Designing Large-Scale LAN/WAN, Part 2

Total Page:16

File Type:pdf, Size:1020Kb

Designing Large-Scale LAN/WAN, Part 2 50-20-52 DATA COMMUNICATIONS MANAGEMENT DESIGNING LARGE-SCALE LAN/WANS, PART II John R. Vacca INSIDE Designing Large-Scale IP LAN/WAN Systems; Designing SRB LAN/WAN Systems; Designing SDLC, SDLLC, and QLLC LAN/WAN Systems; Designing APPN Internetworks; Designing DLSw+ Internetworks; Designing ATM; Designing Packet Service LAN/WAN Systems; Designing DDR Internetworks; Designing ISDN; Designing Switched LAN Systems; Designing LAN/WAN Systems for Multimedia DESIGNING LARGE-SCALE IP LAN/WAN SYSTEMS The following discussion provides a very quick overview of the key de- cisions one must make when selecting and deploying routing protocols for large-scale IP LAN/WAN systems. This discussion lays the foundation for subsequent discussions regarding specific routing protocols. Describing LAN/WAN Topology The complete set of routers, and the networks that connect them, de- scribe the physical topology of a LAN/WAN system. A logical topology is also included in a LAN/WAN. Different routing protocols establish the logical topology in different ways. A logical hierarchy is not used by some routing protocols. Within a given LAN/WAN system environment (and to establish a logical topolo- gy), such protocols use addressing to segregate specific areas or do- mains. For such nonhierarchical, or flat, protocols, no manual topology creation is required. Through the establishment of a backbone and logical areas, other pro- tocols require the creation of an explicit hierarchical topology. Examples of routing protocols that use a hierarchical structure are the OSPF and In- termediate System-to-Intermediate System (IS-IS) protocols. According to Cisco, the explicit topology in a hier- archical scheme takes precedence PAYOFF IDEA over the topology created through This article provides details on how to utilize LAN addressing. and WAN technologies available today to design large-scale LAN/WANs. 08/00 Auerbach Publications © 2000 CRC Press LLC The addressing topology should be assigned to reflect the hierarchy if a hierarchical routing protocol is used. Also, the addressing implicitly cre- ates the topology if a flat routing protocol is used. There are two recom- mended ways to assign addresses in a hierarchical LAN/WAN. The simplest way is to give each area (including the backbone) a unique LAN/WAN address. An alternative is to assign address ranges to each area. Logical collections of contiguous LAN/WANs and hosts are areas. All the routers having interfaces on any one of the included LAN/WANs are also areas. Each area runs a separate copy of the basic routing algorithm. Therefore, each area has its own topological database. DESIGNING SRB LAN/WAN SYSTEMS The following discussion addresses implementation issues that can affect large-scale, router-based SRB LAN/WANs, SRB-related technology, and features that provide support for SRB requirements. Specific topics in- clude typical SRB environments and multiport bridging. Using Typical SRB Environments Three types of user environments use SRB: 1. Any-to-any (flat): End users at one site need to access end stations at another site. 2. Many end stations to few end stations (hierarchical): In a hierarchical SNA network, end users from multiple access sites need connectivity to a host site through a limited number of front-end processors (FEPs). 3. Many end stations to several end stations (distributed): Many users need to access a limited number of servers or a limited number of de- vices, such as an AS/400. The following discussion evaluates SRB environment design issues in relation to these user environments. Multiport Bridging A two-port, ring-to-bridge-to-ring combination was the fundamental de- sign of an SRB, as initially created by IBM. A half-bridge configuration that consisted of a ring-to-wide-area-network (WAN) combination fol- lowed by a second WAN-to-ring half-bridge combination was also creat- ed by IBM. Multiport routers adopt an implementation that allows SRBs to include multiple rings on a single internetworking node to support more than two rings. The virtual ring capability accomplishes this. According to Cisco, a virtual ring is a conceptual entity that connects two or more Auerbach Publications © 2000 CRC Press LLC EXHIBIT 1 — A Multiport Bridge Using a Virtual Ring Concept to Permit Multiple Ring Interconnection physical rings together, locally or remotely. Exhibit 1 illustrates the con- cept of multiport bridges and a virtual ring. Virtual rings can be expanded across router boundaries as a concept. Cisco recommends that several access points can be connected to a cen- tral router with an FEP by a large virtual ring. Simple bridging, multiport bridging, and connections to both local and remote virtual rings are supported by routers. Required to communicate with remote rings is a virtual ring configuration. The half-bridge configu- ration is not supported. The IBM half bridge does not use the concept of virtual