristics is its use of optical fiber as transmission does Optical fiber offers several advantages over traditional copper wiring including security fiber
emit electrical that is to electrical interference not signals can be tapped reliability fiber immune
and speed optical fiber has much higher throughput potential than copper cable
multimode FDDI defines use of two types of fiber single mode sometimes called monomode and
Modes be of bundles of the fiber at Single-mode can thought as light rays entering particular angle fiber allows fiber allows only one mode of light to propagate through the fiber while multimode
multiple modes of light to propagate through the fiber Because multiple modes of light propagating them to through the fiber may travel different distances depending on the entry angles causing arrive at the destination at different times phenomenon called modal dispersion singlemOde to fiber Due fiber is capable of higher bandwidth and greater cable run distances than multimode
7-1 Data interface Fiber Distributed FOOl Specifications
these characteristics single-mode fiber is often used for campus backbones while multimode fiber is often used for workgroup connectivity Multimode fiber uses light-emitting diodes LEDs as the
light-generating devices while single-mode fiber generally uses lasers
FDW Specfcatons
FDDI is defined four by separate specifications see Figure 7-1
Media Access Control MACDefines how the medium is accessed including frame format
token handling addressing algorithm for calculating cyclic redundancy check value and error
recovery mechanisms
Physical Layer Protocol Defines data encoding/decoding procedures clocking requirements framing and other functions
Physical Layer Medium DependentDefines the characteristics of the transmission medium
including the fiber-optic link power levels bit error rates optical components and connectors
Station ManagementDefines the FDDI station configuration ring configuration and ring
control features including station insertion and removal initialization fault isolation and
recovery scheduling and collection of statistics
Logical Link Control
Media Access Control
Station FDDI Physical Layer Protocol Management standards
Physical Layer Medium
Figure 1-1 FDDI Standards
Physca Connections
FDDI specifies the use of dual rings Traffic on these rings travels in opposite directions Physically
the rings consist of two or more point-to-point connections between adjacent stations One of the
two FDDI rings is called the primary ring the other is called the secondary ring The primary ring
is used for data transmission while the secondary ring is generally used as backup
Class or single-attach stations SAS attach to one ring Class or dual-attach stations DAS
attach to both rings SASs are attached to the primary ring through concentrator which provides
connections for multiple SASs The concentrator ensures that failure or power down of any given
SAS does not interrupt the ring This is particularly useful when PCs or similar devices that power
on and off frequently connect to the ring
7-2 Internetworking Technology Overview Traffic Types
typical FDDI configuration with both DASs and SASs is shown in Figure 7-2
Figure 7-2 FDDI Nodes DAS SAS and Concentrator
Each FDDI DAS has two portsdesignated and These ports connect the station to the dual FDDI
ring Therefore each port provides connection for both the primary and the secondary ring as
shown in Figure 7-3
FDDI DAS
Figure 7-3 FDDI DAS Ports
Traffic Types
it ideal for of different FDDI supports real-time allocation of network bandwidth making variety
of traffic and application types FDDI provides this support by defining two types synchronous
asynchronous Synchronous traffic can consume portion of the lOO-Mbps total bandwidth of an
FDDI network while asynchronous traffic can consume the rest Synchronous bandwidth is
allocated to those stations requiring continuous transmission capability Such capability is useful for
transmitting voice and video information for example Other stations use the remaining bandwidth
asynchronously FDDIs SMT specification defines distributed bidding scheme to allocate FDDI bandwidth
scheme Each station is Asynchronous bandwidth is allocated using an eight-level priority assigned
where stations an asynchronous priority level FDDI also permits extended dialogues may mechanism lock out temporarily use all asynchronous bandwidth FDDIs priority can essentially
stations that cannot use synchronous bandwidth and have too low an asynchronous priority
Fiber Distributed Data Interface 7-3 Fault-Tolerant Features
FauRToerant Features
FDDI provides number of fault-tolerant features The primary fault-tolerant feature is the dual ring
If station on the dual ring fails or is powered down or if the cable is damaged the dual ring is
into in In this automatically wrapped doubled back onto itself single ring as shown Figure 7-4
figure when Station fails the dual ring is automatically wrapped in Stations and forming
single ring Although Station is no longer on the ring network operation continues for the
remaining stations
Station
Station
Failed station
Station
Figure 14 Station Failure Ring Recovery Configuration
Figure 7-5 shows how FDDI compensates for wiring failure Stations and wrap the ring within
themselves when wiring between them fails
7-4 Internetworking Technology Overview Fault-Tolerant Features
Station
Station Station
Cl
Station
Figure 1-5 Failed Wiring Ring Recovery Configuration
the of failures When two ring failures As FDDI networks grow possibility multiple ring grows the into two occur the ring will be wrapped in both cases effectively segmenting ring separate rings that cannot communicate with each other Subsequent failures cause additional ring segmentation
be used to failed stations from Optical bypass switches can prevent ring segmentation by eliminating the ring This is shown in Figure 7-6
Fiber Distributed Data Interface 7-5 Frame Format
Station
Optical bypass switch
bypassed configuration
Station Station
Figure 7-6 Lisa of Optical Bypass Switch
Critical devices such as routers or mainframe hosts can use another fault-tolerant technique called dual additional homing to provide redundancy and help guarantee operation In dual-homing
situations the critical device is attached to two concentrators One pair of concentrator links is
declared the active the other link pair is declared passive The passive link stays in backup mode
until the primary link or the concentrator to which it is attached is determined to have failed When
this occurs the passive link is automatically activated
Frame Format
FDDI frame formats shown in Figure 7-7 are similar to those of Token Ring
7-6 Internetworking Technology Overview Frame Format
Data frame
Figure 1-1 FODI Frame Format
The preamble prepares each station for the upcoming frame
The start delimiter indicates the beginning of the frame It consists of signaling patterns that differentiate it from the rest of the frame
The frame control field indicates the size of the address fields whether the frame contains asynchronous or synchronous data and other control information
As with Ethernet and Token Ring FDDI addresses are six bytes The destination address field can contain unicast singular multicast group or broadcast every station address while the source address identifies the single station that sent the frame
The data field contains either information destined for an upper-layer protocol or control information
station As with Token Ring and Ethernet theframe check sequence FCSfield is filled by the source with calculated check value the contents The cyclic redundancy CRC dependent on frame destination station recalculates the value to determine whether the frame may have been damaged in transit If so the frame is discarded
The end delimiter contains nondata symbols that indicate the end of the frame
The frame status field allows the source station to determine if an error occurred and if the frame was recognized and copied by receiving station
Fiber Distributed Data Interface 7-1 Frame Format
1-8 Internetworking Technology Overview AP
HghSpeed Seriag Interface
Background
trend Local-area networks Increasing communication speeds are an undeniable networking LANs Local have recently moved into the 100-Mbps range with Fiber Distributed Data Interface FDDI
and distributed applications driving these speed increases include imaging video todays client-
will continue to drive rates in server data transmission applications Faster computer platforms up
the local environment as they make new high-speed applications possible
match the Higher-throughput wide-area network WAN pipes have been developed to ever-
increasing LAN speeds and to allow mainframe channel extension over WANs WAN technologies Service Network such as Frame Relay Switched Multimegabit Data SMDS Synchronous Optical
SONET and Broadband Integrated Services Digital Network Broadband ISDN or simply
to ensure that WANs are not BISDN take advantage of new digital and fiber-optic technologies communication areas See 13 significant bottleneck in end-to-end over large geographic Chapter information Frame Relay and Chapter 14 Switched Multimegabit Data Service for more on Frame Relay and SMDS respectively
and the wide-area data terminal With higher speeds being achieved in both the local environments these equipment DTE/data circuit-terminating equipment DCE interface that could bridge two worlds without becoming bottleneck became critical need Classical DTEIDCE interface that standards such as RS-232 and V.35 are not capable of supporting T3 digital WAN service
clear that DTEIDCE operates at 45 Mbps or similar rates By the late 1980s it was new protocol was needed
Cisco and The High-Speed Serial Interface HSSI is DTE/DCE interface developed by Systems links The HSSI T3plus Networking to address the need for high-speed communication over WAN HSSI So 150 of specification is available to any organization wishing to implement far over copies are the specification have been distributed and dozens of companies have implemented or currently
implementing an HSSI solution In less than three years HSSI has become de facto industry
standard
National Standards Institute Electronic Industries Association HSSI is now in the American ANSI
for formal standardization It has moved into the Consultative EIAITIA TR3O .2 committee recently International for Committee for International Telegraph and Telephone CCITT and Organization these bodies Standardization ISO organizations as well and is expected to be standardized by
TechnoHogy Bascs
to the HSSI defines both the electrical and the physical DTE/DCE interface It therefore corresponds
technical characteristics are summarized in physical layer of the OSI reference model HSSI Table 8-1
High-Speed Serial Interface 8-1 Technology Basics
Table 8-1 HSSI Technical Characteristics
Characteristic Value
Maximum signaling rate 52 Mbps
Maximum cable length 50 feet
Number of connector pins 50
Interface DTE-DCE
Electrical technology Differential ECL
Typical power consumption 610 mW
Topology Point-to-point
Cable type Shielded twisted pair
The maximum signaling rate of HSSI is 52 Mbps At this rate HSSI can handle the T3 speeds
of of fast the Channel -1 45 Mbps many todays WAN technologies Office OC-l speeds 52 of the and Mbps synchronous digital hierarchy SDH can easily provide high-speed connectivity between LANs such as Token Ring and Ethernet
The use of differential HSSI achieve data and emitter-coupled logic ECL helps high rates low noise levels has been ECL used in Cray interfaces for years and is also specified by the ANSI High- Parallel Performance Interface HIPPI communications standard for supercomputer LAN communications ECL is off-the-shelf technology that permits excellent retiming on the receiver
resulting in reliable timing margins
The flexibility of HSSIs clock and data signaling protocol makes user or vendor bandwidth allocation possible The DCE controls the clock by changing its speed or by deleting clock pulses
In this the way DCE can allocate bandwidth between applications For example PBX may require particular amount of bandwidth router another amount and channel extender third amount Bandwidth allocation is key to making T3 and other broadband services affordable and popular
HSSI uses subminiature FCC-approved 50-pin connector that is smaller than its V.35 counterpart To reduce the need for male-male and female-female adapters HSSI cable connectors are specified
as male The HSSI cable the uses same number of pins and wires as the Small Computer Systems
Interface SCSI-2 cable but the HSSI electrical specification is tighter
For high level of diagnostic input HSSI provides four loopback tests These tests are shown in
8-1 The first local cable Figure provides test as the signal loops back once it reaches the DTE port
The second test reaches the line of the local port DCE The third test reaches the line port of the
remote the fourth test is DCE Finally DCE-initiated test of the DTEs DCE port
8-2 Internetworking Technology Overview Technology Basics
DIE Local DCE
Cable test
DIE Local DCE
DCE test
Remote Local DCE DCE
Telco line test WAN ______
DIE Local DCE
DlEtest
Figure 8-1 HSSIs Four Loopback Tests
and The control is HSSI assumes peer-to-peer intelligence in the DCE DTE protocol simplified
with control available Both signals must be just two signals required DTE and DCE available
asserted before the data circuit is valid The DCE and DTE are expected to be able to manage the
networks behind their interfaces Reducing the number of control signals improves circuit reliability
by reducing the number of circuits that can fail
High-Speed Serial Interface 8-3 Technology Basics
8-4 Internetworking Technology Overview H-A 1- ER
Point4oPoint Protoco
Background
international research institutions In the late 980s the Internet large network connecting many
to growth in government agencies universities and private businesses began experience explosive Protocol The vast of these hosts were the number of hosts supporting the Internet IP majority Ethernet the most Most connected to local-area networks LANs of various types being common networks such as of the other hosts were connected through wide-area WANs X25-style public connected with that data networks PDNs Relatively few of these hosts were simple point-to-point oldest methods of data communications and is serial links Yet point-to-point links are among the connections For asynchronous RS-232-C almost every host supports point-to-point example
interfaces are essentially ubiquitous
the lack of standard Internet One reason for the small number of point-to-point IP links was Point-to-Point Protocol was to solve this problem In encapsulation protocol The PPP designed of IP links addition to solving the problem of standardized Internet encapsulation over point-to-point and of IF PPP was also designed to address other issues including assignment management
bit-oriented network protocol addresses asynchronous startlstop and synchronous encapsulation detection and negotiation for such multiplexing link configuration link quality testing error option and data PPP addresses capabilities as network-layer address negotiation compression negotiation Control Protocol and family of Network these issues by providing an extensible Link LCP and facilities PPP Control Protocols NCPs to negotiate optional configuration parameters Today besides IPX and DECnet supports other protocols IP including
PPP Components
serial links It has three main PPP provides method for transmitting datagrams over point-to-point
components
linksPPP the Data Link method for encapsulating datagrams over serial uses High-Level links See Control HDLC protocol as basis for encapsulating datagrams over point-to-point Link Control and Derivatives for more information on HDLC Chapter 11 Synchronous Data
data-link connection An extensible LCP to establish configure and test the
PPP is family of NCPs for establishing and configuring different network-layer protocols of designed to allow the simultaneous use multiple network-layer protocols
Point-to-Point Protocol 9-1 General Operation
GeneraH Operaton
In order to establish communications over point-to-point link the originating PPP first sends LCP
frames to configure and optionally test the data link After the link has been established and
optional facilities have been negotiated as needed by the LCP the originating PPP sends NCP frames
to choose and configure one or more network-layer protocols Once each of the chosen network-
layer protocols has been configured packets from each network-layer protocol can be sent over the
link The link will remain configured for communications until explicit LCP or NCP frames close
the link or until some external event occurs for example an inactivity timer expires or user intervenes
PhysicaD1ayer Requrements
PPP is capable of operating across any DTE/DCE interface for example EIA RS-232-C ETA
RS-422 ETA RS-423 and CCITT V.35 The only absolute requirement imposed by PPP is the
provision of duplex circuit either dedicated or switched that can operate in either an asynchronous
or synchronous bit-serial mode transparent to PPP link-layer frames PPP does not impose any
restrictions regarding transmission rate other than those imposed by the particular DTE/DCE
interface in use
The PPP Link Layer
PPP uses the principles terminology and frame structure of the International Organization for Standardizations ISOs HDLC procedures ISO 3309-1979 as modified by ISO
33091984/PDADI Addendum Startlstop transmission ISO 3309-1979 specifies the HDLC frame structure for use in synchronous environments ISO 3309 1984/PDAD1 specifies proposed modifications to ISO 3309-1979 to allow its use in asynchronous environments The PPP control
procedures use the definitions and control field encodings standardized in ISO 4335-1979 and ISO 4335-1979/Addendum 1-1979
The PPP frame format appears in Figure 9-1
Field length
in bytes Variable or
Flag Control Protocol Data Address FCS
Figure 9-1 PPP Frame Format
is Theflag sequence single byte and indicates the beginning or end of frame The flag sequence
consists of the binary sequence 01111110
The address field is single byte and contains the binary sequence 11111111 the standard broadcast
address PPP does not assign individual station addresses
The control field is single byte and contains the binary sequence 00000011 which calls for
transmission of user data in an unsequenced frame connectionless link service similar to that of Link Control Logical LLC Type is provided Refer to Chapter 11 Synchronous Data Link Control and Derivatives for more information on LLC types and frame types
9-2 Internetworking Technology Overview The PPP Link Control Protocol
The protocol field is two bytes and its value identifies the protocol encapsulated in the information
field of the frame The most up-to-date values of the protocol field are specified in the most recent Assigned Numbers Requestfor Comments RFC
The data field is zero or more bytes in length and contains the datagram for the protocol specified
in the protocol field The end of the information field is found by locating the closing flag sequence
and allowing two bytes for the FCS field The default maximum length of the information field is
1500 bytes By prior agreement consenting PPP implementations can use other values for the
maximum information field length
The frame check sequence FCS field is normally 16 bits two bytes By prior agreement detection consenting PPP implementations can use 32-bit four-byte FCS for improved error
The LCP can negotiate modifications to the standard PPP frame structure However modified
frames will always be clearly distinguishable from standard frames
The PPP L nk Contro Protoco
The PPP LCP provides method of establishingconfiguringmaintaining and terminating the point-
connection four distinct to-point LCP goes through phases
and Link establishment configuration negotiationBefore any network-layer datagrams for connection and example IP can be exchanged LCP must first open the negotiate configuration frame has been both parameters This phase is complete when configuration acknowledgment sent and received
Link quality determinationLCP allows an optional link quality determination phase following
the link establishment and configuration negotiation phase In this phase the link is tested to
This is determine if the link quality is sufficient to bring up network-layer protocols phase
until this is optional LCP can delay transmission of network-layer protocol information phase
completed
finished the link Network-layer protocol configuration negotiation Once LCP has quality
the determination phase network-layer protocols can be separately configured by appropriate
it informs the NCP and can be brought up and taken down at any time If LCP closes the link
network-layer protocols so that they may take appropriate action
done the Link terminationLCP can terminate the link at any time This will usually be at
carrier the request of user but can happen because of physical event such as the loss of or
expiration of an idle-period timer
There are three classes of LCP frames
Link establishment framesUsed to establish and configure link
Link termination frames Used to terminate link
Link maintenance frames Used to manage and debug link
These frames are used to accomplish the work of each of the LCP phases
Point-to-Point Protocol 9-3 The PPP Link Control Protocol
9-4 Internetworking Technology Overview H-A 10
Integrated Services Digftal Network
Background
Services Network refers to set of services that are Integrated Digital ISDN digital becoming network that available to end users ISDN involves the digitization of the telephone so voice data end from text graphics music video and other source material can be provided to users single worldwide network end-user terminal over existing telephone wiring Proponents of ISDN imagine used and of much like the present telephone network except that digital transmission is variety new
services are available
and and ISDN is an effort to standardize subscriber services user/network interfaces network
level internetwork capabilities Standardizing subscriber services attempts to ensure of and intemational compatibility Standardizing the user/network interface stimulates development intemetwork marketing of these interfaces by third-party manufacturers Standardizing network and
that ISDN networks capabilities helps achieve the goal of worldwide connectivity by ensuring easily communicate with one another
IV additional ISDN applications include high-speed image applications such as Group facsimile
file and video telephone lines in homes to serve the telecommuting industry high-speed transfer
conferencing Voice of course will also be popular application for ISDN
North Many carriers are beginning to offer ISDN under tariff In America large local-exchange carriers LECs are beginning to provide ISDN service as an alternative to the connections
that bulk wide-area digital carrier facilities provided by telephone companies currently carry
telephone service WATS services
Components
ISDN components include terminals terminal adapters TAs network-termination devices line- termination equipment and exchange-termination equipment ISDN terminals come in two types Non-ISDN terminals Specialized ISDN terminals are referred to as terminal equipment type TEl referred terminal such as DTE that predate the ISDN standards are to as equipment type TE2
TE1s connect to the ISDN network through four-wire twisted-pair digital link TB2s connect to the
either be stand-alone device or ISDN network through terminal adapter The ISDN TA can
board inside the TE2 If the TE2 is implemented as stand-alone device it connects to the TA via
standard physical-layer interface for example EIA-232-C V.24 or V.35
Beyond the TEl and TE2 devices the next connection point in the ISDN network is the network
device These are network termination type NT1 or network termination type NT2 termination devices that connect the four-wire subscriber wiring to the conventional two-wire local device In most other loop In North America the NT1 is customer premises equipment CPE parts
The NT2 is more of the world the NT1 is part of the network provided by the carrier complicated
Integrated Services Digital Network 10-1 Services
device typically found in digital private branch that exchanges PBXs performs layer and
protocol functions and concentration services An NT1/2 device also exists it is single device that combines the functions of an NT1 and an NT2
number of reference points are in ISDN These reference specified points define logical interfaces between functional such TAs groupings as and NTis ISDN reference points include the reference point between non-ISDN and equipment TA the reference point between user terminals and the NT2 the reference point between Nil and NT2 devices and the reference point between
NT1 devices and line-termination in the carrier equipment network The reference point is relevant in only North America where the Nil function is not provided by the carrier network
sample ISDN configuration is shown in 10-1 This Figure figure shows three devices attached to an ISDN switch at the central office Two of these devices are ISDN-compatible so they can be attached an reference through point to Ni2 devices The third device astandard non-ISDN telephone attaches through the reference point to TA Any of these devices could also attach to NT1/2 device which would replace both the NT1 and the NT2 And although they are not shown similar user stations are attached to the right-most ISDN switch
TE2 device
standard telephone
Figure 10-1 Sample ISON Configuration
Se rv es
ISDNs Basic Rate Interface BRI service offers two channels and one channel 2BD BRI B-channel service at 64 and is operates kbps meant to carry user data BRI D-channel service
operates at 16 kbps and is meant to control carry and signaling information it although can support user data transmission under certain circumstances The channel signaling protocol comprises layers through of the OSI reference model BRI also provides for framing control and other
overhead bringing its total bit rate to 192kbps The BRJ physical layer specification is CCITT 1.430
10-2 Internetworking Technology Overview Layer
ISDN Primary Rate Interface PRI service offers 23 channels and one channel in North America and Japan yielding total bit rate of 1.544 Mbps the PRI channel runs at 64 kbps
ISDN PRI in Europe Australia and other parts of the world provides 30 plus one 64-kbps
channel and total interface rate of 2.048 Mbps The PRI physical-layer specification is CCITT 1.431
Layer
ISDN physical-layer layer frame formats differ depending on whether the frame is outbound
from terminal to network or inbound from network to terminal Both physical-layer interfaces
are shown in Figure 10-2 The frames are 48 bits long of which 36 bits represent data The bits used contention provide synchronization The bits adjust the average bit value The bits are for
resolution when several terminals on passive bus contend for channel The bit activates
devices The bits have not yet been assigned The Bl B2 and bits are for user data
Field length inbits 11 11111 111 111
B1 B2 Bi Ff LDL LDL
NT frame network to terminal
Field length In bits 11 11111 111 111
B2 B2 FL Bi EDS Bi EDS
TE frame terminal to network
Activation bit
Bi Bi channel bits
B2 B2 channel bits
channel bits 4000 frames/sec 16 kbps
Echo of previous bit
Framing bit
Load balancing Spare bit
Figure 10-2 ISDN Physical-Layer Frame Formats
circuit In this collisions Multiple ISDN user devices can be physically attached to one configuration determine can result if two terminals transmit simultaneously ISDN therefore provides features to E-bit link contention When an NT receives bit from the TE it echoes back the bit in the next transmitted bit position The TE expects the next bit to be the same as its last
Terminals cannot transmit into the channel unless they first detect specific number of ones
If the detects bit in the echo indicating no signal corresponding to pre-established priority TE This channel that is different from its bits it must stop transmitting immediately simple time After successful technique ensures that only one terminal can transmit its message at one
the terminal has its reduced it to detect more continuous message transmission priority by requiring
Integrated Services Digital Network 10-3 Layer
ones before transmitting Terminals may not raise their priority until all other devices on the same
line have had an opportunity to send message Telephone connections have higher priority than
all other services and signaling information has higher priority than nonsignaling information
Layer
Layer of the ISDN signaling protocol is LinkAccess Procedure channel also known as LAPD
LAPD is similar to High-Level Data Link Control HDLC and Link Access Procedure Balanced LAPB see Chapter 11 Synchronous Data Link Control and Derivatives and Chapter 12
.25 for more information on these protocols As LAPD acronym expansion indicates it is
used across the channel to ensure that control and signaling information flows and is received
properly LAPDs frame format see Figure 10-3 is very similar to that of HDLC and like HDLC
LAPD uses supervisory information and unnumbered frames The LAPD protocol is formally
specified in CCITT Q.920 and CCITT Q921
Field length
in bytes Variable
SAPI Service access point identifier bits C/R Command/response bit
EA Extended bits addressing CO TEl Terminal identifier endpoint Cl
Figure 10-3 LAPD Frame Format
The LAPD flag and control fields are identical to those of HDLC The LAPD address field can be
either one or two bytes long If the extended address bit of the first byte is set the address is one byte
if it is not set the address is two bytes The first address field byte contains the service access point
identUler SAPI which identifies the portal at which LAPD services are provided to layer The
C/R bit indicates whether the frame contains command or response The terminal end-point
identifier TEl field identifies either single terminal or multiple terminals TEl of all ones indicates broadcast
Layer
Two layer specifications are used for ISDN signaling CCITT 1.450 also known as CCITT Q.930
and CCITT 1.451 also known as CCITT .931 Together these protocols support user-to-user
circuit-switched and packet-switched connections variety of call establishment call termination
information and miscellaneous messages are specified including SETUP CONNECT RELEASE
USER INFORMATION CANCEL STATUS and DISCONNECT These messages are
10-4 Internetworking Technology Overview Layer
functionally similar to those provided by the X.25 protocol see Chapter 12 X.25 for more information Figure 1O-4from CCITT 1.451 shows the typical stages of an ISDN circuit-switched call
Router Calling Calling Called Called Called
call DTE DCE DCE DTE router
Pick up
Set up ACK
Call proceethn
Ringing lertiflg Aterting Pick up Connect
ConnecL_-i
Information Flow
Flow Information FloW Information
Disconnect
Disconnect
Release
leae complete Release complete
Figure 10-4 ISDN Circuit-Switched Call Stages
Integrated Services Digital rJetwork 10-5 Layer
10-6 Internetworking Technology Overview CHAPTER 11
Sync ron us ata Link Contro Derivatives
Background
in the mid-i 970s for in IBM developed the Synchronous Data Link Control SDLC protocol use of breed Systems Network Architecture SNA environments SDLC was the first an important new
of link-layer protocols based on synchronous bit-oriented operation Compared to synchronous
character-oriented for example Bisync from IBM and synchronous byte-count-oriented protocols
for example Digital Data Communications Message Protocol DDCMP from Digital Equipment and often faster Corporation bit-oriented synchronous protocols are more efficient more flexible
International After developing SDLC IBM submitted it to various standards committees The Link Control Organization for Standardization ISO modified SDLC to create the High-Level Data HDLC protocol The Consultative Committee for International Telegraph and Telephone CCITT Link subsequently modified HDLC to create Link Access Procedure LAP and then Access Procedure Balanced LAPB The Institute of Electrical and Electronic Engineers IEEE modified domain HDLC to create IEEE 802.2 Each of these protocols has become important in its own SDLC
remains SNAs primary link-layer protocol for wide-area network WAN links
Technoogy Basics
of link and It be used with and SDLC supports variety types topologies can point-to-point
and unbounded and transmission facilities multipoint links bounded media half-duplex full-duplex
and circuit-switched and packet-switched networks
SDLC identifies two types of network nodes
PrimaryControls the operation of other stations called secondaries The primary polls the
secondaries in predetermined order Secondaries can then transmit if they have outgoing data
links and the link while it is The primary also sets up and tears down manages operational
SecondaryAre controlled by primary Secondaries can only send information to the primary
but cannot do this unless the primary gives permission
basic SDLC primaries and secondaries can be connected in four configurations
Point-to-pointInvolves only two nodes one primary and one secondary
secondaries MultipointInvolves one primary and multiple
Synchronous Data Link Control and Derivatives 11-1 Frame Format
LoopInvolves ioop topology with the primary connected to the first and last secondaries Intermediate secondaries pass messages through one another as they respond to the primarys
requests
Hub go-aheadInvolves an inbound and an outbound channel The primary uses the outbound
channel to communicate with the secondaries The secondaries use the inbound channel to
communicate with the primary The inbound channel is daisy-chained back to the primary
through each secondary
Frame Format
The SDLC frame appears in Figure 11-1
Field length
in bytes or or Variable
Flag Address Control Data FCS Flag
Information
frame format
Receive Send Poll sequence sequence number final number
Supervisory frame format
Receive Poll Function sequence code number final
Unnumbered frame format
Function Poll Function code final code
Figure 11-1 SLJLC Frame Format
As the frames bounded figure shows SDLC are by unique flag pattern The address field always
contains the address of the involved secondary in the current communication Since the primary is either the communication source or destination there is no need to include the primarys address
it is already known by all secondaries
11-2 Internetworking Technology Overview Frame Format
The control field uses three different formats depending on the type of SDLC frame used The three
SDLC frames are described as follows
Information frames These frames carry upper-layer information and some control
information Send and receive sequence numbers and the poii final P/F bit perform flow and
error control The send sequence number refers to the number of the frame to be sent next The
receive sequence number provides the number of the frame to be received next Both the sender
and the receiver maintain send and receive sequence numbers The primary uses the P/F bit to
tell the secondary whether it requires an immediate response The secondary uses this bit to tell the primary whether the current frame is the last in its current response
Supervisory framesThese frames provide control information They request and suspend
transmission report on status and acknowledge the receipt of frames They do not have an information field
framesThese Unnumbered frames as the name suggests are not sequenced They are used control for control purposes For example they may specify either one- or two-byte field initialize secondaries and do other similar functions They may have an information field
The frame check sequence FCS precedes the ending flag delimiter The FCS is usually cyclic redundancy check CRC calculation remainder The CRC calculation is redone in the receiver If the result differs from the value in the senders frame an error is assumed
typical SDLC-based network configuration appears in Figure 11-2 As illustrated an IBM establishment controller formerly called cluster controller in remote site connects to dumb terminals and to Token Ring network In local site an IBM host connects via channel attach techniques to an IBM front-end processor FEP which can also have links to local Token Ring local-area networks LANs and an SNA backbone The two sites are connected through an SDLC based 56-kbps leased line
Synchronous Data Link Control and Derivatives 11-3 Derivative Protocols
Local site
Remote site
Figure 11-2 Typical SDLC-liased Network Configuration
Dervatve Protocos
the fact that it omits Despite several features used in SDLC HDLC is generally considered to be
compatible superset of SDLC LAP is subset of HDLC LAPB was created to ensure ongoing
compatibility with HDLC which had been modified in the early l980s IEEE 802.2 is modification
of HDLC for LAN environments Qualified Logical Link Control QLLC is link-layer protocol
defined by IBM that allows SNA data to be transported across X.25 networks
IC
shares HDLC SDLCs frame format and HDLC fields provide the same functionality as those in
SDLC Also like SDLC HDLC supports synchronous full-duplex operation
HDLC differs from SDLC in several minor ways First HDLC has an option for 32-bit checksum
And unlike SDLC HDLC does not support the loop or hub go-ahead configurations
11-4 Internetworking Technology Overview Derivative Protocols
difference The major between HDLC and SDLC is that SDLC supports only one transfer mode
while HDLC supports three The three HDLC transfer modes are as follows
Normal response mode NRM This transfer mode is used by SDLC In this mode secondaries
cannot communicate with primary until the primary has given permission
Asynchronous response mode ARM This transfer mode allows secondaries to initiate
communication with primary without receiving permission
Asynchronous balanced mode ABM ABM introduces the combined node combined node
can act as primary or secondary depending on the situation All ABM communication is
between multiple combined nodes In ABM environments any combined station may initiate data transmission without from other permission any
LAPB
is best known for its in the shares the frame LAPB presence X.25 protocol stack LAPB same format
frame types and field functions as SDLC and HDLC Unlike either of these however LAPB is stations restricted to the ABM transfer mode and so is appropriate only for combined Also LAPB circuits can be established by either the data terminal equipment DTE or the data circuit-
terminating equipment DCE The station initiating the call is determined to be the primary while
the responding station is the secondary Finally LAPB use of the P/F bit is somewhat different from
that of the other protocols See Chapter 12 X.25 for details on LAPB
IEEE 802.2
IEEE 802.2 is often referred to as Logical Link Control LLC It is extremely popular in LAN
environments where it interoperates with protocols such as IEEE 802.3 IEEE 802.4 and IEEE 802.5
IEEE 802.2 offers three types of service Type provides unacknowledged connectionless service
Type provides connection-oriented service Type provides acknowledged connectionless service
As an unacknowledged connectionless service LLC Type does not confirm data transfers Because
many upper-layer protocols such as Transmission Control Protocol/Internet Protocol TCP/IP offer reliable data transfer that can compensate for unreliable lower-layer protocols Type is commonly used service
LLC Type often called LLC2 service establishes logical connections between sender and
is found receiver and is therefore connection-oriented LLC2 acknowledges data upon receipt and in IBM communication systems
establish Although LLC Type service supports acknowledged data transfer it does not logical connections As compromise between the other two LLC services LLC Type is useful in factory
automation environments where error detection is important but context storage space for virtual
circuits is extremely limited
service End stations can support multiple LLC service types Class device supports only Type both Class II device supports both Type and Type service Class III devices support Type
and Type service while Class IV devices support all three types of service
The Upper-layer processes use IEEE 802.2 services through service access points SAPs IEEE
identifies the 802.2 header begins with destination service access point DSAP field which
receiving upper-layer process In other words after the receiving nodes IEEE 802.2 implementation
its identified in the field receives the completes processingthe upper-layer process DSAP remaining which data Following the DSAP address is the source service access point SSAP address
identifies the sending upper-layer process
Synchronous Data Link Control and Derivatives 11-5 Derivative Protocols
QLLc
the data link control that to data .25 QLLC provides capabilities are required transport SNA across
networks Together QLLC and X.25 replace SDLC in the SNA protocol stack
QLLC uses the packet-level layer layer of the .25 protocol stack To indicate that layer .25
packet must be handled by QLLC special bit called the qual/ler bit in the general format
ident/ler GFI of the layer X.25 packet-level header is set to one The SNA data is carried as user
data in Layer X.25 packets
For more information about the X.25 protocol stack see Chapter 12 X.25
11-6 Internetworking Technology Overview
CHAPTER 12
X25
Background
In the 1970s set of protocols was needed to provide users with wide-area network WAN
connectivity across public data networks PDNs PDNs such as TELENET and TYMNET had
achieved remarkable success but it was felt that protocol standardization would increase
and lower The result of subscription to PDNs by providing improved equipment compatibility cost
which is X.25 the ensuing development effort was group of protocols the most popular of
.25 formally referred to as the Consultative Committee for International Telegraph and Telephone
CCITT Recommendation X.25 was developed by the common carriers phone companies
is therefore essentially rather than any single commercial enterprise The specification designed to with the work well regardless of users system type or manufacturer Users contract common Services carriers to use their packet-switched networks PSNs and are charged based on PSN use
offered and charges levied are regulated by the Federal Communications Commission FCC
One of .25s unique attributes is its international nature .25 and related protocols are
administered by an agency of the United Nations called the International Telecommunications Union
ITU The CCITT is the ITU committee responsible for voice and data communications CCITT
members include the FCC the European Postal Telephone and Telegraph organizations the common
carriers and many computer and data communications companies As result X.25 is truly global standard
Technoogy Bascs
X.25 defines telephone network for data communications To begin communication one computer
calls another to request communication session The called computer can accept or.refuse the
connection If the call is accepted the two systems can begin full-duplex information transfer Either
side can terminate the connection at any time
interaction data terminal The X.25 specification defines point-to-point between equipment DTE
