route field

In *theory*, the CFI bit would be used when an Ethernet backbone is carrying traffic being bridged from another LAN that supports "big endian" bit format, i.e., 802.5 Token Ring or FDDI. In *practice* there will never be a CFI bit on an Ethernet, since both 802.5 Token Ring and FDDI are obsolete technologies. You are looking at historical artifacts from the evolution of networking.

"In theory, theory and practice are the same. In practice, they are not."

-- Rich Seifert Networks and Communications Consulting 21885 Bear Creek Way (408) 395-5700 Los Gatos, CA 95033 (408) 228-0803 FAX

Send replies to: usenet at richseifert dot com

Reply to
Rich Seifert
Loading thread data ...

Again, you are looking at portions of the standard related to internetworking between 802.5 Token Ring, FDDI, and Ethernet. Source Routing was a bridging mechanism supported on 802.5 Token Ring and FDDI, but is no longer used.

This topic (as well as most of the questions you have been raising lately) is discussed in Chapter 3 and 6 of "The Switch Book". I strongly suggest you obtain a copy and read it before throwing questions out "into the aether" for others to educate you.

-- Rich Seifert Networks and Communications Consulting 21885 Bear Creek Way (408) 395-5700 Los Gatos, CA 95033 (408) 228-0803 FAX

Send replies to: usenet at richseifert dot com

Reply to
Rich Seifert

Ethernet does not support source routed frames. Please see earlier postings about obtaining appropriate reference material and self-education.

-- Rich Seifert Networks and Communications Consulting 21885 Bear Creek Way (408) 395-5700 Los Gatos, CA 95033 (408) 228-0803 FAX

Send replies to: usenet at richseifert dot com

Reply to
Rich Seifert

-----------------------------------------------

Can u plz tell me that is the setting and resetting of CFI bit and corresponding E-RIF bits is done by the h/w or automatically or for this any user or programmer plays a role.....

Thanks in advance

Vikrant

Reply to
vicky

Hello sir can u tell me the meaning of the term --

Default 802.1Q Tag

is the value of the 802.1q is same for all ports.

Vikrant

Reply to
vicky

---------------------------------------------------------------------------

Hello

As u mentioned here above in u'r point that

if the bridge is "tunneling," or bridging, an FDDI > frame from one FDDI LAN to another FDDI LAN, for example, and there > are some Ethernet segments between the two FDDI LANs, then the VLAN > tag can carry that FDDI "source routing" information. It's a way of > allowing frames from different MACs to be bridged, without losing > extra header information available in the non- Ethernet LANs.

so for doing that function is a brigde is capable of doing routing (is bridge is source routed bridge) or it done at normally also.

One more thing is about that type of tunneling is it done automatically or a programmer has also play a role for this , and if a programmer has a role than also tell me some about of this role.

Thanks

Vikrant

Reply to
vicky

------------------------------------------

What r the transparent frames

is all ethernet / 802.3 frame are said to be transparent frames....

Vikrant

Reply to
vicky

Tunneling is *not* routing. The point made above is that an Ethernet bridge can be used to tunnel source-route information (including CFI information) between two source-route-capable LANs (e.g., Token Ring or FDDI) across a non-source-route-capable Ethernet backbone. The Ethernet bridge is not performing any source-route function, only passing along the information.

The tunneling function must be designed into the bridge. It can be performed either in hardware or software.

-- Rich Seifert Networks and Communications Consulting 21885 Bear Creek Way (408) 395-5700 Los Gatos, CA 95033 (408) 228-0803 FAX

Send replies to: usenet at richseifert dot com

Reply to
Rich Seifert

Sir

can u tell me

What are the Unregistered Group Addresses

is there any relation b/w group MAC address and Unregistered Group Addresses.

Thanks in advance

Vikrant

Reply to
vicky

Okay, here is how you go about getting the answer.

Where did you see a reference to "unregistered group address"? Chances are, the answer to your question is in the same place, right?

If you see the terms "registered" associated with "group address," you must be referring to? GMRP, the GARP Multicast Registration Protocol. This is a *layer 2* equivalent of IGMP. So, it uses only layer 2 tools.

Now, where would this be discussed? It's in IEEE 802.1D. Clause 10.

Parenthetically, I think GMRP is on its way out, to be replaced by something newer. GMRP is not used very much. Most use IGMP snooping instead.

Bert

Reply to
Albert Manfredi

-------------------------------------------------

without the use of GMRP is IGMP Snooping is possible ????

Reply to
vicky

," or bridging, an

another FDDI LAN,

between the two FDDI

ource routing"

rent MACs to be

vailable in the non-

-----------------------------------------------------------

can u please highligted the following with detail....................

The tunneling function must be designed into the bridge. It can be performed either in hardware or software.

Thanks

regards

Vikrant Pandey

Reply to
vicky

The statement means exactly what it says. A device cannot tunnel unless it is designed to do so. The tunneling function can be implemented either in hardware (e.g., in a finite-state machine), or in software (e.g., as code executed by a microprocessor). The choice is a matter of implementation preference, performance, and cost.

-- Rich Seifert Networks and Communications Consulting 21885 Bear Creek Way (408) 395-5700 Los Gatos, CA 95033 (408) 228-0803 FAX

Send replies to: usenet at richseifert dot com

Reply to
Rich Seifert

Yes.

-- Rich Seifert Networks and Communications Consulting 21885 Bear Creek Way (408) 395-5700 Los Gatos, CA 95033 (408) 228-0803 FAX

Send replies to: usenet at richseifert dot com

Reply to
Rich Seifert

I don't even think that was the right question.

The question one SHOULD be asking oneself is, "With IGMP snooping, who needs GMRP?"

And the answer is, as long as you're carrying IP multicasts, no one. However if the multicasts are NOT of IP packets, then GMRP, or other similar layer 2 protocol, may well offer added value.

Bert

Reply to
Albert Manfredi

Hello

Is the both terms

inter-switch link port and trunk port

are same or has any difference

Is two l 2 switches are connected by a trunk port or from what else.

Thanks

Vikrant

Reply to
vicky

Hello Sir

What u say about inter-port based-vlan communication is it possible ..... if yes plz tell how ???? please.........

Thanks

Vikrant

Reply to
vicky

It is *not* possible on any Layer 2 switch unless that switch has bugs in its hardware or software.

(Some Layer 2 switches allow you to deliberately configure intra-vlan communications, but I count that as a bug.)

Reply to
Walter Roberson

Two LANs can be interconnected by a bridge. Two VLANs can be interconnected by making the hosts in the two members of both VLANs. For example, if the VLANs are 802.1Q, make the hosts VLAN-aware and members of both VLANs. If the VLANs are differentiated by IP subnet, same thing, only now using IP prefixes instead of the VLAN tag.

Bert

Reply to
Albert Manfredi

---------------------------------------------------

Hello Sir

is the inter-port based-vlan communication is only possible when the switch controller providing some that type of register support.

Vikrant

Reply to
vicky

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.