rings. Two IBM half bridges use two rings. The virtual ring advan- tage is in a topology that features many SRBs. In such an arrangement, only a single unit is required at a central site. A property not found in physical ring topologies is what makes up re- mote virtual rings. The LAN/WAN administrator determines the logical connectivity. Two options are available: partially meshed topologies (sometimes called redundant star topologies) or fully meshed topologies. In a partially meshed topology, a single central location (such as an FEP Token Ring) is connected to all access locations. Each access location is Auerbach Publications © 2000 CRC Press LLC logically connected to the central FEP rings and is not connected to any other ring. Partially meshed topologies using virtual rings do not permit direct communication between remote rings. However, communication is allowed from the central ring to the remote rings, which also allows communication among remote rings through the central ring. DESIGNING SDLC, SDLLC, AND QLLC LAN/WAN SYSTEMS This part of the article very briefly describes three techniques designed to enable LAN/WAN system capabilities for SNA-based network architectures: 1. SDLC via STUN 2. SDLLC implementation 3. QLLC conversion Tunneling SDLC via STUN SDLC via serial tunneling (STUN) encapsulates SDLC frames into Internet Protocol (IP) packets and routes the encapsulated packets over IP-support- ed LAN/WAN media. According to Cisco, the SDLC frame is transmitted without modification. Also, the information within the frame is transparent to the LAN/WAN. All SNA physical unit (PU) types are supported. Implementing SDLLC Serial-attached devices using the SDLC protocol are allowed to commu- nicate with LAN-attached devices using the Logical Link Control, type 2 (LLC2)1 protocol via the SDLLC function. To consolidate the traditionally disparate SNA/SDLC networks onto a LAN-based, multiprotocol, multi- media backbone network is the basic purpose of the SDLLC function. Routers use the SDLLC feature to forward the LLC2 traffic through re- mote source-route bridging (RSRB) over a point-to-point or IP LAN/WAN, terminate SDLC sessions, and to translate SDLC to the LLC2 protocol. According to Cisco, routers support SDLLC over all such media through IP encapsulation because a router-based IP LAN/WAN can use any arbitrary media, such as FDDI, Frame Relay, X.25, or leased lines. Exhibit 2 illustrates a general SDLLC media translation LAN/WAN inter- network arrangement.2 Converting QLLC A data-link protocol defined by IBM that allows SNA data to be transport- ed across X.25 networks is known as QLLC. According to Cisco, each SDLC physical link is replaced by a single virtual circuit with QLLC. Also, according to Cisco, QLLC conversion is a feature of its IOS Software3 that causes the router to perform all of the translation required Auerbach Publications © 2000 CRC Press LLC EXHIBIT 2 — SDLLC Media Translation to send SNA data over an X.25 network so that IBM devices that are con- nected to a router do not have to be configured for QLLC. DESIGNING APPN INTERNETWORKS Because APPN has many of the characteristics of the LAN networks and still offers the advantages of an SNA network, with APPN, one can con- solidate the two networks (an SNA subarea network and an interconnect- ed LAN network). The following are the major benefits of using APPN: • APPN provides an effective routing protocol to allow SNA traffic to flow natively and concurrently with other protocols in a single net- work. • APPN supports subarea4 applications as well as newer peer-to-peer applications over a single network. • Connections are peer-to-peer, allowing any end user to initiate a con- nection with any other end user without the mainframe (VTAM) in- volvement. • Traditional SNA class of service (COS)/transmission priority can be maintained. One feature has remained critical to many users: COS,5 as SNA has evolved. On an SNA session basis (on the backbone), this feature pro- vides traffic prioritization. This, in turn, allows a single user to have ses- sions with multiple applications, each with a different COS. In APPN, this feature offers more granularity and extends this capability all the way to the end node rather than just between communication controllers. Identifying Types of APPN Nodes An APPN LAN/WAN has three types of nodes: local entry networking (LEN) nodes, end nodes (EN), and network nodes (NN). According to Cisco, the control point (CP), which is responsible for managing a node’s Auerbach Publications © 2000 CRC Press LLC resources and adjacent node communication in APPN, is key to an APPN node. The APPN control point is the APPN equivalent of the signaling connection control part (SSCP).6 Using Local Entry Networking (LEN) Nodes LEN nodes are pre-APPN, peer-to-peer nodes. They can participate in an APPN LAN/WAN using the services provided by an adjacent network node. The CP of the LEN node manages the local resources but does not establish a CP-CP session with the adjacent network node.