and data circuit-terminating equipment DCE DThs terminals and hosts in the users facilities connect to DCEs modems packet switches and other ports into the PDN generally located in the
carriers facilities which connect to packet switching exchanges PSEs or simply switches and
other DCEs inside PSN and ultimately to another DTE The relationship between the entities in
an X.25 network is shown in Figure 12-1
X.25 12-1 Technology Basics
PSN
Figure 12-1 X.25 Model
DTE can be terminal that does not implement the complete X.25 functionality DTE is
connected to DCE through translation device called packet assembler/disassembler PAD The
operation of the terminal-to-PAD interface the services offered by the PAD and the interaction between the PAD and the host are defined by CCITT Recommendations X.28 X.3 and X29
respectively
X.25 the reference model X.25 The specification maps to layers through of OSI Layer entities describes packet formats and packet exchange procedures between peer layer Layer defines .25 is implemented by Link Access Procedure Balanced LAPB LAPB packet framing
for the DTE/DCE link Layer X.25 defines the electrical and mechanical procedures for activating
and deactivating the physical medium connecting the DTE and the DCE This relationship is shown
in Figure 12-2 Note that layers and are also referred to as the ISO standards ISO 7776 LAPB
and ISO 8208 X.25 packet layer
Os X.25 reference model
User- Packet-
defined switching process network
X.25 4- Packet interface packet level
X.25 4- Frame interface frame level
X.25 Physical interface physical level
DTE DTE/DCE DCE
interface
Figure 12-2 X.25 and the OSI Reference Model
12-2 Internetworking Technology Overview Frame Format
End-to-end communication between DTEs is accomplished through bidirectional association
called virtual circuit Virtual circuits permit communication between distinct network elements number of intermediate through any nodes without the dedication of portions of the physical
medium that characterizes physical circuits Virtual circuits can either be permanent or switched
temporary Permanent virtual circuits are commonly called PVCs switched virtual circuits are called commonly SVCs PVCs are typically used for the most-often-used data transfers while SVCs
are used for sporadic data transfers Layer X.25 is concerned with end-to-end communication
involving both PVCs and SVCs
Once virtual circuit is established the DTE sends packet to the other end of the connection by
sending it to the DCE using the proper virtual circuit The DCE looks at the virtual circuit number
to determine how to route the packet through the X.25 network The layer X.25 protocol
multiplexes between all the DTEs served by the DCE on the destination side of the network and the
packet is delivered to the destination DTE
Frame Format
An X.25 frame is composed of series of fields as shown in Figure 12-3 Layer X.25 fields make
up an X.25 packet and include header and user data Layer X.25 LAPB fields include frame-
level control and the embedded addressing fields layer packet and frame check sequence FCS
Packet
Packet- User Layer data X.25 header
Frame level Layer Flag control and Data FCS Flag X.25 address
Frame 11
Layer Bit stream
Figure 12-3 X.25 Frame
Layer
channel The layer X.25 header is made up of generalformat identifier GET logical identifier the format of LCI and packet type identifier PIT The GFT is 4-bit field that indicates general
the packet header The LCT is 12-bit field that identifies the virtual circuit The LCI is locally
significant at the DTE/DCE interface In other words the PDN connects two logical chaelseach
circuit The PTI field with an independent LCI on two DTE/DCE interfaces to establish virtual
identifies one of X.25s 17 packet types
These Addressing fields in call setup packets provide source and destination DTE addresses are
used to establish the virtual circuits that constitute X.25 communication CCIII Recommendation
referred X.121 specifies the source and destination address formats X.121 addresses also to as
International Data Numbers or IDNs vary in length and can be up to 14 decimal digits long Byte
X.25 12-3 Frame Format
four in the call setup packet specifies the source DTE and destination DTE address lengths The first
code The DNIC is divided four digits of an IDN are called the data network identification DNIC
into two parts the first three digits specifying the country and the last specifying the PSN itself and used The remaining digits are called the national terminal number NTN are to identify the
specific DTE on the PSN The X.121 address format is shown in Figure 12-4
DNIC NTN
digits up to 10 digits btIs bits
Called DTE Calling DTE National
address address Country PSN terminal length length number
ci
International Data Number
Figure 124 X.121 Address Format
The addressing fields that make up the X.121 address are only necessary when an SVC is used and
then only during call setup Once the call is established the PSN uses the LCI field of the data packet
header to specify the particular virtual circuit to the remote DTE
Layer X.25 uses three virtual circuit operational procedures
Call setup
Data transfer
Call clearing
Execution of these procedures depends on the virtual circuit type being used For PVC layer
X.25 is always in data transfer mode because the circuit has been permanently established If an SVC
is used all three procedures are used
Data transfer is effected by data packets Layer X25 segments and reassembles user messages if
they are too long for the circuits maximum packet size Each data packet is given sequence
number so error and flow control can occur across the DTE/DCE interface
Layer
Layer .25 is implemented by LAPB LAPB allows both sides the DTE and the DCE to initiate
communication with the other During information transfer LAPB checks that the frames arrive at
the receiver in the correct sequence and error-free
12-4 Internetworking Technology Overview Frame Format
As with similar three link-layer protocols LAPB uses frame format types
frameThese frames Information carry upper-layer information and some control
information for necessary full-duplex operation Send and receive sequence numbers and the
final bit flow poll P/F perform control and error recovery The send sequence number refers to the number of the frame current The receive sequence number records the number of the frame
to be received next In full-duplex conversation both the sender and the receiver keep send and receive numbers sequence The poii bit is used to force final bit message in response this is
used for detection error and recovery
Supervisory framesThese frames provide control information They request and suspend
transmission report on status and acknowledge the receipt of frames They do not have an information field
Unnumbered framesThese frames as the name suggests are not sequenced They are used
for control purposes For example they may initiate connection using standard or extended disconnect the windowing modulo versus 128 link report protocol error or similar functions
The LAPB frame is shown in Figure 12-5
Field length Variable
in bytes
Figure 12-5 LAPB Frame
fields delimit Theflag the LAPB frame Bit stuffing is used to ensure that the flag pattern does not
occur within the body of the frame
The address field indicates whether the frame carries command or response
The control field further of command and provides qualifications response frames and also indicates the frame format or frame function for example receiver ready or disconnect and the
send/receive sequence number
The data field carries data Its size and format upper-layer vary depending on the layer packet type
The maximum length of this field is set by agreement between PSN administrator and the
subscriber at subscription time
The FCS field ensures the integrity of the transmitted data
Layer
Layer X.25 uses the X.21 bis physical-layer protocol which is roughly equivalent to RS-232-C
X.21 bis was derived from CCITT Recommendations V.24 and V.28 which identify the interchange
circuits and electrical characteristics respectively of DTE to DCE interface X.2l bis supports
point-to-point connections speeds of up to 19.2 kbps and synchronous full-duplex transmission
over four-wire media The maximum distance between DTE and DCE is 15 meters
X.25 12-5 Frame Format
12-6 Internetworking Technology Overview CHAPTER 13
Frame ReOay
Background
Frame Relay was originally conceived as protocol for use over ISDN interfaces and initial
proposals to this effect were submitted to the Consultative Committee for International Telegraph
and Telephone CCITT in 1984 Work on Frame Relay was also undertaken in the American
National Standards Institute ANSIaccredited Ti Si standards committee in the United States
There was major development in Frame Relays history in 1990 when Cisco Systems StrataCom
Northern Telecom and Digital Equipment Corporation formed consortium to focus Frame Relay
technology development and accelerate the introduction of interoperable Frame Relay products This
consortium developed specification conforming to the basic Frame Relay protocol being discussed
in Ti Si and CCITT but extended it with features that provide additional capabilities for complex
internetworking environments These Frame Relay extensions are referred to collectively as the local
management interface LMI
Technoogy Bas cs
Frame Relay provides packet-switching data communications capability that is used across the interface between devices user for example routers bridges host machines and network
equipment for example switching nodes User devices are often referred to as data terminal while equipment DTE network equipment that interfaces to DTE is often referred to as data
circuit-terminating equipment DCE The network providing the Frame Relay interface can be
either carrier-provided public network or network of privately owned equipment serving single
enterprise
As interface an to network Frame Relay is the same type of protocol as X.25 see Chapter 12
differs in its In X.25 However Frame Relay significantly from X.25 functionality and format
particular Frame Relay is more streamlined protocol facilitating higher performance and greater
efficiency
As an interface between user and network equipment Frame Relay provides means for statistically
data conversations virtual multiplexing many logical referred to as circuits over single physical
transmission link This contrasts with systems that use only time-division-multiplexing TDM
techniques for supporting multiple data streams Frame Relays statistical multiplexing provides
more flexible and efficient use of available bandwidth It can be used without TDM techniques or on
top of channels provided by TDM systems
Another important characteristic of Frame Relay is that it exploits the recent advances in wide-area
network WAN transmission technology Earlier WAN protocols such as X.25 were developed when
transmission and media links less analog systems copper were predominant These are much reliable
than the fiber media/digital transmission links available today Over links such as these link-layer
protocols can forego time-consuming error correction algorithms leaving these to be performed at
Frame Relay 13-1 LMI Extensions
higher protocol layers Greater performance and efficiency is therefore possible without sacrificing data integrity Frame Relay is designed with this approach in mind It includes cyclic redundancy check CRC algorithm for detecting corrupted bits so the data can be discarded but it does not include any protocol mechanisms for correcting bad data for example by retransmitting it at this
level of protocol
Another difference between Frame Relay and .25 is the absence of explicit per-virtual-circuit flow
control in Frame that Relay Now many upper-layer protocols are effectively executing their own flow control algorithms the need for this functionality at the link layer has diminished Frame Relay does not include flow therefore explicit control procedures that duplicate those in higher layers
Instead very simple congestion notification mechanisms are provided to allow network to inform
user device that the network resources are close to congested state This notification can alert
higher-layer protocols that flow control may be needed
Current Frame standards Relay address permanent virtual circuits PVCs that are administratively configured and managed in Frame Relay network Another type switched virtual circuits SVC5 has also been proposed The Integrated Services Digital Network ISDN signaling protocol is the proposed as means by which DTE and DCE will communicate to establish terminate and SVCs manage dynamically See Chapter 10 Integrated Services Digital Network for more
information on Both Ti Si and CCITT have work in include SVCs in ISDN progress to Frame Relay standards
LM Extensoris
In addition to the basic Frame Relay protocol functions for transferring data the consortium Frame
Relay specification includes LMI extensions that make supporting large complex intemetworks
easier Some LMI extensions are referred to as common and are expected to be implemented by
everyone who adopts the specification Other LMI functions are referred to as optional summary of the LMI extensions follows
Virtual circuit status messages common Provide communication and synchronization
between the network and the user device periodically reporting the existence of new PVCs and
the deletion of already existing PVCs and generally providing information about PVC integrity
Virtual circuit status messages prevent the sending of data into black holes that is over PVCs
that no longer exist
Multicasting optional Allows sender to transmit single frame but have it delivered by the
network to multiple recipients Thus multicasting supports the efficient conveyance of routing and protocol messages address resolution procedures that typically must be sent to many
destinations simultaneously
Global addressing optional Gives connection identifiers global rather than local significance be allowing them to used to identify specific interface to the Frame Relay network Global addressing makes the Frame Relay network resemble local-area network LAN in terms of address addressing resolution protocols therefore perform over Frame Relay exactly as they do over LAN
Simple flow control optionalProvides for an XON/XOFF flow control mechanism that
to the entire applies Frame Relay interface It is intended for those devices whose higher layers
cannot use the congestion notification bits and that need some level of flow control
13-2 Internetworking Technology Overview Frame Format
Frame Format
The Frame frame is shown in Relay Figure 13-1 Flags delimit the frames beginning and end the two Following leading flags are bytes of address information Ten bits of these two bytes make
the actual circuit ID the up called DLCI for data link connection identifier
Field length Variable
in bytes
Cl
Figure 13-1 Frame Relay Frame
The 10-bit DLCI value is the heart of the Frame Relay header It identifies the logical connection
that is into multiplexed the physical channel In the basic that is not extended by the LMI mode of
addressing DLCIs have local significance that is the end devices at two different ends of connection may use different DLCI to refer to that same connection Figure 13-2 provides an
of the example use of DLCIs in nonextended Frame Relay addressing
San Jose Pittsburgh
Cl
Figure 13-2 Frame Relay Addressing
In Figure 13-2 assume two PVCs one between Atlanta and Los Angeles and one between San Jose and Pittsburgh Los Angeles may refer to its PVC with Atlanta using DLCI 12 while Atlanta refers
to the same with 82 PVC DLCI Similarly San Jose may refer to its PVC with Pittsburgh using
DLCI 12 The network uses internal proprietary mechanisms to keep the two locally significant
PVC identifiers distinct
At the end of each DLCI is extended address byte an EA bit If this bit is one the current byte is the last DLCI All byte implementations currently use two-byte DLCI but the presence of the EA
bits means that longer DLCIs may be agreed upon and used in the future
The bit marked CIR following the most significant DLCI byte is currently not used
Frame Relay 13-3 LMI Message Format
Finally three bits in the two-byte DLCI are fields related to congestion control The forward explicit
congestion notification FECN bit is set by the Frame Relay network in frame to tell the DTE
receiving that frame that congestion was experienced in the path from source to destination The
backward notification explicit congestion BECN bit is set by the Frame Relay network in frames
traveling in the opposite direction from frames encountering congested path The notion behind
both of these bits is that the FECN or BECN indication can be promoted to higher-level protocol
that can take flow control action as appropriate FECN bits are useful to higher-layer protocols that
use receiver-controlled flow control while BECN bits are significant to those that depend on emitter-controlled flow control
The discard eligibility DE bit is set by the DTE to tell the Frame Relay network that frame has
lower importance than other frames and should be discarded before other frames if the network becomes short of resources Thus it represents very simple priority mechanism This bit is usually
set only when the network is congested
LM Message Format
The previous section described the basic Frame Relay protocol format for carrying user data frames The consortium Frame Relay specification also includes the LMI procedures LMI messages are sent
in frames distinguished by an LMI-specific DLCI defined in the consortium specification as
DLCI 1023 The LMI message format is shown in Figure 13-3
Field length
in bytes Variable
FCS Flag
Figure 13-3 LMI Message Format
In LMI messages the basic protocol header is the same as in normal data frames The actual LMI
message begins with four mandatory bytes followed by variable number of information elements The format and TEs encoding of LMI messages is based on the ANSI T1S1 standard
The first of the mandatory bytes unnumbered information indicator has the same format as the
LAPB unnumbered frame indicator with the bit set to the information UI poll/final zero See
section in Layer Chapter 12 X.25 for more information on LAPB The next byte is referred
to the as protocol discriminator which is set to value that indicates LMI The third mandatory
byte call reference is always filled with zeros
The final is mandatory byte the message type field Two message types have been defined Status- allow enquiry messages the user device to inquire about network status Status messages respond to
status-enquiry messages Keepalives messages sent through connection to ensure that both sides
will continue to regard the connection as active and PVC status messages are examples of these
and are the common features that be of messages LMI are expected to part every implementation that conforms to the consortium specification
and Together status status-enquiry messages help verify the integrity of logical and physical links
This information is critical in routing environment because routing algorithms make decisions
based on link integrity
the Following message type field is some number of lEs Each IE consists of single-byte JE IE ident/ler an length field and one or more bytes containing actual data
13-4 Internetworking Technology Overview IMI Message Format
Global Addressing
In addition to the common LMI features there are several optional LMI extensions that are
extension is extremely useful in an internetworking environment The first important optional LMI
global addressing As noted earlier the basic nonextended Frame Relay specification only
supports values of the DLCI field that identify PVCs with local significance In this case there are
no addresses that identify network interfaces or nodes attached to these interfaces Because these
addresses do not exist they cannot be discovered by traditional address resolution and discovery
techniques This means that with normal Frame Relay addressing static maps must be created to tell
routers which DLCIs to use to find remote device and its associated internétwork address
The global addressing extension permits node identifiers With this extension the values inserted in
the DLCI field of frame are globally significant addresses of individual end-user devices for
example routers This is implemented as shown in Figure 13-4
San Jose Pittsburgh
DLCI 12 DLCI 13
OLCI 14 DLCI 15
Los Angeles
Figure 13-4 Global Addressing Exchange
send frame In Figure 13-4 note that each interface has its own identifier Suppose Pittsburgh must
field and sends to San Jose San Joses identifier is 12so Pittsburgh places the value 12 in the DLCI
the frame into the Frame Relay network At the exit point the DLCI field contents are changed by
the network to 13 to reflect the frames source node As each routers interface has distinct value
in as its node identifier individual devices can be distinguished This permits adaptive routing
complex environments
Global addressing provides significant benefits in large complex internetwork The Frame Relay
the its like No to network now appears to routers on periphery any LAN changes higher-layer
protocols are needed to take full advantage of their capabilities
Frame Relay 13-5 Network Implementation
Muticast ig
is another valuable feature Multicast Multicasting optional LMI groups are designated by series of four reserved DLCI values 1019 to 1022 Frames sent by device using one of these reserved
DLCIs are replicated by the network and sent to all exit points in the designated set The multicasting
extension also defines LMI that devices of the messages notify user addition deletion and presence of multicast groups
In networks that take advantage of dynamic routing routing information must be exchanged among routers with many Routing messages can be sent efficiently by using frames multicast DLCI This
allows to be sent to messages specific groups of routers
Network mpementaton
Frame be used Relay can as an interface to either publicly available carrier-provided service or to network of privately owned equipment typical means of private network implementation is to
traditional equip multiplexers with Frame Relay interfaces for data devices as well as non-Frame
interfaces for Relay other applications such as voice and video-teleconferencing Figure 13-5 shows
this configuration
Frame Relay interface
Ti -Frame Relay MUXnterface
Co
Non-Frame Relay interface
Video/teleconference
Ethernet
Figure 13-5 Hybrid Frame Relay Network
13-6 Internetworking Technology Overview Network Implementation
public Frame Relay service is deployed by putting Frame Relay switching equipment in the central offices of telecommunications carrier In this case users may realize economic benefits
traffic-sensitive relieved from charging rates and are from the work necessary to administer and maintain the network equipment and service
In either type of network the lines that connect user devices to the network equipment may operate
at speed selected from broad range of data rates Speeds between 56 kbps and Mbps are typical
although Frame Relay can support lower and higher speeds Implementations capable of operating over 45-Mbps DS3 links are expected to be available soon
Whether in public or private network the support of Frame Relay interfaces to user devices does not necessarily dictate that the Frame Relay protocol is used between the network devices No
standards for interconnecting equipment inside Frame Relay network currently exist Thus
traditional circuit-switching packet-switching or hybrid approach combining these technologies
can be used
Frame Relay 13-7 Network Implementation
13-8 Internetworking Technology Overview CHAPTER 14
Swftched Muftimegabft Data Service
Background
service for Switched Multimegabit Data Service SMDS is packet-switched datagram designed
wide-area data communications offers data that will be very high speed SMDS throughputs initially in in the 1- to 34-Mbps range and is being deployed in public networks by the carriers response to
two trends The first trend is the proliferation of distributed processing and other applications that
require high-performance networking The second trend is the decreasing cost and high-bandwidth
potential of fiber media making support of such applications over wide-area network WAN
viable
SMDS is described in series of specifications produced by Bell Communications Research
Beilcore and adopted by the telecommunications equipment providers and carriers One of these
which is the between user specifications describes the SMDS Interface Protocol SIP protocol and network device referred to as customer premises equipment or CPE SMDS equipment
The SIP is based on an IEEE standard protocol for metropolitan area networks MANs that is the
IEEE 802.6 Distributed Queue Dual Bus DQDB standard Using this protocol CPE such as routers
can be attached to an SMDS network and use SMDS service for high-speed intemetworking
Technogy Bascs
this to is Figure 14-1 shows an internetworking scenario using SMDS In figure access SMDS
provided over either 1.544-Mbps DS-1 or Digital Signal or 44.736-Mbps DS-3 or Digital fiber-based DS-l Signal transmission facility Although SMDS is usually described as service with access may be provided over either fiber or copper-based media sufficiently good error network and the customers characteristics The demarcation point between the carriers SMDS referred the subscriber network equipment is to as interface SNI
Switched Multimegahit Data Service 14-1 Addressing
Ethernet
DS-3 access
Ethernet CU
Figure 14-1 SMDS Internetworking Scenario
data units SMDS are capable of containing up to 9188 octets bytes of user information SMDS is
therefore capable of encapsulating entire IEEE 802.3 IEEE 802.4 IEEE 802.5 and FDDI frames
The size is large packet consistent with the high-performance objectives of the service
Addressing
Like other datagram protocols SMDS data units carry both source and destination address The
recipient of data unit can use the source address to return data to the sender and for functions such address as resolution discovering the mapping between higher-layer addresses and SMDS SMDS addresses addresses are 10-digit addresses that resemble conventional phone numbers
In addition SMDS supports group addresses that allow single data unit to be sent and then delivered the by network to multiple recipients Group addressing is analogous to multicasting on local-area networks LANs and is valuable feature in internetworking applications where it is
used for address and widely routing resolution dynamic discovery of network resources such as file servers
SMDS offers several other addressing features Source addresses are validated by the network to
that the ensure address in question is legitimately assigned to the SNI from which it originated Thus
users are protected against address spoofing that is sender pretending to be another user Source and destination address screening is also possible Source address screening acts on addresses as
data units are leaving the network while destination address screening acts on addresses as data
units are entering the network If the address is disallowed the data unit is not delivered With
14-2 Internetworking Technology Overview Access Classes
address screening subscriber can establish private virtual network that excludes unwanted traffic This provides the subscriber with an initial security screen and promotes efficiency because devices
attached to SMDS do not have to waste resources handling unwanted traffic
Access CHasses
To accommodate of traffic range requirements and equipment capabilities SMDS supports
variety of access classes Different access classes determine the various maximum sustained
information transfer well rates as as the degree of burstiness allowed when sending packets into the SMDS network
On DS-3-rate interfaces access classes are implemented through credit management algorithms
which track credit balances for each customer interface Credit is allocated on periodic basis up maximum the to some Then credit balance is decremented as packets are sent to the network
The of operation the credit management.scheme essentially constrains the customers equipment to sustained some or average rate of data transfer This average rate of transfer is less than the full
information carrying bandwidth of the DS-3 access facility Five access classes corresponding to
sustained information rates of 10 1625 and 34Mbps are supported for DS-3 access interface
The credit management scheme is not applied to DS-1-rate access interfaces
SMDS nterface ProtocoH SP
Access to the network is via is SMDS accomplished SIP The SIP based on the DQDB protocol
specified by the IEEE 802.6 MAN standard The DQDB protocol defines Media Access Control
that allows MAC protocol many systems to interconnect via two unidirectional logical buses
As designed by IEEE 802.6 the DQDB standard can be used to construct private fiberbased MANs
supporting variety of applications including data voice and video This protocol was chosen as
the basis for SIP because it was an open standard could support all the SMDS service features was designed for compatibility with carrier transmission standards and is aligned with emerging
standards for Broadband ISDN BISDN As BISDN technology matures and is deployed the
carriers intend to support not only SMDS but broadband video and voice services as well
To interface to SMDS networks only the connectionless data portion of the IEEE 802.6 protocol is needed SIP does Therefore not define voice or video application support
When used to gain access to an SMDS network operation of the DQDB protocol across the SNI
results in an access DQDB The term access DQDB distinguishes operation of DQDB across the SNI
from operation of DQDB in any other environment such as inside the SMDS network switch in
the network SMDS operates as one station on an access DQDB while customer equipment operates as one or more stations on the access DQDB
Because the DQDB protocol was designed to support variety of data and nondata applications and
because it is shared medium access control protocol it is relatively complex It has two parts
The protocol syntax
The distributed queuing algorithm that constitutes the shared medium access control
Switched Multimegabit Data Service 14-3 SMDS Interface Protocol SIP
CPE Configurations
There are two possible configurations of CPE on the SMDS access DQDB see Figure 14-2 In
single-CPE configuration the access DQDB simply connects the switch in the carrier network and one subscriber-owned station CPE In multi-CPE configuration the access DQDB consists of the
switch in the network and multiple interconnected CPE at the subscriber site In this latter
configuration all CPE must belong to the same subscriber
Single CPE
BusA
Bus
cJ
Figure 14-2 Single-CPE and Multi-CPE Configurations
In the single-CPE case the access DQDB is essentially just two-node DQDB subnetwork Each of nodes the the switch and the CPE transfer data to the other via unidirectional logical bus There
is no contention for this bus since there are no other stations Because of this the distributed
queueing algorithm need not be used Without the complexity of the distributed queuing algorithm
SIP for single-CPE configurations is much simpler than SIP for multi-CPE configurations
SP Leves
The SIP can be logically partitioned into three levels as shown in Figure 14-3
14-4 Internetworking Technology Overview SMDS Interface Protocol SIP
SMDS SDU
SIP level PDU HDR TRLR /N
SIP level PDU HDR TRLR HDR TRLR1 HDR TRLR1
HDR Header
PDU Protocol data unit
SDU Service data unit
TRLR Trailer
Figure 14-3 Encapsulation of User Information by SIP Levels
LeveI3
SIP level involves the operation encapsulation of SMDS service data units SDUs in level
header and trailer Level protocol data units PDUs are then broken into level PDUs as
appropriate to conform to level specifications
The SIP level PDU is reasonably complex It is shown in Figure 14-4
Number of octets Field length
in bytes bits bits 12 9188 04
lnfo1 RSVD BAsize DA HEL BEtag SA HE CRC Lenh HI Pad RSVDBEtag
BEtag Beginning-end tag BAsize Buffer allocation size
CRC Cyclic redundancy check DA Destination address
HE Header extension
HEL Header extension length
HLPI Higher-layer protocol identifier
lnfoPad Information padding to ensure that this field ends on 32-bit boundary SA Source address RSVD Reserved Carried across network unchanged
Figure 14-4 SIP Level PDU
Fields marked in the figure are not used in the provision of SMDSbut are present in the protocol
to ensure alignment of the SIP format with the DQDB protocol format Values placed in these fields by the CPE must be delivered unchanged by the network
Switched Multimegabit Data Service 14-5 SMDS Interface Protocol SIP
The two reserved fields must be populated with zeros The two BEtag fields contain an identical
value and are used to form an association between the first and last segments or level PDUs of
SIP level PDU These fields can be used to detect the condition where the last segment of one level
PDU and the first segment of the next level PDU are both lost resulting in receipt of an invalid level PDU
The BAsize field contains the buffer allocation size
and The destination and source addresses consist of two parts an address type an address In both
cases the address type occupies the four most significant bits of the field If the address is
destination address the address type may be either 1100 or 1110 The former indicates 60-bit
individual address the latter indicates 60-bit group address Tithe address is source address the
address type field can only indicate an individual address
Bellcore Technical Advisories specify how addresses consistent in format with the North American
Numbering Plan NANP are to be encoded in the source and destination address fields In this case
the four most significant bits of each of the source and destination address subfields contain the value
0001 which is the internationally defined country code for North America The next 40 bits
contains the binary coded decimal BCDencoded values of the 10-digit SMDS NANP-aligned
addresses The final 16 least-significant bits are populated with ones for padding
The higher-layer protocol identifier field indicates what type of protocol is encapsulated in the
information field This value is important to systems using the SMDS network such as Cisco
routers but is not processed or changed by the SMDS network
The header extension length HEL field indicates the number of 32-bit words in the header
extension field Currently the size of this field for SMDS is fixed at 12 bytes Therefore the HEL
value is always 0011
The header extension HE held is currently identified as having two uses One is to contain an
SMDS version number which is used to determine what version of the protocol is being used The
other use is to convey carrier selection value providing the ability to select particular
carrier interexchange to carry SMDS traffic from one local carrier network to another In the future other information may be defined to be conveyed in the header extension field if required
The CRC field contains cyclic redundancy check value
LeveI2
Level PDUs are segmented into uniformly sized 53-octet level PDUs often referred to as slots
or cells The format of the SIP level PDU is shown in Figure 14-5
Field length
in bits 32 14 352 10
Header Trailer
Figure 14-5 SIP Level PDU
14-6 Internetworking Technology Overview SMDS Interface Protocol SIP
The access control field of the SIP level PDU contains different values depending on the direction
of information flow If the slot is sent from the switch to the CPE only the indication of whether the
PDU contains information or not is important If the slot was sent from the CPE to the switch and
if the is configuration multi-CPE this field can also carry request bits that indicate bids for slots on
the bus from the switch going to the CPE Further detail on how these request bits are used to
implement distributed queuing media access control can be obtained from the IEEE 802.6 standard
The network control information field can contain only two possible values One particular bit
pattern is included when the PDU contains information another is used when it does not
The field segment type indicates whether this level PDU is the beginning slot the last slot or slot from the middle of level PDU Segment type values are shown in Table 14-1
Table 14-1 Segment Type Values
Value Meaning
00 Continuation of message
01 End of message
10 Beginning of message
11 Single segment message
The ID field allows association of level message PDUs with level PDU The message ID is the same for all segments of given level PDU On multi-CPE access DQDB level PDUs
originating from different CPE must have different message IDs This allows the SMDS network
receiving interleaved slots from different level PDUs to associate each level PDU with the
correct level PDU Successive level PDUs from the same CPE may have identical message IDs This since presents no ambiguity any single CPE must send all level PDUs from one level PDU
before it begins sending level PDUs of different level PDU
The segmentation unit field is the data portion of the PDU In the event of an empty level PDU
this field is populated with zeros
The field payload length indicates how many bytes of level PDU are actually contained in the
unit field segmentation If the level PDU is empty this field is also populated with zeros
the field contains 10-bit check value used Finally payload CRC cyclic redundancy CRC to detect the errors over segment type message ID segmentation unit payload length and payload CRC
fields This CRC does not cover the access-control or network-control information fields
Level
SIP level the provides physical link protocol which operates at DS-3 or DS-1 rates between the
CPE and the network SIP level is divided into two parts the transmission system sublayer and the
Physical Layer Convergence Protocol PLCP The transmission system sublayer defines the
characteristics and method of attachment to the transmission link that is the DS-3 or DS-1 The
PLCP how the level specifies PDUs or slots are to be arranged relative to the DS-3 or DS-1 frame and defines certain management information
the is Because SIP based on IEEE 802.6 it has the advantage of compatibility with future BISDN
interfaces that will support not only data but video and voice applications as well However this
compatibility does cost some protocol overheadwhich must be taken into account when calculating
overall data throughput that can be achieved using SIP Over DS-3 access DQDB the total
bandwidth available for level PDU user data is approximately 34 Mbps Over DS- access
approximately 1.2 Mbps can carry user data
Switched Multimegabit Data Service 14-7 SMDS Interface Protocol SIP
The use of the IEEE 802.6 MAN MAC protocol as the basis for the SMDS SIP means that local communication between CPE on the same access DQDB is possible Some of this local communication will be visible to the switch serving the SNI and some will not The switch therefore must use the destination address of data unit to differentiate between data units intended for
SMDS-based transfer and data units intended for local transmission among multiple CPE sharing an access DQDB
Network mpementaton
Inside the carrier network the high-speed packet-switching capability required by SMDS can be number of provided by different technologies In the near term switches based on MAN such the technology as DQDB standard are being included in number of networks series of Technical Advisories Beilcore produced by specify standard requirements on network equipment for such functions as the following
Network operations
Usage measurement for billing
Interface between local carrier network and long-distance carrier network
Interface between two switches inside the same carriers network
Customer network management
As has been noted the IEEE 802.6 and SIP protocol were intentionally designed to align with the BISDN referred principal protocol to as Asynchronous Transfer Mode ATM ATM and IEEE 802.6 belong to class of often referred to protocols as fast packet-switching or cell relay protocols These information protocols organize into small fixed-size cells level PDUs in SIP terminology Fixed-
size cells can be and switched in hardware processed at very high speeds This tightly constrains
delay characteristics cell useful making relay protocols for video and voice applications As ATM based switching equipment becomes available this technology will also be introduced into networks providing SMDS
14-8 Internetworking Technology Overview CHAPTER 15
Asynchronous Transfer Mode
Background
The foundational elements of Asynchronous Transfer Mode ATM were first synthesized by
researchers at ATT Bell Laboratories and France Telecoms Research Center in the early to mid
980s These researchers were interested in packetizing voice information so that one switching
fabric could be used for both data and voice Researchers believed that device capable of
packetizing and switching voice information would have to move at least one million packets per
second with millisecond-range queuing delays Because no existing packet-switching technology
was capable of these speeds the researchers were forced to consider new paradigms
researchers realized that scale Early ATM incorporating very large integration VLSI technology
into fabric enabled switches examine the of header and switching to and process contents packet
provide memory for buffering In particular the switch could quickly direct information through the
network after analyzing simple addresses contained in packet headers The researchers concluded
that networks of these switches could with minimal conceivably achieve very high performance delay
Another concept that was critical to the development of ATM was switching technique called fast
in that packet switching Fast packet switches differ from X.25-like packet-switching systems they
minimize storing processing and forwarding activity at each link For example error control and
flow control are performed on an end-to-end rather than on link-by-link basis By reducing the
activities at each link additional throughput is possible
As initially designed fast packet-switching systems handled variable-length packets The final
technical contribution toATMs development was the modification of fast packet switching to handle
small fixed-length packets called cells Short cells reduce queuing delay and increase the ability of
system elements to operate in parallel Fixed-size cells limit delay variance and ease buffer
allocation Limited delay variance is particularly important for supporting real-time traffic such as voice or video conversations
For wide-area networking ATM is currently being standardized for use in Broadband Integrated
Services Digital Networks BISDNs by the Consultative Committee for International Telegraph and Telephone CCITT and the American National Standards Institute ANSI Officially the ATM
layer of the BISDN model is defined by CCITT 1.36 one of many BISDN specifications
Although ATM was designed with wide-area networks WANs in mind many experts believe that another widespread use of ATM will be in campus network applications Local-area network LAN
managers need high throughput and improved scalability for network-intensive distributed
applications Large end users with low-delay high-bandwidth applications are seeking new network
