ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents

Size: px
Start display at page:

Download "ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents"

Transcription

1 Bridging ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Jean-Yves Le Boudec Fall 0 Algorhyme I think that I shall never see a graph more lovely than a tree. A tree whose crucial property is loop-free connectivity. A tree that must be sure to span so packet can reach every LAN. First, the root must be selected. By ID, it is elected. Least-cost paths from root are traced. In the tree, these paths are placed. A mesh is made by folks like me, then bridges find a spanning tree. Radia Perlman (inventor of STP) Contents. Specification of the Spanning Tree Protocol (STP). A best path problem 3. The Spanning Tree Algorithm 4. STP in practice

2 . Transparent Bridging Bridges are intermediate systems that forward MAC frames to destinations based on MAC addresses Transparent bridging (the main method used today) means that there is no difference from a protocol viewpoint for end-systems, whether there is a bridge or not but there is a performance difference Transparent bridges learn by sniffing, this requires that there is no loop port Bridge A port Repeater D port 3 B C Forwarding Table Dest Port MAC Nb addr A B C 3 D 3 A mesh is made by folks like me, then bridges find a spanning tree. What does the Spanning Tree Protocol do? Prevent loops in the active topology Decide which ports should be blocked or opened ports that are allowed to forward frames are said to be in the forwarding state or called forwarding ports Adapt to changes in the physical topology is plug and play 4

3 Specification of the Spanning Tree Protocol We now specify the STP method (ie what it does, in more details than before, not how) There are many ways to build a tree on a graph. Minimum Spanning Tree (Kruskal or Prim s algorithms) The STP chose to use the set of shortest paths towards some selected vertex. Each bridge has a bridge label, based on MAC address + configurable offset. Bridge with smallest label is selected and called root. Each LAN between bridges has a cost, by default, decreasing function of bit rate: Port Type Duplex Cost 00BASE-TX / 00BASE-FX (VLT) Full 5 Half 0BASE-T Full Half 700 What: The STP computes a tree of shortest paths to the bridge with the smallest label 5 Specification of STP (cont d) STP gives a role to ports of bridges Root ports One per bridge := port towards root along shortest path in case of equal costs, lowest port id chosen Designated ports On every LAN ( collision domain), choose one designated bridge all ports on LAN for which the bridge is designated are designated ports Designated bridge one per LAN defined by : it has the shortest path to root possibly root itself Ports other than root or designated are blocking 3

4 9% 9% 9% 9% % % 3% 9% % %. b, r, 3r. b, d, 3d 3. b, r, 3d 4. b, d, 3r 5. d, r, 3b. d, b, 3d 7. d, b, 3b 8. r, b, 3d 9. None of the above 0. I don t know What is the role of each port of B90 (b=blocking, r=root, d=designated)? 7 cost = 3 Solution X cost = 3 T B84 B8 X B4 3 X B90 cost = Z back cost = 3 X Y cost = 3 B9 3 B99 cost = root port designated port X blocking port Forwarding Tables: B4 X YZ 3T B84 XYZT B9 XZT Y B8 XYZT B90 XZT 3Y B99 XZT Y 8 4

5 What does STP produce on this network of bridges? The loop is broken Paths are not optimal X All frames go through the spanning tree Less efficient than routing A B 9. A Best Path Problem STP uses a variant of the Bellman-Ford algorithm (see dv.ppt), which we call the Bellman-Ford algorithm for Bridges To fully appreciate the algorithm, let us first transform the original problem into a shortest path problem 0 5

6 A Special Path Algebra Consider a directed graph with edge (=link) costs c(i, j) > 0 and c(i,j) = when i and j are not connected. Every vertex (=node), say, also has a label l Definition: an link attribute is A(i,j) := [l(j), c(i,j)] = [label of end, cost] comparison of attributes lexicographic: [l, c] [l c ] iff [(l < l ) or (l = l and c c )] a total order on N x [0, ] concatenation of attributes: [l,c] [l, c ] = [min(l, l ), c+c ] the attribute of a path i i ik is the concatenation of the attributes of the links i.e.: [minimum label, sum of costs] A path p is better than p if attribute of p attribute of p Which path is best? label cost % 4% % 9% 3 4

