![]() |
|||
![]()
|
![]() |
![]() Click Here! |
![]() |
Source Route Bridging Whereas transparent bridging with the spanning tree algorithm assumes that all bridging intelligence is in the bridge, source route bridging assumes that most of the intelligence is in the hosts attached to each network. The name source route bridge is derived from the premise that in the route information field (RIF) each source frame contains the entire route to the destination(Exhibit 3-3-13). If a given host A wants to send a frame to host B the source route communication process works in the following manner:
Source route bridging was developed by IBM and is the predominant bridging protocol for connecting Token Ring LANs. The operational outline described previously shows that the majority of the source route bridge processor load falls on the end workstation. Performance can vary because route decisions are made by individual workstations. Workstation related performance problems are most common in complex network environments or in networks where processor resources (i.e., memory, disk space, I/O,or CPU capacity) are constricted. The last step of the source route sequence has the originating workstation inserting some number of routes into its route cache. The 802.5 specification does not mandate the criteria for choosing a route, but instead makes several recommendations. Route selection can be based on any one or more of the following metrics:
The metric used to make the route selection is specific to the vendors implementation of the source route process. This variability can lead to poor performance if a common metric is not used throughout the network. The heavy load placed on the workstations, combined with hardware limitations, leads to a seven hop limitation, meaning that a real world source route bridge implementation cannot have more than seven bridges cascaded serially. The 802.5 specification allows up to 28 cascaded bridges,but this limit is not achievable. Another distance related issue with source route bridge implementations is that most implementations are based on the LLC2 specification, which specifies a connection oriented link level protocol with a 2 second timeout. The connection oriented sessions in conjunction with the 2 second timeout can lead to time-out problems in networks that use seven hops. This problem is especially prevalent in networks that communicate over WAN links. The LLC1 link level protocol, which is connectionless and therefore has no timeout function, eliminates this problem in transparent bridging. Although source route bridging has a number of limiting factors,it also has several advantages over transparent bridging. Source route bridges make use of explicit routes, which means that the routing information is contained in each frame. This mechanism makes problem resolution easier because complete route information is contained in each frame. The explicit route implementation permits parallel routes to exist, which can be used for load sharing or fault tolerance. Thus far this source route bridge discussion has been limited to bridging between Token Ring LANs. Real world network implementations mix physical and link level protocols. The introduction of distributed applications and integrated business functions requires communication between processors on different LAN types. The advent of new bridges and router/bridges has made possible bridged communications between different LAN media.
|
![]() |
|
Use of this site is subject certain Terms & Conditions. Copyright (c) 1996-1999 EarthWeb, Inc.. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Please read our privacy policy for details. |