technologies that can quickly move variety of source material for example data voice image and video between remote locations ATM has many of the characteristics these users want
Asynchronous Transfer Mode 15-1 Technology Basics
To promote ATM interoperability based on standards Cisco Systems and three other companies
NET/ADAPTIVE Northern Telecom and Sprint founded the ATM Forum in the fall of 1991 This
organization which now has over 300 members helps ensure ATM implementation compatibility
through various activities including publication of the ATM User-Network Interface Specfi cation
Tech noogy Basics
ATM is cell-switching and multiplexing technology that combines the benefits of circuit switching
constant transmission delay guaranteed capacity with those of packet switching flexibility
efficiency for intermittent traffic Like .25 and Frame Relay ATM defines the interface between
the user equipment and the network referred to as the User-Network Interface or UNJ This
definition supports the use of ATM switches and ATM switching techniques within both public and
private networks
Because it is an asynchronous mechanism ATM differs from synchronous transfer mode STM methods where time-division multiplexing TDM techniques are employed to preassign users to
time slots ATM time slots are made available on demand with labels identifying the source of the
transmission contained in each ATM cell TDM is inefficient relative to ATM because if station
has to transmit when its nothing time slot comes up that time slot is wasted The converse situation where station has lots one of information to transmit is also less efficient In this case that station
transmit when its can only turn comes up even though all the other time slots are empty With ATM station send labeled can cells whenever necessary Figure 15-1 contrasts TDM and ATM
multiplexing techniques
1DM Time slots
11/21/3 j/1 12/3/4/1 12/3/4/1 /21/3L4/1 IJ
Station data
fl Nothing to send
With TDM station can send only during preassigned time slot
ATM Cells
//p////PvIYP//1
Station data
Nothing to send
With station send labeled ATM can cells whenever necessary
15-1 Figure TDM and ATM Multiplexing Techniques
Another critical ATM design characteristic is its star topology The ATM switch acts as hub in the
with all ATM network devices attached directly This provides all the traditional benefits of star-
topology networks including easier troubleshooting and support for network configuration changes and additions
15-2 Internetworking Technology Overview Technology Basics
fabric Furthermore ATMs switching provides additive bandwidth As long as the switch can handle
the cell transfer additional aggregate rate connections to the switch can be made The total
bandwidth of the increases If switch cells system accordingly can pass among all its interfaces at the full rate of all interfaces it is described as nonbiocking For example an ATM switch with 16 ports each at 155 megabits second would about per Mbps require 2.5 gigabits per second Gbps aggregate throughput to be nonbiocking
consists of three functional ATM layersthe ATM physical layer the ATM layer and the ATM
adaptation to layerthat correspond roughly layer and parts of layer such as error control and data framing of the Open System Interconnection OSI reference model
The first layer is the ATM The physical layer ATM physical layer controls transmission and receipt
of bits on the medium It also track physical keeps of ATM cell boundaries and packages cells into
the of frame for the medium appropriate type physical being used Above the physical layer is the
ATM layer which is for responsible establishing virtual connections and passing ATM cells through the ATM network above the Immediately ATM layer is the ATM adaptation layer The ATM
translates between the adaptation layer larger service data units SDUs for example video streams and data of packets upper-layer processes and ATM cells Several ATM adaptation layers are and currently specified they are analyzed later in this chapter Finally aboe the ATM adaptation are layer higher-layer protocols representing traditional transports and applications
ATM Physica Layer
The ATM is divided into physical layer two parts the physical medium sublayer and the transmission convergence sublayer The physical medium sublayer is responsible for sending and
continuous flow of bits with receiving associated timing information to synchronize transmission
and Because it includes reception only physical-medium-dependent functions its specification depends on the physical medium used
can use medium ATM any physical capable of carrying ATM cells Some existing standards that can cells SONET carry ATM are Synchronous Optical Network/SDH DS-3/E3 100-Mbps local fiber
physical and local fiber Channel FDDI layer 55-Mbps Fiber physical layer Various proposals for use over twisted pair are also under consideration
The transmission convergence sublayer is responsible for the following
Cell delineationMaintains ATM cell boundaries
Header control error sequence generation and verificationGenerates and checks header
error control code to ensure valid data
Cell rate decouplingInserts or suppresses idle unassigned ATM cells to adapt the rate of valid ATM cells to the payload capacity of the transmission system
Transmission frame adaptationPackages ATM cells into frames acceptable to the particular
physical-layer implementation
Transmission frame generation and recoveryGenerates and maintains the appropriate
physical-layer frame structure
ATM Layer
The is ATM layer responsible for establishing connections and passing cells through the ATM network To do this it uses the information contained in the ATM cells Each ATM cell consists of
48 octets of payload and five octets of header information The five header octets contain
information the the identifying path through network as well as congestion indicators the payload
type and other parameters The payload portion carries upper-layer information
Asynchronous Transfer Mode 15-3 Technology asics
An ATM cell is shown in Figure 15-2 The header begins with bits of generic flow control GFC
information This field can be used to provide standardized local functions such as media access
control when multiple stations share single switch port Values within this field are not carried end
to end and are overwritten by the ATM network
Field length 48
in octects
Field length in bits 16 31
GFC Generic flow control
VPI Virtual path identifier
Vol Virtual channel identifier
PT Payload type Call loss CLP priority HEC Header error control
Figure 15-2 ATM Cell
Following the GFC field the ATM specification calls for bits of virtual path identUler VPI
information and 16 bits of virtual channel identifier VCI information These two fields are commonly referred to as one called the VPI/VCI field or value
Together the VPI and VCI provide ATM with two connection concepts virtual channel is simply
the classical notion of the virtual circuit providing logical connection between two users virtual
path defines bundle of virtual channels along some segment of their route through the network Many virtual channels can use the same virtual path
Using two-part connection identifier helps speed operations at each link Once virtual path is
established adding another virtual channel to that path involves very little overhead In addition
number of data transport functions such as traffic management can be performed at the virtual path
level simplifying the network architecture
ATM virtual connections are formed by linking VPIIVCI values on different ports as illustrated in
Figure 15-3 When cell with VPJJVCI 29 arrives at port of the ATM switch the switch looks in
its table and learns that it must translate the VPIIVCI value to 45 and output the cell on port
Similarly cell with VPIIVCI 64 arriving at port will be output on port with VPIJVCh29
Transit in the opposite directions over the same circuits results in full-duplex operations As this
example illustrates VPIIVCI values are unique only on single interface not throughout the ATM network
15-4 Internetworking Technology Overview ATM Adaptation Layers
Port
Port VPINCI Port VPINCI
______29J
Figure 15-3 Virtual Connections Through an ATM Switch
Following the VPI/VCI information is the 3-bit payload type PT field The first bit indicates user
data or control data if the first bit indicates user data the middle bit indicates congestion and the
last bit indicates the end of the frame
The next field is the 1-bit cell loss priority CLP field This field allows the user or network to
optionally indicate the explicit loss priority of the cell value of one means that the cell may be
discarded first if necessary value of zero means that the cell should not be discarded as readily
Discarding cells with both CLP values might be necessary when severe network congestion is
present
Finally the 8-bit header error control HEC field is used to detect multiple-bit errors and optionally
correct single-bit errors in the header It can also be used for cell delineation by searching the bit
stream for repeating pattern of valid HEC values
ATM Adaptation Layers
ATM adaptation layers AALs segment upper-layer information into cells at the transmitter and
reassemble them at the receiver Several AAL specifications exist including AAL1 and AAL2
which support voice video and similar traffic and AAL3/4 and AAL5 which support data communications
ATM AALs are used to support four service classes which are shown in Table 15-1 Class will
probably be used to transport the existing telephone digital hierarchy Class is similar to class
except that in class the bit rate is variable so it is more appropriate for compressed video where
the information rate changes with scene content Classes and will be used to transport data in
connection-oriented and connectionless environments respectively
Asynchronous Transler Mode 15-5 ATM Adaptation Layers
Table 15-1 BISDN Service Classes
Class Class Class Class Characteristic AAL1 AAL2 AAI 3/4 or AAL5 AAI3/4 or AAL5
Not Timing relationship Required Required Not required required
between source and
destination
Bit rate Constant Variable Variable Variable
Connection mode Connection- Connection- Connection- Connectionless
oriented oriented oriented
data AAL3/4 and AAL5 can each carry both connection-oriented and connectionless packets They
and is in its are essentially two different ways of doing the same thing Work on AAL AAL2 early
stages
AAL314
AAL3/4 is divided into two sublayers convergence sublayer CS and segmentation and
reassembly sublayer SAR The CS itself has two parts common part convergence sublayer
and The is not standardized CPCS service-specific convergence sublayer SSCS SSCS yet fully
The CPCS is designed primarily for error control
Figure 15-4 shows how AAL3/4 treats payload frame The CPCS encapsulates information within
4-octet header and 4-octet trailer Once encapsulated the CS protocol data unit PDU is broken
into 44-octet units with 2-octet header and 2-octet trailer inside the cell payload by the SAR
sublayer In the SAR header are two bits that indicate whether the cell is the beginning of message
continuation of message or end of message Single segment messages that begin and end in one cell are also possible message ident/ler MID in the SAR header allows multiple messages to
interleave on single virtual connection
Data frame
AAL3/4
convergence
sublayer
Adaptation AAL3/4
layer segmentation and
reassembly
sublayer
ATM layer
Figure 15-4 AAL3/4 Treatment of Payload Frame
15-6 Internetworking Technology Overview ATM Adaptation Layers
Finally the SAR PDU is inserted into the 48-octet payload of the ATM cell at the ATM layer The
distinguishing features of this are ten-bit cell technology CRC per rather than per frame and the fact that it is to frames possible multiplex onto single virtual connection Figure 15-5 shows AAL3/4 SAR state simplified diagram which tracks the progress of packet on single VPIIVCI and MID
Beginning of message
Continuation of message
fmessage
Single segment message
Figure 15-5 AAL3/4 SAR Sublayer State Diagram
AAL5
Packet delimiting in AAL5 is performed within the ATM cell header rather than within the SAR
PDU header as inAAL3/4 Also error detection is provided by length field and 32-bit-per-frame CRC rather than 10-bit by per-cell CRC as in AAL34 Payload frame treatment by AAL5 is shown in Figure 15-6
Data frame
Convergence
sublayer
AAL5
SAR
sublayer
ATM layer
I-
Co
Figure 15-6 AAL5 Treatment of Payload Frame
Asynchronous Transfer Mode 15-7 ATM Architectures
trailer the frame The The AAL5 convergence sublayer appends pad and an 8-octet to payload pad
ensures that the AAL5 PDU falls exactly on 48-octet cell payload boundary The AAL5 and 32-bit convergence sublayer trailer includes the length of the data frame CRC computed across the data receiver the entire payload By checking that the length and CRC still match frame can
detect bit errors and lost or misordered cells
into 48-octet After processing by the convergence sublayer the AAL5 PDU is then segmented
blocks without the additional SAR header or trailer required by AAL3/4 Messages are not
Then data cells with interleaved instead empty cells are sent until the data frame is ready are sent
cell is with the the end-of-message EOM bit in the header set to zero and the last data sent BOM 15-7 these blocks bit set to one simplified illustration of this process is shown in Figure Finally
are placed directly into the ATM cell payload field OMOEOMO
Empty cell
Figure 15-7 AAL5 Convergence Sublayer State Diagram
AAL5 is gathering momentum because several computer vendors including Sun Microsystems
plan to support it in their products The applications on such computers will help drive the success
of ATM in data networks
Connecting computers that use different AALs is somewhat analogous to connecting computers on
different shared-media LANs foi example Ethernet and Token Ring router/bridge or other
internetworking device must convert between the two frame and cell types
ATM Architectures
As simplified in standards documents the ATM architecture consists of super terminals very fast
intelligent terminals with large graphics displays and multimedia capability that connect directly to
public ATM networks Unfortunately this model ignores the current heterogeneous installed base
and the economic necessity of at least some private networking
more practical ATM architecture calls for connectivity with todays wide variety of installed
networks through internetworking devices such as routers to an ATM network as shown in
Figure 15-8 The ATM network could consist of both public and private portions
15-8 Internetworking Technology Overview ATM Architectures
File server
switch
Ethernet
IBM mainframe with
front-end processor
Figure 15-8 Practical ATM Architecture
Network planners for data choose from considering ATM can among three ATM implementation TM techniques permanent-virtual-connection PVC service ATM switched-virtual-connection and ATM SVC service connectionless service In the following sections the term router is used to
refer to any ATM end point
ATM Permaieiit Virtual Ctnmection PVC Service
ATM PVC shown in service Figure 15-9 operates much like Frame Relaya virtual connection
mesh partial mesh or star is administratively established through the ATM network between the
routers ATM PVC service was the original focus of the ATMForum
Asynchronous Transfer Mode 15-9 ATM Architectures
Co
Figure 15-9 ATM PVC Service
Advantages of ATM PVC service include direct ATM connection between routers and the
simplicity of the specification and subsequent implementation Disadvantages include static
connectivity and the administrative overhead of provisioning virtual connections manually
ATM Switched Virtua Connection SVC Service
ATM SVC service shown in Figure 15-10 operates much like X.25 SVC service although ATM
allows much higher throughput Virtual connections are created and released dynamically providing
user bandwidth on demand This service requires signaling protocol between the router and the
network The ATM Forum is currently drafting signaling implementation agreement based on
continuing CCITT standardization
Router
Signaling
Co
Ci
Figure 15-10 ATM SVC Service
Advantages of the ATM SVC service include good general connectivity and simple administration
Its disadvantages include immature standards and potentially slow SVC setup
15-10 Internetworking Technology Overview ATM Architectures
ATM Coirnectionless Service
ATM connectionless service shown in Figure 15-11 operates much like Switched Multimegabit
Data Service SMDS In this scheme virtual connection is administratively established between
the router and connectionless server Jinction CLSF an ancillary part of the ATM switch The CLSF forwards data frames based on the destination address which can be multicast address
included in each frame not each cell No signaling is required because all connections to the CLSF
are preestablished Many telecommunications carriers are introducing metropolitan area network MAN trials and services and plan to migrate toward ATM connectionless service
Figure 15-11 ATM Connectionless Service
The advantages of ATM connectionless service include good connectivity and strong match with
many of todays popular connectionless protocols The Internet communitys Internet Protocol IP and Novells Internet Packet Exchange IPX are examples of these protocols The primary
disadvantage of this approach is that the CLSF can become throughput bottleneck or single point
of failure
Asynchronous Transfer Mode 15-11 ATM Architectures
15-12 Internetworking Technology Overview
CHAPTER 16
AppleTalk
Background
In the early 980s as Apple Computer Inc was preparing to introduce the Macintosh Apple
engineers knew that networks would become critical need They wanted to ensure that
Macintosh-based network was seamless extension of the revolutionary Macintosh user interface
With these two in decided goals mind Apple to build network interface into every Macintosh and
to integrate that interface into the desktop environment Apples new network architecture was called AppleTalk
Although AppleTalk is proprietary network Apple has published AppleTalk specifications in an
to attempt encourage third-party development Today many companies are successfully marketing AppleTalk-based products including Novell Inc and Microsoft Corporation
The of original implementation AppleTalk which was designed for local workgroups is now
commonly referred to as AppleTalk Phase With the installation of over 1.5 million Macintosh
in the first five computers years of the products life however Apple found that some large
corporations were exceeding the built-in limits of AppleTalk Phase so they enhanced the protocol The enhanced known protocols as AppleTalk Phase enhanced AppleTalks routing capabilities and allowed AppleTalk to run successfully in larger networks
TechnoHogy Basics
AppleTalk was designed as client-server distributed network system In other words users share
network resources such as files and printers with other users Computers supplying these network called resources are servers computers using servers network resources are called clients Interaction with servers is essentially transparent to the user because the computer itself determines
the location of the requested material and accesses it without further information from the user In
addition their to ease of use distributed systems also enjoy an economic advantage over peer-to-peer systems because important materials can be located in few rather than many locations
AppleTalk corresponds relatively well to the OSI reference model In Figure 16-1 AppleTalk
are shown to the OSI This differs protocols adjacent layers to which they map figure from some
other depictions of how the AppleTalk protocol stack relates to the OSI model in that it places the
Name Binding Protocol NBP Zone Information Protocol ZIP and Routing Table Maintenance Protocol RTMP at layer and the AppleTalk Echo Protocol AEP at layer Cisco believes that
NBP ZIP and RTMP are more closely aligned functionally to layer of the OSI model even
though they use the services of the Datagram Delivery Protocol DDP another layer protocol
Similarly Cisco believes that AEP should be listed as an application-layer protocol because it is
commonly used to provide application-layer functionality Specifically AEP helps determine the
ability of remote nodes to receive incoming connections
AppleTalk 16-1 Media Access
Other protocols shown in Figure 16-1 are the AppleTalk Transaction Protocol ATPAppleTalk Data Stream Protocol ADSP and AppleTalk Address Resolution Protocol AARP
OS Reference
Model AppleTalk Protocols
Application
AppleTalk Data Zone Information AppleTalk Printer Access Protocol Session Stream Protocol Protocol Session Protocol ADSP ZIP ASP PAP
Routing Table Name Binding Transport Maintenance Ech Protocol Transaction pPleTalk APPleTalk Protocol NBP Protocol RTMP AEP Protocol ATP
Datagram Delivery Protocol DDP Network
Address Resolution Protocol AARP
EtherTalk Link LocalTalk Link TokenTalk Link FDDITaIk Data Link Access Protocol Access Protocol Access Protocol ELAP LLAP TLAP FLAP
Ethernet LocalTalk TokenTalk FDDI Physical Hardware Hardware Hardware Hardware
Figure 16-1 AppleTalk and the OSI Reference Model
Meda Access
Apple constructed AppleTalk to be link-layer independent In other words it can theoretically run
on top of any link-layer implementation Apple supports variety of link-layer implementations including Ethernet Token Ring Fiber Distributed Data Interface FDDI and LocalTalk Apple
refers to AppleTalk over Ethernet as EtherTalk to AppleTalk over Token Ring as TokenTalk and to
AppleTalk over FDDI as FDDITa1k For more information on Ethernet Token Ring and FDDI
technical characteristics see Chapter Ethernet/IEEE 802.3 Chapter Token Ring/IEEE
802.5 and Chapter Fiber Distributed Data Interface respectively
LocalTalk is Apples proprietary media-access system It is based on contention access bus
topology and baseband signaling and runs on shielded twisted-pair media at 230.4 kbps The
physical interface is RS-422 balanced electrical interface supported by RS-449 LocalTalk nodes segments can span up to 300 meters and support maximum of 32
16-2 Internetworking Technology Overview Network Layer
Network Layer
This section describes AppleTalk network-layer concepts and protocols It includes discussion of
protocol address assignment network entities and AppleTalk protocols that provide OSI reference
model layer functionality
Protoco Address Assignment
To ensure minimal network administrator overhead AppleTalk node addresses are assigned
dynamically When Macintosh running AppleTalk starts up its chooses protocol network-layer
address and checks to see whether that address is currently in use If not the new node has
successfully assigned itself an address If the address is currently in use the node with the conflicting
address sends message indicating problem and the new node chooses another address and
repeats the process Figure 16-2 shows the AppleTalk address selection process
Id like
addre37 address 37
o0 00
Macintosh Macintosh
Macintosh
Macintosh
Macintosh
Macintosh
Figure 16-2 AppleTalk Address Selection Process
AppleTalk 16-3 Network Layer
The actual mechanics of AppleTalk address selection are media dependent The AppleTalk Address
Resolution Protocol is used to associate addresses with AARP AppleTalk particular media
addresses also AARP associates other protocol addresses with hardware addresses When either
AppleTalk or any other protocol stack must send packet to another network node the protocol
address is passed to AARP AARP first checks an address cache to see whether the relationship between the protocol and the hardware address is already known If so that relationship is passed
up to the inquiring protocol stack If notAARP initiates broadcast or multicast message inquiring
about the hardware address for the protocol address in question If the broadcast reaches node with
the specified protocol address that node replies with its hardware address This information is
passed up to the inquiring protocol stack which uses the hardware address in communications with
that node
Network Entites
identifies several network AppleTalk entities The most elemental is node which is simply any
device connected to an AppleTalk network The most common nodes are Macintosh computers and
laser but other printers many types of computers are also capable of AppleTalk communication IBM including PCs Digital Equipment Corporation VAX computers and variety of workstations The next defined entity by AppleTalk is the network An AppleTalk network is simply single cable the logical Although logical cable is frequently single physical cable some sites use bridges
to interconnect several physical cables Finally an AppleTalk zone is logical group of possibly
noncontiguous networks These AppleTalk entities are shown in Figure 16-3
16-4 Internetworking Technology Overview Network Layer
Zone
Figure 16-3 AppleTalk Entities
Datagram Delivery Protoco DDP
AppleTalks primary network-layer protocol is the Datagram Delivery Protocol DDP DDP
provides connectionless service between network sockets Sockets can be assigned either statically
or dynamically
AppleTalk addresses which are administered by the DDP consist of two components 16-bit
network number and an 8-bit node number The two components are usually written as decimal
numbers separated by period for example 10.1 means network 10 node .When an 8-bit socket
is network number and node identifying particular process added to the number unique process
on network is specified
AppleTalk Phase distinguishes between nonextended and extended networks In nonextended
network such as LocalTalk each AppleTalk node number is unique Nonextended networks were the
extended network such as EtherTalk and sole network type defined in AppleTalk Phase In an TokenTalk each network number/node number combination is unique
the router Each Zones are defined by the AppleTalk network manager during configuration process Extended networks can have node in an AppleTalk network belongs to single specific zone
networks to zone multiple zones associated with them Nodes on extended can belong any single associated with the extended network
AppleTalk 16-5 Network Layer
Routing Tabe Maintenance Protoco RTMP
The protocol that establishes and maintains AppleTalk routing tables is called the Routing Table
Maintenance Protocol RTMP RTMP routing tables contain an entry for each network that
datagram can reach Each entry includes the router port that leads to the destination network the
node ID of the next router to receive the packet the distance in hops to the destination network and
the current state of the entry good suspect or bad Periodic exchange of routing tables allows the
routers in an internet to ensure that they supply current and consistent information Figure 16-4
shows sample RTMP table and the corresponding network architecture
er1Routing Table
Network Distance Port Next router Entry state
Good
Good
Router Good
Router Good
Cl
Figure 16-4 Sample AppleTalk Routing Table
AppleTalks Name Binding Protocol NBP associates AppleTalk names expressed as network-
visible entities or NVEs with addresses An NVE is an AppleTalk network-addressable service
such as socket NVEs are associated with one or more entity names and attribute lists Entity names character such are strings as printer@ net while attribute lists specify NVE characteristics
Named associated NVEs are with network addresses through the process of name binding Name be done when the binding can user node is first started up or dynamically immediately before first orchestrates the use NBP name binding process which includes name registration name
confirmation name deletion and name iookup
Zones allow in name lookup group of logically related nodes To look up names within zone an
NBP lookup request is sent to local router which sends broadcast request to all networks that have nodes belonging to the target zone The Zone Information Protocol ZIP coordinates this effort
16-6 Internetworking Technology Overview Transport Layer
ZIP maintains network number to zone name mappings in zone information tables ZITs ZITs are
stored in routers which are the primary users of ZIP but end nodes use ZIP during the startup
process to choose their zone and to acquire internetwork zone information ZIP uses RTMP routing
tables to keep up with network topology changes When ZIP finds routing table entry that is not in
the ZIT it creates new ZIT entry Figure 16-5 shows sample ZIT
Network number Zone
My
Your
Marketing
Documentation
5-5 Sales
Figure 16-5 Sample AppleTalk ZIT
Transport Layer
AppleTalks transport layer is implemented by two primary Apple protocolsAppleTalk Transaction
Protocol ATP and AppleTalk Data Stream Protocol ADSP ATP is transaction oriented while
ADSP is data-stream oriented
AppeTak Transactoti Protoco AlP
ATP is one of AppleTalks transport-layer protocols ATP is suitable for transaction-based
applications such as those found in banks or retail stores
ATP transactions consist of requests from clients and replies from servers Each request/reply
pair has particular transaction ID Transactions occur between two socket clients ATP uses exactly once XO and at-least-once ALO transactions XO transactions are required in those situations
where accidentally performing the transaction more than once is unacceptable Bank transactions are
examples of such nonidempotent situationssituations where repeating transaction causes problems by invalidating the data involved in the transaction
ATP is capable of most important transport-layer functions including data acknowledgment and
retransmission packet sequencing and fragmentation and reassembly ATP limits message
segmentation to packets and ATP packets cannot contain more than 578 data bytes
AppDeTak Data Stream Protoco ADSP
ADSP is another important AppleTalk transport-layer protocol As its name implies ADSP is data-
stream rather than transaction oriented It establishes and maintains full-duplex data streams
between two sockets in an AppleTalk internetwork
AppleTalk 16-7 Upper-Layer Protocols
ADSP is reliable protocol in that it guarantees that data bytes will be delivered in the same order
as they were sent and that they are not duplicated ADSP numbers each data byte to keep track of
the individual elements of the data stream
ADSP also specifies flow-control mechanism The destination can essentially slow source
transmissions by reducing the size of its advertised receive window
ADSP also provides an out-of-band control message mechanism Attention packets are used as the vehicle for movement of out-of-band control messages between two AppleTalk entities These
number differentiate them from normal packets use separate sequence stream to ADSP data packets
UpperLayer ProtocoDs
AppleTalk supports several upper-layer protocols The AppleTalk Session Protocol ASP
establishes and maintains sessions logical conversations between an AppleTalk client and server
AppleTalks Printer Access Protocol PAP is connection-oriented protocol that establishes and maintains connections between clients and servers Use of the term printer in this protocols title is
purely historical The AppleTalk Echo Protocol AEP is an extremely simple protocol that
generates packets that can be used to test the reachability of various network nodes Finally the
AppleTalk Filing Protocol AFP helps clients share server files across network
16-8 Internetworking Technology Overview CHAPTER 17
DECnet
Background
Digital Equipment Corporation Digital developed the DECnet protocol family to provide well-
its The version of thought-out way for computers to communicate with one another first DECnet
released in 1975 allowed two directly attached PDP- 11 minicomputers to communicate In more remains recent years Digital has included support for nonproprietary protocols but DECnet the most
important of Digitals network product offerings
DECnet is currently in its fifth major product release sometimes called Phase and referred to as
DECnet/OSI in Digital literature DECnet Phase is superset of the OSI protocol suite and
supports all OSI protocols as well as several other proprietary and standard protocols that were
supported in previous versions of DECnet As with past changes to the protocol DECnet Phase is
compatible with the previous release Phase IV in this case
DgitaH Network Architecture DNA
Contrary to popular belief DECnet is not network architecture at all but is rather series of
products conforming to Digitals Digital Network Architecture DNA Like most comprehensive
network architectures from large systems vendors DNA supports large set of both proprietary and
standard protocols The list of DNA-supported technologies grows constantly as Digital implements
new protocols Figure 17-1 illustrates an incomplete snapshot of DNA and the relationship of some
of its components to the OSI reference model
DECnet 17-1 Media Access
OSI reference model DNA
Application DNA applications OSI applications
Presentation OSI presentation DNA DNA
name session
service control Session OSI session
Transport NSP TPO TP2 TP4
ES-IS IS-IS
Network Connectionless Connection-oriented CLNP CLNS X.25 CMNP
Link
Various link-access protocols
Physical
Figure 17-1 DNA and the OSI Reference Model
Meda Access
As 17-1 Figure shows DNA supports variety of media and link implementations Among these are well-known standards such as Ethernet Token Ring Fiber Distributed Data Interface FDDIIEEE and X.25 See 8022 ChapterS Ethernet/IEEE 802.3 Chapter Token Ring/IEEE 802.5
Chapter Fiber Distributed Data Interface Chapter 11 Synchronous Data Link Control and and Derivatives Chapter 12 .25 for more information on these protocols DNA also offers
traditional point-to-point link-layer protocol called Digital Data Communications Message Protocol DDCMP and 70-Mbps bus used in the VAXciuster called the computer-room interconnect bus CI bus
Network Layer
DECnet both connectionless and connection-oriented network supports layers Both network layers are implemented by OSI protocols The connectionless implementation uses the Connectionless Network Protocol CLNP and the Connectionless Network Service CLNS The connection-
oriented network uses the X.25 Packet-Level Protocol is layer PLPwhich also known as X.25 level and the Connection-Mode Network Protocol CMNP These OSI protocols are described more completely in Chapter 20 OSI Protocols
Although most of DNA was brought into OSI conformance with DECnet Phase DECnet Phase
IV routing was similar to OSI Phase already very routing DNA routing consists of OSI routing and ES-IS IS-IS plus continued support for the DECnet Phase IV routing protocol ES-IS and IS IS are described in Chapter 28 OSI Routing
17-2 Internetworking Technology Overview Network Layer
DECnet Phase Routing Frame Format
The DECnet Phase IV routing protocol differs from IS-IS in several ways One difference is in the
protocol header The DNA Phase IV routing layer header is shown in Figure 17-2 Is-Is packet
formats are shown in Chapter 28 OSI Routing
Field length mbytes
Routing Destination Source Nodes node flags node traversed .i
Co
Cl
Figure 11-2 DNA Phase IV Routing Layer Header
The first field in DNA Phase IV routing header is the routing flags field which includes
return-to-sender bit which if set indicates that the packet is returning to the source
return-to-sender-request bit which if set indicates that request packets should be returned to
the source if they cannot be delivered to the destination
An intraLAN bit which is on by default If the router detects that the two communicating end
systems are not on the same subnetwork it turns the bit off
Other bits that indicate header format whether padding is being used and other functions
The destination node and source node fields identify the network addresses of the destination nodes
and the source node
The nodes traversed field shows the number of nodes the packet has traversed on its way to the
destination This field allows implementation of maximum hop count so that obsolete packets can
be removed from the network
DECnet identifies two types of nodes end nodes and routing nodes Both end nodes and routing
nodes can send and receive network information but only routing nodes can provide routing services
for other DECnet nodes
DECnet routing decisions are based on cost an arbitrary measure assigned by network
administrators to be used in comparing various paths through an internetwork environment Costs
are typically based on hop count media bandwidth or other measures The lower the cost the better
the path When network faults occur the DECnet Phase IV routing protocol uses cost values to
recalculate the best paths to each destination Figure 17-3 illustrates the calculation of costs in
DECnet Phase IV routing environment
DECnet 17-3 Network Layer
Best path to destination
Source LII Destination
17-3 Figure DECnet Phase IV Routing Protocol Cost Calculation
Addressing
DECnet addresses are not associated with the physical networks to which the nodes are connected Instead DECnet locates hosts area/node address An areas value using pairs ranges from to 63 inclusive node address be can between and 1023 inclusive Therefore each area can have nodes and 1023 approximately 65000 nodes can be addressed in DECnet network Areas can span many routers and single cable can support many areas Therefore if node has several network
interfaces it uses the area/node same address for each interface Figure 17-4 shows sample DECnet
network with several addressable entities
10.1
Area Node number number
Area 10 Area5
Figure 17-4 DECnet Addresses
DECnet hosts do not use manufacturer-assigned Media Access Control MAClayer addresses Instead network-level addresses are embedded in the MAC-layer address according to an algorithm that the multiplies area number by 1024 and adds the node number to the The product resulting
17-4 Internetworking Technology Overview Network Layer
16-bit decimal address is converted to hexadecimal number and appended to the address
AAOO.0400 in with byte-swapped order the least significant byte first For example DECnet address 12.75 becomes 12363 which base 10 equals 304B base 16 After this byte-swapped address is
to the standard DECnet appended MAC address prefix the resulting address is AAOO .0400 .4B30
Rou ng LeveOs
DECnet routing nodes are referred to as either level or level routers level router communicates with end nodes and with other level routers in particular area Level routers
communicate with level routers in the same area and with level routers in different areas
level and level Together routers form hierarchical routing scheme This relationship is
illustrated in Figure 17-5
Level Level router routet End
system ______
Level router
Area 10
Level router
Level C0 router CU
Area
Figure 17-5 DECnet Level and Level Routers
End systems send routing requests to designated level router The level router with the highest
priority is elected to be the designated router If two routers have the same priority the one with the
larger node number becomes the designated router routers priority can be manually configured
to force it to become the designated router
DECnet 17-5 Transport Layer
As shown in Figure 17-5 multiple level routers can exist in any area When level router wishes
level in the In to send packet outside its area it forwards the packet to router same area some cases the level router may not have the optimal path to the destination but the mesh network
the of level configuration offers degree of fault tolerance not provided by simple assignment one
router per area
Transport Layer
both and standard The DNA transport layer is implemented by variety of transports proprietary
described in detail in OSI transports TPO TP2 and TP4 are supported These are greater Chapter 20 OSI Protocols
similar in that it offers Digitals own Network Services Protocol NSP is functionally to TP4 connection-oriented flow-controlled service with message fragmentation and reassembly Two
subchannels are supportedone for normal data and one for expedited data and flow control
information Two flow control types are supporteda simple start/stop mechanism where the
receiver tells the sender when to terminate and resume data transmission and more complex flow
control technique where the receiver tells the sender how many messages it can accept NSP can also
respond to congestion notifications from the network layer by reducing the number of outstanding
messages it will tolerate
UpperLayer Protocolls
its well Above the transport layer DECnet supports own proprietary upper-layer protocols as as
standard OSI upper-layer protocols DECnet application protocols use the DNA session control
protocol and the DNA name service OSI application protocols are supported by OSI presentation
and session-layer implementations See Chapter 20 OSI Protocols for more information on these
OSI protocols
1-6 Internetworking Technology Overview CHAPTER 18
Internet Protocols
Background
In the mid-i 970s the Defense Advanced Research Projects Agency DARPA became interested in
establishing packet-switched network to provide communications between research institutions in
the United States DARPA and other government organizations understood the potential of packet-
switched technology and were just beginning to face the problem virtually all companies with networks now have communication between dissimilar computer systems
With the goal of heterogeneous connectivity in mind DARPA funded research by Stanford
University and Bolt Beranek and Newman BBN to create series of communication protocols
The result of this development effort completed in the late 1970s was the Internet protocol suite of
which the Transmission Control Protocol TCP and the Internet Protocol IP are the two best known
The Internet be used communicate of interconnected networks protocols can to across any set They are equally well suited for local-area network LAN as well as wide-area network WAN communications The Internet suite includes and not only lower-layer specifications like TCP IP
but also specifications for such common applications as mail terminal emulation and file transfer
Figure 18-1 shows some of the more important Internet protocols and their relationship to the OSI
reference model
Internet Protocols 18-1 Network Layer
OSI reference model The Internet orotocol suite
Application NFS
FTP Telnet Presentation XDR SMTP SNMP
Session RPC
Transport TCP UDP
Routing protocols ICMP Network lP
ARP RARP
Link
Not specified
Physical
______
Figure 18-1 Internet Protocol Suite and the OSI Reference Model
Creation and documentation of the Internet protocols closely resembles an academic research
project The protocols are specified in documents called Requestfor Comments RFCs RFCs are
published and then reviewed and analyzed by the Internet community Protocol refinements are
published in new RFCs Taken together the RFCs provide colorful history of the people
companies and trends that shaped the development of what is today the worlds most popular open
system protocol suite
Network Layer
IP is the primary layer protocol in the Internet suite In addition to internetwork routing IP
provides fragmentation and reassembly of datagrams and error reporting Along with TCP IP
represents the heart of the Internet protocol suite The IP packet format is shown in Figure 18-2
18-2 Internetworking Technology Overview Network Layer
32 bits
Version IHL Type of service Total length