7 Solutions Attributes of the following paths [, ] [0, 9] 0 0 [0, 7] [0, 4] The best path is the last The STP problem seen as a best path computation problem Assume the graph is fully connected; all vertex labels are different; all link costs are > 0 A path p that starts at is best (among all paths that start at i) iff It goes through the vertex i 0 that has the smallest label in the graph (the minimum label is reached at only one vertex, by hypothesis) It stops at i 0 It is a shortest path from i to i 0 Thus: the best paths in this graph are the shortest paths to the node with the smallest label Thus: STP problem = finding best paths from self to anywhere in this special path algebra 4 7

8 3. The STP Algorithm The STP algorithm is fully distributed It is simpler to understand first the centralized version It is a Bellman-Ford algorithm! 5 A Centralized Bellman-Ford Algorithm What: Given a directed graph with links attributes as above, computes one tree of best paths from any node to any node let A(i,j):= attribute of link (i,j) =[l(j), c(i,j)] How: Define p k (i) as the attribute of the best path from i to anywhere in at most k hops. Theorem. If the graph is fully connected, the algorithm stops at the latest at k=number of vertices ; at the end, p k (i) is the attribute of a best path. A best path from is obtained by letting pred(i) = the index (j or i) that achieves the minimum in () If the min is achieved by the term [l(i),0] then pred[i]=i; this happens only when vertex i has the smallest label 8

9 The algorithm is the same as the classical Bellman-Ford algorithm with the following modifications Exotic algebra instead of usual algebra: costs are replaced by attributes; addition of costs is replaced by concatenation ( ) and comparison by the lexicographic order. All paths instead of paths to a specific node: add a virtual node 0 such that A(i,0)=[l(i), 0] and A(0,i)=[, ]. Apply the classical Bellman-Ford to compute the shortest (i.e. best) paths from all nodes i to node 0. Remove the final edge from these paths and obtain the best paths we are looking for. Indeed, with these modifications, the classical Bellman-Ford becomes One can easily see that () is equivalent to (), given that we set p k- (0) to [, 0], and that the impact of the initialization for p 0 (i) disappears after one step. Note: in the algorithm, min is the lexicographic min (derived from the comparison of attributes) The proof of the algorithm is similar to the classical case. It relies on the fact that is associative. 7 A Run of this Centralized Bellman Ford Algorithm l, 0 k=0 l 0, 0 k= l 0, l 0, l 0, 0 l 0, 0 l 50, 0 l 40, 0 k= l 0, 7 l 0, l 0, 3 l 40, k=3 l 0, 4 l 0, l 0, 0 l 0, 0 l 0, 3 l 0, l 0, 3 l 0, 8 9

10 A Run of this Centralized Bellman Ford Algorithm p k (i): (format: (label, cost)) k \ i ,0 0,0,0 40,0 50,0 0,0 0, 0, 0, 0,3 0,0 0, 0,7 0, 0,3 3 0,0 0, 0,4 0, 0,3 i pred(i) If we change the initial conditions, will the centralized algorithm converge to the correct value?. Yes. No 3. Sometimes yes, sometimes no, depending on the initial contidions 4. I don t know p k (i): (format: label, cost) k \ i ,0 0,0 09, 40,0 50,0 3 34% 8% 34% 3%

11 Impact of Initial Conditions Unlike the classical Bellman-Ford algorithm, this one may fail if initial conditions are not as expected Example: If initial conditions say that some node has a best path with label 09, every node will eventually believe the best label is p k (i): (format: label, cost) k \ i ,0 0,0 09, 40,0 50,0 0,0 09,8 0, 0, 09,3 09,9 09, 09,4 09,4 09, 3 09, 09,7 09, 09,9 09,0 4 09,8 09, 09, 09,0 09,0 5 09, 09,9 09, 09,0 09,0 09,0 09,3 09, 09, 09, The Bellman-Ford Algorithm for Bridges is sensitive to initial conditions Theorem If the initial conditions in the centralized Bellman-Ford Algorithm for Bridges satisfy: i: p 0 (i)=(m i, c i ) with m i min j l(j) the algorithm converges to the correct value else the algorithm diverges lim k p k (i)=(m 0, ) where m 0 =min i m i Proof: first show that the label converges to the minimum of all initial conditions (it can only decrease). Then use the property of Bellman-Ford in the usual algebra (see chapter distance vector ) Comment: the convergence may be much longer than with the initial conditions in theorem All-path variant of Bellman Ford Note that there is a condition on the initial label, not on the initial cost.