Recommended publications
  • What Is Routing
    Module 7 Routing and Congestion Control Version 2 CSE IIT, Kharagpur Lesson 7 Basics of Routing Version 2 CSE IIT, Kharagpur Specific Instructional Objectives On completion of this lesson, the students will be able to: • Understand the need for routing • Understand desirable properties of routing • Understand various Routing algorithms • Fixed (Static) routing • Understand Flooding 7.1.1 Introduction Routing is the act of moving information across an inter-network from a source to a destination. Along the way, at least one intermediate node typically is encountered. It’s also referred to as the process of choosing a path over which to send the packets. Routing is often contrasted with bridging, which might seem to accomplish precisely the same thing to the casual observer. The primary difference between the two is that bridging occurs at Layer 2 (the data link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer). This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways. The routing algorithm is the part of the network layer software responsible for deciding which output line an incoming packet should be transmitted on, i.e. what should be the next intermediate node for the packet. Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of measurement; such as path bandwidth, reliability, delay, current load on that path etc; that is used by routing algorithms to determine the optimal path to a destination.
    [Show full text]
  • MPLS Basic MPLS Configuration Guide, Cisco IOS Release 12.4T
    MPLS Basic MPLS Configuration Guide, Cisco IOS Release 12.4T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Ipv4 And/Or Ipv6: Yes, but Then What?
    IPv4 and/or IPv6: yes, but then what? ● IP serves only for sending packets with well-known addresses. Some crucial questions however remain open: ● how to map an IP address to a link layer address? è Address Resolution Protocol (ARP) ● how to map a link layer address to an IP address? è Reverse Address Resolution Protocol (RARP) ● how to signal errors, send control messages at the network layer? è Internet Control Message Protocol (ICMP) ● how to acquire and assign an IP address for a device interface? è DHCP, NDP/SLAAC ● how to establish/maintain paths through the Internet? è Routing, with OSPF, BGP… ● how to communicate efficiently with sets of devices/interface, at once? è Multicasting, Internet Group Management Protocol (IGMP) 7.2.1 CONTENT of this CHAPTER v Fundamental Goals of the Network Layer v Network Layer Addressing v IPv4 Addressing v IPv6 Addressing v Internet Protocol Design v Internet Protocol version 4 v Internet Protocol version 6 v IPv6 Migration: Transition and Coexistence v IP Address Mapping & Assignment (ARP, RARP, DHCP, NDP/SLAAC) v Control, Error Management and Diagnostic (ICMP) v Network Address Translation (NAT) v Routing (Concepts, OSPF, BGP…) v Multicast (Concepts, IGMP…) 7.2.2 Delivery of Packets End-to-end Application Layer Transport Layer Network Layer IP Addresses Link Layer Corresponding MAC Addresses ? Physical Layer Server Server Server Ethernet Computer Server Computer Computer 142.117.1.1 Ethernet Computer 142.117.1.7 194.52.124.1 142.117.0.0 194.52.124.10 194.52.124.0 7.2.3 Address Resolution Protocol (ARP) ● The Internet is a virtual network, which is build upon physical networks.