Identification Flags Fragment offset
Time to Protocol Header checksum
live
Source address
Destination address
Options padding
Data variable
cJ
Figure 18-2 IP Packet Format
used The IP header begins with version number which indicates the version of IP currently
32-bit words The IP header length IHL field indicates the datagram header length in
The type-of-service field specifies how particular upper-layer protocol would like the current
this field datagram to be handled Datagrams can be assigned various levels of importance through
The total length field specifies the length of the entire IF packet including data and header in bytes
The identification field contains an integer that identifies the current datagram This field is used to help piece together datagram fragments
low-order bits control One bit The flags field is three-bit field of which the two fragmentation
second bit whether the is the specifies whether the packet can be fragmented the specifies packet last fragment in series of fragmented packets
The time-to-live field maintains counter that gradually decrements down to zero at which point the datagram is discarded This keeps packets from looping endlessly
receives after IP The protocol field indicates which upper-layer protocol incoming packets processing is complete
The header checksum field helps ensure IF header integrity
The source and destination address fields specify the sending and receiving nodes
such The options field allows IP to support various options as security
The data field contains upper-layer information
Internet Protocols 18-3 Network Layer
Addresshig
As with all network-layer protocols IPs addressing scheme is integral to the process of routing IP
datagrams through an intemetwork An IP address is 32 bits in length divided into either two or
three parts The first part designates the network address the second part if present designates the
subnet address and the final part designates the host address Subnet addresses are only present if
the network administrator has decided that the network should be divided into subnetworks The
lengths of the network subnet and host fields are all variable
IP addressing supports five different network classes The leftmost bits indicate the network class
Class networks are intended mainly for use with few very large networks since they provide
only seven bits for the network address field
Class networks allocate 14 bits for the network address field and 16 bits for the host address
field This address class offers good compromise between network and host address space
Class networks allocate 22 bits for the network address field Class networks only provide
eight bits for the host field however so the number of hosts per network may be limiting factor
Class addresses are reserved for multicast groups as described formally in RFC 1112 In class
addresses the four highest-order bits are set to and
Class addresses are also defined by IPbut are reserved for future use In class addresses the
four highest-order bits are all set to
IP addresses are written in dotted decimal formatfor example 34.10.2.1 Figure 18-3 shows the
address formats for class and IP networks
Class
Network Host
Class
Network Host
Class iLi
Host Network
Figure 18-3 Class and Address Formats
IP networks can also be divided into smaller units called subners Subnets provide extra flexibility
for network administrators For example assume that network has been assigned class address
and all the nodes on the network currently conform to class address format Then assume that
the dotted decimal representation of this networks address is 128.10.0.0 all zeros in the host field
all the addresses other basic of an address specifies the entire network Rather than change to some
18-4 Internetworking Technology Overview Network Layer
network number the administrator can subdivide the network using subnetting This is done by
borrowing bits from the host portion of the address and using them as subnet field as shown in
Figure 18-4
Class address before subnetting
Class
Network Host
Class address after subnetting
Class 10
Network Subnet Host
Figure 18-4 Subnet Addresses
If network administrator has chosen to use eight bits of subnetting the third octet of class IP
address provides the subnet number In our example address 128.10.1.0 refers to network 128.10
subnet address 128.10.2.0 refers to network 128.10 subnet and so on
The number of bits borrowed for the subnet address is variable To specify how many bits are used
format and as IP IP provides the subnet mask Subnet masks use the same representation technique
bits that the host field For addresses Subnet masks have ones in all bits except those specify
for class address 34.0.0.0 is example the subnet mask that specifies eight bits of subnetting
255.255.0.0 The subnet mask that specifies 16 bits of subnetting for class address 34.0.0.0 is
255.255.255.0 Both of these subnetmasks are shown in Figure 18-5
Class 34.0.0.0 address oOiooHi
Subnet mask 255.255.0.0 subnet bits
ClassA 34.0.0.0 address
Subnet mask 255.255.255.0 16 subnet bits
Figure 18-s Sample Subnet Mask
Internet Protocols 18-5 Network Layer
On some media such as IEEE 802 LANs media addresses and IP addresses are dynamically
discovered through the use of two other members of the Internet protocol suite the Address
Resolution Protocol ARP and the Reverse Address Resolution Protocol RARP ARP uses broadcast messages to determine the hardware Media Access Control MAC-layer address
corresponding to particular internetwork address ARP is sufficiently generic to allow use of IP with of virtually any type underlying media-access mechanism RARP uses broadcast messages to
determine the Internet address associated with particular hardware address RARP is particularly
to diskless important nodes which may not know their internetwork address when they boot
nterret Rout ig
devices in the Routing Internet have traditionally been called gateways an unfortunate term
because elsewhere in the industry the term applies to device with somewhat different
functionality Gateways which we will call routers from this point on within the Internet are
organized hierarchically Some routers are used to move information through one particular group of networks under the same administrative authority and control such an entity is called an
autonomous system Routers used for information exchange within autonomous systems are called
interior routers and they use variety of interior gateway protocols IGPs to accomplish this
purpose Routers that move information between autonomous systems are called exterior routers
and use an exterior for this they gateway protocol purpose The Internet architecture is shown in Figure 18-6
Autonomous system Autonomous system
EExterior gateway
Interior gateway
Figure 18-6 Internet Architecture
IP routing protocols are dynamic Dynamic routing calls for routes to be calculated at regular
intervals software in the by routing devices This contrasts with static routing where routes are
established by the network administrator and do until the not change network administrator changes
them An IP table consists of destination address/next routing hop pairs sample entry shown in Figure 18-7 is interpreted as meaning to get to network 34.1.0.0 subnet on network 34 the next stop is the node at address 54.34.23.12
18-6 Internetworking Technology Overview Network Layer
Destination Next address hop
34.1.0.0 54.34.23.12
78.2.0.0 54.34.23.12
147.9.5.0
17.12.0.0
54.32.12.10
54.32.12.10
CU
Figure 18-1 IP Routing Table
IP routing specifies that IP datagrams travel through internetworks one hop at time The entire
route is not known at the outset of the journey Instead at each stop the next destination is calculated
by matching the destination address within the datagram with an entry in the current nodes routing
table Each nodes involvement in the routing process consists only of forwarding packets based on
internal information regardless of whether the packets get to their final destination In other words
IP does not provide for error reporting back to the source when routing anomalies occur This task
is left to another Internet protocol the Internet Control Message Protocol ICMP
UCMP
ICMP performs number of tasks within an IP internetwork The principal reason it was created was
for reporting routing failures back to the source In addition ICMP provides helpful messages such
as the following
Echo and reply messages to test node reachability across an internetwork
Redirect messages to stimulate more efficient routing
Time exceeded messages to inform sources that datagram has exceeded its allocated time to
exist within the internetwork
Router advertisement and router solicitation messages to determine the addresses of routers on
directly attached subnetworks
discover the subnet mask more recent addition to ICMP provides way for new nodes to currently IP used in an internetwork All in all ICMP is an integral part of any implementation particularly
those that run in routers
RIP is discussed in Other chapters of this book discuss specific IP routing protocols Chapter 23 Interior Routing Information Protocol IGRP is discussed in Chapter 24 Gateway Routing Protocol and Enhanced Interior Gateway Routing Protocol OSPF is discussed in Chapter 25 Exterior and Open Shortest Path First EGP is discussed in Chapter 26 Gateway Protocol BGP
is also official IP is discussed in Chapter 27 Border Gateway Protocol IS-IS an routing protocol
and is discussed in Chapter 28 OSI Routing
RDP
and solicitation The ICMP Router Discovery Protocol IRDP uses router advertisement router discover addresses of attached subnets messages to routers on directly
Internet Protocols 18-7 Transport Layer
The way IRDP works is that each router periodically multicasts router advertisement messages from
each of its interfaces Hosts discover the addresses of routers on the directly attached subnet by
listening for these messages Hosts can use router solicitation messages to request immediate
advertisements rather than waiting for unsolicited messages
IRDP offers several advantages over other methods of discovering addresses of neighboring routers
Primarily it does not require hosts to recognize routing protocols nor does not it require manual
configuration by an administrator
Router advertisement messages allow hosts to discover the existence of neighboring routers but not
which router is best to reach destination If host particular uses poor first-hop router to reach
it receives redirect better choice particular destination message identifying
Transport Layer
The Internet transport layer is implemented by TCP and the User Data gram Protocol UDP TCP
provides connection-oriented data transport while UDP operation is connectionless
Transrnisson ControU Protoc TCP
TCP provides full-duplex acknowledged and flow-controlled service to upper-layer protocols It
in moves data continuous unstructured byte stream where bytes are identified by sequence
numbers TCP can also support numerous simultaneous upper-layer conversations The TCP packet
format is shown in Figure 18-8
Source port Destination port
Sequence number
Acknowledgment number
Data offset Reserved Flags Window
Checksum Urgent pointer
Options padding
Data variable
Figure 188 TCP Packet Format
The source port and destination port fields identify the points at which upper-layer source and
destination processes receive TCP services
18-8 Internetworking Technology Overview Upper-Layer Protocols
The sequence number field usually specifies the number assigned to the first byte of data in the
current Under certain it can also be used to initial message circumstances identify an sequence number to be used in the upcoming transmission
The number acknowledgment field contains the sequence number of the next byte of data the sender
of the packet expects to receive
The data offset field indicates the number of 32-bit words in the TCP header
The reserved field is reserved for future use by protocol designers
The flags field carries variety of control information
The window field the size of the senders receive window buffer specifies that is space available for incoming data
The checksum field indicates whether the header was damaged in transit
The urgent pointer field points to the first urgent data byte in the packet
The options field specifies various TCP options
The data field contains upper-layer information
User Datagram Protocol UDP
UDP is much simpler protocol than TCP and is useful in situations where TCPs powerful mechanisms reliability are not necessary The UDP header has only four fields source port destination and port length UDP checksum The source and destination port fields serve the same
functions as they do in the TCP header The length field specifies the length of the UDP header and and the checksum data field allows packet integrity checking The UDP checksum is optional
Upper4ayer ProtocoQs
The Internet protocol suite includes many upper-layer protocols representing wide variety of
applications including network management file transfer distributed file services terminal
emulation and electronic mail Table 18-1 maps the best-known Internet upper-layer protocols to
the applications they support
Table 18-1 Internet Protocol/Application Mapping
Application Protocols
File transfer FTP
Terminal emulation Telnet
Electronic mail SMTP
Network management SNTvIP
Distributed file services NFS XDR RPC Windows
The File Transfer Protocol FTP provides way to move files between computer systems Telnet
allows virtual terminal emulation The Simple Net-work Management Protocol SNMP is network
management protocol used for reporting anomalous network conditions and setting network
threshold values Windows is popular protocol that permits intelligent terminals to communicate
with remote computers as if they were directly attached Network File System SExternal Data
Representation XDR and Remote Procedure Call RPC combine to allow transparent access to
Internet Protocols 18-9 Upper-Layer Protocols
remote network resources The Simple Mail Transfer Protocol SMTP provides an electronic mail
transport mechanism These and other network applications use the services of TCP/IP and other
lower-layer Internet protocols to provide users with basic network services
18-10 Internetworking Technology Overview 19
NetWare ProtocoDs
Background
NetWare is network operating system NOS and related support services environment created by
Novell Inc and introduced to the market in the early 980s Then networks were small and
predominantly homogeneous local-area network LAN workgroup communication was new and the idea of personal computer PC was just becoming popular
Much of NetWares networking technology was derived from Xerox Network Systems XNS networking system created by Xerox Corporation in the late 970s For more information on XNS
see Chapter 22 Xerox Network Systems
By the early 1990s NetWares NOS market share had risen to between 50 and 75 percent With over
500000 NetWare networks installed worldwide and an accelerating movement to connect networks
to other networks NetWare and its supporting protocols often coexist on the same physical channel
with many other popular protocols including TCP/IP DECnet and AppleTalk
Technoogy Basics
As NOS environment NetWare specifies the upper five layers of the OSI reference model It
provides file and printer sharing support for various applications such as electronic mail transfer and
database access and other services Like other NOSs such as the Network File System NFS from
Sun Microsystems Inc and LAN Manager from Microsoft Corporation NetWare is based on
client-server architecture In such architectures clients sometimes called workstations request
certain services such as file and printer access from servers
Originally NetWare clients were small PCs while servers were slightly more powerful PCs As
NetWare became more popular it was ported to other computing platforms Currently NetWare
clients kind of and servers may be represented by virtually any computer system from PCs to mainframes
primary characteristic of the client-server system is that remote access is transparent to the user
This is which local accomplished through remote procedure calls process by computer program
running on client sends procedure call to remote server The server executes the remote
procedure call and returns the requested information to the local computer client
Figure 19-1 illustrates simplified view of NetWares best-known protocols and their relationship to
the OSI reference model With appropriate drivers NetWare can run on any media-access protocol
The figure lists those media-access protocols currently supported with NetWare drivers
NetWare Protocols 19-1 Media Access
OSI reference model NetWare
Applications RPC based
NetWare application Core LU 62 NetWare Protocol support NetBlOS shell emulator NCP client RPC
IPX
Token Ethernet Ring/ IEEE FDDI ARCnet PPP IEEE 8023 802.5
Figure 19-1 NetWare and the OSI Reference Model
Metha Access
NetWare runs on Ethernet/IEEE 802.3 Token Ring/IEEE 802.5 Fiber Distributed Data Interface FDDI and ARCnet For information on Ethernet/IEEE 802.3 see Chapter Ethernet/IEEE 802.3 For information on Token Ring/IEEE 802.5 see Chapter Token Ring/IEEE 802.5 For
Interface NetWare also works information on FDDI see Chapter Fiber Distributed Data over
Protocol is synchronous wide-area network WAN links using the Point-to-Point PPP PPP
discussed in more detail in Chapter Point-to-Point Protocol
all three Attached Resource Computer Network ARCnet is simple network system that supports and primary media twisted pair coaxial cable and fiber-optic cable and two topologies bus star
It was developed by Datapoint Corporation and introduced in 1977 Although ARCnet has not
attained the popularity enjoyed by Ethernet and Token Ring its low cost and flexibility have resulted
in many loyal supporters
Network Layer
device to be Internet Packet Exchange IPX is Novells original network-layer protocol When
communicated with is located on different network IPX routes the information to the destination
through any intermediate networks Figure 19-2 shows the IPX packet format
19-2 Internetworking Technology Overview Network Layer
IPX packet structure
Checksum
Packet length
Transport control Packet type
Destination network
Destination node
Destination socket
Source network
Source node
Source socket
Upper-layer data
Figure 19-2 IPX Packet Format
The IPX packet begins with 16-bit checksum field that is set to is
16-bit packet length field specifies the lengthin bytesof the complete IPX datagram IPX packets can be any length up to the media maximum transfer unit MTU size There is no packet fragmentation
field the has The 8-bit transport control indicates the number of routers packet passed through
When the value of this field reaches 15 the packet is discarded under the assumption that routing loop might be occurring
receive the information The 8-bit packet type field specifies the upper-layer protocol to packets
values for this field are Packet and Two common which specifies Sequenced Exchange SPX 17 the Protocol which specifies NetWare Core NCP
The destination network destination node and destination socket fields specify destination information
The source network source node and source socket fields specify source information
The upper-layer data field contains information for upper-layer processes
of Although IPX was derived from XNSit has several unique features From the standpoint routing difference the encapsulation mechanisms of these two protocols are the most important
and data into Encapsulation is the process of packaging upper-layer protocol information frame
in For Ethernet XNS uses standard Ethernet encapsulation whereas IPX packets are encapsulated
Ethernet Version 2.0 or IEEE 802.3 without the IEEE 802.2 information that typically accompanies these frames Figure 19-3 illustrates Ethernet standard IEEE 802.3 and IPX encapsulation
in standard IEEE 802.3 frames It also Note NetWare 4.0 supports encapsulation of IPX packets which extends the IEEE 802.2 supports SubNetwork Access Protocol SNAP encapsulation Ethernet headers by providing type code similar to that defined in the specification
NetWare Protocols 19-3 Transport Layer
Ethernet Standard IEEE 802.3 IPX
Destination address Destination address Destination address
Source address Source address Source address
Type Length Length
Upper-layer 802.2 header
data IPX data
802.2 data
CRC CRC CRC
Figure 19-3 Ethernet IEEE 8a2.3 and IPX Encapsulation Formats
To route packets in an internetwork IPX uses dynamic routing protocol called the Routing
Information Protocol RIP Like XNS RIP derived from work done at Xerox for the XNS protocol
family Today RIP is the most commonly used interior gateway protocol IGP in the Internet
community large international network environment providing connectivity to virtually every
research institution government agency and university and many private businesses in the United
States as well as many foreign organizations For more detailed information on RIP see Chapter 23 Routing Information Protocol
In addition to the difference in encapsulation mechanisms Novell also added protocol called the Service Advertisement Protocol allows nodes SAP to its IPX protocol family SAP that provide
services such as file servers and print servers to advertise their addresses and the services they provide
Novell also supports IBMs Logical Unit LU 6.2 network addressable unit NAU LU 6.2 allows
peer-to-peer connectivity across IBM communication environments Using NetWares LU 6.2
capability NetWare nodes can exchange information across an IBM network NetWare packets are
encapsulated within LU 6.2 packets for transit across the IBM network
Transport Layer
Packet Sequenced Exchange SPX is the most commonly used NetWare transport protocol Novell derived this protocol from XNS Sequenced Packet Protocol SPP As with the Transmission Control Protocol and TCP many other transport protocols SPX is reliable connection-oriented
protocol that supplements the datagram service provided by layer protocols
Novell also offers Internet Protocol IF support in the form of User Datagram Protocol UDPIP
encapsulation of other Novell packets such as SPXIPX packets IPX datagrams are encapsulated
inside UDP/IP headers for transport across an IF-based internetwork For more information on UDP
and the Internet protocols in general see Chapter 18 Internet Protocols
UpperLayer Protocos
NetWare wide supports variety of upper-layer protocols but several are somewhat more popular than others The NetWare shell runs in clients often called workstations in the NetWare community
and intercepts application I/O calls to determine whether they require network access for
satisfaction If the so NetWare shell packages the requests and sends them to lower-layer software
for processing and network transmission If not they are simply passed to local 110 resources Client
19-4 Internetworking Technology Overview Upper-Layer Protocols
calls applications are unaware of any network access required for completion of application redirection NetWare Remote Procedure Call NetWare RPC is another more general mechanism
supported by Novell
The NetWare Core Protocol NCP is series of server routines designed to satisfy application requests coming from for example the NetWare shell Services provided by NCP include file
acess printer access name management accounting security and file synchronization
NetWare also supports the Network Basic Input/Output System NetBIOS session-layer interface
specification from IBM and Microsoft NetWares NetBIOS emulation software allows programs
written to the industry-standard NetBIOS interface to run within the NetWare system
NetWare application-layer services include NetWare Message Handling Service NetWare MHS
Btrieve NetWare Loadable Modules NLMs and various IBM connectivity features NetWare
electronic mail Btrieve is Novells MHS is message delivery system that provides transport
implementation of the binary tree btree database access mechanism NLMs are implemented as
add-on modules that attach into the NetWare system NLMs for alternate protocol stacks
communication services database services and many other services are currently available from
Novell and third parties
NetWare Protocols 19-5 Upper-Layer Protocols
19-6 Internetworking Technology Overview CHAPTER 20
OS ProtocoDs
Background
In the early days of intercomputer communication networking software was created in haphazard
ad hoc fashion When networks grew sufficiently popular the need to standardize the by-products of
network software and hardware development became clear Standardization it was believed would
allow vendors to create hardware and software systems that could communicate with one another
even if the underlying architectures were dissimilar With this goal in mind the International
Organization for Standardization ISO began development of the Open Systems Interconnection OSI reference model The OSI reference model was completed and released in 1984
Today the OSI reference model discussed in detail in Chapter Introduction to Internetworking
is the worlds most promInent networking architecture model It is also the most popular tool for
learning about networks The OSI protocols on the other hand have had long gestation period
While OSI implementations are not unheard of the OSI protocols have not yet attained the
popularity of many proprietary for example DECnet and AppleTalk and de facto for example the
Internet protocols standards
TechnoHogy Bascs
The world of OSI networking has unique terminology
End system ES refers to any nonrouting network device
Intermediate system IS refers to router
be Area is group of contiguous networks and attached hosts that are specified to an area by
network administrator or manager
Domain is collection of connected areas Routing domains provide full connectivity to all end
systems within them
Media Access
Like several other modem seven-layer protocol stacks the OSI stack includes many of todays
popular media-access protocols This allows other protocol stacks to exist alongside OSI on the same media OSI includes IEEE 802.2 IEEE 802.3 IEEE 802.5 FDDI X.21 V.35 X.25 and others.Most
of these OSI media-access protocols are discussed elsewhere in this publication
OSI Protocols 20-1 Network Layer
Network Layer
OSI offers both connectionless and connection-oriented network layer service The
connectionless service is described in ISO 8473 usually referred to as Connectionless Network Protocol or CLNP The connection-oriented service sometimes called Connection-Oriented Packet-Level Network Service or CONS is described in ISO 8208 X.25 Protocol sometimes referred to as Connection-Mode Net-work Protocol or CMNP and ISO 8878 which describes how
to use ISO 8208 to provide OSI connection-oriented service An additional document ISO 8881 describes how to run the X.25 Packet-Level Protocol over IEEE 802 local-area networks LANs
OSI also specifies several routing protocols which are discussed in Chapter 28 OSI Routing
X.25 is discussed in Chapter 12 X.25
In addition to the previously mentioned protocol andservice specifications other relevant OSI
network-layer documents include
ISO 8648 This document is usually referred to as the internal organization of the network layer
IONL It describes how the network layer can be divided into three separate and distinct
sublayers to allow support for different subnetwork types
ISO 8348This document is usually called the network service definition It describes the
connection-oriented and connectionless services provided by the OSI network layer Network
layer addressing is also defined in this document The connectionless-mode service definition
and the addressing definition were previously published as separate addenda to ISO 8348
however the 1993 version of ISO 8348 folds all of the addenda into single document
ISO TR 9575This document describes the framework concepts and terminology used in OSI
routing protocols
ISO TR 9577This document describes how to discriminate between multiple network-layer
protocols running on the same medium Such discrimination is necessary because unlike other
protocols051 network-layer protocols cannot be identified through protocol ID or similarfield
at the link layer
Connectioness Serv ce
As its name suggests CLNP is connectionless datagram protocol used to carry data and error indications Functionally it is quite similar to the Internet Protocol IP described in Chapter 18 Internet Protocols It has no facilities for error detection or correction relying on the transport
layer to provide these services as appropriate It has only one phase called data transfer Each
invocation of service primitive is independent of all other invocations requiring all address
information to be completely contained within the service primitive
While CLNP defines the actual protocol performing typical network-layer functions Connectionless
Network Service CLNS describes service provided to the transport layer in which request to
transfer data receives best effort delivery Such delivery does not guarantee that data will not be
lost corrupted misordered or duplicated Connectionless service assumes that the transport layer
will correct such problems as necessary CLNS does not provide any form of connection information and or state connection setup is not performed Because CLNS provides transport layers with the service interface to CLNP CLNS and CLNP are often discussed together
In the United States federal agencies use the Government Open Systems Interconnection Profile
GOSIP specification to ensure interoperability of CLNS network products GOSJP requires certification of CLNP over LANs andX.25
20-2 Internetworking Technology Overview Network Layer
Connection-Oriented Service
OSI connection-oriented network service is specified by ISO 8208 and ISO 8878 OSI uses the X.25
Packet-Level Protocol for connection-oriented data movement and error indications Six services are
provided to transport-layer entities one for connection establishment one for connection release
and four for data Services invoked combination transfer are by some of four primitives request
indication response and confirmation The four primitives interact as shown in Figure 20-1
ES1 ES2
Figure 20-1 OSI Primitives
At time t- ES ls transport layer sends request primitive to ES ls network layer This request is
placed onto ES ls subnetwork by lower-layer subnetwork protocols and is eventually received by
ES which sends the information up to the network layer At time t-2 ES 2s network layer sends
an indication primitive to its transport layer After required upper-layer processing for this packet is
initiates sent from the complete ES response to ES by using response primitive transport
layer to the network layer The response which occurs at time t-3travels back to ES which sends the information up to the network layer where confirm primitive is generated and sent to the
transport layer at time t-4
Addressing
the The OSI network service is provided to the transport layer through conceptual point on
There is network/transport layer boundary known as network service access point NSAP one
NSAP per transport entity
Each NSAP can be individually addressed in the global OSI internetwork through its NSAP address end have often colloquially and imprecisely known as an NSAP An OSI system can multiple
NSAP addresses in which case the addresses usually differ only in the last byte known as the
n-selector
associated with It is also useful to address systems network layer without being specific transport when entityfor instance when system participates in routing protocols or addressing an network address intermediate system router Such addressing is done via special known as
title is identical to an but uses the network entity NET NET structurally NSAP address special have unlike n-selector value 00 Most end systems and intermediate systems only single NET
intermediate that is IP routers which usually have one address per interface However an system NETs participating in multiple areas or domains can choose to have multiple
OSI Protocols 20-3 Transport Layer
NETs and NSAP addresses are hierarchical addresses Addressing hierarchies facilitate both administration by allowing multiple levels of address administration and routing by encoding network topology information An NSAP address is first separated into two parts the initial domain
part IDP and the dwnain specic part DSP The IDP is then further divided into the authority
and format identifier AFI and the initial domain identifier IDI
The AR provides information about the structure and content of the IDI and DSP fields including
whether the WI is of variable length and whether the DSP uses decimal or binary notation The IDI
specifies an entity that can assign values to the DSP portion of the address
The DSP is then further subdivided by the authority responsible for its administration Typically
another administrative authority identifier follows allowing address administration to be further
delegated to subauthorities Following that comes information used for routing such as the routing
domain the area with the routing domain the station ID within the area and the selector within the
station Figure 20-2 illustrates the OSI address format
IDP DSP
AFI IDI Area Station Selector
ci
Fiqure 20-2 OSI Address Format
Transport Layer
As with the OSI network both layer connectionless and connection-oriented transport services are offered There are actually five connection-oriented OSI transport protocols TPO TP1 TP2 TP3
and TP4 All but TP4 work only with OSIs connection-oriented network service TP4 works with
both connection-oriented and connectionless services
TPO is the OSI simplest comiection-oriented transport protocol Of the classical transport layer
functions it performs only segmentation and reassembly This means that TPO will note the smallest
maximum size protocol data unit PDU supported by the underlying subnetworks and will break
the transport packet into smaller pieces that are not too big for network transmission
In addition to segmentation and reassembly TP1 offers basic error recovery It numbers all PDUs
and resends those that are unacknowledged TP1 can also reinitiate connections when excessive unacknowledged PDUs occur
TP2 can multiplex and demultiplex data streams over single virtual circuit This capability makes TP2 particularly useful over public data networks PDNs where each virtual circuit incurs Like separate charge TPO and TP TP2 also segments and reassembles PDUs
TP3 combines the features or TP1 and TP2
TP4 is the most popular 051 transport protocol TP4 is similar to the Internet protocol suites Transmission Control Protocol TCP and in fact was based on TCP In addition to TP3s features
TP4 reliable provides transport service It assumes network in which problems are not detected
20-4 Internetworking Technology Overview Upper-Layer Protocols
Upper4ayer Protocos
Principal OSI upper-layer protocols are shown in Figure 20-3
OSI reference model
CMIP DS FTAM MHS VTP Application
ASN.1 ACSE ROSE RTSE
Presentation 051 presentation layer
Session OSI session layer
Figure 20-3 Principal OSI Upper-Layer Protocols
Session Layer
The OSI session-layer protocol turns the data streams provided by the lower four layers into sessions mechanisms include conversation by implementing various control mechanisms These accounting
control that is determining who can talk when and session parameter negotiation
of which the Session conversation control is implemented by use of token the possession provides
that right to communicate The token can be requested and ESs can be given priorities provide for
unequal token use
Presentation Layer
The OSI presentation layer is typically just pass-through protocol for information from adjacent
layers Although many people believe that Abstract Syntax Notation ASN.1 is OSIs
presentation-layer protocol ASN.1 is used for expressing data formats in machine-independent
format This allows communication between applications on diverse computer systems ESs in
manner transparent to the applications
Application Layer
well service elements The OSI application layer includes actual applications as as application
lower The three most ASEs ASEs allows easy communication from applications to layers Remote Service important ASEs are Association Control Service Element ACSE Operations Element ROSE and Reliable Transfer Service Element RTSE ACSE associates application communication names with one another in preparation for application-to-application ROSE
in similar implements generic request-reply mechanism that permits remote operations manner
to that of remote procedure calls RPCs RTSE aids reliable delivery by making session-layer
constructs easy to use
OSI Protocols 20-5 Upper-Layer Protocols
Five OSI applications receive the most attention
Common Protocol network Management Information CMIPOSIs management protocol Like SNMP see Chapter 32 Simple Network Management Protocol for more information and NetView see Chapter 33 IBM Network Management for more information it allows of exchange management information between ESs and management stations which are also ESs
Services Derived from the Consultative Directory DS Committee for International Telegraph and Telephone CCITT X.500 specification this service provides distributed database useful capabilities for upper-layer node identification and addressing
File and Transfer Access Management FTAMOSIs file transfer service In addition to
classical file transfer for which FTAM provides numerous options FTAM also offers distributed
file access facilities in the of NetWare spirit from Novell Inc or Network File System NFS from Sun Microsystems Inc
Message Handling Systems MHS Provides an underlying transport mechanism for electronic messaging applications and other applications desiring store-and-forward services Although similar they accomplish purposes MHS is not to be confused with Novells NetWare MHS see Chapter 19 NetWare Protocols for more information
Virtual Terminal Protocol VTP Provides terminal emulation In other words it allows
to to remote if it computer system appear ES as were directly attached terminal With VTP users can for example run remote jobs on mainframes
20-0 Internetworking Technology Overview CHA TER 21
Banyan VINES
Background
Banyan Virtual Network System VINES implements distributed network operating system based
on proprietary protocol family derived from Xerox Corporations Xerox Network Systems XNS
protocols see Chapter 22 Xerox Network Systems VINES uses client-server architecture in
such file and from with which clients request certain services as printer access servers Along Novells NetWare IBMs LAN Server and Microsofts LAN Manager VINES is one of the best- networks known distributed system environments for microcomputer-based
TechnoHogy Bascs
The VINES protocol stack is shown in Figure 21-1
OSI
reference
model VINES protocol
File Print Other StreetTalk services services applications
RPC
IPC SPP datagram stream
ARP
VIP RTP
ICP
Media-access protocols
Figure 21-1 VINES Protocol Stack
Banyan VINES 21-1 Media Access
Meda Access
The lower two layers of the VINES stack are implemented with variety of well-known media- access Data mechanisms including High-Level Link Control HDLC see Chapter 11 Data Control and Synchronous Link DerivativesX.25 see Chapter 12 X.25 Ethernet see Chapter Ethernet/IEEE 802.3 and Token Ring see Chapter Token Ring/IEEE 802.5
Network Layer
VINES uses the VINES Intern etwork Protocol VIP to perform layer activities including
internetwork routing VINES also its own Address Resolution Protocol supports ARP its own version of the Protocol Routing Information RIP called the Routing Table Protocol RTP and the Internet Control Protocol which ICP provides exception handling and special routing cost
information ARP ICP and RTP packets are encapsulated in VIP header
VNES nternetwork Protoc VP VINES network-layer addresses are 48-bit entities subdivided into network 32 bits and subnetwork The 16 bits portions network number is better described as server number since it is derived from the directly servers key hardware module that identifies unique number and the software
for that options server The subnetwork portion of VINES address is better described as host
since it is number used to identify hosts on VINES networks Figure 21-2 illustrates the VINES address format
32 33 48
Network number Subnet number
Server number Host number
Figure 21-2 VINES Address Format
The network number identifies VINES logical network which is represented as two-level tree
with the root at service node Service nodes which are usually servers provide address resolution
and services to routing clients which represent the leaves of the tree The service node assigns VIP
addresses to clients
When client is powered it broadcasts for All on request servers servers that hear the request The client chooses the respond first response and requests subnetwork host address from that server The server responds with an address consisting of its own network address derived from its concatenated with key subnetwork host address of its own choosing Client subnetwork addresses are typically assigned sequentially starting with 8001H Server subnetwork addresses are The VINES always address selection process is shown in Figure 21-3
21-2 Internetworking Technology Overview Network Layer
Broadcast
any servers
______
Client Server
Server Please
assign me an address
Client Server Server2
Your address is Server Node 8001
Client Server Server
Figure 21-3 VINES Address Selection Process
Dynamic address assignment is not unique in the industry AppleTalk also uses this processbut it is certainly not as common as static address assignment Since addresses are chosen exclusively by the of the there particular server whose address is unique as result of uniqueness hardware key Internet Protocol is very little chance of duplicate address potentially devastating problem on IP and other networks
In the VINES network scheme all servers with multiple interfaces are essentially routers Clients always choose their own server as first-hop router even if another server on the same cable about other routers provides better route to the ultimate destination Clients can learn by receiving for redirect messages from their own server Since clients rely on their servers first-hop routing
VINES servers maintain routing tables to help them find remote nodes
Banyan VINES 21-3 Network Layer
VINES routing tables consist of hosticost where host pairs corresponds to network node that can be reached and cost corresponds to in delay expressed milliseconds to get to that node RTP helps VINES servers find neighboring clients servers and routers
Periodically all clients advertise both their network-layer and their Media Access Control MAClayer addresses with the equivalent of hello packet Hello packets indicate that the client is still operating and network-ready The servers themselves send routing updates to other servers
periodically Routing updates alert other routers to in node changes addresses and network topology
When VINES server receives it checks to if the packet see packet is destined for another server
or if its broadcast If the current server is the the destination server handles the request