12 Example Q. write p k (i), pred(i) and draw the spanning tree, with initial conditions as shown. The dotted link does not exist in the current configuration. It existed before, and explains why node starts with these initial conditions. Does the algorithm converge to the correct values? p k (i): (format: (label, cost)) k \ i ,0 0,0 0, 40,0 50,0 3 3 Example Q. write p k (i), pred(i) and draw the spanning tree, with initial conditions as shown. The dotted link does not exist in the current configuration. It existed before, and explains why node starts with these initial conditions. A. The algorithm converges since the initial labels are not below the smallest one. p k (i): (format: (label, cost)) 0 0 k \ i ,0 0,0 0, 40,0 50,0 3 0,0 0, 0, 0, 0, ,0 0, 0,3 0, 0,3 3 0,0 0, 0,4 0, 0,3 4 0,0 0, 0,4 0, 0,3 4

13 3% % 0% 0% 0% % % % 3% 3% Distributed Bellman-Ford The Bellman-Ford Algorithm for Bridges can be distributed: It is the algorithm used by STP Distributed Bellman-Ford Algorithm, Bridges node maintains an estimate of its best path attribute node also keeps a record of latest values for all neighbors initial conditions are l,0 from time to time, i sends its value to all neighbours when receives an updated value from neighbor, node recomputes : eq () min A i, j q j pred(i) is set to a value of j that achieves the min in eq() 5. A and C. A and D 3. B and C 4. B and D 5. A, B and C. A, B and D 7. A, C and D 8. B, C and D 9. All 0. I don t know Say what is true A. The Distributed Bellman-Ford algorithm for bridges keeps a record of the most recent updates received from all neighbors B. The Distributed Bellman-Ford algorithm for routers keeps a record of the most recent updates received from all neighbors C. The Distributed Bellman-Ford algorithm for bridges works regardless of initial conditions D. The Distributed Bellman-Ford algorithm for routers works regardless of initial conditions 3

14 Sample Run of the Distributed Bellman- Ford Algorithm for Bridges A possible run : > > 0 0 -> > 50 -> > > > > > link breaks 50 -> 0 -> > i ,0 0,0,0 40,0 50,0 0, 0, 0,4 0,7 0,5 0,4 0, 0,3 0,4 50 does as if received q(40)= (, ); pred(50)=40 thus 50 does q(50)=(50,0); similarly 40 does a new computation but this does not change 40 0, 50,0,0 0,4 0,5 7 The Distributed Bellman-Ford Algorithm for Bridges may need to be reset Like the centralized algorithm, the distributed algorithm is robust to changes in configuration as long as the node with the smallest label (called root bridge ) is still present and reachable from all bridges. if this is not true, the algorithm does not converge to a true value. It needs to be reset by some additional mechanism. This is solved in STP by root monitoring: root refreshes validity of STP by periodically sending a refresh message every HelloTime (s) the refresh message is propagated along the spanning tree a bridge that does not receive refresh message for MaxAge restarts STP basic procedure from fresh initial conditions (= reset) Q. Compare to the classical distributed Bellman-Ford algorithm (for routers) A. It does not need to be reset, since it always converges to the true value. 8 4

15 Standardized by IEEE 80.D All bridges run it 4. STP in practice Bridges send to other bridges BPDU (Bridge PDUs) Implements the Distributed Bellman Ford Algorithm for Bridges Bridge keeps best values received on all ports Bridge periodically sends its values to downstream neighbours, and to all whenever a loss of root occurs 9 Topology changes Topology changes occur due to changes in configuration failures, recoveries It changes occur, the behaviour depends on whether the root bridge is still reachable from all bridges if so, let distributed Bellman Ford do the job else, root monitoring kicks in 5

16 A Topology Change That is Handled by Bellman-Ford B99 crashes; focus on B90 B90 detects absence of B99 (absence of hello, or other mechanism); this is equivalent to receiving (in Bellman-Ford s algorithm) a state information: from B99: best attribute (, ) B90 compares all values received so far on all ports Port : best = B4, 3; port =, port 3: best = B90, Bellman ford finds new best value: B4, 3 on port cost = 3 X cost = 3 T B84 cost = 3 B8 X B4 B90 X3 cost = Z Y cost = 3 B9 U B99 cost = A Topology Change That is not Handled By Bellman-Ford Q: If B4 dies, what happens? A: root monitoring at all bridges detect that B4 does not send a refresh message anymore all bridges start the STP procedure from fresh initial conditions and converge to a new spanning tree rooted at B8 3