    [Show full text]
  • Network Layer Chapter 5
    Network Layer Chapter 5 • Design Issues • Routing Algorithms • Congestion Control • Quality of Service • Internetworking • Network Layer of the Internet Revised: August 2011 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The Network Layer Application Responsible for delivering packets between endpoints over multiple Transport links Network Link Network Layer is the lowest layer in Physical the OSI Reference Model that deals with end-to-end transmission. It provides services to the Transport Layer. CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Design Issues • Store-and-forward packet switching » • Connectionless service – datagrams » • Connection-oriented service – virtual circuits » • Comparison of virtual-circuits and datagrams » CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Store-and-Forward Packet Switching Hosts send packets into the network; packets are forwarded by routers ISP’s equipment Questions: If P1 on Host H1 is sending a message to P2 on H2, for the packet at Host H1: • What is the destination address for the packet’s network layer? • What is the destination address for the packet’s data link layer? CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Connectionless Service – Datagrams Packet is forwarded using destination address inside it • Different packets may take different paths ISP’s equipment A’s table (initially) A’s table (later) C’s Table E’s Table Dest. Line 5 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Connection-Oriented – Virtual Circuits Packet is forwarded along a virtual circuit using tag inside it • Virtual circuit (VC) is set up ahead of time ISP’s equipment A’s table C’s Table E’s Table In: Line Tag Line Tag: Out Question: For the Internet Protocol Suite, is there ANY connection-oriented protocol at the Network Layer whatsoever? 6 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D.
    [Show full text]
  • Network Layer Chapter 5
    Network Layer Chapter 5 • Design Issues • Routing Algorithms • Congestion Control • Quality of Service • Internetworking • Network Layer of the Internet Revised: August 2011 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The Network Layer Application Responsible for delivering packets between endpoints over multiple Transport links Network Link Network Layer is the lowest layer in Physical the OSI Reference Model that deals with end-to-end transmission. It provides services to the Transport Layer. CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Design Issues • Store-and-forward packet switching » • Connectionless service – datagrams » • Connection-oriented service – virtual circuits » • Comparison of virtual-circuits and datagrams » CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Store-and-Forward Packet Switching Hosts send packets into the network; packets are forwarded by routers ISP’s equipment Questions: If P1 on Host H1 is sending a message to P2 on H2, for the packet at Host H1: • What is the destination address for the packet’s network layer? • What is the destination address for the packet’s data link layer? CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Connectionless Service – Datagrams Packet is forwarded using destination address inside it • Different packets may take different paths ISP’s equipment A’s table (initially) A’s table (later) C’s Table E’s Table Dest. Line 5 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Connection-Oriented – Virtual Circuits Packet is forwarded along a virtual circuit using tag inside it • Virtual circuit (VC) is set up ahead of time ISP’s equipment A’s table C’s Table E’s Table In: Line Tag Line Tag: Out Question: For the Internet Protocol Suite, is there ANY connection-oriented protocol at the Network Layer whatsoever? 6 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D.
    [Show full text]
  • An Analysis of Label Switching Forwarding Mechanisms in Future IP Over Cell Networks Paul Andrew Boustead University of Wollongong
    University of Wollongong Research Online University of Wollongong Thesis Collection University of Wollongong Thesis Collections 2000 An analysis of label switching forwarding mechanisms in future IP over cell networks Paul Andrew Boustead University of Wollongong Recommended Citation Boustead, Paul Andrew, An analysis of label switching forwarding mechanisms in future IP over cell networks, Doctor of Philosophy thesis, School of Electrical, Computer and Telecommunications Engineering, University of Wollongong, 2000. http://ro.uow.edu.au/ theses/1940 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] An Analysis of Label Switching Forwarding Mechanisms in Future IP over Cell Networks A thesis submitted in fulfilment of the requirements for the award of the degree Doctor of Philosophy from THE UNIVERSITY OF WOLLONGONG by Paul Andrew Boustead Bachelor of Engineering (Honours Class I) SCHOOL OF ELECTRICAL, COMPUTER AND TELECOMMUNICATIONS ENGINEERING 2000 Abstract The label switching forwarding mechanism, which was derived from the connection oriented ATM protocol, is currently being applied to IP networks. Use of this mech­ anism brings significant advantages in terms of simplifying forwarding decisions as well as enabling implementation of comprehensive traffic engineering mechanisms. Label switching simplifies forwarding by replacing the longest-match prefix search algorithms with a simple lookup table. This thesis concentrates on examining the use of label switching techniques for scal­ able best effort unicast forwarding. Most label switching protocols are capable of operating over cell based switched networks such as ATM, and we constrain this thesis to examining this case. In essence we examine the implementation of label switching techniques in an Internet wide environment.
    [Show full text]