appropriately If another server is the the destination current server either forwards the packet the directly if server is neighbor or routes it to the next server in line If the packet is broadcast the current server checks to see if the from the packet came least-cost path If not the packet is discarded If so the packet is forwarded on all interfaces except the one on which it was received This approach helps diminish the number of broadcast storms common problem in other network environments The VINES routing algorithm is shown in Figure 21-4
Figure 21-4 VINES flouting Algorithm
21-4 Internetworking Technology Overview Network Layer
The VIP packet format is shown in Figure 21-5
Field length Variable in bytes
Trans- Destination Destination Source Source Check- Packet Protocol port network subnetwork network subnetwork Data sum length control type number number number number
Figure 21-5 VIP Packet Format
The VIP packet begins with checksum field which is used to detect packet corruption
The packet length field indicates the length of the entire VIP packet
broadcast The transport control field consists of several subfields If the packet is packet two
subfield subfields are provided the class subfield bits through and the hop-count bits through the If the packet is not broadcast packet four subfields are provided the error subfield metric
subfield the redirect subfield and the hop count subfield The class subfield specifies the type of
node that should receive the broadcast For this purpose nodes are broken into various categories
of link the node is the of nodes having to do with the type of node and the type on By specifying type
to receive broadcasts the class subfield reduces the disruption caused by broadcasts The hop count
the has been The error subfield represents the number of hops router traversals packet through
subfield specifies whether the ICP protocol should send an exception notification packet to the
packets source if packet turns out to be unroutable The metric subfield is set to one by transport
entity when it needs to learn the routing cost of moving packets between service node and
neighbor The redirect subfield specifies whether the router should generate redirect when
appropriate
for which the metric or The protocol type field indicates the network- or transport-layer protocol
exception notification packet is destined
The destination network number destination subnetwork number source network number and
source subnetwork number fields provide VIP address information
Routing Tahe Protocol RIP
RTP distributes network topology information Routing update packets are broadcast periodically
by both client and service nodes These packets inform neighbors of nodes existence and also
indicate whether the node is client or service node Service nodes also include in each routing
associated with those update packet list of all known networks and the cost factors reaching networks
and table For Two routing tables are maintained table of all known networks of neighbors
service nodes the table of all known networks contains an entry for each known network except the and service nodes own network Each entry contains network number routing metric pointer
The table of contains to the entry for the next hop to the network in the table of neighbors neighbors Entries include network an entry for each neighbor service node and client node number
used to reach that subnetwork number the media-access protocol for example Ethernet node local-area network LAN address if the medium connecting the neighbor is LAN and neighbor metric
Banyan VINES 21-5 Network Layer
RTP specifies four packet types
Routing update packetsIssued periodically to notify neighbors of an entitys existence
Routing request packetsExchanged by entities when they need to learn the networks topology
quickly
information and used service nodes Routing response packets Contain topological are by to
respond to routing request packets
Routing redirect packetsProvide better path information to nodes using inefficient paths
RTP packets have four-byte header consisting of the following fields
one-byte operation type field which indicates the packet type
one-byte node type field which indicates whether the packet came from service node or nonservice node
one-byte controller type field which indicates whether the controller in the node transmitting
the RTP packet has multibuffer controller
one-byte machine type field which indicates whether the processor in the RTP sender is fast
or slow
Both the controller type and the machine type fields are used for pacing
Address Resokitou ProtocoD ARP
ARP protocol entities are classified as either address resolution clients or address resolution
services Address resolution clients are usually implemented in client nodes whereas address
resolution services are typically provided by service nodes
ARP packets have an 8-byte header consisting of two-byte packet type four-byte network
number and two-byte subnetwork number There are four packet types query request which is
for which is request an ARP service service response response to query request an
assignment request which is sent to an ARP service to request VINES internetwork address and
which is service the an assignment response sent by the ARP as response to assignment request
The network number and fields have in subnet number only meaning an assignment response packet
ARP clients and services implement the following algorithm when client starts up First the client
broadcasts the client query request packets Then each service that is neighbor of responds with service response packet The client then issues an assignment request packet to the first service that
responded to its query request packet The service responds with an assignment response packet
containing the assigned internet address
nternet Contro ProtocoD DCP
ICP defines exception notification and metric notification packets Exception notification packets
provide information about network-layer exceptions metric notification packets contain
information about the final transmission used to reach client node
Exception notifications are sent when VIP packet cannot be routed properly and the error subfield
in the VIP headers transport control field is enabled These packets also contain field identifying
the particular exception by its error code
ICP entities in service nodes generate metric notification messages when the metric subfield in the
VIP headers transport control field is enabled and the destination address in the service nodes
packet specifies one of the service nodes neighbors
21-6 Internetworking Technology Overview Transport Layer
Transport Layer
VINES provides three transport-layer services
Unreliable datagram serviceSends packets that are routed on best-effort basis but not
acknowledged at the destination
Reliable message serviceA virtual-circuit service that provides reliable sequenced and
acknowledged delivery of messages between network nodes reliable message may be
transmitted in maximum of four VIP packets
Data stream serviceSupports the controlled flow of data between two processes The data
stream service is an acknowledged virtual circuit service that supports the transmission of
messages of unlimited size
UpperLayer Protocos
As distributed network VINES uses the remote procedure call RPC model for communication
between clients and servers RPC is the foundation of distributed service environments The NetRPC
that allows to remote protocol layers and provides high-level programming language access
services in manner transparent to both the user and the application
well which At layer VINES offers file-service and print-service applications as as StreetTalk
provides globally consistent name service for an entire internetwork
under several VINES also provides an integrated applications development environment operating
third systems including DOS and UNIX This development environment allows parties to develop
both clients and services that run in the VINES environment
Banyan VINES 21-7 Upper-Layer Protocols
21-8 Internetworking Technology Overview CHAPTER 22
Xerox Network Systems
Background
The Xerox Network Systems XNS protocols were created by Xerox Corporation in the late 1970s
and early l980s They were designed to be used across variety of communication media
and Several resemble the Internet Protocol and processors office applications XNS protocols IP Transmission Control Protocol TCP protocols developed by the Defense Advanced Research Projects Agency DARPA for the U.S Department of Defense DoD See Chapter 18 Internet
Protocols for more information on these and related protocols All XNS protocols meet the basic
design objectives of the OSI reference model
Because of its availability and early entry into the market XNS was adopted by most of the early
LAN companies including Novell Inc Ungermann-B ass Inc now part of Tandem Computers
and 3Com Corporation Each of these companies has since made various changes to the XNS
protocols Novell added the Service Advertisement Protocol SAP to permit resource advertisement
and modified the OSI layer protocols which Novell renamed IPX for Internetwork Packet modified Exchange to run on IEEE 802.3 rather than Ethernet networks Ungermann-B ass RIP to
also made the support delay as well as hop count Other small changes were Over time XNS
implementations for PC networking have become more popular than XNS as it was designed by Xerox
Technoogy Basics
the of Although the XNS design objectives are the same as the OSI reference model XNS concept the reference model protocol hierarchy is somewhat different from that provided by OSI rough
comparison is shown in Figure 22-1
Xerox Network Systems 22-1 Media Access
XNS
OSI Level
Level
Level
______
Level
Level
Figure 22-1 XNS and the OSI Reference Model
As seen in Xerox Figure 22-1 provided five-level model of packet communications Level
corresponds to OSI and link roughly layers handling access and bit-stream manipulation Level corresponds roughly to the portion of OSI layer that pertains to network traffic Level
corresponds to the of OSI that roughly portion layer pertains to internetwork routing and to OSI layer which handles interprocess communication Levels and correspond roughly to the upper two layers of the OSI data model handling structuring process-to-process interaction and XNS has applications no protocol corresponding to OSI layer the session layer
Media Access
Although XNS documentation mentions X.25 Ethernet and High-Level Data Link Control
XNS does not define what it HDLC expressly refers to as level protocol Like many other protocol suites XNS leaves media access an issue open implicitly allowing any such protocol to host the of transport XNS packets over physical medium
Network Layer
The XNS network-layer protocol is called the Internet Data Protocol gram IDP IDP performs standard layer functions including and end-to-end logical addressing datagram delivery across an internetwork The format of an IDP packet is shown in Figure 22-2
22-2 Internetworking Technology Overview Network Layer
Field length in bytes 0-546
ABCD Data
Checksum
Length
Transport control
Packet type Destination network
Destination host
Destination socket Source network
Source host
Source socket
Figure 22-2 lOP Packet Format
The first field in an IDP packet is 16-bit checksum field which helps gauge the integrity of the packet after it traverses the internetwork
The 16-bit length field carries the complete length including checksum of the current datagram
The 8-bit control field contains and subfields transport hop count maximumpacket lifetime MPL
The hop count subfield is initialized to zero by the source and incremented by one as the datagram
reaches the is discarded the passes through router When the hop count field 16 datagram on assumption that routing ioop is occurring The MPL subfield provides the maximum amount of time in seconds that packet can remain on the intemetwork
The 8-bit packet type field specifies the format of the data field
XNS source and destination network addresses each have three fields 32-bit network number that uniquely identifies network in an internetwork 48-bit host number that is unique across all hosts ever manufactured and 16-bit socket number that uniquely identifies socket process within particular host IEEE 802 addresses are equivalent to host numbers so hosts that are connected to more than one IEEE 802 network have the same address on each segment This makes network numbers redundant but nevertheless useful for routing Certain socket numbers are well known meaning that the service performed by the software using them is statically defined All other socket numbers are reusable
XNS supports Ethernet Version 2.0 encapsulation for Ethernet and three types of encapsulation for Token Ring 3Com SubNet Access Protocol SNAP and Ungermann-Bass
XNS supports unicast point-to-point multicast and broadcast packets Multicast and broadcast addresses are further divided into directed and global types Directed multicasts deliver packets to destination multicast members of the multicast group on the network specified in the network address Directed broadcasts deliver packets to all members of specified network Global
entire whereas multicasts deliver packets to all members of the group within the internetwork global broadcasts deliver packets to all internetwork addresses One bit in the host number indicates single versus multicast address All ones in the host field indicate broadcast address
To route packets in an internetwork XNS uses dynamic routing scheme called the Routing Protocol Information Protocol RIP Today RIP is the most commonly used Interior Gateway
IGP in the Internet community which is large international network environment providing
Xerox Network Systems 22-3 Transport Layer
connectivity to many research institutions government agencies and universities and private
businesses in the United States See Chapter 23 Routing Information Protocol for more information on RIP
Transport Layer
OSI transport-layer functions are implemented by several protocols Each of the following protocols
is described in the XNS specification as level protocol
The Sequenced Packet Protocol SPP provides reliable connection-based flow-controlled packet
transmission behalf of client It is similar in function the Internet Protocol suites on processes to Transmission Control Protocol TCP and the OSI protocol suites Transport Protocol TP4 See
Chapter 18 Internet Protocols for more information on TCP and Chapter 20 OSI Protocols for more information on TP4
SPP includes which is used order and determine if Each packet sequence number to packets to any
have been duplicated or missed SPP packets also contain two 16-bit connection identifiers One
connection identifier is specified by each end of the connection Together the two connection
identifiers client uniquely identify logical connection between processes
SPP packets cannot be longer than 576 bytes Client processes can negotiate use of different packet
size during connection establishment but SPP does not define the nature of this negotiation
The Packet Exchange Protocol PEP is request-response protocol designed to have greater
reliability than simple datagram service as provided by IDP for example but less reliability than
SPP PEP is functionally similarto the Internet Protocol suites User Data gram Protocol UDP See
Chapter 18 Internet Protocols for more information on UDP PEP is single-packet based
providing retransmissions but no duplicate packet detection As such it is useful in applications
where request-response transactions are idempotent repeatable without damaging data or where
reliable transfer is executed at another layer
The Error Protocol EP can be used by any client process to notify another client process that
network error has occurred This protocol is used for example in situations where an SPP
implementation has identified duplicate packet
Upper4ayer ProtocoDs
XNS offers several upper-layer protocols The Printing Protocol provides print services The Filing
Protocol provides file-access services The Clearinghouse Protocol provides name services Each of
these three protocols runs on top of the Courier Protocol which provides conventions for data
structuring and process interaction
XNS also defines level protocols These are application protocols but since they have little to do
with actual communication functions the XNS specification does not include any pertinent definitions
the Echo Protocol is used of network nodes Finally to test the reachability XNS It is used to support
functions such as that provided by the ping command found in UNIX and other environments The
XNS specification describes the Echo Protocol as level protocol
22-4 Internetworking Technology Overview
CHAPTER 23
Routing Information Protocol
Background
The Routing Information Protocol RIP is routing protocol originally designed for Xerox PARC
and used in the Universal Protocol where it was called GWINFO Xerox Network Systems XNS and Transmission Control Protocol/Internet protocol suite RIP became associated with both UNIX Protocol TCP/IP in 1982 when the Berkeley Software Distribution BSD version of UNIX began
route which is shipping with RIP implementation referred to as routed pronounced dee RIP
is defined in the still very popular routing protocol in the Internet community formally XNS 1058 Internet Transport Protocols publication 1981 and inRequestfor Comments RFC 1988
for in their RIP has been widely adopted by personal computer PC manufacturers use networking
Maintenance also products For example AppleTalks routing protocol Routing Table Protocol basis the of known as RTMP is modified version of RIP RIP was also the for routing protocols Novell 3Com Ungennann-Bass and Banyan The Novell and 3Com RIPs are basically standard their needs Xerox RIP Ungermann-B ass and Banyan made minor modifications to RIP to serve own
Routng Tabe Format
table of the ultimate Each entry in RIP routing provides vaiiety information including metric indicates the destination the next hop on the way to that destination and metric The be in the distance in number of hops to the destination Other information can also present routing
table is shown in table including various timers associated with the route typical RIP routing
Figure 23-1
Destination Next hop Distance Timers Flags
Network Router tl 12 t3
Network Router ti t2 13
Network Router 11 t2 t3
Figure 23-1 Typical RIP Routing Table
Routing Information Protocol 23-1 Packet Format IP Implementations
RIP maintains only the best route to destination When new information provides better route
this information replaces old route information Network topology changes can provoke changes to
routes causing for example new route to become the best route to particular destination When
network topology changes occur they are reflected in routing update messages For example when
router detects link failure or router failure it recalculates its routes and sends routing update Each messages router receiving routing update message that includes change updates its tables
and propagates the change
Packet Format mpementations
Figure 23-2 shows the RIP packet format for IF implementations as specified by RFC 1058
Note Figure 23-2 shows the RIP format used for IP networks in the Internet Some other RIP
variations make slight modifications to the format and/or to the field names listed here but the basic
routing algorithm is functionally the same
Field length mbytes
Command request or response Version number Zero
Address family identifier Address
Metric
Figure 23-2 RIP Packet Format
The first field in an IP RIP packet is the command field This field carries an integer indicating either or The command the request response request requests responding system to send all or part of
its table Destinations for which is listed later in routing response requested are the packet The
response command represents reply to request or more frequently an unsolicited regular routing
update In the response packet responding system includes all or part of its routing table Regular
routing update messages include the entire routing table
The version number field the RIP version With specifies being implemented the potential for many
RIP implementations in an intemetwork this field can be used to signal different potentially
incompatible implementations
Following 16-bit field of all zeros is the address family identifier field which specifies the
particular address family being used On the Internet large international network connecting
research institutions government institutions universities and private businesses this address
family is typically IF value but other network types may also be represented
After another 16-bit field of zeros is 32-bit address field In Internet RIP implementationsthis field
typically contains an IP address
23-2 Internetworking Technology Overview Stability Features
Following two more 32-bit fields of zeros is the RIP metric which is hop count It indicates how
many internetwork hops routers must be traversed before the destination can be reached
Up to 25 occurrences of the address family identifier through metric fields are permitted to occur in
any single IP RIP packet In other words up to 25 destinations may be listed in any single RIP
packet Multiple RIP packets.are used to convey information from larger routing tables
Like other routing protocols RIP uses certain timers to regulate its performance The RIP routing
update timer is generally set to 30 seconds ensuring that each router will send complete copy of
its routing table to all neighbors every 30 seconds The route invalid timer determines how much
time must expire without router having heard about particular route before that route is
considered invalid When route is marked invalid neighbors are notified of this fact This
notification must occur prior to expiration of the route flush timer When the route flush timer
expires the route is removed from the routing table Typical initial values for these timers are 90
seconds for the route invalid timer and 270 seconds for the route flush timer
Stabilty Features
RIP specifies number of features designed to make its operation more stable in the face of rapid
network topology changes These include hop-count limit hold-downs split horizons and poison
reverse updates
HopCount Umt
RIP permits maximum hop count of 15 Any destination greater than 15 hops away is tagged as
unreachable RIPs maximum hop count greatly restricts its use in large internetworks but prevents
problem called count to infinity from causing endless network routing loops The count-to-infinity
problem is shown in Figure 23-3
Figure 23-3 Count-To-Infinity Problem
In Figure 23-3 consider what will happen if Router ls Rl link link to Network fails Ri
link Network Since examines its infonnation and sees that Router R2 has one-hop to Ri Network and knows it is directly connected to R2 it advertises two-hop path to begins routing
all traffic to Network through R2 This creates routing loop When R2 sees that Ri can now get
show that it has to Network in two hops it changes its own routing table entry to three-hop path
to Network This problem and the routing loop will continue indefinitely or until some external
boundary condition is imposed That boundary condition is RIPs hop-count maximum When the
is removed from the hop count exceeds 15 the route is marked unreachable Over time the route table
Routing Information Protocol 23-3 Stability Features
ol d- Downs
Hold-downs are used to prevent regular update messages from inappropriately reinstating route
that has gone bad When route goes down neighboring routers will detect this These routers then calculate new routes and send out routing update messages to inform their neighbors of the route
change This activity begins wave of routing updates that filter through the network
Triggered updates do not instantly arrive at every network device It is therefore possible that device that has yet to be informed of network failure may send regular update message
indicating that route that has just gone down is still good to device that has just been notified
of the network failure In this case the latter device now contains and potentially advertises
incorrect routing information
Hold-downs tell routers to hold down any changes that might affect recently removed routes for
some period of time The hold-down period is usually calculated to be just greater than the period of
time necessary to update the entire network with routing change Hold-down prevents the count-
to-infinity problem
Split Horizons
Split horizons derive from the fact that it is never useful to send information about route back in
the direction which from it came For example consider Figure 23-4
Co
CC
Network Network
Figure 23-4 Split Horizons
Router Ri initially advertises that it has route to Network There is no reason for Router
R2 to include this route in its update back to Ri as Ri is closer to Network The split-horizon
rule says that R2 should strike this route from any updates it sends to Ri
The split-horizon rule helps prevent two-node routing loops For example consider the case where
Ris interface to Network goes down Without split horizons R2 continues to inform Ri that it
can get to Network through Ri If Ri does not have sufficient intelligence it might actually pick
up R2s route as an alternative to its failed direct connection causing routing ioop Although hold-
downs should prevent this split horizon provides extra algorithm stability
Poison Reverse Updates
Whereas split horizons should prevent routing loops between adjacent routers poison reverse
updates are intended to defeat larger routing loops The idea is that increases in routing metrics indicate generally routing loops Poison reverse updates are then sent to remove the route and place
it in hold-down
23-4 Internetworking Technology Overview CHAPTER 24
Interior Gateway Routing Protocol and
Enhanced Interior Gateway Routing Protocol
Background
in the mid-i 980s The Interior Gateway Routing Protocol IGRP is routing protocol developed by
Cisco Systems Inc Ciscos principal goal in creating IGRP was to provide robust protocol for and of routing within an autonomous system AS having arbitrarily complex topology consisting
media with diverse bandwidth and delay characteristics An AS is collection of networks under
common administration that share common routing strategy ASs are typically given unique Center 16-bit number that is assigned by the Defense Data Network DDN Network Information NIC
Protocol In the mid-1980s the most popular intra-AS routing protocol was the Routing Information
RIP Although RIP was quite useful for routing within small- to moderate-sized relatively homogeneous internetworks its limits were being pushed by network growth In particular RIPs metric did small hop-count limit 16 restricted the size of internetworks and its single hop count information not allow for much routing flexibility in complex environments For more on RIP see robustness of Chapter 23 Routing Information Protocol The popularity of Cisco routers and the with IGRP IGRP have encouraged many organizations with large internetworks to replace RIP
Ciscos initial IGRP implementation worked in Internet Protocol IP networks IGRP was designed
to run in any network environment however and Cisco soon ported it to run in Open System Interconnection OSI Connectionless Network Protocol CLNP networks
of Cisco developed Enhanced IGRP EIGRP in the early 990s to improve the operating efficiency
IGRP EIGRP is discussed in detail later in this chapter
Tech no gy
call for IGRP is distance vector interior-gateway protocol IGP Distance vector routing protocols
intervals each router to send all or portion of its routing table in routing update message at regular
to each of its neighboring routers As routing information proliferates through the network routers
can calculate distances to all nodes within the internetwork
which send Distance vector routing protocols are often contrasted with link state routing protocols Shortest Path local connection information to all nodes in the internetwork See Chapter 25 Open Path First First and Chapter 28 OSI Routing respectively for discussion of Open Shortest
link OSPF and Intermediate System-to-Intermediate System IS-IS two popular state routing
algorithms
and load IGRP uses combination vector of metrics Internetwork delay bandwidth reliability are
factors for each all factored into the routing decision Network administrators can set the weighting
of these metrics IGRP uses either the administrator-set or the default weightings to automatically
calculate optimal routes
Interior Gateway Routing Protocol and Enhanced Interior Gateway Routing Protocol 24-1 Stability Features
and load take value IGRP provides wide range for its metrics For example reliability can on any
to 10 between and 255 bandwidth can take on values reflecting speeds from 1200 bps gigabits the 24th Wide metric per second while delay can take on any value from to to power ranges
allow satisfactory metric setting in intemetworks with widely varying performance characteristics user-definable As Most importantly the metric components are combined in algorithm result
network administrators can influence route selection in an intuitive fashion
Dual lines To provide additional flexibility IGRP permits multipath routing equal-bandwidth may
switchover the second line if run single stream of traffic in round-robin fashion with automatic to
metrics the different one line goes down Also multiple paths can be used even if the for paths are
metric is times For example if one path is three times better than another because its three lower
within certain the better path will be used three times as often Only routes with metrics that are
range of the best route are used as multiple paths
Stabil ty Features
IGRP provides number of features that are designed to enhance its stability These include hold-
downs split horizons and poison reverse updates
HodDowros
Hold-downs are used to prevent regular update messages from inappropriately reinstating route
detect this via the lack of that may have gone bad When router goes down neighboring routers and send regularly scheduled update messages These routers then calculate new routes routing This of update messages to inform their neighbors of the route change activity begins wave
triggered updates that filter through the network
therefore that These triggered updates do not instantly arrive at every network device It is possible
device that has yet to be informed of network failure may send regular update message
notified indicating that route that has just gone down is still good to device that has just been of the network failure In this case the latter device would now contain and potentially advertise
incorrect routing information
Hold-downs tell routers to hold down any changes that might affect routes for some period of time
The hold-down period is usually calculated to be just greater than the period of time necessary to
update the entire network with routing change
SpUt Horzorls
Split horizons derive from the fact that it is never useful to send information about route back in
the direction from which it came For example consider Figure 24-1
Network Network
Figure 24-1 Split Horizons
24-2 Internetworking Technology Overview EIGRP
Router Ri initially advertises that it has route to Network There is no reason for Router
to include this route in its is closer R2 update back to Ri as Ri to Network The split-horizon
rule that R2 should strike this from it sends says route any updates to Ri
The split-horizon rule helps prevent routing loops For example consider the case where Ris
interface to Network down continues inform goes Without split horizons R2 to Ri that it can get to Network through If Ri does not have sufficient intelligence it may actually pick up R2s
route as an alternative to its failed direct connection causing routing loop Aithough hold-downs
should prevent this split horizons are implemented in IGRP because they provide extra algorithm
stability
Poison Reverse Updates
Whereas split horizons should prevent routing loops between adjacent routers poison reverse
updates are intended to defeat larger routing loops Increases in routing metrics generally indicate
routing loops Poison reverse updates are then sent to remove the route and place it in hold-down
In Ciscos implementation of IGRP poison reverse updates are sent if route metric has increased
by factor of .1 or greater
Timers
IGRP maintains number of timers and variables containing time intervals These include an update
timer an invalid timer hold-time period and flush timer The update timer specifies how
frequently routing update messages should be sent The IGRP default for this variable is 90 seconds
invalid in The timer specifies how long router should wait the absence of routing update messages
about specific route before declaring that route invalid The IGRP default for this variable is three
times the update period The hold-time variable specifies the hold-down period The IGRP default
for this variable is three times the update timer period plus ten seconds Finally the flush timer
indicates how much time should pass before route should be flushed from the routing table The
IGRP default is seven times the routing update period
UGRP
With Software Release 9.21 Cisco introduced an enhanced version of IGRP that combines the
advantages of link state protocols with the advantages of distance vector protocols EIGRP
incorporates the Diffusing Update Algorithm DUAL developed at SRI International by Dr J.J
Garcia-Luna-Aceves EIGRP includes the following features
Fast convergenceEIGRP uses DUAL to achieve convergence quickly router running
EIGRP stores all of its neighbors routing tables so that it can quickly adapt to alternate routes
If no appropriate route exists EIGRP queries its neighbors to discover an alternate route These
queries propagate until an alternate route is found
Variable length subnet masksEIGRP includes full support for variable length subnet masks
Subnet routes are automatically summarized on network number boundary In addition
Enhance IGRP can be configured to summarize on any bit boundary at any interface
Partial bounded updates EIGRP does not make periodic updates Instead it sends partial
updates only when the metric for route changes Propagation of partial updates is automatically
bounded so that only those routers that need the information are updated.As result of these two
capabilities EIGRP consumes significantly less bandwidth than IGRP
Interior Gateway Routing Protocol and Enhanced Interior Gateway Routing Protocol 24-3 EIGRP Technology
and Novell Multiple network-layer supportEIGRP includes support for AppleTalk IP Maintenance Protocol NetWare The AppleTalk implementation uses Routing Table RTMP to Protocol redistribute routes The IP implementation can use OSPF RIP I-JSExterior Gateway EGPor Border Gateway Protocol BGP to redistribute routes The Novell implementation can use Novell RIP or Service Advertisement Protocol SAP to redistribute routes
Compatibility with UGRP
automatic EIGRP provides compatibility and seamless interoperation with IGRP routers An
redistribution mechanism allows IGRP routes to be imported into EIGRP and EIGRP routes to be
imported into IGRP so it is possible to add EIGRP gradually into an existing IGRP network
Because the metrics for both protocols are directly translatable they are as easily comparable as if
they were routes that originated in their own ASs In addition EIGRP treats IGRP routes as extemal
routes and provides way for the network administrator to customize them
EGRP Tech noogy
EIGRP features four new technologies
Neighbor discovery/recovery
Reliable Transport Protocol
DUAL finite state machine
Protocol-dependent modules
Neighbor discovery/recovery is the process that routers use to dynamically learn about other routers
on their directly attached networks Routers must also discover when their neighbors become
unreachable or inoperative This process is achieved with low overhead by periodically sending
small hello packets As long as router receives hello packets from neighboring router it assumes
that the neighbor is functioning and they can exchange routing information
The Reliable Transport Protocol RTP is responsible for guaranteed ordered delivery of EIGRP
packets to all neighbors It supports intermixed transmission of multicast or unicast packets For
efficiency only certain EIGRP packets are transmitted reliably For example on multiaccess
network that has multicast capabilities such as Ethernet it is not necessary to send hello packets
reliably to all neighbors individually For that reason EIGRP sends single multicast hello packet
containing an indicator that informs the receivers that the packet need not be acknowledged Other
types of packets such as updates indicate in the packet that acknowledgment is required RTP has
provision for sending multicast packets quickly when unacknowledged packets are pending which links helps ensure that convergence time remains low in the presence of varying speed
all tracks The DUAL finite state machine embodies the decision process for route computations It
all routes advertised by all neighbors DUAL uses distance information to select efficient loop-free
paths and selects routes for insertion in routing table based on feasible successors Afeasible
successor is neighboring router used for packet forwarding that is least-cost path to destination
which is guaranteed not to be part of routing loop When neighbor changes metric or when
topology change occurs DUAL tests for feasible successors If one is found DUAL uses it to avoid
recomputing the route unnecessarily When there are no feasible successors but there are neighbors
advertising the destination recomputation also known as diffusing computation must occur to
determine new successor Although recomputation is not processor intensive it does affect
convergence time so it is advantageous to avoid unnecessary recomputations
The protocol-dependent modules are responsible for network-layer protocol-specific requirements
For example the IP-EIGRP module is responsible for sending and receiving EIGRP packets that are
encapsulated in IP IP-EIGRP is also responsible for parsing EIGRP packets and informing DUAL
24-4 Internetworking Technology Overview EIGRP Technology
of the new information that has been received IP-EIGRP asks DUAL to make routing decisionsthe
results of which are stored in the IP routing table IP-EIGRP is responsible for redistributing routes
learned by other IP routing protocols
The consistent and superior performance of EIGRP relies on several new features
Packet types
Neighbor tables
Topology tables
Route states
Route tagging
Packet Types
EIGRP uses five packet types
Hello/acknowledgment
Update
Query
Reply
Request
An Hello packets are multicast for neighbor discovery/recovery and do not require acknowledgment contain acknowledgment packet is hello packet that has no data Acknowledgment packets
nonzero acknowledgment number and they are always sent using unicast address
Update packets are used to convey reachability of destinations When new neighbor is discovered
unicast update packets are sent so the neighbor can build up its topology table In other cases such
as link cost change updates are multicast Updates are always transmitted reliably
Query and reply packets are sent when destination has no feasible successors Query packets are
in to indicate to the always multicast Reply packets are sent response to query packets originator that the originator does not need to recompute the route because there are feasible successors Reply Both and transmitted packets are unicast to the originator of the query query reply packets are
reliably
Request packets are used to get specific information from one or more neighbors Request packets unicast transmitted are used in route server applications and can be multicast or Request packets are
unreliably
Neighbor Tabes
address and interface When router discovers new neighbor it records the neighbors as an entry module When in the neighbor table There is one neighbor table for each protocol-dependent
the of time router treats neighbor sends hello packet it advertises hold time which is amount received within the hold hold neighbor as reachable and operational If hello packet isnt timethe
time expires and DUAL is informed of the topology change
numbers The neighbor table entry also includes information required by RTP Sequence are number received from employed to match acknowledgments with data packets The last sequence
transmission list is used the neighbor is recorded so out-of-order packets can be detected to queue
timers in the packets for possible retransmission on per-neighbor basis Round-trip are kept retransmission interval neighbor table entry to estimate an optimal
Protocol 24-5 Interior Gateway Routing Protocol and Enhanced Interior Gateway Routing EIGRP Technology
Topology Tables
The topology table contains all destinations advertised by neighboring routers The protocol-
dependent modules populate the table and the table is acted on by the DUAL finite state machine
Each entry in the topology table includes the destination address and list of neighbors that have advertised the destination For each neighbor the entry records the advertised metric which the
in neighbor stores its routing table An important rule that distance vector protocols must follow is
that if the neighbor is advertising this destination it must be using the route to forward packets
The metric that the router uses to reach the destination is also associated with the destination The
metric that the router uses in the routing table and to advertise to other routers is the sum of the best
advertised metric from all neighbors plus the link cost to the best neighbor
Route States
topology table entry for destination can be in one of two states active or passive destination
is in the passive state when the router is not performing recomputation or in the active state when
the router is performing recomputation If feasible successors are always available destination
never has to go into the active state thereby avoiding recomputation
recomputation occurs when destination has no feasible successors The router initiates the
recomputation by sending query packet to each of its neighboring routers The neighboring router
can send reply packet indicating it has feasible successor for the destination or it can send
query packet indicating that it is participating in the recomputation While destination is in the
active state router cannot change the destinations routing table information Once the router has received reply from each neighboring router the topology table entry for the destination returns to
the passive state and the router can select successor
Route Tagging
EIGRP supports internal and external routes Internal routes originate within an EIGRP AS
Therefore directly attached network that is configured to run EIGRP is considered an internal
route and is propagated with this information throughout the EIGRP AS External routes are learned
by another routing protocol or reside in the routing table as static routes These routes are tagged
individually with the identity of their origin
External routes are tagged with the following information
The router ID of the EIGRP router that redistributed the route
The AS number of the destination
configurable administrator tag
The ID of the external protocol
The metric from the external protocol
Bit flags for default routing
Route allows the network administrator tagging to customize routing and maintain flexible policy
controls Route tagging is particularly useful in transit ASs where EIGRP typically interacts with an