17 Other Bells and Whistles Bridges wait for some time after any topology change before declaring the port as «forwarding» (5--45 secs) To avoid loops during transients Optimizations of STP (called «Rapid STP», RSTP) avoid the timers in some frequent cases Detects that the change cannot cause a loop See «Rapid Spanning Tree» on 33 Conclusions Bridges use STP to remove loops from the active topology An example of bio-like software All bridges have the same code, only one becomes root No central intervention, plug and play The Bellman Ford algorithm of Bridges repairs any failures except loss of root Handled by a separate keep-alife mechanism; loss of root causes a global reset RSTP is an optimization to speed up impact of topology changes The active topology is the same as with STP To know more: Radia Perlman, «Interconnections, Bridges and Routers» CISCO RSTP White Paper 34 7

Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub

Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub Contents ÉCOLE POLYTECHNIQUE FÉÉRLE E LUSNNE Bridging Jean-Yves Le Boudec Fall 007!.Transparent bridging!. Spanning Tree Protocol (STP) "#specification $#an exotic version of Bellman-Ford %#the STP protocol,

More information

Distance Vector Routing

Distance Vector Routing ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Routing in General Distance Vector Routing Jean Yves Le Boudec Fall 22 Contents. Routing in General 2. Distance vector: theory. Distance vector: practice 4. Dynamic

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Interconnection Layer 2: bridges and VLANs Prof. Andrzej uda duda@imag.fr http://duda.imag.fr 1 Contents Transparent bridges Spanning Tree Protocol (STP) Rapid Spanning Tree

More information

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 44, 2015/02/18 12:55:30) Thursday, February 19, 2015 Bridge loops Two bridges

More information

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 18.4, 2018/11/16 13:23:04) Friday, November 16, 2018 Bridge loops Two bridges

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2015

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2015 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Link State Routing Jean Yves Le Boudec 2015 1 Contents 1. Link state 2. OSPF and Hierarchical routing with areas 3. Dynamic metrics and Braess paradox 2 1. Link

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

CS Networks and Distributed Systems. Lecture 5: Bridging. Revised 1/14/13

CS Networks and Distributed Systems. Lecture 5: Bridging. Revised 1/14/13 CS 3700 Networks and Distributed Systems Lecture 5: Bridging Revised 1/14/13 Just Above the Data Link Layer 2 Application Presentation Session Transport Network Data Link Physical Bridging! How do we connect

More information

Transparent Bridging and VLAN

Transparent Bridging and VLAN Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4

More information

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2017

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2017 The MAC Layer Mukhopadhyay Jean Yves Le Boudec 2017 1 Contents 1. MAC as Shared Medium : The Ethernet Myth and the WiFi Reality 2. MAC on cabled systems: the world of switches 3. Format and addresses 4.

More information

Trees Algorhyme by Radia Perlman

Trees Algorhyme by Radia Perlman Algorhyme by Radia Perlman I think that I shall never see A graph more lovely than a tree. A tree whose crucial property Is loop-free connectivity. A tree which must be sure to span. So packets can reach

More information

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5 Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of redundancy in a converged

More information

VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology

VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology VLN and bridges dvanced Computer Networks Interconnection Layer : bridges and VLNs Contents Transparent bridges Spanning Tree Protocol (STP) apid Spanning Tree Protocol (STP) VLNs Prof. ndrzej uda duda@imag.fr

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2018

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2018 The MAC Layer Mukhopadhyay Jean Yves Le Boudec 2018 1 Contents 1. MAC as Shared Medium 2. MAC on cabled systems: the world of switches 3. Format and addresses 4. Virtual LANs 5. Architecture Aspects 6.

More information

Implementing Spanning Tree Protocol

Implementing Spanning Tree Protocol Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

CSEP 561 LAN Switches. David Wetherall

CSEP 561 LAN Switches. David Wetherall CSEP 561 LAN Switches David Wetherall djw@cs.washington.edu How to combine links into a simple network Topics: Switch internals Plug and play LANs (switched Ethernet) Application Transport Network Building

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking Maintaining Specific VLAN Identification Specifically developed for multi-vlan interswitch communications Places a unique identifier in each frame Functions at Layer 2 2003, Cisco Systems, Inc. All rights

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) March 19 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks Reliable

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 20: Bridging Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui

More information

Improving network convergence with Multiple Spanning Tree Protocol

Improving network convergence with Multiple Spanning Tree Protocol CEAI, Vol.15, No.1 pp. 79-87, 2013 Printed in Romania Improving network convergence with Multiple Spanning Tree Protocol Roxana Stănică SC Civitas Systems S.R.L., Craiova, Romania (e-mail: roxana_batm@yahoo.com)

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING

RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING 1 RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING Donald E. Eastlake 3 rd donald.eastlake@stellarswitches.com CONTENTS Introduction Ethernet and Spanning Tree RBridge Features TRILL Encapsulation

More information

Chapter 5: STP. * What is STP? How does STP work?

Chapter 5: STP. * What is STP? How does STP work? Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between

More information

802.1AS Fast Master Clock Selection

802.1AS Fast Master Clock Selection 802.1AS Fast Master Clock Selection Moving 802.1AS closer to RSTP Version 2 Norman Finn Cisco Systems 1 Introduction 2 Introduction IEEE 1588 networks that contain transparent clocks and the current draft

More information

Understanding and Configuring STP

Understanding and Configuring STP CHAPTER 14 This chapter describes how to configure the Spanning Tree Protocol (STP) on a Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 9: Bridging Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) 13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Computer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow

Computer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow Computer Network Protocols: Myths, Missteps, and Mysteries Dr. Radia Perlman, Intel Fellow It s not what you don t know that s the problem. It s what you do know that ain t true.mark Twain (?) 2 Network

More information

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 34, 2014/02/17 14:41:48) Monday, February 17, 2014 Bridge loops Two bridges

More information

Managing Network Spanning Trees

Managing Network Spanning Trees CHAPTER 8 This chapter describes, the IEEE 802.1d Spanning Tree Protocol (STP), and how to use and configure Cisco s proprietary spanning-tree protocols, Per VLAN Spanning Tree (PVST), Multiple Spanning

More information

Configuring Spanning Tree

Configuring Spanning Tree CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

Bridging Transmitting Non-IP Traffic or Merging Two Networks

Bridging Transmitting Non-IP Traffic or Merging Two Networks 10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra) ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor

More information

Dijkstra s algorithm for shortest paths when no edges have negative weight.

Dijkstra s algorithm for shortest paths when no edges have negative weight. Lecture 14 Graph Algorithms II 14.1 Overview In this lecture we begin with one more algorithm for the shortest path problem, Dijkstra s algorithm. We then will see how the basic approach of this algorithm

More information

Distance Vector Routing

Distance Vector Routing ÉOL POLYTHNIQU FÉÉRL LUSNN istance Vector Routing Jean Yves Le oudec 20 ontents. Routing in General 2. istance vector: theory 3. istance vector: practice (RIP) 4. Software efined Networking (SN) Textbook

More information

Distributed Routing. EECS 228 Abhay Parekh

Distributed Routing. EECS 228 Abhay Parekh Distributed Routing EECS 228 Abhay Parekh parekh@eecs.berkeley.edu he Network is a Distributed System Nodes are local processors Messages are exchanged over various kinds of links Nodes contain sensors

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2017

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2017 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Link State Routing Jean Yves Le Boudec 2017 1 Contents 1. Routing in General 2. Link state routing, OSPF Single Area 3. Dijkstra s algorithm 4. Equal Cost Multipath

More information

Understanding Rapid Spanning Tree Protocol (802.1w)

Understanding Rapid Spanning Tree Protocol (802.1w) Understanding Rapid Spanning Tree Protocol (802.1w) Contents Introduction Support of RSTP in Catalyst Switches New Port States and Port Roles Port States Port Roles New BPDU Format Full View of the Cisco

More information

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions Jean-Yves Le Boudec 2005 December 8 Do not forget to put your names on all sheets of your solution. If you need to make assumptions in order

More information

Distributed Algorithms 6.046J, Spring, Nancy Lynch

Distributed Algorithms 6.046J, Spring, Nancy Lynch Distributed Algorithms 6.046J, Spring, 205 Nancy Lynch What are Distributed Algorithms? Algorithms that run on networked processors, or on multiprocessors that share memory. They solve many kinds of problems:

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

Switching and Forwarding

Switching and Forwarding Switching and Forwarding Outline Store-and-Forward Switches Bridges and Extended LANs Spring 7 CSE64 Switch Switching protocol T T STS- Spring 7 CSE64 Scalable Networks Switch forwards packets from input

More information

RSTP Configuration. Page 1 of 26

RSTP Configuration. Page 1 of 26 RSTP Configuration Page 1 of 26 Content Chapter 1 STP Configuration... 1 1.1 STP Overview... 1 1.1.1 Function of STP...1 1.1.2 Protocol Packets of STP...1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree

More information

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging) Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2