interdomain that routing protocol implements more global policies resulting in very scalable
policy-based routing
24-6 lnternetworking Technology Overview CH pTE 25
Open Shortest Path First
Background
Open Shortest Path First OSPF is routing protocol developed for Internet Protocol IF networks
by the interior gateway protocol IGP working group of the Internet Engineering Task Force IETF
in IGP based the shortest The working group was formed 1988 to design an on path first SPF
algorithm for use in the Internet large international network connecting research institutions
government agencies universities and private businesses Like the Interior Gateway Routing Protocol IGRP see Chapter 24 Interior Gateway Routing Protocol and Enhanced Interior
Gateway Routing Protocol for more information OSPF was created because the Routing unable Information Protocol RIP was in the mid-1980s increasingly to serve large heterogeneous Protocol for information RIP internetworks See Chapter 23 Routing Information more on
OSPF was derived from several research efforts including
Bolt Beranek and Newmans BBNs SPF algorithm developed in 1978 for the ARPANET
landmark packet-switching network developed in the early 1970s by BBN
Dr Perlmans research on fault-tolerant broadcasting of routing information 1988
BBNs work on area routing 1986
An early version of OSIs Intermediate System-to-Intermediate System IS-IS routing protocol
See Chapter 28 OSI Routing for more information on IS-IS
that it is in that As indicated by its acronym OSPF has two primary characteristics The first is open For its specification is in the public domain The OSPF specification is published as Request
second characteristic is that it is based on the SPF Comments RFC 1247 The principal algorithm
credited with its which is sometimes referred to as the Dijkstra algorithm named for the person
creation
Technoogy Bascs
advertisements OSPF is link state routing protocol As such it calls for the sending of link state within the hierarchical Information on attached interfaces LSA5 to all other routers same area
metrics used and other variables is included in OSPF LSAs As OSPF routers accumulate link state node information they use the SFF algorithm to calculate the shortest path to each
As link state algorithm OSPF contrasts with RIP and IGRP which are distance vector routing
their tables protocols Routers running the distance vector algorithm send all or portion of routing
in routing update messages but only to their neighbors
Open Shortest Path First 25-1 Routing Hierarchy
Routing Herarchy
Unlike RIP OSPF can operate within hierarchy The largest entity within the hierarchy is the
autonomous system AS An AS is collection of networks under common administration sharing
common routing strategy OSPF is an intra-AS interior gateway routing protocol although it is
capable of receiving routes from and sending routes to other ASs
An AS be divided into number of An is of can areas area group contiguous networks and
attached hosts Routers with multiple interfaces can participate in multiple areas These routers
which are called area border routers maintain separate topological databases for each area
topological database is essentially an overall picture of networks in relationship to routers The
topological database contains the collection of LSAs received from all routers in the same area
Because within the routers same area share the same information they have identical topological databases
The term domain is sometimes used to describe portion of the network in which all routers have
identical topological databases Domain is frequently used interchangeably with AS
An areas topology is invisible to entities outside the area By keeping area topologies separate
OSPF passes less routing traffic than it would if the AS were not partitioned
Area partitioning creates two different types of OSPF routing depending on whether the source and
destination are in the same or different areas Intra-area routing occurs when the source and
destination are in the same area interarea routing occurs when they are in different areas
An OSPF backbone is responsible for distributing routing information between areas It consists of
all area border routers networks not wholly contained in any area and their attached routers Figure 25-1 shows an example of an intemetwork with several areas
25-2 Internetworking Technology Overview Routing Hierarchy
Routérl
Router 11
Autonomous system
Cl
Figure 25-1 Hierarchical OSPF Internetwork
In this figure Routers 56 10 11 and 12 make up the backbone If host Hi in Area wishes to
send packet to host H2 in Area the packet is sent to Router 13 which forwards the packet to
Router 12 which sends the packet to Router ii Router ii forwards the packet along the backbone
to area border router Router 10 which sends the packet through two intra-area routers Router and
Router to be forwarded to host H2
The backbone itself is an OSPF area so all backbone routers use the same procedures and algorithms
to maintain routing information within the backbone that any area router would The backbone
topology is invisible to all intra-area routers as are individual area topologies to the backbone
Areas can be defined in such way that the backbone is not contiguous In this case backbone
connectivity must be restored through virtual links Virtual links are configured between any
backbone routers that share link to nonbackbone area and function as if they were direct links
AS border routers running OSPF learn about exterior routes through exterior gateway protocols Border Protocol EGPs such as Exterior Gateway Protocol EGP or Gateway BGP or through
configuration information See Chapter 26 Exterior Gateway Protocol and Chapter 27 Border
Gateway Protocol respectively for more information on these protocols
Open Shortest Path First 25-3 The SPF Algorithm
The SPF AHgorthm
The SPF routing algorithm is the basis for OSPF operations When an SPF router is powered up it
initializes its routing protocol data structures and then waits for indications from lower-layer
protocols that its interfaces are functional
Once router is assured that its interfaces are functioningit uses the OSPF Hello protocol to acquire
neighbors Neighbors are routers with interfaces to common network The router sends hello
packets to its neighbors and receives their hello packets In addition to helping acquire neighbors
hello packets also act as keepalives to let routers know that other routers are still functional
On multiaccess networks networks supporting more than two routers the Hello protocol elects
designated router and backup designated router The designated router is responsible among other
things for generating LSAs for the entire multiaccess network Designated routers allow reduction
in network traffic and in the size of the topological database
When the link state databases of two neighboring routers are synchronized the routers are said to be
adjacent On multiaccess networks the designated router determines which routers should become
adjacent Topological databases are synchronized between pairs of adjacent routers Adjacencies
control the distribution of routing protocol packets These packets are sent and received only on
adjacencies
Each router periodically sends an LSA LSAs are also sent when.a routers state changes LSAs
include information on routers adjacencies By comparing established adjacencies to link states
failed routers can be quickly detected and the networks topology altered appropriately From the
topological database generated from LSAs each router calculates shortest-path tree with itself as
root The shortest-path tree in turn yields routing table
Packet Format
All OSPF packets begin with 24-byte header as shown in Figure 25-2
Field length
in bytes Variable
Authent Version Packet Check- Type Router ID Area ID ication Authentication Data number length sum type
Figure 25-2 OSPF Header Format
The first field in the OSPF header is the OSPF version number The version number identifies the
particular OSPF implementation being used
Following the version number is the type field There are five OSPF packet types
Hello Sent at regular intervals to establish and maintain neighbor relationships
Database description Describes the contents of the topological database and are exchanged
when an adjacency is being initialized
Link state requestRequests pieces of neighbors topological database They are exchanged
after router has discovered through examination of database description packets that parts of
its topological database are out of date
25-4 Internetworking Technology Overview Additional OSPF Features
Link state updateResponses to link state request packets They are also used for the regular
dispersal of LSAs Several LSAs maybe included within single packet
Link state acknowledgmentAcknowledges link state update packets Link state update packets
must be explicitly acknowledged to ensure that link state flooding throughout an area is reliable process
Each LSA in link state update packet contains type field There are four LSA types
Router links advertisements RLAsDescribe the collected states of the routers links to
specific area router sends an RLA for each area to which it belongs RLAs are flooded
throughout the entire area and no further
Network links advertisements NLAsSent by the designated routers They describe all the
routers that are attached to .multiaccess network and are flooded throughout the area containing
the multiaccess network
Summary links advertisements SLAsSummarize routes to destinations outside an area but
within the AS They are generated by area border routers and are flooded throughout the area
Only intra-area routes are advertised into the backbone Both intra-area and interarea routes are
advertised into the other areas
AS external links advertisementsDescribe route to destination that is external to the AS AS
external links advertisements are originated by AS boundary routers This type of advertisement
is the only type that is forwarded everywhere in the AS all others are forwarded only within
specific areas
Following the OPSF packet headers type field is packet length field which provides the packets
length including the OSPF header in bytes
The router ID field identifies the packets source
The area ID field identifies the area to which the packet belongs All OSPF packets are associated
with single area
standard IP checksum field checks the entire packet contents for potential damage suffered in
transit
The authentication type field contains an authentication type Simple password is an example of
an authentication type All OSPF protocol exchanges are authenticated The authentication type is
configurable on per-area basis
The authentication field is 64 bits in length and contains authentication information
Additona OSPF Features
Additional OSPF features include equal-cost multipath routing and routing based on upper-layer
type of service TOS requests TOS-based routing supports those upper-layer protocols that can
specify particular types of service For example an application might specify that certain data is
urgent If OSPF has high-priority links at its disposal these can be used to transport the urgent datagram
OSPF supports one or more metrics If only one metric is used it is considered to be arbitrary and
lOS is not supported If more than one metric is used TOS is optionally supported through the use for each of the combinations of separate metric and therefore separate routing table eight
created by the three IP TOS bits the delay throughput and reliability bits For example if the IP
calculates routes to all TOS bits specify low delay low throughput and high reliability OSPF
destinations based on this TOS designation
Open Shortest Path First 25-5 Additional OSPF Features
IP subnet masks are included with each advertised destination enabling variable-length subnet
masks With variable-length subnet masks an IP network can be broken into many subnets of
various sizes This provides network administrators with extra network configuration flexibility
25-6 Internetworking Technology Overview 26
Exterior Gateway Protocol
Background
used in the The Exterior Gateway Protocol EGP is an interdomain reachability protocol Internet and large international network connecting research institutions government agencies universities
private commercial businesses EGP is documented in Request For Comments RFC 904 published
in April 1984
As the first exterior gateway protocol to gain widespread acceptance in the Internet EGP served
valuable purpose Unfortunately EGPs weaknesses have become more apparent as the Internet has grown and matured Because of these weaknesses EGP is currently being phased out of the Internet
and is being replaced by other exterior gateway protocols such as the Border Gateway Protocol
BGP and the Interdomain Routing Protocol IDRP For more information on these protocols see
Chapter 27 Border Gateway Protocol and Chapter 28 OSI Routing
Technoogy Bascs
EGP was originally designed to communicate reachability to and from the ARPANET core routers
in distinct administrative domains Information was passed from individual source nodes ntemet
which the information the called autonomous systems ASs up to the core routers passed through network within another This backbone until it could be passed down to the destination AS in 26-1 relationship between EGP and other ARPANET components is shown Figure
Core roUteu
Figure 26-1 EGP and the ARPANET
does metrics Although EGP is dynamic routing protocol it uses very simple design It not use contain network and therefore cannot make intelligent routing decisions EGP routing updates reachable reachability information In other words they specify that certain networks are through
certain routers
Exterior Gateway Protocol 26-1 Packet Format
EGP has three primary functions First routers running EGP establish set of neighbors These
neighbors are simply routers with which an EGP router wishes to share reachability information
there is no implication of geographic proximity Second EGP routers polls their neighbors to see if
they are alive Third EGP routers send update messages containing information about the
reachability of networks within their ASs
Packet Format
An EGP packet is shown in Figure 26-2
Field length in bytes Variable
EGP Autonomous Sequence version Type Code Status Checksum system Data number number number
Figure 26-2 EGP Packet Format
The first field in the EGP packet header is the EGP version number field This field identifies the
current EGP version and is checked by recipients to determine whether there is match between the
sender and recipient version numbers
field identifies the defines five shown in Table The type message type EGP separate message types 26-1
Table 26-1 EGP Message Types
Message Function
Neighbor acquisition Establishes/de-establishes neighbors
Neighbor reachability Determines if neighbors are alive
Poll Determines reachability of particular network
Routing update Provides routing updates
Error Indicates error conditions
The code field distinguishes among message subtypes
The status field contains message-dependent status information Status codes include insufficient
resources parameter problemprotocol violation and others
The checksum field is used to detect possible problems that may have developed with the packet in
transit
The autonomous system number field identifies the AS to which the sending router belongs
The sequence number field is the last field in the EGP packet header This field allows two EGP
routers exchanging messages to match requests with replies The sequence number is initialized to
zero when neighbor is established and incremented by one with each request-response transaction
26-2 Internetworking Technology Overview Message Types
Message Types
fields the Additional fields follow the EGP header The contents of these vary depending on message
type as specified by the type field
Neighbor Acquisition
field The hello The neighbor acquisition message includes hello interval field and poll interval
interval interval field specifies the interval period for testing whether neighbors are alive The p011
field specifies the routing update frequency
Neighbor Reachability
The neighbor reachability message adds no extra fields to the EGP header These messages use the code field to indicate whether the message is hello message or response to hello message
Separating the reachability assessment function from the routing update function reduces network
traffic because network reachability changes usually occur more often than routing parameter have been received does an changes Only after specified percentage of reachability messages not
EGP node declare neighbor to be down
Poll
relative location of remote hosts The To provide correct routing between ASs EGP must know the information about the networks which poll message allows EGP routers to acquire reachability on these hosts reside These messages only have one field beyond the common headerthe IP source
for the network field This field specifies the network to be used as reference point request
Ronting Update
locations of various Routing update messages provide way for EGP routers to indicate the include networks within their ASs In addition to the common header these messages many
of interior additional fields The number of interior gateways field indicates the number gateways number of exterior appearing in the message The number of exterior gateways field indicates the IP address of the gateways appearing in the message The IP source network field provides the of blocks network from which reachability is measured Following this field is series gateway and distances Each gateway block provides the IF address of gateway and list of networks
associated with reaching those networks
distance there Within the gateway block EGP lists networks by distances In other words at three of networks may be four networks These networks are then listed by address The next group may be those that are distance four away and so on
EGP does not interpret the distance metrics that are contained within the routing update messages distance value In essence EGP uses the distance field to indicate whether path exists the can only
if this EGP is be used to compare paths those paths exist wholly within particular AS For reason limitations more reachability protocol than routing protocol This restriction also places topology
be tree structure on the structure of the Internet Specifically an EGP portion of the Internet must within the This in which core gateway is the root and there are no loops among other ASs tree
restriction is primary limitation of EGP and provides an impetus for its gradual replacement by
other more capable exterior gateway protocols
Exterior Gateway Protocol 26-3 Message Types
Error
Error messages identify various EGP error conditions In addition to the common EGP header EGP
error messages provide reason field followed by an error message header Typical EGP errors
reasons include bad EGP header format bad EGP data field format excessive polling rate and
the unavailability of reachability information The error message header consists of the first three
32-bit words of the EGP header
26-4 lnternetworking Technology Overview CHAPTER 27
Border Gateway Protoco
Background
Exterior gateway protocols are designed to route between routing domains In the terminology of the
Internet large international network connecting research institutions government agencies
universities and private businesses routing domain is called an autonomous system AS .The first
exterior gateway protocol to achieve widespread acceptance in the Internet was the Exterior
Gateway Protocol EGP See Chapter 26 Exterior Gateway Protocol for more information on
EGP Although EGP is useful technology it has several weaknesses including the fact that it is
more reachability protocol than routing protocol
The Border Gateway Protocol BGP represents an attempt to address the most serious of EGPs
problems BGP is an inter-AS routing protocol created for use in the Internet Unlike EGP BGP was
designed to detect routing loops BGP may be thought of as next-generation EGP Indeed BGP and
other inter-AS routing protocols are slowly replacing EGP in the Internet BGP Version is
specified in Request For Comments RFC 1163
To address the needs of the growing Internet BGP continues to evolve future version of BGP will
give it the ability to aggregate or summarize groups of similar routes into one route
TechnoHogy Bas cs
within and between Although BGP was designed as an inter-AS protocol it can be used both ASs
Two BGP neighbors communicating between ASs must reside on the same physical network BGP
routers within the same AS communicate with one another to ensure that they have consistent view
of the AS and to determine which BGP router within that AS will serve as the connection point to or
from certain external ASs
Some ASs are merely pass-through channels for network traffic In other words some ASs carry with network traffic that did not originate within and is not destined for them BGP must interact
whatever intra-AS routing protocols exist within these pass-through ASs
BGP update messages consist of network number/AS path pairs The AS path contains the string of the ASs through which the specified network may be reached These update messages are sent over
Transmission Control Protocol transport mechanism to ensure reliable delivery
The initial data exchange between two routers is the entire BGP routing table Incremental updates
are sent out as the routing tables change Unlike some other routing protocols BGP does not require
periodic refresh of the entire routing table Instead routers running BGP retain the latest version of
each table maintains table with all feasible to peer routing Although BGP routing paths particular
network it only advertises the primary optimal path in its update messages
Border Gateway Protocol 27-1 Packet Format
The BGP metric is an arbitrary unit number specifying the degree of preference of particular path
These metrics are typically assigned by the network administrator through configuration files
Degree 91 preference may be based on any number of criteria including AS count paths with smaller AS link link stable fast count are generally better type of is the reliable and other factors
Packet Format
The BGP packet format is shown in Figure 27-1
Held length
in bytes
Co
Figure 27-1 BGP Packet Format
BGP packets have common 19-byte header consisting of three fields
The marker field is 16 bytes long and contains value that the receiver of the message can
predict.This field is used for authentication
The length field contains the total length of the message in bytes
The field the type specifies message type
Messages
Four message types are specified in RFC 1163
Open
Update
Notification
Keepalive
Open
After transport protocol connection is established the first message sent by each side is an open
message If the open message is acceptable to the recipient keepalive message confirming the open message is sent back Upon successful confirmation of the open message updates keepalives and notifications may be exchanged
In addition to the common BGP packet header open messages define several fields The version field
provides BGP version number and allows the recipient to check that it is running the same version the sender as The autonomous system field provides the AS number of the sender The hold-time
field indicates the maximum number of seconds that may elapse without receipt of message before
the transmitter is assumed to be dead The authentication code field indicates the authentication type being used if any The authentication data field contains actual authentication data if any
27-2 Internetworking Technology Overview Messages
Update
BGP update messages provide routing updates to other BGP systems Information in these messages
is used to construct graph describing the relationships of the various ASs In addition to the
common BGP header update messages have several additional fields These fields provide routing
information by listing path attributes corresponding to each network
BGP currently defines five attributes
OriginCan take on one of three values IGP EGP and incomplete The TOP attribute means
that the network is part of the AS The EGP attribute means that the information was originally
learned from the EGP BGP implementations would be inclined to prefer IGP routes over EGP
fails The attribute is used routes since EGP in the presence of routing loops incomplete to
indicate that the network is known via some other means
AS pathProvides the actual list of ASs on the path to the destination
Next hopProvides the IP address of the router that should be used as the next hop to the
networks listed in the update message
UnreachableIf present indicates that route is no longer reachable
Inter-AS metricProvides way for BOP router to advertise its cost to destinations within its
own AS This information can be used by routers external to the advertisers AS to select an
optimal route into the AS to particular destination
Notificaton
Notification messages are sent when an error condition has been detected and one router wishes to
tell another why it is closing the connection between them Aside from the common BGP header
notification messages have an error code field an error subcode field and error data The error code
field indicates the type of error and can be one of the following
Message header errorIndicates problem with the message header such as an unacceptable
message length an unacceptable marker field value or an unacceptable message type
Open message errorIndicates problem with an open message such as an unsupported version
number an unacceptable AS number or IP address or an unsupported authentication code
Update message errorIndicates problem with the update message Examples include
malformed attribute list an attribute list error and an invalid next-hop attribute
Hold time expiredIndicates hold-time expiration after which BGP node will be declared dead
KeepaUive
in the header Keepalive messages do not contain any additional fields beyond those common BGP These messages are sent often enough to keep the hold-time timer from expiring
Border Gateway Protocol 27-3 Messages
21-4 Internetworking Technology Overview 28
OS Routing
Background
Several routing protocols have been or are being developed under the auspices of the International
Organization for Standardization ISO ISO refers to the Intermediate System to Intermediate National System Intradomain Routing Exchange Protocol IS-IS as ISO 10589 The American
Standards Institute ANSI X3S3 .3 network and transport layers committee was the motivating
force behind ISO standardization of IS-IS Other ISO protocols associated with routing include ISO
9542 End System-to-Intermediate System or ES-IS and ISO 10747 IS-IS Interdomain Routing
Protocol or IDRP Both of these protocols are discussed briefly in this chapter but the focus is on
the intradomain version of IS-IS
IS-IS is based on work originally done at Digital Equipment Corporation for Phase DECnet
Although IS-IS was created to route in ISO Connectionless Network Protocol CLNP networks
version has since been created to support both CLNP and Internet Protocol IF networks This
variety of IS-IS is usually referred to as Integrated IS-IS and has also been called Dual IS-IS
Integrated IS-IS is also discussed briefly
Term no gy
The world of OSI internetworking has unique terminology The term end system ES refers to any
nonrouting network node the term intermediate system IS refers to router These terms are the
basis for the OSI protocols ES-IS which allows ESs and ISs to discover each other and IS-IS which
provides routing between ISs Several other important OSI internetworking terms are defined as
follows
and attached hosts that to be AreaA group of contiguous networks are specified an area by
network administrator or manager
Domain collection of connected areas Routing domains provide full connectivity to all end
systems within them
Level routingRouting within level area
Level routingRouting between level areas
Figure 28-1 shows the relationship between these terms
OSI Routing 28-1 ES-IS
Domain
Figure 28-1 Hierarchies in OSI Internetworks
From purely technological standpoint IS-IS is quite similar to the Open Shortest Path First
OSPF routing protocol see Chapter 25 Open Shortest Path First for more information on of the OSPF Both are link state protocols Both offer variety f7eatures not provided by Routing Information Protocol RIP including routing hierarchiespath splitting type-of-service TOS
support authentication support for multiple network-layer protocols and with Integrated IS-IS
support for variable length subnet masks
ESiS
ES-IS is more discovery protocol than routing protocol Through ES-IS ESs and ISs learn about
each other This process is known as configuration And because configuration must happen before
routing between ESs can occur ES-IS is discussed here
ES-IS distinguishes between three different types of subnetworks
Point-to-point subnet-worksProvide point-to-point link between two systems Many wide-
area network WAN serial links are point-to-point networks
Broadcast subnetworksDirect single physical message to all nodes on the subnetwork
Ethernet and IEEE 802.3 are examples of broadcast subnetworks For more information about
Ethernet and IEEE 802.3 see Chapter Ethernet/IEEE 802.3
General-topology subnetworks Support an arbitrary number of systems However unlike
broadcast subnetworks the cost of an n-way transmission scales directly with the subnetwork
size on general-topology subnetwork X.25 is an example of general-topology subnetwork
For more information about X.25 see Chapter 12 X.25
Configuration information is transmitted at regular intervals through two types of messages ES hello
messages ESHs are generated by ESs and sent to every IS on the subnetwork IS hello messages
ISHs are generated by ISs and sent to all ESs on the subnetwork These hello messages are
primarily intended to convey the subnetwork and network-layer addresses of the systems that
generate them
28-2 Internetworking Technology Overview Is-Is
information Where possible ES-IS attempts to send configuration to many systems simultaneously
all ISs multicast On broadcast subnetworks ES-IS hello messages are sent to through special address ISs send hello messages to special multicast address designating all end systems When does transmit operating on general-topology subnetwork ES-IS generally not configuration
information because of the high cost of multicast transmissions
OSI ES-IS conveys both network-layer addresses and subnetwork addresses network-layer
addresses either the service which is the interface between identify network access point NSAP
and the title is the in an OSI IS layer layer or network entity NET which network layer entity
OSI subnetwork addresses sometimes called subneiwork point of attachment addresses or SNPAs address are the points at which an ES or IS is physically attached to subnetwork The SNPA the uniquely identifies each system attached to the subnetwork In an Ethernet network for example information SNPA is the 48-bit Media Access Control MAC address Part of the configuration transmitted by ES-IS is the NSAP-to-SNPA or NET-to-SNPA mapping
Figure 28-2 shows the frame formats of both ESH and ISH packets
ESH
Field length in bytes bits Variable
Network Version Number of Source Source layer Length protocol Type of Holding Check- Reserved source address addresses protocol indicator ID packet time sum addresses length identifier extensions
May be
ISH repeated
Field length Variable in bytes bits
Network Version
layer Length protocol Type of Holding Check- Net Reserved NET protocol indicator ID packet time sum length
identifier extensions
Figure 28-2 ESH and ISH Packet Formats
s.is
IS-IS is link state routing protocol It floods the network with link state information in order to
build complete consistent picture of network topology
Routing Hierarchy
between level and level ISs Level To simplify router design and operation IS-IS distinguishes
ISs know how to communicate with other level ISs in the same area Level ISs know how to
communicate with ISs in other areas To summarize level lISs form level areas level ISs route
between level areas
Level 2ISs form an intradomain routing backbone In other words level ISs can get to other level
because level ISs now need ISs by traversing only level ISs The backbone simplifies design only
can also without to know how to get to the nearest level 21S The backbone routing protocol change
impacting the intra-area routing protocol
OSI Routing 28-3 Is-Is
kiter-ES Communication
OSI routing is accomplished as follows Each ES lives in particular area ESs discover the nearest
IS by listening to ISH packets When an ES wants to send packet to another ES it sends the packet
to one of the ISs on its directly attached network The router looks up the destination address and
forwards the packet along the best route If the destination ES is on the same subnetwork the local
IS will know this from listening to ESHs and will forward the packet appropriately In this case the
IS may also provide redirect RD message back to the source to tell it that more direct route is
available If the destination address is an ES on another subnetwork in the same area the IS will
know the correct route and will forward the packet appropriately If the destination address is an ES
in another area the level IS sends the packet to the nearest level IS Forwarding through level
ISs continues until the packet reaches level IS in the destination area Within the destination area
ISs forward the packet along the best path until the destination ES is reached
and which it is well the Each IS generates an update specifying the ESs ISs to connected as as
associated metrics The update is sent to all neighboring ISs which forward flood it to their
neighbors and so on sequence numbers terminate the flood and distinguish old updates from new
ones Because all ISs receive link state updates from all other ISs each IS can build complete full
topology database When the topology changes new updates are sent
Metrics
The metric is IS-IS uses single required default metric with maximum path value of 1024
link have maximum arbitrary and is typically assigned by network administrator Any single can metric values value of 64 Path lengths are calculated by summing link values Maximum were set time at these levels to provide the granularity to support various link types while at the same
ensuring that the shortest path algorithm used for route computation would be reasonably efficient
IS-IS also defines three additional metrics costs as an option for those administrators who feel they
The reflects the of the link The cost reflects the are necessary delay cost amount delay on expense
communications cost associated with using the link The error cost reflects the error rate of the link
IS-IS maintains mapping of these four metrics to the quality of service QOS option in the CLNP
packet header Using these mappings IS-IS can compute routes through the internetwork
Packet Format
Is-IS uses three basic packet formats
IS-IS hello packets
Link state packets LSPs
Sequence numbers packets SNPs
Each of the three IS-IS packets has complex format with three different logical parts The first part
is an eight-byte fixed header shared by all three packet types The second part is packet-type-
specific portion with fixed format The third logical part is also packet-type-specific but is of
variable length The logical format of IS-IS packets is shown in Figure 28-3
Packet-type- Packet-type-
Common header specific specific variable-
fixed header length header ______
Figure 28-3 IS-IS Logical Packet Format
28-4 Internetworking Technology Overview Integrated IS-IS
Each of the three packet types shares common header as shown in Figure 28-4
Field length
mbytes
Figure 28-4 IS-IS Common Header Format
The first field in the IS-IS common header is the protocol identfler which identifies the IS-IS
protocol This field contains constant 131
The header length field contains the fixed header length The length is always equal to eight bytes
but is included so that IS-IS packets wont differ significantly from CLNP packets
The version field is equal to one in the current IS-IS specification
The ID length field specifies the size of the ID portion of an NSAP if between one and eight
inclusive If the field contains zero the ID portion equals six bytes If the field contains 255 all
ones the ID portion is zero bytes
field the of IS-IS The packet type specifies type packet hello LSP or SNP
The version field is repeated after the packet type field
The reserved field is equal to zero and is ignored by the receiver
The maximum area addresses field specifies the number of addresses permitted in this area
Following the common header each packet type has different additional fixed portion followed
by variable portion
ntegrated SIS
Integrated IS-IS is version of IS-IS that uses single routing algorithm to support more network-
layer protocols than just CLNP Integrated IS-IS is sometimes called Dual IS-IS after version
designed for IP and CLNP networks
Several fields are added to IS-IS packets to allow IS-IS to support additional network layers These
fields inform routers about
The reachability of network addresses from other protocol suites
Which protocols are supported by which routers
Other information required by specific protocol suite
network in Integrated IS-IS represents one of two ways of supporting multiple layer protocols
router the other being the ships-in-the-night approach Ships-in-the-night advocates the use of
that the completely separate and distinct routing protocol for each network protocol so multiple
routing protocols essentially exist independently with different types of routing information passing
tables like ships in the night The ability to route multiple network-layer protocols through
calculated by single routing protocol saves some router resources
OSI Routing 28-5 Interdomain Routing Protocol IDUP
nterdoma n Routng Protoc DRP
domains As it is IDRP is the OSI protocol designed to move information between routing such
and IS-IS IDRP is based on the Border designed to operate seamlessly with CLNP ES-IS Gateway Protocol BGP an interdomain routing protocol that originated in the IP community For more information on BGP see Chapter 27 Border Gateway Protocol
IDRP introduces several new terms including
in interdomain As such it Border intermediate system BISAn IS that participates routing
uses IDRP
under the set of administrative Routing domain RDA group of ESs and ISs operating same
rules including the sharing of common routing plan
identifier Routing domain identUler RDIA unique RD
used IDRP RIBs built each Routing information base RIBThe routing database by are by
BIS from information received from within the RD and from other BISs RIB contains the set
of routes chosen for use by particular BIS
The confederation to RDs outside the confederation as Confederation group of RDs appears the confederation single RD confederations topology is not visible to RDs outside and be Confederations help reduce network traffic by acting as intemetwork firewalls may
nested within one another
of these RDIs can be confederations Each BIS is An IDRP route is sequence of RDIs Some about other configured to know the RD and confederations to which it belongs and learns BISs with distance RDs and confederations through information exchanges with each neighbor As vector that routing routes to particular destination accumulate outward from the destination Only routes
satisfy BISs local policies and have been selected for use will be passed on to other BISs Route
recalculation is partial and occurs when one of three events occurs an incremental routing update
with new routes is received BIS neighbor goes down or BIS neighbor comes up
IDRP features include
Support for CLNP QOS
traversed route Loop suppression by keeping track of all RDs by
Reduction of route information and processing by using confederations the compression of RD
path information and other means
Reliability by using built-in reliable transport
basis Security by using cryptographic signatures on per-packet
Route servers
RIB refresh packets
2U-6 Internetworking Technology Overview
CHAPTER 29
Transparent Bridging
Background
Transparent bridges were first developed at Digital Equipment Corporation Digital in the early
Electrical and Electronic 1980s Digital submitted its work to the Institute of Engineers IEEE
which incorporated the work into the IEEE 802.1 standard Transparent bridges are very popular in
Ethernet/IEEE 802.3 networks
Technoogy Basics
network Transparent bridges are so named because their presence and operation are transparent to
the hosts When transparent bridges are powered on they learn the networks topology by analyzing
source address of incoming frames from all attached networks If for example bridge sees frame
arrive on line from Host the bridge concludes that Host can be reached through the network
in connected to line Through this process transparent bridges build table such as the one
Figure 29-1
Host address Network number
15
17
12
13
18
14
CU
Cl
Figure 29-1 Transparent Bridging Table
The bridge uses its table as the basis for traffic forwarding When frame is received on one of the
bridges inteacesthe bridge looks up the frames destination address in its internal table If the table
contains an association between the destination address and any of the bridges ports aside from the
one on which the frame was received the frame is forwarded out the indicated port If no association
is found the frame is flooded to all ports except the inbound port Broadcasts and multicasts are also flooded in this way
Transparent Bridging 29-1 Bridging Loops
Transparent bridges successfully isolate intrasegment traffic thereby reducing the traffic seen on individual each segment This usually improves network response times as seen by the user The
extent to which traffic is reduced and response times are improved depends on the volume of
intersegment traffic relative to the total traffic as well as the volume of broadcast and multicast
traffic
Bridgng Loops
Without bridge-to-bridge protocol the transparent bridge algorithm fails when there are multiple
paths of bridges and local-area networks LAN5 between any two LANs in the intemetwork
Figure 29-2 illustrates such bridging ioop
Network
Network
Co
Figure 29-2 Inaccurate Forwarding and Learning in Transparent Bridging Environments
Suppose Host sends frame to Host Both bridges receive the frame and correctly conclude that
Host is on Network Unfortunately after Host receives two copies of Host As frame both
bridges will again receive the frame on their Network interfaces because all hosts receive all
messages on broadcast LANs In some cases the bridges will then change their internal tables to indicate that Host is on Network If so when Host replies to Host As frame both bridges will
receive and subsequently drop the replies since their tables will indicate that the destination Host
is on the same network segment as the frames source
In addition to basic connectivity problems such as the one just described the proliferation of
broadcast messages in networks with loops represents potentially serious network problem
Referring again to Figure 29-2 assume that Host As initial frame is broadcast Both bridges will