More information

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist

More information

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38 Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 351-001 Title : CCIE Cisco Certified InterNetworking Expert Vendors : Cisco

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium

More information

Table of Contents 1 MSTP Configuration 1-1

Table of Contents 1 MSTP Configuration 1-1 Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction

More information

EIGRP Features and Operation

EIGRP Features and Operation EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as

More information

Table of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w)

Table of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w) Table of Contents Understanding Rapid Spanning Tree Protocol (802.1w)...1 Introduction...1 Support of RSTP in Catalyst Switches...2 New Port States and Port Roles...2 Port States...2 Port Roles...3 New

More information

Table of Contents Chapter 1 MSTP Configuration

Table of Contents Chapter 1 MSTP Configuration Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation

More information

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791 CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there

More information

Cisco Exam Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ]

Cisco Exam Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ] s@lm@n Cisco Exam 200-101 Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ] Topic break down Topic No. of Questions Topic 1: LAN Switching Technologies 18 Topic 2:

More information

RSTP Configuration. RSTP Configuration

RSTP Configuration. RSTP Configuration RSTP Configuration Contents 16. STP Configuration...1 1.1 STP Overview...1 1.1.1 Function of STP... 1 1.1.2 Protocol Packets of STP... 1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree Interface States...

More information

Layer 2 Engineering Spanning Tree

Layer 2 Engineering Spanning Tree Layer 2 Engineering Spanning Tree Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Table of Contents. Cisco Spanning Tree Protocol Enhancements using Loop Guard and BPDU Skew Detection Features

Table of Contents. Cisco Spanning Tree Protocol Enhancements using Loop Guard and BPDU Skew Detection Features Table of Contents Spanning Tree Protocol Enhancements using Loop Guard and BPDU Skew Detection Features...1 Document ID: 10596...1 Introduction...1 Feature Availability...1 Brief Summary of STP Port Roles...2

More information

Lecture 11: Analysis of Algorithms (CS ) 1

Lecture 11: Analysis of Algorithms (CS ) 1 Lecture 11: Analysis of Algorithms (CS583-002) 1 Amarda Shehu November 12, 2014 1 Some material adapted from Kevin Wayne s Algorithm Class @ Princeton 1 2 Dynamic Programming Approach Floyd-Warshall Shortest

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : 200-105 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Vendor : Cisco Version : DEMO Get Latest

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Redundancy in a converged network Spanning-Tree Protocol (STP) STP Operation

More information

Configuring STP and Prestandard IEEE 802.1s MST

Configuring STP and Prestandard IEEE 802.1s MST 20 CHAPTER This chapter describes how to configure the Spanning Tree Protocol (STP) and prestandard IEEE 802.1s Multiple Spanning Tree (MST) protocol on Catalyst 6500 series switches. Note The IEEE 802.1s

More information

Configuring Resilient Ethernet Protocol

Configuring Resilient Ethernet Protocol CHAPTER 19 This chapter describes how to use Resilient Ethernet Protocol (REP) on the Catalyst 4500 series switch. REP is a Cisco proprietary protocol that provides an alternative to Spanning Tree Protocol

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Principles Broadcast

More information

Routing without tears: Bridging without danger

Routing without tears: Bridging without danger Routing without tears: Bridging without danger Radia Perlman Sun Microsystems Laboratories Radia.Perlman@sun.com 1 Before we get to RBridges Let s sort out bridges, routers, switches... 2 What are bridges,

More information

Implementation of the meshed tree algorithm on a switched network

Implementation of the meshed tree algorithm on a switched network Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 12-10-2016 Implementation of the meshed tree algorithm on a switched network Kuhu Sharma kxs3104@rit.edu Follow

More information

Chapter 5. Spanning Tree Protocol (STP) Part II

Chapter 5. Spanning Tree Protocol (STP) Part II Chapter 5 Spanning Tree Protocol (STP) Part II CCNA3-1 Chapter 5-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Exam Questions

Exam Questions Exam Questions 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) https://www.2passeasy.com/dumps/200-105/ 1.At which layer of the OSI model is RSTP used to prevent loops? A. physical

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source

More information

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols

More information

Review of Graph Theory. Gregory Provan

Review of Graph Theory. Gregory Provan Review of Graph Theory Gregory Provan Overview Need for graphical models of computation Cloud computing Data centres Telecommunications networks Graph theory Graph Models for Cloud Computing Integration

More information

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Module 8. Routing. Version 2 ECE, IIT Kharagpur Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol

More information