forward the frames endlessly using all available network bandwidth and blocking the transmission
of other packets on both segments
topology with loops such as that shown in Figure 29-2 can be useful as well as potentially harmful
loop implies the existence of multiple paths through the internetwork network with multiple
paths from source to destination can increase overall network fault tolerance through improved
topological flexibility
29-2 Internetworking Technology Overview Spanning-Tree Algorithm STA
Spanning-Tree Agodthm STA
The Ethernet spanning-tree algorithm STA was developed by Digital key vendor to preserve the
benefits of loops while eliminating their problems Digitals algorithm was subsequently revised by
the IEEE 802 committee and published in the IEEE 802.ld specification The Digital algorithm and
the IEEE 802.ld algorithm are not the same nor are they compatible
The STA subset of the designates loop-free networks topology by placing those bridge ports that
if would into active create loops standby blocking condition Blocking bridge ports can be
activated in the event of primary link failure providing new path through the internetwork
The STA uses conclusion from graph theory as basis for constructing loop-free subset of the
networks topology Graph theory states the following
For any connected graph consisting of nodes and edges connecting pairs of nodes there is
spanning tree of edges that maintains the connectivity of the graph but contains no loops
Figure 29-3 illustrates how the STA eliminates ioops The STA calls for each bridge to be assigned
unique identifier Typically this identifier is one of the bridges Media Access Control MAC
addresses plus priority Each port in every bridge is also assigned unique within that bridge
identifier typically its own MAC address Finally each bridge port is associated with path cost
The path cost represents the cost of transmitting frame onto LAN through that port In
Figure 29-3 path costs are noted on the lines emanating from each bridge Path costs are usually
defaulted but can be assigned manually by network administrators
Designated port Root port
through LANs
Figure 29-3 Transparent Bridge Network Before Running STA
The first activity in spanning-tree computation is the selection of the root bridgewhich is the bridge
with the lowest value bridge identifier In Figure 29-3the root bridge is Bridge Next the root port
all other on bridges is determined bridges root port is the port through which the root bridge may
be reached with the least aggregate path cost This value the least aggregate path cost to the root is
called the root path cost
Finally designated bridges and their designated ports are determined designated bridge is the
bridge on each LAN that provides the minimum root path cost LANs designated bridge is the
only bridge allowed to forward frames to and from the LAN for which it is the designated bridge
LANs designated port is that port which connects it to the designated bridge
Transparent Bridging 29-3 Frame Format
In some cases two or more bridges may have the same root path cost For example in Figure 29-3
Bridges and can both reach Bridge the root bridge with path cost of 10 In this case the
bridge identifiers are used again this time to determine the designated bridges Bridge 4s LAN
port is selected over Bridge Ss LAN port
connected to each Using this process all but one of the bridges directly LAN are eliminated thereby
removing all two-LAN loops The STA also eliminates loops involving more than two LANs while
still preserving connectivity Figure 29-4 shows the results of applying the STA to the network
shown in Figure 29-3 Figure 29-4 shows the tree topology more clearly Comparing this figure to
the pre-spanning-tree figure shows that the STAhas placed both Bridge 3s and Bridge 5s ports to
LAN in standby mode
Active port
Blocking port
Figure 29-4 Transparent Bridge Network After Running STA
The spanning-tree calculation occurs when the bridge is powered up and whenever topology
change is detected The calculation requires communication between the spanning-tree bridges
which is effected through configuration messages sometimes called bridge protocol data units or
BPDUs Configuration messages contain information identifying the bridge that is presumed to be
the root root identifier and the distance from the sending bridge to the root bridge root path cost
Configuration messages also contain the bridge and port identifier of the sending bridge and the age of information contained in the configuration message
Bridges exchange configuration messages at regular intervals typically one to four seconds If
bridge fails causing topology change neighboring bridges will soon detect the lack of
configuration messages and initiate spanning-tree recalculation
All transparent bridge topology decisions are made locally Configuration messages are exchanged
between neighboring bridges There is no central authority on network topology or administration
Frame Format
Transparent bridges exchange configuration messages and topology change messages
Configuration messages are sent between bridges to establish network topology Topology change
messages are sent after topology change has been detected to indicate that the STA should be rerun
The transparent bridge configuration message format is shown in Figure 29-5
29-4 Internetworking Technology Overview Frame Format
Field length in bytes
Protocol Message Message Maximum Hello Forward Version Flags Root ID path Bridge ID Po ID identifier type age age time delay cost
Figure 29-5 Transparent Bridge Configuration Message Format
The protocol identifier field contains the value zero
The version field contains the value zero
The message type field contains the value zero
Theflags field is one-byte field of which only the first two bits are used The topology change TC
bit signals topology change The topology change acknowledgment TCA bit is set to acknowledge receipt of configuration message with the IC bit set
The root ID field identifies the root bridge by listing its two-byte priority followed by its six-byte ID
The root path cost field contains the cost of the path from the bridge sending the configuration
message to the root bridge
The bridge ID field identifies the priority and ID of the bridge sending the message
The port ID field identifies the port from which the configuration message was sent This field allows
loops created by multiply attached bridges to be detected and dealt with
The message age field specifies the amount of time since the root sent the configuration message on
which the current configuration message is based
The maximum age field indicates when the current configuration message should be deleted
The hello time field provides the time period between root bridge configuration messages
The forward delay field provides the length of time that bridges should wait before transitioning to
new state after topology change If bridge transitions too soon not all network links may be
ready to change their state and ioops can result
Topological change messages consist of only four bytes They include protocol identijier field
which contains the value zero version field which contains the value zero and message type
field which contains the value 128
Transparent Bridging 29-5 Frame Format
29-6 Internetworking Technology Overview CHAPTER 30
SourceRoute Bridging
Background
The source-route bridging SRB algorithm was developed by IBM and proposed to the IEEE 802.1
committee as the means to bridge between all local-area networks LANs The IEEE 802.1
committee selected competing standard see Chapter 29 Transparent Bridging for more
information on the transparent bridging standard SRB supporters proposed SRB to the IEEE 8025
committee which subsequently adopted SRB into the IEEE 802.5 Token Ring LAN specification
Since its initial proposal IBM has offered new bridging standard to the IEEE 802 committee the
source-route transparent SRT bridging solution See Chapter 31 Mixed-Media Bridging for information more on SRT bridging SRT bridging eliminates pure SRBs entirely proposing that the
two types of LAN bridges be transparent bridges and SRT bridges Although SRT bridging has
achieved support SRBs are still widely deployed
SRB APgorthm
SRBs are so named because they assume that the complete source-to-destination route is placed in
all inter-LAN frames sent by the source SRBs store and forward the frames as indicated by the route appearing in the appropriate frame field Figure 30-1 illustrates sample SRB network
Source-Route Bridging 30-1 SRI3 Algorithm
Figure 30-1 Sample SRB Network
wishes send frame to Host Host does Referring to Figure 30-1 assume that Host to Initially sends not know whether Host resides on the same or different LAN To determine this Host has out test frame If that frame returns to Host without positive indication that Host seen it
Host must assume that Host is on remote segment
To determine the exact remote location of Host Host sends an explorer frame Each bridge
the frame onto all outbound receiving the explorer frame Bridges and in this example copies
information is added to the frames as travel through the internetwork ports Route explorer they each the When Host Xs explorer frames reach Host Host replies to individually using Host choose accumulated route information Upon receipt of all response frames may path
based on some predetermined criteria
this will two routes In the example in Figure 30-1 process yield
LAN Bridge LAN Bridge LAN
LAN Bridge LAN Bridge LAN
does mandate the Host must select one of these two routes The IEEE 802.5 specification not
the criteria Host should use in choosing route but it does make several suggestions including
following
First frame received
Response with the minimum number of hops
size Response with the largest allowed frame
Various combinations of the above criteria
received will be used In most cases the path contained in the first frame
30-2 Internetworking Technology Overview Frame Format
After route is selected it is inserted into frames destined for Host Yin the form of routing
RIF is included in those frames destined for other LANs The information field RIF only of the presence of routing information within the frame is indicated by the setting most significant bit bit within the source address field called the routing information indicator Ru
Frame Format
The IEEE 802.5 R1F is structured as shown in Figure 30-2
802.5 MAC frame
// 7/ 7/7/ .7
Ring Bridge Not used TYPe Length Largest number number
Cl
Figure 30-2 IEEE 802.5 RIF
routed The type subfield in the RIP indicates whether the frame should be to single node group
The first is called of nodes that make up spanning tree of the intemetwork or all nodes type
and the third is specifically routed frame the second type is called spanning-tree explorer type
transit mechanism for called an all-paths explorer The spanning-tree explorer can be used as
in outbound multicast frames It can also be used as replacement for the all-paths explorer route
queries In this case the destination responds with an all-paths explorer
The length subfield indicates the total length in bytes of the RIP
The bit indicates the direction of the frame forward or reverse
The largest field indicates the largest frame that can be handled along this route
number that There can be multiple route descriptor fields Each carries ring number-bridge pair of LAN and specifies portion of route Routes then are simply alternating sequences bridge
numbers that start and end with LAN numbers
Source-Route Bridging 30-3 Frame Format
30-4 Internetworking Technology Overview CHAPTER 31
MixedMedia Bridging
Background
Transparent bridges are found predominantly in Ethernet networks and source-route bridges
SRBs are found almost exclusively in Token Ring networks See Chapter 29 Transparent
Bridging for more information on transparent bridges see Chapter 30 Source-Route Bridging
for more information on SRBs Both transparent bridges and SRBs are popular so it is reasonable to
ask whether method exists to bridge between them This basic question is illustrated in Figure 31-1
Transparent
bridge Transparent .-
bridge
______p
Transparent
bridge
SRB bridge environment TB bridge environment
Figure 31-1 Bridging Between Transparent Bridging and SRB Domains
Technoogy Basics
Translational bridging provides relatively inexpensive solution to some of the many problems
involved with bridging between transparent bridging and SRB domains Translational bridging first
appeared in the mid- to late-1980s but has not been championed by any standards organization As
result many aspects of translational bridging are left to the implementor
Mixed-Media Bridging 31-1 Technology Basics
In 1990 IBM addressed some of the weaknesses of translational bridging by introducing source-
route transparent SRT bridging SRT bridges can forward traffic from both transparent and source-
route end nodes and form common spanning tree with transparent bridges thereby allowing end
stations of each type to communicate with end stations of the same type in network of arbitrary
topology
Ultimately the goal of connecting transparent bridging and SRB domains is to allow communication
between transparent bridges and SRB end stations This chapter describes the technical problems
that be addressed must by algorithms attempting to do this and presents two possible solutions
translational bridging and SRT bridging
TrausIaton Chaflenges
There are number of challenges associated with allowing end stations from the Ethernet
transparent bridging domain to communicate with end stations from the SRB/Token Ring domain
including the following
Incompatible bit orderingAlthough both Ethernet and Token Ring support 48-bit Media
Access Control MAC addresses the internal hardware representation of these addresses differs
In serial bit stream representing an address Token Ring considers the first bit encountered to
be the high-order bit of byte Ethernet on the other hand considers the first bit encountered to
be the low-order bit
Embedded MAC addressesIn some cases MAC addresses are actually carried in the data
portion of frame For example the Address Resolution Protocol ARP popular protocol in
Transmission Control Protocol/Internet Protocol TCP/IP networks places hardware addresses
in the data of frame Conversion of addresses that in portion link-layer may or may not appear
the data portion of frame is difficult because they must be handled on case-by-case basis
Incompatible maximum transfer unit MTU sizesToken Ring and Ethernet support different
maximum frame sizes Ethernets MTU is approximately 1500 bytes whereas Token Ring
frames can be much larger As bridges are not capable of frame fragmentation and reassembly
packets that exceed the MTU of given network must be dropped
Handling of frame status bit actions Token Ring frames include three frame status bits
and The of these bits is tell purpose to the frames source whether the destination saw the frame
bit setcopied the frame bit set and/or found errors in the frame bit set Since Ethernet
does not support these bits the question of how to deal with them is left to the Ethernet-Token
Ring bridge manufacturer
Handling of exclusive Token Ring functionsCertain Token Ring bits have no corollary in
Ethernet For example Ethernet has no priority mechanism whereas Token Ring does Other
Token Ring bits that must be thrown out when Token Ring frame is converted to an Ethernet
frame include the token bit the monitor bit and the reservation bits
Handling of explorer framesTransparent bridges do not inherently understand what to do with
SRB explorer frames Transparent bridges learn about the networks topology through analysis
of the source address of incoming frames They have no knowledge of the SRB route discovery
process
Handling of routing information field RIF information within Token Ring frames The SRB
algorithm places routing information in the RIF field The transparent bridging algorithm has no
R1F equivalent and the idea of placing routing information in frame is foreign to transparent
bridging
31-2 Internetworking Technology Overview Translational Bridging
Incompatible spanning-tree algorithms Transparent bridging and SRB both use the spanning-
tree algorithm to try to avoid loops but the particular algorithms employed by the two bridging
methods are incompatible
Handling of frames without route information SRBs expect all inter-LAN frames to contain
route information When frame without RIF field including transparent bridging
configuration and topology change messages as well as MAC frames sent from the transparent
bridging domain arrives at an SRB bridge it is simply ignored
Transatonai Brdgng
Because there has been real in no standardization how communication between two media types
should occur there is no single translational bridging implementation that can be called correct The
following describes several popular methods for implementing translational bridging
Translational bridges reorder source and destination address bits when translating between Ethernet
and Token Ring frame formats The problem of embedded MAC addresses can be solved by
programming the bridge to check for various types of MAC addresses but this solution must be with adapted each new type of embedded MAC address Some translational bridging solutions
simply check for the most popular embedded addresses If translational bridging software runs in
multiprotocol router the router can successfully route these protocols and avoid the problem
entirely
The RIF field has subfield that indicates the largest frame size that can be accepted by particular
SRB implementation Translational bridges that send frames from the transparent bridging domain
to the SRB domain usually set the MTU size field to 1500 bytes to limit the size of Token Ring
frames entering the transparent bridging domain Some hosts cannot correctly process this field in
which case translational bridges are forced to simply drop those frames that exceed Ethernets MTU size
Bits representing Token Ring functions that have no Ethernet corollary are typically thrown out by
translational bridges For example Token Rings priority reservation and monitor bits contained
in the access-control byte are discarded Token Rings frame status bits contained in the byte
following the ending delimiter which follows the data field are treated differently depending on the
translational bridge manufacturer Some translational bridge manufacturers simply ignore the bits
Others have the bridge set the bit to indicate that the frame has been copied but not the bit
which indicates that the destination station recognizes the address In the former case there is no way for Token Ring source node to determine whether the frame it sent has become lost
Proponents of this approach suggest that reliability mechanisms such as the tracking of lost frames
are better left for implementation in layer of the OSI model Proponents of the set the bit
approach contend that this bit must be set to track lost frames but that the bit cannot be set
because the bridge is not the final destination
Translational bridges can create software gateway between the two domains To the SRB end
stations the translational bridge has ring number and bridge number associated with it and so it
looks like standard SRB The ring number in this case actually reflects the entire transparent
is another bridging domain To the transparent bridging domain the translational bridge simply
transparent bridge
information is When bridging from the SRB domain to the transparent bridging domain SRB
from the removed RIFs are usually cached for use by subsequent return traffic When bridging
if it has transparent bridging to the SRB domain the translational bridge can check the frame to see
unicast destination If the frame has multicast or broadcast destination it is sent into the SRB
domain as spanning tree explorer If the frame has unicast address the translational bridge looks added up the destination in the RIF cache If path is found it is used and the RIF information is to
Mixed-Media Bridging 31-3 Translational Bridging
the frame otherwise the frame is sent as spanning-tree explorer Because the two spanning-tree
implementations are not compatible multiple paths between the SRB and the transparent bridging
domains are typically not permitted
Figure 31-2 Figure 31-3 and Figure 31-4 are examples of frame conversions that can take place in
translational bridging
DASA SAP Control Data IEEE 802.3
DASA RIF SAP Control Data LACFC Token Ring
Figure 31-2 Frame Conversion Between IEEE 802.3 and Token Ring
Figure 31-2 shows the frame conversion between IEEE 8023 and Token Ring The destination and
source addresses DASA service access point SAP Logical Link Control LLC information
Control and data are passed to the corresponding fields of the destination frame The destination
and source address bits are reordered When bridging from IEEE 802.3 to Token Ring the length
field of the IEEE 802.3 frame is removed When bridging from Token Ring to IEEE 802.3the access
control byte and RIF are removed The RIF can be cached in the translational bridge for use by return
traffic
DASA Type Data Ethernet Type II
CFC DASA RIF SAP Control Vendor Code Type Dat
Figure 31-3 Frame Conversion Between Ethernet Type II and Token Ring SNAP
Figure 31-3 shows the frame conversion between Ethernet Type II and Token Ring Subnetwork
Access Protocol SNAP SNAP adds vendor and type codes to the data field of the Token Ring frame The destination and source addresses DASA type information and data are passed to the
corresponding fields of the destination frame The destination and source address bits are reordered
When bridging from Token Ring SNAP to Ethernet Type II the RIF information service access
point SAP LLC information Control and vendor code are removed The RIF can be cached in
the translational bridge for use by return traffic When bridging from Ethernet Type II to Token Ring
SNAP no information is removed
31-4 Internetworking Technology Overview Source-Route Transparent Bridging
Ethernet DASA OD5 F-r SAP Control Data
ACFC DASA RIF SAP Control Data Token Ring
31-4 Frame Conversion Between Ethernet and Token Figure Type II Ox8OD5 Format Ring
Figure 31-4 shows the frame conversion between Ethernet Type II Ox8OD5 format and Token Ring Ethernet Type II OxOD5 carries IBM SNA data in Ethernet frames The destination and
source addresses DASA service access point SAP LLC information Control and data are
passed to the corresponding fields of the destination frame The destination and source address bits
are reordered When bridging from Ethernet Type II Ox8OD5 to Token Ring the type and 80D5
header fields are removed When bridging from Token Ring to Ethernet Type II Ox8OD5 the RIF
is removed The RIF can be cached in the translational bridge for use by return traffic
Source-Route Transparent Brdgng
combine SRT SRT bridges implementations of the transparent bridging and SRB algorithms bridges use the routing information indicator Ru bit to distinguish between frames employing SRB and
in the and the frames employing transparent bridging If the Rh bit is RIF is present frame
bridge uses the SRB algorithm If the Ru bit is RIF is not present and the bridge uses transparent
bridging
mixed-media Like translational bridges SRT bridges are not perfect solutions to the problems of
bridging SRT bridges must still deal with the EthernetJToken Ring incompatibilities described
earlier SRT bridging is likely to require hardware upgrades to SRBs to allow them to handle the
increased burden of analyzing every packet Software upgrades to SRBs may also be required
Further in environments of mixed SRT bridges transparent bridges and SRBs source routes chosen
must traverse whatever SRT bridges and SRBs are available The resulting paths can potentially be
substantially inferior to spanning-tree paths created by transparent bridges Finally mixed SRB/SRT
bridging networks lose the benefits of SRT bridging so users will feel compelled to execute
complete cutover to SRT bridging at considerable expense Still SRT bridging permits the
coexistence of two incompatible environments and allows communication between SRB and
transparent bridging end nodes
Mixed-Media Bridging 31-5 Source-Route Transparent Bridging
31-6 Internetworking Technology Overview
CHAPTER 32
Simple Network Management Protocol
Background
Network Protocol Three development efforts impacted what was to become the Simple Management SNMP
with some High-Level Entity Management System HEMS Specifies management system never used outside its development interesting technical attributes Unfortunately HEMS was
sites and this eventually led to its demise
Initiated of network engineers to Simple Gateway Monitoring Protocol SGMP by group the Internet internetwork address the problems associated with managing rapidly growing large and businesses this connecting government agencies research institutions universities private Internet SGMP was effort produced protocol designed to manage gateways routers
implemented on many regional branches of the Internet
CMIP over TCP CMOTAdvocated by the developers of Open System interconnection OSI
based network management software and specifically of the Common Management information Control Protocol internetworks Protocol CMIP to help manage Transmission TCPbased
demerits of these three were Through the latter part of 1987 the merits and approaches frequently
Board committee was created to and hotly contested In early 1988 an Internet Activities JAB
is the that is for resolve the network management protocol debate The JAB group responsible the JAB committee that an technical development of the Internet protocols Eventually agreed the short-term and some OSI improved version of SGMP to be called SNMP would be solution
for its To based technology either CMOT or CMIP itself would be analyzed long-term suitability
framework for network called the ensure an easy upgrade path common management now Internet-standard Network Management Framework was created
for diverse commercial university and Today SNMP is the most popular protocol managing
research internetworks SNMP-related standardization activity continues even as vendors develop
and release state-of-the-art SNMP-based management applications SNMP is relatively simple
is to handle the difficult problems presented by protocol yet its feature set sufficiently powerful
management of heterogeneous networks
TechnWogy Basics
to facilitate the of management SNMP is an application-layer protocol designed exchange second and network information between network devices By using SNMP data such as packets per network and find and solve error rates network administrators can more easily manage performance network problems
32-1 Simple Network Management Protocol Technology Basics
Management Model
In SNMP agents are software modules that run in managed devices Agents compile information
about the managed devices in which they run and make this information available to network
management systems NMS5 via network management protocol SNMP This model is
graphically represented in Figure 32-1
Managed Managed Managed device device device
Figure 32-1 SNMP Management Model
managed device can be any type of node residing on network including computer hosts communication servers printers routers bridges and hubs Because some of these systems may have limited ability to run management software they may have relatively slow CPUs or limited memory for example management software must assume the lowest common denominator In other words management software must be built in such way as to minimize its own performance
impact on the managed device
Because managed devices contain lowest common denominator of management software the
management burden falls on the NMS Therefore NMSs are typically engineering workstation caliber computers that have fast CPUs megapixel color displays substantial memory and lots of disk space One or more NMSs may exist on any managed network NMSs run the network
management applications that present management information to users The user interface is
typically based on standardized graphical user interface GUI
Communication between managed devices and NMSs is governed by the network management protocol The Internet-standard Network Management Framework assumes remote-debugging
paradigm where managed devices maintain values for number of variables and report those on
demand to NMSs For example managed device might keep track of the following
Number and state of its virtual circuits
Number of certain kinds of error messages received
32-2 Internetworking Technology Overview Technology Basics
Number of bytes and packets in and out of the device
routers and other devices Maximum output queue length for internetworking
Broadcast messages sent and received
Network interfaces going down and coming up
Command Types
the If an NMS wishes to control managed device it can do so by sending message requiring
of its variables In devices respond to or managed device to change the value of one total managed
initiate four different types of commands
ReadsTo monitor managed devices NMSs read variables maintained by the devices
within the devices WritesTo control managed devices NMSs write variables stored managed
device Traversal operationsNMSs use these to determine which variables managed supports tables an IP table and to sequentially gather information in variable such as routing
devices to certain events to NMSs TrapsManaged use traps asynchronously report
Data Representation Differences
in the is by differences Exchange of information in managed network potentially compromised used the devices In other words computers represent data representation techniques by managed rationalized to allow communication information differently these incompatibilities must be function SNMP uses subset of Abstract between diverse systems An abstract syntax performs this
abstract created for OSI for this ASN.l defines Syntax Notation One ASN.l an syntax purpose is characteristic of something both packet formats and managed objects managed object simply
differs from which is object instance that can be managed managed object variable particular or tabular defining multiple related Managed objects may be scalar defining single instance instances
Management Database
Base which is essentially All managed objects are contained in the Management Information MIB abstract with individual data items as database of objects Logically Mffi is depicted as an tree
in the tree identifiers are like phone leaves Object identifiers uniquely identify MIB objects Object and are different organizations numbers in that they are organized hierarchically parts assigned by of codes by an international For example international phone numbers consist country assigned
as defined that United States phone numbers organization and the telephone number by country office and station number associated are further subdivided into an area code central number
identifiers are the International with that central office Similarly top-level MIB object assigned by Standardization/International Electrotechnical Commission ISO/JEC Lower- Organization for the associated The root and several prominent level object IDs are allocated by organizations in 32-2 branches of the MIB tree appear Figure
32-3 Simple Network Management Protocol Technology Basics
Figure 32-2 MW Tree
The MIB tree is extensible by virtue of experimental and private branches Vendors for example
define their can own private branches to include instances of their own products Currently all
standardization work is in the experimental branch
document called the Structure of Management Information SMI defines the structure of the MIB The SMI defines the following data types
Network addressesRepresent an address from particular protocol family Currently 32bit IP
addresses is the only instance of network addresses
CountersNonnegative integers that increase monotonically until they reach maximum value
when they wrap back to zero The total number of bytes received on an interface is an example of counter
GaugesNonnegative integers that can increase or decrease but latch at amaximum value The
length of an output packet queue in packets is an example of gauge
TicksHundredths of second since some event The time since an interface entered its current
state is an example of tick
This is used Opaque An arbitrary encoding to pass arbitrary information strings outside of the
strict data typing used by the SMI
Operations
itself is Nodes send SNMP simple request/response protocol can multiple requests without
response Four SNMP operations are defined
GetRetrieves an object instance from the agent
Get-nextA traversal operation that retrieves the next object instance from table or list within
an agent
SetSets object instances within an agent
TrapUsed by the agent to asynchronously inform the NMS of some event
32-4 Internetworking Technology Overview Message Format
Message Format
contain and SNMP messages two parts community name data The community name assigns an
access environment for set of NMSs using that community name NMSs within the community can
devices that do know be said to exist within the same administrative domain Because not the proper
community name are precluded from SNMP operations network managers have also used the
community name as weak form of authentication
The data portion of an SNMP message contains the specified SNMP operation get set and so on and associated operands Operands indicate the object instances involved in the SNMP transaction
SNMP messages are formally referred to as protocol data units PDUs Figure 32-3 shows the SNMP message format
Get set format Field length
in bytes Variable
Request-ID Error status Error index Variable bindings
Trap format Field length
in bytes Variable
Figure 32-3 SNMP Message Format
SNMP get and set PDUs consist of the following parts
Request-ID Associates requests with responses
Error-statusIndicates an error and an error type
Error-index Associates the error with particular object instance
Variable bindingsComprise the data of an SNMP PDU.Variable bindings associate particular
variables with their current values
Trap PDUs are slightly different from PDUs for other operations They consist of the following
parts
EnterpriseIdentifies the type of object generating the trap
Agent addressProvides the address of the object generating the trap
Generic trap typeProvides the generic trap type
SpecJlc trap codeProvides the specific trap code
Time stampProvides the amount of time that has elapsed between the last network
reinitialization and generation of this trap
Variable bindingsProvides list of variables containing interesting information about the trap
Simple Network Management Protocol 32-5 Message Format
32-6 Internetworking Technology Overview CHAPTER 33
IBM NeMiork Management
Background
IBM was one of the first companies to recognize the importance of complete integrated network framework management strategy In 1986 IBM proposed Open Network Architecture ONA describing generalized network management architecture Net View the premier product for
network management on an IBM mainframe is actually component of ONA NetView provides cohesive set of centralized network management services that allow users to monitor control and
reconfigure their Systems Network Architecture SNA networks
Since the introduction of ONA and NetView IBM has almost continually enhanced expanded and
otherwise altered its network management technology base Today IBM network management is the comprehensive and extremely complex This chapter describes the high-level basics of some of components of IBM network management
Functona Areas of Management
IBM divides network management into five user-based functions
control Configuration managementIdentifies physical and logical system resources and allows
of their relationships
Performance and accounting management Allows quantification measurement reportingand
control of the responsiveness availability utilization and usage of network component
Problem managementProvides problem detection diagnosis resolution and tracking and
control capabilities
and control distributed network Operations managementProvides the means to query
resources from central site
Change managementAllows planning control and application of additions deletions and modifications to system hardware microcode and software
These network management functions do not correlate perfectly with those proposed by the International Organization for Standardization ISO in its Open System Interconnection OSI
model The OSI and the IBM network management functions are compared in Figure 33-1
IBM Network Management 33-1 Functional Areas of Management
OSI IBM
Configuration management Configuration management
Performance management Performance and accounting
Accounting management management
Fault management Problem management
Security management
Operations management CD CD Change management Co
Figure 33-1 OSI and IBM Network Management Functions
Corifiguraton Management
and information Configuration management controls information describing both physical logical
consists of systems resources and their relationships to each other This information typically resource names addresses locations contacts and phone numbers IBMs configuration
management function corresponds very closely to OSIs concept of configuration management
network Through configuration management facilitiesusers can piaintain an inventory of resources
reflected Configuration management helps ensure that network configuration changes can be
expeditiously and accurately in the configuration management database Configuration management
data is used by problem management systems to compare version differences and to locate identify
and check the characteristics of network resources Change management systems can use
configuration management data to analyze the effect of changes and to schedule changes at times of minimal network impact
An SNA management service called query product identification retrieves software and hardware
physical information from the configuration management database The information retrieved is
sometimes called vital product data
Performance and Accounting Management
This SNA management function provides information about the performance of network resources
Through analysis of performance and accounting management data users can determine whether
network performance goals are being met
Performance and accounting management includes accounting monitoring of response times
availability utilization and component delay as well as performance tuning tracking and control Data from each of these functions can result in the initiation of problem determination procedures if
performance levels are not being met
33-2 Internetworking Technology Overview Functional Areas of Management
Problem Management
SNA management services define problem as an error condition that causes user to lose full
functionality of system resource SNA divides problem management into several areas
Problem determinationDetects problem and completes steps necessary for problem
diagnosis to begin Problem determination intends to isolate the problem to particular
subsystem such as hardware device software product microcode component or media segment
Problem diagnosisDetermines the precise cause of problem and the action required to solve
the problem If problem diagnosis is done manually it follows problem determination If it is
done automatically it is usually done simultaneously with problem determination so that the
results can be reported together
Problem bypass and recoveryAttempts to bypass problem either partially or completely
Normally this operation is temporary with the intent that complete problem resolution will
is less resolved follow but problem bypass may be permanent when the problem easily
Problem resolutionInvolves efforts required to eliminate the problem Problem resolution
usually begins after problem diagnosis is complete and often involves corrective action that
must be scheduled such as replacement of failed disk drive
Problem tracking and control Tracks the problem until final resolution Specifically if external
action is required to fix the problem the vital information describing the problem such as status
monitoring data and problem status reports are included in problem management record which
is entered into the problem database
Operations Management
central site Operations management involves management of distributed network resources from
It entails two sets of functions common operations services and operations management services SNAs Common operations services allow management of resources not explicitly addressed by
other management categories by allowing specialized communication with these resources through the new more capable applications Two very important services providing this capability are execute command and the resource management service The execute command provides
standardized means of executing remote command Resource management services provide way
to transport information in context-independent manner
Operations management services provide the ability to control remote resources through resource clocks activation resource deactivation command cancellation and the setting of network resource
Operations management services can be initiated automatically as result of system problem
notification forwarding thereby allowing automatic handling of remote problems
Change Management
Change management helps users control network or system changes by allowing the sending
retrieving installing and removing of change files at remote nodes Further change management
allows node activation Changes occur because either user requirements have changed or because
problem must be circumvented
Although problems cause change change can also cause problems Change management attempts
to minimize problems created by change through encouraging orderly change and by tracking changes
IBM Network Management 33-3 Principal Management Architectures and Platforms
Principa Management Architectures and PHatforms
IBM offers several management architectures and many important management platforms
The Open Network Arch tecture Framework
The basic ONA framework is shown in Figure 33-2
Figure 33-2 ONA Framework
Focal points provide support for centralized network management operations They are the
management entities referred to in the general model described previously Focal points respond to
end station alerts maintain management databases and provide the user interface to the network
management operator
There are two kinds of focal points primary and secondary Primary focal points are as described
previously Secondary focal points provide backup for primary focal points and are used when
primary focal points fail
Nested focal points provide distributed management support for portions of large networks They
forward critical information to more global focal points
Collection points relay information from self-contained SNA subnetworks to focal points
Collection points are commonly used to forward data from IBM peer-to-peer networks into the ONA
hierarchy
Entry points are SNA devices that can implement ONA for themselves and other devices Most standard devices SNA are capable of being entry points
33-4 lnternetworking Technology Overview Principal Management Architectures and Platforms
Service points are systems that provide access into ONA for non-SNA devices Service points are
capable of sending network management information about non-SNA systems to focal points and
are also capable of receiving commands from focal points translating them into format acceptable
to non-SNA devices and forwarding them to non-SNA devices for execution Service points are
essentially gateways into ONA
SystemView
IBM announced SystemView in 1990 SystemView is blueprint for the creation of management
applications capable of managing multivendor information systems Specifically SystemView
describes how applications that manage heterogeneous networks will look feel and cooperate with other management systems Officially SystemView is Systems Application Architectures SAAs
systems management strategy
NetVew
It has the NetView is IBMs most comprehensive enterprise network management platform
following major parts
basic Command control facilityProvides the ability to control the network through operator
and file access commands to Virtual Telecommunications Access Method VTAM applications NetView and non-SNA controllers operating systems and Net View/PC an interface between devices
Hardware monitorMonitors the network and automatically issues alerts to the network when hardware operator error occurs
Session monitor Acts as VTAM performance monitor The session monitor provides software
problem determination and configuration management
function Help function Provides help for NetView management services users The help network includes browse facility help desk facility and library of commonly encountered
operation situations
Status monitorSummarizes and presents network status information
called Performance monitorMonitors the performance of communications controllers also
front-end processors or FEPs the Network Control Program NCP and attached resources
Distribution managerPlans schedules and tracks the distribution of data software and 3174
microcode in an SNA environment
LAN Network Manager
TB Ms LAN Network Manager LNM product is an OS/2 Extended Editionbased network local-area networks from management application that enables control of Token Ring LANs communicates with central support site NetView can see LNM activity for example alarmsLNM
LAN Station Manager LSM software which implements management agents in individual LAN
end stations Communication between LNM and LSM is effected using OSI Common Management
Protocol over the Information Services/Common Management Information CMIS/CMIP running connectionless Logical Link Control LLC protocol
SNMP
Protocol See IBM has recently added support for the Simple Network Management SNMP
information this Chapter 32 Simple Network Management Protocol for on protocol
IBM Network Management 33-5 Principal Management Architectures and Platforms
33-6 Internetworking Technology Overview
APPENDIX
References and Recommended Reading
Books and Periodcas
Massachusetts Addison- Apple Computer Inc AppleTalk Network System Overview Reading
Wesley Publishing Company Inc 1989
New Prentice Black Data Networks Concepts Theory and Practice Englewood Cliffs Jersey Hall 1989
Los California IEEE Black Physical Level Interfaces and Protocols Alamitos Computer
Society Press 1988
and the of Case J.D JR Davins M.S Fedor and ML Schoffstall Network Management Design SNMP ConneXions The Interoperability Report Vol March 1989
Case J.D JR Davins MS Fedor and ML Schoffstall Introduction to the Simple Gateway
Monitoring Protocol IEEE Network March 1988
Vol No March Clark SNAlnternetworking ConneXions The Interoperabilily Report 1992
The Vol Coltun OSPF An Internet Routing Protocol ConneXions Interoperability Report
No August 1989
and Architecture Vol 2nd ed Corner D.E Intern etworking with TCP/IP Principles Protocols
Englewood Cliffs New Jersey Prentice Hall 1991
York 1992 Davidson An Introduction to TCP/IP New York New Springer-Verlag
Publication Garcia-Luna-Aceves J.J Loop-FreeRouting Using Diffusing Computations pending
in IEEE/ACM Transactions on Networking Vol No 1993
Business One Irwin 1992 Green J.K Telecommunications 2nd ed Homewood Illinois
The Vol Hagans Components of OSI ES-IS Routing ConneXions Interoperability Report No August 1989
ConneXions The Hares Components of OSI Inter-Domain Routing Protocol IDRP 1992 Interoperability Report Vol No May
An Overview Joyce S.T and J.Q Walker II Advanced Peer-to-Peer Networking APPN 1992 ConneXions The Interoperability Report Vol No 10 October
No 1990 Kousky Bridging the Network Gap LAN Technology Vol January
Massachusetts Leinwand and Fang Network Management Practical Perspective Reading 1993 Addison-Wesley Publishing Company Inc
Vol 20 No 14 October 1991 Lippis The Internetwork Decade Data Communications
References and Recommended Reading A-i Books and Periodicals
McNamara J.E Local Area Networks Digital Press Educational Services Digital Equipment
Corporation 12 Crosby Drive Bedford MA 01730
Martin SNA IBMs Networking Solution Englewood Cliffs New Jersey Prentice Hall 1987
Martin with K.K Chapman and the ARBEN Group Inc LocalArea Networks Architectures and
Implementations Englewood Cliffs New Jersey Prentice Hall 1989
Medin The Great IGP DebatePart Two The Open Shortest Path First OSPF Routing
Protocol ConneXions The Interoperability Report Vol No 10 October 1991
Meijer Systems NetworkArchitecture tutorial New York New York John Wiley Sons Inc 1987
Miller M.A LAN Protocol Handbook San Mateo California MT Books 1990
OReilly and Todino Managing UUCP and Usenet 10th ed Sebastopol California OReilly Associates Inc 1992
Perlman Interconnections Bridges and Routers Reading Massachusetts Addison-Wesley
Publishing Company Inc 1992
Penman and Callon The Great IGP DebatePart One IS-IS and Integrated Routing ConneXions The Interoperability Report Vol No 10 October 1991
Rose M.T The Open Book Practical Perspective on OSI Englewood Cliffs New Jersey Prentice Hall 1990
Rose M.T The Simple Book An Introduction to Management of TCP/IP-based Internets
Englewood Cliffs New Jersey Prentice Hall 1991
Ross EE FDDIA Tutorial IEEE Communications Magazine Vol 24 No May 1986
Schlar S.K Inside X.25 Managers Guide New York New York McGraw-Hill Inc 1990
Schwartz Telecommunications Networks Protocols Modeling and Analysis Reading
Massachusetts Addison-Wesley Publishing Company Inc 1987
Sherman Data Communications Users Guide Englewood Cliffs New Jersey Prentice Hall 1990
Sidhu G.S R.F Andrews andA.B Oppenheimer Inside AppleTalk 2nd ed Reading
Massachusetts Addison-Wesley Publishing Company Inc 1990
Spragins J.D et al Telecommunications Protocols and Design Reading Massachusetts Addison-
Wesley Publishing Company Inc 1991
Stallings Data and Computer Communications New York New York Macmillan Publishing Company 1991
Stallings Handbook of Computer-Communications Standards Vols 13 Carmel Indiana HowardW Sams Inc 1990
Stallings Local Networks 3rd ed New York New York Macmillan Publishing Company 1990
Sunshine CA ed. ComputerNetworkArchitectures andProtocols 2nd ed New York New York Plenum Press 1989
Tannenbaum AS Computer Networks 2nd ed Englewood Cliffs New Jersey Prentice Hall 1988
Terplan Communication Networks Management Englewood Cliffs New Jersey Prentice Hall 1992
Tsuchiya Components of OSI IS-IS Intra-Domain Routing ConneXions The Interoperabiliiy Report Vol No August 1989
A-2 Internetworking Technology Overview Technical Publications and Standards
Tsuchiya Components of OSI Routing An Overview ConneXions The Interoperability Report Vol No August 1989
Zimmerman OSI Reference ModelThe ISO Model of Architecture for Open Systems
Interconnection IEEE Transactions on Communications COM-28 No April 1980
TechnicaH Pubhcatons and Standards
Advanced Micro Devices The Supernet Family for FDDI Technical Manual Number 09779A
Sunnyvale California 1989
The Supernet Family for FDDI 1989 Data Book Number 09734C Sunnyvale California 1989
American National Standards Institute X3T9.5 Committee FDDI Station Management SMT Rev 6.i 15 1990
Revised Text of ISO/DIS 8802/2 for the Second DIS Ballot Information Processing
SystemsLocal Area Networks Part Logical Link Control 1987-01 -14
Ti .606 Integrated Services Digital Network ISDNArchitectural Framework and
Service Description for Frame-Relaying Bearer Service 1990
Ti .617 Integrated Services Digital Network ISDNSignaling Specification for Frame
Relay Bearer Service for Digital Subscriber Signaling System Number DSS1 1991
Ti.6i8 Integrated Services Digital Network ISDNCore Aspects of Frame Protocol for Use with Frame Relay Bearer Service 1991
ATM Data Exchange Interface DXI Specification Version 1.0 Document ATM_FORUM/93-
590R1 August 41993
Banyan Systems Inc VINES Protocol Definition DA254-00 Rev 1.0 Westboro Massachusetts
February 1990
Belicore Generic System Requirements in Support of Switched Multi-Megabit Data Service
Technical Advisory TA-TSY-000772 October 1989
Local Access System Generic Requirements Objectives and Interface Support of Switched Issue December 1985 Multi-Megabit Data Service Technical Advisory TA-TSY-000773
Switched Multi-Megabit Data Service SMDS Operations Technology Network Element
Generic Requirements Technical Advisory TA-TSY-000774
Chapman J.T and Halabi HSSI High-Speed Serial Interface Design Specification Menlo Park California and Santa Clara California Cisco Systems and T3Plus Networking Inc 1990
Consultative Committee for International Telegraph and Telephone CCITT Data Communications
NetworksServices and Facilities Terminal Equipment and Interfaces Recommendations
X.29 Yellow Book Vol VIII Fascicle VIII.2 1980
CCITT Data Communications NetworksInterfaces Recommendations X.2UX.32 Red
Book Vol VIII Fascicle VIII.3 1984
DDN Protocol Handbook Four volumes 1989
Order Defense Conmiunications Agency Defense Data Network X.25 Host Interface Speclciation number AD A137 427 December 1983
From Phase IV Digital Equipment Corporation DECnet/OSI Phase Making the Transition EK PVTRN-BR 1989
References and Recommended Reading A-3 Technical Publications and Standards
DECserver 200 LocalArea Transport LAT Network Concepts AA-LD84A-TK June 1988
DIGITAL NetworkArchitecture Phase EK-DNAPV-GD-O01 September 1987
Digital Equipment Corporation Intel Corporation Xerox Corporation The Ethernet Local-Area
Network Data Link Layer and Physical Layer Specifications Ver 2.0 November 1982
Feinler E.J et al DDN Protocol Handbook Vols 14 NIC 50004 50005 50006 50007 Defense Communications Agency Alexandria Virginia December 1985
Garcia-Luna-Aceves J.J Unified Approach to Loop-Free Routing Using Distance Vectors or Link States ACM 089791-332-9/89/0009/0212 pp 212223 September 1989
Henirick and Lang Introduction to Switched Multi-megabit Data Service SMDS an Early Broadband Service Proceedings of the XIII International Switching Symposium ISS 90 May 27 June 1990
Hewlett-Packard Company X.25 The PSN Connection An Explanation of Recommendation X.25
5958-3402 October 1985
IEEE Project 802Local Metropolitan Area Networks Proposed Standard Distributed Queue
Dual Bus DQDB Subnetwork of Metropolitan Area Network MAN February 1990
IEEE 802.2Local Area Networks Standard 802.2 Logical Link Control ANSI/IEEE Standard October 1985
IEEE 802.3 LocalArea Networks Standard 802.3 Carrier Sense Multiple Access ANSIIIEEE Standard October 1985
International Business Machines Corporation ACF/NCP/VS network control program system
support programs general information GC3O-3058
Advanced Communications Function for VTAM ACFIVTAM general information introduction GS27-0462
Advanced Communications Function for VTAM general information concepts GS27- 0463
Dictionary of Computing SC2O-1699-7 1987
LocalArea Network Technical Reference SC3O-3883
Network Problem Determination Application general information GC34-2010
Synchronous Data Link Control general information GA27-3093
Systems Network Architecture concepts and products GC3O-3072
Systems NetworkArchitecture technical overview GC3O-3073-1 1985
Token-Ring Network Architecture Reference SC3O-3374
International Organization for Standardization Information Processing SystemOpen System
Interconnection Specification of Abstract Syntax Notation One ASN.1 International Standard 8824 December 1987
McGraw-HilIlData Communications McGraw-Hill Compilation of Data Communications
Standards Edition III 1986
National Security Agency Blacker Interface Control Document March 21 1989
Novell Inc IPX Router Specification Version 1.10 Part Number 107-000029-001 October 16 1992
A-4 Internetworking Technology Overview Technical Publications and Standards
Number 100 NetWare Link Services Protocol NLSP Specification Revision 0.9 Part 001708-001 March 1993
StrataCom Frame Relay Specification with Extensions 001-208966 Rev.1.0 September 18 1990
Xerox Corporation Internet Transport Protocols XNSS 029101 January 1991
References and Recommended Reading A-5 Technical Publications and Standards
A-6 Internetworking Technology Overview
INDEX
Numerics American National Standards Institute See ANSI ANSI 1-78-1 13-1 15-1 lOBase2 5-2 AppleTalk lOBaseS 5-2 and EIGRP 24-4 lOBaseT 5-2 and the OSI reference model 16-2 lOBroad36 5-2 attention packet 16-8 lBase5 5-2 3Com client-erver distributed system 16-1 extended network 16-5 and RIP 23-1 general operation 16-1 and XNS 22-1 22-3 media access protocols 16-2
network 16-4
nonextended network 16-5
Phase 16-1
Phase 16-1
15-615-7 AAL3/4 protocol address assignment 16-3 AAL5 15-715-8 transport-layer protocols 16-7
AARP 16-4 AppleTalk Address Resolution Protocol ABM 11-5 See AARP
Abstract Syntax Notation AppleTalk Data Stream Protocol See ASN.1 See ADSP
access classes SMDS 14-3 AppleTalk Echo Protocol access DQDB SMDS 14-3 See AEP
acknowledgment packet EIGRP 24-5 AppleTalk Filing Protocol ACSE 20-5 See APP
active link FDDI 7-6 AppleTalk Session Protocol active monitor Token Ring 6-4 See ASP
active state EIGRP 24-6 AppleTalk Transaction Protocol
adaptation layers ATM See ATP
See AAL3/4 AAL5 application service element Address Resolution Protocol See ASE
See ARP ARCnet as NetWare medium 19-2 address spoofing SMDS 14-2 area
addressing definition 2-6
general description 1-5 OSI 20-128-1
link-layer addresses 1-6 OSPF 25-2
network-layer addresses 1-6 area border router OSPF 25-2 25-4 adjacent routers OSPF ARM 11-5
ADSP 16-7 ARP
ABP 16-8 IP 18-6 AFT 20-4 VINES 21-221-6
APP 16-8 AS
algorithms inBGP 27-1
backoff 5-1 in EGP 26-1
beaconing 6-4 in EIGRP 24-6
Dijkstra 25-1 in IGRP 24-1 DUAL 24-3 inIP 18-6
routing 2-32-8 in OSPF 25-2
source-route bridging 30-130-3 ASE 20-5
SPF 25-4 ASN.l 20-5 32-3
STA 29-329-4 31-3 ASP 16-8
switching 2-2 Association Control Service Element
VINES routing 21-3 See ACSE
all-paths explorer RIF 30-3 asynchronous balanced mode See ABM
Index asynchronous response mode open 27-2 See ARM update 27-3 Transfer Mode Asynchronous packet formats 27-2 See ATM BIS 28-6
at-least-once transactions AppleTalk 16-7 BISDN 14-315-1 ATM black hole Frame Relay 13-2
adaptation layers 15-515-8 Border Gateway Protocol
ATM layer 15-315-5 See BGP
connectionless service 15-11 border intermediate system IDRP
general operation 15-1 See BIS
media supported 15-3 BPDU 29-4
multiplexing technology 15-2 BRI 10-2
network architecture 15-8 bridge protocol data unit
permanent-virtual-connection service 15-9 See BPDU
physical layer 15-3 bridge definition 34
ATM Forum 15-2 bridging
ATP 16-7 between transparent bridging and source-route bridging attachment unit interface domains 31-131-5
See AUI general operation 3-1
AUI 5-2 source-route 30-130-3
authentication technology basics 3-2
and BGP 27-227-3 translational 31-1 31-331-5 and OSPF 25-5 transparent 29-129-5
and SNMP 32-5 Broadband Integrated Services Digital Network
in OSI routing 28-2 See BISDN
authority and format identifier broadcast
SeeAFI networks 5-1
autonomous system subnetworks 28-2
See AS XNS addresses
autoreconfiguration Token Ring 6-4 directed 22-3
global 22-3 BSD UMX
and RIP 23-1 Btrieve NetWare 19-5
backbone OSPF 25-2
backoff algorithm Ethernet 5-1
Banyan VINES See VINES
Basic Rate Interface carrier sense multiple access/collision detection see BRI See CSMA/CD
beaconing Token Ring 6-4 CCIYI
Bell Communications Research and Frame Relay 13-1
See Bellcore and HSSI 8-1
Belicore and OSI 20-6
and SMDS 14-1 14-8 and SDLC 11-1
technical advisories 14-6 and X.25 12-1
Bellman-Ford routing algorithm 2-7 general description 1-7
BGP recommendations
and EIGRP 24-4 V.24 12-5
and OSPF 25-3 V.28 12-5
as the basis for IDRP 28-6 specifications
general operation 27-1 1.361 15-1
messages 1.430 10-2
keepalive 27-3 1.431 10-3
notification 27-3 1.450 10-4
Internetworking Technology Overview 1.451 10-4 common part convergence sublayer ATM 15-6 Q.920 10-4 communications controller IBM
Q.921 10-4 See FEP
Q.930 10-4 community name SNMP 32-5
Q931 10-4 computer-room interconnect bus cell loss field 15-5 See CI bus priority ATM cell relay protocols 14-8 concentrator FDDI 7-2 cells confederation IDRP 28-6
ATM 15-415-5 configuration management IBM 33-1 33-2 definition ATM 15-1 configuration message transparent bridging 29-4 SIP 14-6 confirmation OSI service primitive 20-3 change management IBM 33-133-3 Connectionless Network Protocol
CI bus 17-2 See CLNP circuits Connectionless Network Service
permanent virtual 12-3 See CLNS
switched virtual 12-3 connectionless server function ATM
virtual 12-3 13-1 See CLSF Cisco Systems connectionless service ATM 15-11
defining HSSI 8-1 Connection-Mode Network Protocol
developing IGRP 24-1 See CMNP
formation of Frame Relay consortium 13-1 Connection-Oriented Network Service Class network IP 18-4 See CONS Class network IP 18-4 CONS 20-2 Class network IP 18-4 Consultative Committee for International Telegraph and Class network IP 18-4 Telephone Class network IP 18-4 See CCITT
Clearinghouse protocol XNS 22-4 convergence client-server architecture ATM sublayer 15-6
AppleTalk 16-1 definition 2-4 NetWare 19-1 core routers ARPANET 26-1 VINES 21-2 counter SNMP data type 32-4
CLNP count-to-infinity problem RIP 23-3
and DECnet 17-2 Courier protocol XNS 22-4
and IGRP 24-1 CPE
and IS-IS 28-1 and SMDS 14-1
definition 20-2 multi-CPE configuration 14-4
CLNS single-CPE configuration 14-4
and DECnet 17-2 CSMAICD 5-I
definition 20-2 customer premises equipment CLP field ATM 15-5 See CPE CLSF 15-11
cluster controller SDLC 11-3 CMIP
and CMOT 32-1 and LAN Network Manager 33-5 DARPA 18-122-1 andTCP 32-1 DAS 7-2 definition 20-6 data circuit-terminating equipment CMIS/CMIP 33-5 See DCE CMNP and DECnet 17-2 data link connection identifier CMOT 32-1 See DLCI èollection points ONA 33-4 data network identification code command control facility NetView 33-5 See DNIIC Common Management Information Protocol data terminal equipment See CMIP See DTE common operations services IBM 33-3
Index Datagram Delivery Protocol Distributed Queue Dual Bus SeeDDP See DQDB DCE distribution manager NetView 33-5 and Frame Relay 13-1 DLCI 13-3 and LAPB circuits 1-5 DNA 17-1 and X.25 12-1 DNIC 12-4
DDCMP 11-1 17-2 domain
DDP 6-5 definition 2-6 DECnet OSI 20-128-1 addressing 17-3 OSPF 25-2 and CMNP 17-2 domain specific part andPLP 17-2 See DSP as the basis for IS-IS 28-1 DQDB 14-1 general operation 17-1 DS OSI 20-6 media-access 17-2 protocols DS-1 14-1 14-7 17-2 network-layer protocols DS-3 14-1 14-7
Phase IV routing 17-2 DS-3/E3 15-3 Phase frame format IV routing 17-3 DSAP 11-5
Phase definition 17-1 DSP 20-4
upper-layer protocols 17-6 DTE DECnet/OSI 17-1 and Frame Relay 13-1 Defense Advanced Research Projects Agency and LAPB circuits 11-5 See DARPA and X25 12-1
designated bridge transparent bridging 29-3 DTE/DCE interface
designated 29-3 port transparent bridging and Frame Relay 13-1 designated router OSPF 25-4 and HSSI 8-1
destination service access point and PPP 9-2 See DSAP andX.25 12-112-4
Diffusing Update Algorithm DUAL 24-3 See DUAL DUAL finite state machine EIGRP 24-4 Digital Data Communications Protocol Message dual homing FDDI 7-6 See DDCMP Dual IS-IS
Digital Equipment Corporation See Integrated IS-IS
and DDCMP 11-1 dual-attach station
and DECnet 17-1 See DAS
and Frame 13-1 Relay dynamic routing 2-5 18-6 and IS-IS 28-1
Digital Network Architecture See DNA
Digital Signal
See DS-l
token release 6-2 Digital Signal early Token Ring Echo Protocol See DS-3 XNS 22-4 EGP Dijkstra algorithm OSPF 25-1 and EIGRP 24-4 directed broadcasts XNS 22-3 and OSPF 25-3 directed multicasts XNS 22-3 compared with BGP 27-1 Directory Services See DS OSI general operation 26-1 message type discovery protocol ES-IS 28-2 error 26-4 discovery/recovery EIGRP 24-4 neighbor acquisition 26-3 distance vector routing neighbor reachability 26-3 algorithm 2-7 poll 26-3 protocol 24-125-1 routing update 26-3 distributed architecture advantages of 16-1 packet formats 26-2
ETA 1-7
Iriternetworking Technology Overview EIGRP
and AS 24-6
compatibility with IGRP 24-4 fast packet switching 14-8 15-1 external routes 24-6 FDDI internal routes 24-6 as DECnet medium 17-2 packet types 24-5 as NetWare medium 19-2 recomputation 24-6 as an AppleTalk medium 16-2 route tagging 24-6 as an ATM medium 15-3 Electronic Industries Association as an OSI medium 20-1 See ETA concentrator 7-2 emitter-coupled logic ECL 8-2 fault-tolerant features 7-47-6 encapsulation frame format 7-67-7 IPX 19-3 general operation 7-1 XNS 19-322-3 link types end system active 7-6 See ES passive 7-6 End System-to-Intermediate System priority scheme 7-3 SeeES-IS similarities to Token Ring 7-1 entry points ONA 33-4 specifications EP 22-4 Media Access Control 7-2 error message EGP 26-4 Physical Layer Medium Dependent 7-2 Error Protocol Physical Layer Protocol 7-2 See EP Station Management 7-2 ES traffic types 7-3 definition 2-3 FDDITaIk AppleTalk 16-2 hello packet format 28-3 PEP 11-333-5 in OSI networking 20-1 28-1 fiber ES-IS multimode 7-1 general operation 28-2 single mode 7-1 subnetwork types 28-2 Fiber Channel as an ATM medium 15-3 establishment controller SDLC 11-3 Fiber Distributed Data Interface Ethernet See FDDI and Token Ring MTU 31-2 File Transfer Protocol and transparent bridging 29-1 See FTP as DECnet medium 17-2 File Transfer Access and Management as NetWare medium 19-2 See FTAM as an AppleTalk medium 16-2 Filing protocol XNS 22-4 as an example of broadcast subnetwork 28-2 focal point ONA as an example of LAN 9-1 nested 33-4 differences between IEEE 802.3 and 5-2 primary 33-4 frame format 5-3 secondary 33-4 general operation 5-1 frame format EtherTalk AppleTalk 16-2 DECnet Phase IV routing 17-3 exactly once transactions AppleTalk 16-7 Ethernet 5-3 explorer frames 30-2 31-2 FDDI 7-67-7 extended network AppleTalk 16-5 Frame Relay 13-3 Exterior Gateway Protocol IEEE 802.3 5-3 See EGP IEEE 802.5 RIF 30-3 exterior router IP 18-6 SDLC 11-2 External Data Representation SIP level 14-6 See XDR SIP level 14-5 external routes EIGRP 24-6 Token Ring/IEEE 802.5 6-4
transparent bridging 29-4
X.25 12-3
Index Frame Relay High-Level Data Link Control
compared with ATM 15-9 See HDLC
consortium formation of 13-1 High-Level Entity Management System
frame format 13-3 See HEMS
general operation 13-1 High-Performance Parallel Interface LMI See HIPPI
extensions 13-2 High-Speed Serial Interface
global addressing 13-2 13-5 See HSSI
message format 13-4 HIPPI 8-2
multicasting 13-2 13-6 hold-downs 23-4 24-2
simple flow control 13-2 hop count
2-7 virtual circuit messages 13-2 general description network implementation 13-6 RIP limit 23-3 frame definition of 1-6 host/cost pairs VINES 21-4 FTAM 20-6 HSSI
FTP 18-9 and the OSI reference model 8-1
general operation 8-1
loopback tests 8-28-3
gateway
basic definition 3-1
in the Internet community 18-6 lAB
32-4 and 32-1 gauge data type SNMP SNMP subnetworks 28-2 1-7 general-topology ES-IS general description 32-4 get operation SNMP IBM 32-4 19-4 get-next operation SNMP andLU6.2 22-3 19-5 global broadcasts XNS and NetBIOS 22-3 network 33-133-5 global multicasts XNS and management GOSIP 20-2 and SDLC 11-1
and SRB 30-1
and SRT bridging 31-2 IBM network management and OSI 33-2
and SNA 33-2 33-3 33-4 33-5 hardware addresses and SNMP 33-5 See link-layer addresses definition of 33-1 hardware monitor NetView 33-5 functional areas of 33-1 HDLC LNM 33-5 and PPP 9-1 LSM 33-5 and VINES 21-2 NetView 33-5 differences between SDLC and 11-4 principal architectures and platforms 33-4 general operation 11-4 SystemView 33-5 header error control field ATM 15-5 IBM Token Ring network header as defined in OSI model 1-3 See Token Ring/IEEE 802.5 HEC field ATM 15-5 ICMP 18-7 hello packets ICMP Router Discovery Protocol EIGRP 24-5 See IRDP VINES 21-4 ICP VINES 21-2 21-6 Hello protocol OSPF 25-4 IDI 20-4 help function NetView 33-5 IDN 12-3 HEMS 32-1 IDP initial domain part 20-4 hierarchical routing 2-6 IDP Internet Datagram Protocol high-bandwidth applications ATM 15-1 description 22-2
packet format 22-3
Internetworking Technology Overview IDRP 28-128-6 interior gateway protocols IEEE 802.2 See IGP
11-1 and SDLC Interior Gateway Routing Protocol
as DECnet protocol 17-2 See IGRP
as an OSI protocol 20-1 interior router IP 18-6
general operation 11-5 intermediate system
IEEE 802.3 See IS
and FDDI 7-1 Intermediate System-to-Intermediate System Intradomain
and transparent bridging 29-1 Routing Exchange Protocol
as NetWare medium 19-2 See IS-IS
as an example of broadcast subnetwork 28-2 internal organization of the network layer
as an OSI protocol 20-1 See IONL
differences between Ethernet and 5-2 internal routes EIGRP 24-6
frame format 5-3 International Data Number
general operation 5-1 See IDN
IEEE 802.5 International Telecommunications Union
and FDDI 7-1 See ITU
and source-route bridging 30-1 30-2 Internet Activities Board
as NetWare medium 19-2 See lAB
as an OSI protocol 20-1 Internet community
compatibility of IBM Token Ring network and 6-1 and IGRP 25-1
general operation 6-1 and RIP 19-4
RIF 30-3 and XNS 22-3
IEEE 802.6 Internet Control Message Protocol
as the basis for SIP 14-1 See ICMP
MAC protocol 14-8 Internet Control Protocol
1-7 See IEEE general description ICP VINES
IGP 18-6 25-1 Internet Datagram Protocol
IGRP See IDP Internet Datagram Protocol
compatibility with EIGRP 24-4 Internet Packet Exchange
general operation 24-1 See IPX
stability features 24-2 Internet Protocol
timers SeeIP
flush 24-3 intradomam IS 2-3
hold time 24-3 IONL 20-2
invalid 24-3
update 24-3 and EIGRP 24-4 image traffic ATM 15-1 and IGRP 24-1 28-1 indication OSI service primitive 20-3 and Integrated IS-IS information frames and NetWare 19-4
SDLC 11-3 and OSPF 25-1
X.25/LAPB 12-5 and the OSI reference model 18-2 initial domain identifier and XNS 22-1
See IDI definition of 18-1 initial domain part network classes 18-4
See IDP initial domain part packet format 18-3
Institute of Electrical and Electronic Engineers subnet addresses 18-4 18-418-5
See IEEE subnet masks 18-5 25-6
Integrated IS-IS 28-1 TOS bits 25-5
Integrated Services Digital Network transport layer 18-8
See ISDN upper-layer protocols 18-9 inter-AS routing protocol BGP 27-1 IPX interdomain IS 2-3 and XNS 22-1
Interdomain Routing Protocol general operation 19-2
See IDRP packet format 19-2
Index IRDP 18-718-8
Is
definition 2-3 LAN Network Manager hello format 28-3 packet See LNM in OSI networking 20-128-1 LAN Station Manager ISDN See LSM and Frame Relay 13-2 LAP 11-1 general operation 10-1 LAPB Layer 10-3 and SDLC 11-1 Layer 10-4 compared to HDLC and SDLC 11-5 Layer 10-4 frame types reference 10-2 points information frames 12-5 Is-Is supervisory frames 12-5 and EIGRP 24-4 unnumbered frames 12-5 and OSPF 25-1 general operation 12-4 general operation 28-1 LCP metrics 28-4 general operation 9-3 packet formats packet types IS-IS hello 28-428-5 link establishment 9-3 link-state 28-428-5 link maintenance 9-3 numbers packets 28-428-5 sequence link termination 9-3 redirect message 28-4 purpose of 9-1 routing hierarchy 28-3 Level router DECnet 17-5 so Level routing OSI 28-1 and FDDI 7-1 Level router DECnet 17-5 and HSSI 8-1 Level routing OSI 28-1 and IBM network management 33-1 Link Access Procedure and PPP 9-2 See LAP
and routing protocols 28-1 Link Access Procedure Balanced and SDLC 11-1 See LAPB and the OSI reference model 20-1 Link Control Protocol 1-7 general description See LCP TEC 32-3 link state advertisement network device names 2-3 See LSA network management functional areas link state routing algorithm 4-3 accounting management definition 2-7
configuration management 4-3 vs distance vector algorithm 24-1 fault management 4-4 link-layer addresses 1-6 performance management 4-2 link-state packet security management 4-4 See LSP specifications LLC 10589 28-1 and LAN Network Manager 33-5 10747 28-1 classes 3309-1979 9-2 Class 11-5 3309-1984/PDAD1 9-2 Class II 11-5 4335-1979 9-2 Class III 11-5 4335-1979/Addendum 1-1979 9-2 Class IV 11-5 7776 12-2 general operation 11-5 8208 12-2 sublayer 3-3 8348 20-2 types 8648 20-2 Type 11-5 9542 28-1 Type 11-5 TR9575 20-2 Type 11-5 TR 9577 20-2 LLC2 11-5 ITU 12-1
Internetworking Technology Overview LMI metropolitan area network extensions 13-2 See MAN
global addressing 13-2 13-5 MHS 20-6
message format 13-4 MIB 32-3
multicasting 13-2 13-6 mied-media bridging 31-131-5
simple flow control 13-2 modal dispersion FDDI 7-1
virtual circuit messages 13-2 monomode fiber
33-5 See fiber LNM single mode FDDI local management interface MSAU 6-1 6-4 See LMI multiaccess network OSPF 25-4 LocalTalk AppleTalk 16-2 multicast XNS Logical Link Control directed 22-3
SeeLLC global 22-3 logical link control sublayer multimode fiber FDDI 7-1
SeeLLC multipath routing LSA in IGRP 24-2
definition 25-1 in OSPF 25-5
types multiplexing technology AS external links advertisements 25-5 ATM 15-2 network links advertisements 25-5 TDM 15-2
router links advertisements 25-5 multistation access unit
summary links advertisements 25-5 See MSAU LSM 33-5
LSP 28-428-5
LU 6.2 IBM 19-4
Name Binding Protocol SeeNBP
NANP 14-6
MAC national terminal number
addresses 28-3 31-2 See NTN
sublayer 3-3 NAU 19-4
MAC-layer bridge 3-3 NBP 16-6
MAN 14-115-11 NCP NetWare Core Protocol 19-3 19-5
Management Information Base NCP Network Control Program 33-5
See MIB NCP Network Control Protocol 9-1
MAU 5-2 neighbor
Media Access Control sublayer EGP 26-2 See MAC OSPF 25-4 medium attachment unit neighbor acquisition message EGP 26-3
See MAU neighbor discover/recovery EIGRP 24-4 message format neighbor reachability message EGP 26-3 SNMP 32-5 neighbor tables EIGRP 24-5
Message Handling System nested focal points IBM 33-4 See MHS NET 20-328-3 message definition of 1-6 NetBIOS 19-5 metrics NetRPC protocol VINES 21-7
and BGP 27-2 NetView 33-1 33-5 and EGP 26-3 NetWare
and IGRP 24-1 and EIGRP 24-4
and IS-IS 28-4 and the OSI reference model 19-2
and OSPF 25-5 general operation 19-1
and RIP 23-1 media access 19-2
definition 2-1 2-7 network-layer protocols 19-2
shell 19-4
Index transport-layer protocols 19-4 NOS 19-1
upper-layer protocols 19-4 Novell
NetWare Core Protocol 19-5 and EIGRP 24-4
see NCP NetWare Core Protocol and NetWare 19-1
NetWare Loadable Module and RIP 23-1
See NLM and XNS 22-1
NetWare Message Handling System NRM 11-5 See NetWare MHS NSAP
NetWare MHS 19-5 20-6 addresses 20-3
NetWare Remote Procedure Call definition 20-3 28-3 See NetWare RPC n-selector OSI 20-3
NetWare RPC 19-5 NSP 17-6 network AppleTalk 16-4 NT1 10-1 network addressable unit NT1/2 10-2
See NAU NT2 10-i
Network Basic Input/Output System NTN 12-4 See NetBIOS NVE 16-6
Network Control Program See NCP Network Control Program
Network Control Protocol
See NCP network entity title OC-1 8-2 See NET Office Channel Network File System See OC-1 See NFS ONA 33-133-433-5 network management SNMP data type 32-4 IBM opaque Open Network Architecture functional areas 33-133-3 See ONA principal architecures and platforms 33433-5 Open Systems Interconnection SNMP 32-1 See OSI network management architecture 4-14-2 operations management IBM 33-1 Network Management Framework 32-1 32-2 operations management services IBM 33-3 Network 32-2 Management System OS network management systems 4-1 address format 20-4 network management ISO functional areas and IBM network management 33-1 accounting management 4-3 and IGRP 24-1 configuration management 4-3 ISO specifications 20-2 fault management 4-4 media-access protocols 20-1 security management 4-4 network service definition 20-2 network operating system network-layer protocols 17-2 20-2 See NOS routing protocols 28-1 network service access point service primitives See NSAP confirmation 20-3 Network Services Protocol indication 20-3 SeeNSP request 20-3 network-visible entity response 20-3 See NVE transport-layer protocols 20-4 NFS 18-9 20-6 upper-layer protocols 20-5 NLM 19-5 OSI reference model node AppleTalk 16-4 compatibility issues 1-4 nonbiocking interface ATM 15-3 information formats 1-3 normal response mode introduction 1-1 See NRM layers North American numbering plan application layer 1-4 See NANP link layer 1-5
10 Internetworking Technology Overview network layer 1-5 PEP 22-4
physical layer 1-5 performance and accounting management IBM 33-1
presentation layer 1-4 33-2
session layer 1-4 performance monitor NetView 33-5
transport layer 1-5 permanent virtual circuit OSPF See PVC
and EIGRP 24-4 permanent-virtual-connection service ATM 15-9
and IS-IS 28-2 Phase IV routing DECnet 17-2
database description packets 25-4 physical addresses
general operation 25-1 See link-layer addresses
hello packets 25-4 Physical Layer Convergence Protocol
link state acknowledgment packets 25-5 See PLCP
link state request packets 25-4 PLCP 14-7
link state update packets 25-5 PLP 17-2
packet formats 25-4 Point-to-Point Protocol
routing hierarchy 25-2 SeePPP
point-to-point subnetworks ES-IS 28-2
poison reverse updates 23-4 24-3 26-3 poll message EGP PPP
and LCP 9-3 packet assembler/disassembler andNCP 9-1 See PAD and NetWare 19-2 Packet Exchange Protocol frame format 9-2 See PEP general operation 9-1 packet format link layer 9-2 BGP 27-2 physical layer requirements 9-2 EGP 26-2 PRI 10-3 ES hello 28-228-3 Primary Rate Interface IDP 22-3 See PRI IP 18-3 Printer Access Protocol IPX 19-3 See PAP 16-8 IS hello 28-228-3 Printing Protocol 22-4 IS-IS 28-428-5 problem management IBM 33-1 33-3 OSPF 25-4 protocol data unit RIP 23-2 SeePDU TCP 18-8 protocol-dependent modules EIGRP 24-4 VIP 21-5 PSE 12-1 packets definition of 1-6 PSN 12-1 packet-switched network PT field ATM 15-5 See PSN public data network packet-switching exchange See PDN See PSE PVC PAD 12-2 and ATM 15-9 PAP 16-8 and Frame Relay 13-2 link 7-6 passive FDDI and X.25 12-3 state 24-6 passive EIGRP path splitting OSPF and IS-IS 28-2 payload type field ATM 15-5 PDN 12-1 PDU AAL3/4 ATM 15-6 QLLC 11-4 AAL5 ATM 15-7 Qualified Logical Link Control as used in networking literature 1-6 See QLLC SIP level SMDS 14-6 qualifier bit QLLC 11-6 28-4 SIP level SMDS 14-5 quality of service QOS
Index 11 24-5 query packets EIGRP route flush timer RIP 23-3 query product identification SNA 33-2 route invalid timer RIP 23-3 route states EIGRP
active 24-6
passive 24-6
routed protocols
AppleTalk 16-1 RARP 18-6 DECnet 17-1 RD 28-6 IP 18-2 RDI 28-6 IPX 19-2 recomputation EIGRP 24-6 OSI 20-2 redirect message IS-IS 28-4 VINES 21-5 Reliable Transfer Service Element vs routing protocols 2-8 See RTSE XNS 22-1 Reliable Transport Protocol router See RTP basic definition 3-1 Remote Operations Service Element exterior 18-6 See ROSE interior 18-6 remote procedure call 19-1 20-5 21-7 router of last resort 2-6 Remote Procedure Call Internet Protocol routing See RPC algorithm design goals 2-3 repeater definition 3-1 algorithm types 2-52-7 24-5 reply packets EIGRP definition of 2-1 service 20-3 request OSI primitive dynamic 18-6 Request For Comments metrics 2-7 See RFC multipath 24-225-5 24-5 request packets EIGRP static 18-6 response OSI service primitive 20-3 update message 2-2 26-3 Reverse Address Resolution Protocol routing algorithms See RARP Bellman-Ford 2-7 RFC distance vector 2-7 1058 23-2 link state 2-7 1163 27-1 shortest path first 2-7 1247 25-1 routing area 2-3 904 26-1 routing domain 2-3 assigned numbers 9-3 routing domain IDRP 28-6 general description 18-2 routing domain identifier IDRP 28-6 RIB 28-6 routing hierarchy IS-IS 28-2 28-3 RIF 30-3 routing information base IDRP 28-6 Ril bit 30-3 routing information field RIP See RIF and EIGRP 24-4 routing information indicator bit and IGRP 24-1 See Ru bit and IS-IS 28-2 Routing Information Protocol and NetWare 19-4 See RIP and OSPF 25-1 routing loop 23-3 24-3 and VINES 21-2 routing protocols and XNS 22-1 22-3 BGP 27-1 general operation 23-1 EGP 26-1 packet fonnat 23-2 IGRP 24-1 routing update timer 23-3 OSPF 25-1 stability features 23-323-4 RIP 23-1 root 29-3 bridge STA RTMP 16-6 root path cost STA 29-3 vs routed protocols 2-8 root port STA 29-3 routing table 2-1 ROSE 20-5
12 Internetworking Technology Overview Routing Table Maintenance Protocol service-specific convergence sublayer ATM 15-6 See RTMP session monitor NetView 33-5 Routing Table Protocol set operation SNMP 32-4
See RTP SGMP 32-1
timer 23-3 routing update RIP ships-in-the-night routing Integrated IS-IS 28-5 RPC 18-9 shortest-path-first routing algorithm 2-7 25-1 RS-232 12-5 8-19-2 Simple Gateway Monitoring Protocol RS-422 9-2 See SGMP RS-423 9-2 Simple Mail Transfer Protocol RTMP 16-623-124-4 See SMTP RTP Simple Network Management Protocol 21-2 general operation See SNMP 21-6 packet types single mode fiber FDDI 7-1 RTSE 20-5 single-attach station
See SAS
SIP
level 14-7
level 14-6
level 14-5 SAA 33-5 transmission system sublayer 14-7 SAP service access point 1-3 11-5 slow convergence SAP Service Advertisement Protocol See convergence and EIGRP 24-4 SMDS and NetWare 19-4 access classes 14-3 and XNS 22-1 and relationship to IEEE 802.6 14-3 SAR 15-6 compared with ATM 15-11 SAS 7-2 14-1 SDLC general operation network implementation 14-8 configurations 11-1 SIP 14-3 frame format 11-2 SMDS Interface Protocol frame types See SIP information 11-3 SMI 32-4 supervisory 11-3 SMTP 18-10 unnumbered 11-3 SNA general operation 11-1 and IBM network management 33-2 33-3 33-4 node types 11-1 33-5 SDU 15-3 and SDLC 11-1 and segmentation reassembly sublayer ATM 15-6 SNAP sequence numbers packet and NetWare 19-3 See SNP and XNS 22-3 Sequenced Packet Exchange SNI 14-1 See SPX SNMP Sequenced Packet Protocol and CMIP 20-6 See SPP and IBM network management 33-5 server and the Internet protocol suite 18-9 AppleTalk 16-1 general operation 32-1 NetWare 19-1 get operation 32-4 VINES 21-2 get-next operation 32-4 service access point message format 32-5 See SAP service access point set operation 32-4 Service Advertisement Protocol trap operation 32-4 See SAP Service Advertisement Protocol SNP 28-428-5 service data unit SNPA 28-3 See SDU SONET 15-3 service node VINES 21-2 service points ONA 33-5
Index 13 source service access point switching
See SSAP algorithms 2-2 source-route bridging definition 2-1
See SRB fast packet 14-8 source-route transparent bridging Synchronous Data Link Control
See SRT bridging See SDLC spanning-tree algorithm synchronous digital hierarchy SDH 8-2
See STA Synchronous Optical Network spanning-tree explorer RIF 30-3 See SONET specifically routed frame RIF 30-3 synchronous transfer mode
SPF algorithm OSPF 25-4 See STM split horizons 23-4 24-224-3 Systems Application Architecture
SPP 19-4 22-4 See SAA
SPX 19-4 Systems Network Architecture SRB SeeSNA
and STA 31-3 SystemView 33-5
bridging algorithm 30-2
explorer frames 31-2
general operation 30-1
MAC addresses 31-2
SRT bridging 30-131-231-5 T3 8-1 SSAP 11-5 T3plus Networking 8-1 SSCS 15-6 TA ISDN 10-1 STA 29-329-4 31-3 table of all known networks VINES 21-5 standards organizations 1-7 table of neighbors VINES 21-5 star topology tables ATM 15-2 AppleTalk routing 16-6 Token Ring 6-4 IP routing 18-618-7 static routing 2-5 18-6 neighbor 24-5 status monitor NetView 335 RIP routing 23-1 STM 15-2 topology 24-6 StreetTalk VINES 21-7 transparent bridging 29-1 29-2 Structure of Management Information zone information 16-7 See SMI TCP subnet addresses IP 18-4-i 8-5 and RIP 23-1 subnet masks 18-5 25-6 and SNMP 32-1 SubNetwork Access Point and SPP 22-4 See SNAP and TP4 20-4 subnetwork point of attachment and XNS 22-1 See SNPA background 18-1 subscriber network interface definition of 18-1 See SM packet format 18-8 supervisory frames TDM 13-1 15-2 SDLC 11-3 TEl 10-1 X25/LAPB 12-5 TE2 10-1 SYC TELENET 12-1 Frame Relay 13-2 Telnet 18-9 X.25 12-3 terminal adapter ISDN 10-1 Switched Multimegabit Data Service tick SNMP data type 32-4 See SMDS time-division multiplexing switched virtual circuit SeeTDM See SVC token
OSI protocols 20-5
Token Ring/IEEE 802.5 6-2
14 Internetworking Technology Overview Token Ring/IEEE 802.5
and Ethernet MTU 31-2
and IBM network management 33-5 UDP 18-8 18-9 19-422-4 as DECnet medium 17-2 Ungermann-Bass as NetWare medium 19-2 and RIP 23-1 as VINES medium 21-2 and XNS 22-1 22-3 as an AppleTalk medium 16-2 unicast XNS 22-3 of 6-1 compatibility unnumbered frames fault management mechanisms 6-4 SDLC 11-3 frame format 6-4 X.25/LAPB 12-5 6-1 general operation 24-5 update packets EIGRP priority system 6-3 User Datagram Protocol TokenTalk AppleTalk 16-2 See UDP topological database OSPF 25-2 User-Network Interface ATM 15-2 topology
ATM 15-2
IEEE 802.5 6-1
TokenRing 6-1
topology change message in transparent bridging networks 29-4 V.24 12-5
topology tables EIGRP 24-6 V.28 12-5 TOS 28-2 V.35 8-19-220-1
TPO 20-4 variable-length subnet masks 25-6 28-2
TP1 20-4 VCI 15-4
TP2 20-4 video traffic ATM 15-1 15-5 TP3 20-4 VINES 21-3 TP4 20-422-4 address selection process transaction ID AppleTalk 16-7 and RIP 23-1
translational bridging general operation 21-1
host/cost 21-4 general operation 31-131-3 pairs
translation challenges 31-231-3 network-layer protocols 21-2
Transmission Control Protocol routing algorithm 21-4 21-7 SeeTCP transport-layer services 21-7 transparent bridging upper-layer protocols and RIF 31-2 VINES Internetwork Protocol
andSTA 31-3 See VIP
frame format 29-4 VIP 21-2 general operation 29-1 general operation format 21-5 Transport Protocol packet See TP4 virtual channel identifier
32-4 See VCI trap operation SNMP channels 15-4 twisted pair virtual ATM circuit 13-1 as Token Ring/IEEE 802.5 medium 6-1 virtual 12-3 virtual connections 15-4 as an ATM medium 15-3 ATM
as an Ethernetl802.3 medium 5-2 virtual links 25-3
as an HSSI medium 8-2 virtual path identifier TYMNET 12-1 See VPI
15-4 type of service virtual paths ATM Method See TOS Virtual Telecommunications Access See VTAM
Virtual Terminal Protocol
See VTP
vital product data SNA 33-2
voice traffic ATM 15-1 15-5
VPI 15-4
Index 15 VTAM VTP 20-6
ZIP 16-6
ZIT 16-7
zone AppleTalk 16-4
Zone Information Protocol
See ZIP Windows 18-9 information table X.21 20-1 zone SeeZIT X.2lbis 12-5
X.25
and DECnet 17-2
and Frame Relay 13-1
and OSI 20-1
and OSI routing 28-2
and PPP 9-1
and SDLC 11-5
and VINES 21-2
compared with ATM 15-10
frame format 12-3
general operation 12-1
Layer 12-5
Layer 12-4
Layer 12-3
X.25 Packet-Level Protocol
See PLP
X.28 12-2
X29 12-2
X.3 12-2
X.500 20-6
XDR 18-9
Xerox Corporation
and Ethernet 5-1
and NetWare 19-1
and VINES 21-1
and XNS 22-1 XNS
and 3Com 22-3
and NetWare 19-1
and RIP 23-1
and SNAP 22-3
and the OSI reference model 22-1
and Ungermann-Bass 22-3
and VINES 21-1
encapsulation 22-3
general operation 22-1
media-access protocols 22-2
network-layer protocols 22-2
packet types 22-3
transport-layer protocols 22-4
upper-layer protocols 22-4
XON/XOFF flow control 13-2
16 Internetworking Technology Overview Corporate Headquarters Cisco Systems Inc
P.O Sex 3015
1525 OBrien Drive
Menlo Park CA 94026 USA
Tel 415 326-1941
800 553-NETS 6387
Fax 415 326-1909
Cisco Systems has sver 75
sales offices worldwide Call
415326-1941 tocontactyosr
local account representative
or in North America call 800 553-NETS 6381
3/12
Printed in the USA on recycled psper containing 10% post-consomer wsste
78-1249-01