The fundamentals of Ethernet!

Size: px
Start display at page:

Download "The fundamentals of Ethernet!"

Transcription

1 Building Ethernet Connectivity Services for Provider Networks" " Eduard Bonada i Cruells" Tesi Doctoral UPF / 2012 Dirigida per Dra. Dolors Sala i Batlle Departament de Tecnologies de la Informació i les Comunicacions Ethernet Bridging Overview The fundamentals of Ethernet Ethernet is broadcast Ethernet plug-n-play Ethernet needs the spanning tree protocol 1 1

2 Ethernet Bridging Overview Ethernet is broadcast In the original Ethernet all nodes are connected to the bus" Ethernet bridges interconnect different shared segments or point-to-point connections The broadcast service is maintained in all evolutions 2 Ethernet Bridging Overview Ethernet is Plug-n-play Ethernet bridges are plug-n-play: no configuration is needed to run Frames are flooded if the destination is unknown Forwarding tables are populated learning the paths from the received frames tracing back the origin s to d d to s learn DEST" PORT" s p1 forward DEST" PORT" s p1 Paths must be symmetrical (Só D) 3 2

3 Ethernet Bridging Overview Loop avoidance and the spanning tree Flooding frames to unknown destinations results into Broadcast storms It only works on loop-free topologies The Spanning Tree Protocol (STP) constructs a logical tree on top of any physical topology Ony tree links are active Broadcast is controlled and symmetrical paths are guaranteed 4 Motivation and problem definition Ethernet Extension to Provider Networks Network Providers are considering the use of Ethernet technology in their deployments Ethernet is positioned as a good candidate Ubiquity Bandwidth flexibility Reduced cost Challenges in the provider environment Scalability (geographical and operational) Resiliency (50ms) QoS (SLA), Management (OAM) 5 3

4 Motivation and problem definition The spanning tree is a key element The spanning tree is the architecture element that determines the network connectivity" It constructs a single shortest-path tree RSTP is the current technique specified in the IEEE standard Implications of using RSTP to construct the tree Cannot use redundancy because only tree links are active Sub-optimal paths are deployed, only Root sees shortest paths Long recovery times as RSTP suffers count-to-infinity when the Root fails 6 Motivation and problem definition Problem, approach and contributions Allows for quick recoveries in all failure situations We propose a complete solution that: " Makes use of available redundancy" Provides optimal paths between all pairs Approach based on understanding RSTP limitations and design required extensions" RSTP Characterization to understand the propagation model and countto-infinity RSTP-Conf to resolve the long recovery problems in the scenarios with count-toinfinity Thesis contributions" RSTP-SP to operate with optimal communication paths. Implementation of the protocol modules in the ns3 network simulator 7 4

5 Outline Motivation State of the Art RSTP description Analysis if the RSTP Behavior RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-SP: shortest path extension to RSTP Conclusion 8 Outline Motivation State of the Art" RSTP description Analysis if the RSTP Behavior RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-SP: shortest path extension to RSTP Conclusion 9 5

6 State of the art Viking Uses MSTP as a multiple tree framework Initially configures primary and backup trees The trees are externally computed by a central manager and configured into the MSTP instances of the bridges by SNMP" Failures are notified to the central manager that locally reconfigures the trees and remotely updates the MSTP Better use of redundancy Significant overhead Recovery time of 400ms Not plug-n-play 10 State of the art LSOM Substitutes the spanning tree by a link-state protocol The routing protocol initially configures the forwarding tables with point-to-point paths between bridges (bridge-bridge table) Bridges disseminate their connected end-hosts to the rest of nodes Better use of redundancy Better path optimality Not backwards-compatible Not plug-n-play 11 6

7 State of the art IEEE 802.1aq Shortest Path Bridging Last evolution currently discussed in IEEE Work in parallel with this thesis Configures one tree per node to deploy optimal paths Substitutes the STP with a link-state protocol Directly compares to RSTP-SP 12 Outline Motivation State of the Art RSTP description" Analysis if the RSTP Behavior RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-SP: shortest path extension to RSTP Conclusion 13 7

8 RSTP description Distributed configuration of the tree RSTP constructs the tree by activating or blocking bridge ports" Each bridge selects the state of its own ports RSTP is a distance-vector protocol Each node selects its best path to the Root to construct the branches 14 RSTP description Stored information: Port roles The port state is determined by the Role of each port Root role: The active port that connects the bridge up to the Root Designated role: The active port(s) that connect the bridge down to the leaves Alternate role: The inactive port(s) that provide an extra connection to the Root, but temporarily blocked. UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 15 8

9 RSTP description Stored information: Priority vectors Port roles are selected comparing topological information of different bridges This topological information is exchanged as Priority Vectors (PV) BPDU messages contain the exchanged PV The PV fields are sequentially compared and a lower value indicates a better vector that updates Priority Vector Root ID of the Root Cost Cost to it Bridge ID of the Bridge Port Port of the Bridge UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 16 RSTP description All bridges initialized as Root At start-up all bridges believe they are the Root Transient configuration as there should be a single Root A bridge B disseminates its own vector [B:0:B:0] indicating that B is the Root and that B is at distance 0 from the Root (itself) [0:0:0:p] [6:0:6:p] 17 9

10 RSTP description Processing of a received BPDU The priority vector comparison determines the operation An equal or worse vector does not update A better vector updates, reconfigures and disseminates A vector from the parent always updates equal - BPDU received Compare vectors received is better (or from parent) Configure Tree Store Select port roles Select port states Disseminate BPDUs worse Reply BPDU Continuous sequence of updating vectors makes the algorithm evolve 18 RSTP description Reception and dissemination of BPDUs The better vectors update and disseminate [0:0:0:1] [0:1:4:1] Received from B0 Stored in B4 [0:0:0:1] compare [4:0:4:0] [0:0:0:1] update [0:1:4:0] disseminate [0:1:4:p] All nodes keep updating its vectors until the best possible vector is received, which represents the best possible path to the Root 19 10

11 Outline Motivation State of the Art RSTP description Analysis of the RSTP Behavior" Nature of the tree construction" Root failure and count-to-infinity RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-SP: shortest path extension to RSTP Conclusion 20 Nature of the tree construction Wave-fronts propagation The propagation of BPDUs can be modeled as wave-fronts of information that start propagating at each node. When two wave-fronts encounter, the one about a higher Root wins and removes the other. Only the wave-front starting at B0 always wins and hence it spans the entire network

12 Nature of the tree construction Theoretical bound of the convergence time Theoretical bound of the convergence time CT = max(l br ) x t hop The feasibility of this bound depends on the ability to detect that root messages have fully propagated through the entire network Original STP is based on timers RSTP introduces the proposal/agreement handshake 22 Nature of the tree construction Cold-start evaluation: Convergence Time (CT) Ring topology of increasing connectivity 100 executions, random BridgeIDs 1 hop = 1.33 msec Higher size, higher CT Higher redundancy, lower CT 23 12

13 [0:6] 7/15/12 Outline Motivation State of the Art RSTP description Analysis of the RSTP Behavior" Nature of the tree construction Root failure and count-to-infinity" RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-SP: shortest path extension to RSTP Conclusion 24 Root failure and count-to-infinity Root failure and count-to-infinity in RSTP RSTP suffers count-to-infinity only in the scenarios where the Root fails" BPDUs about the failed Root start looping and are only removed when the BPDU hop counter reaches its maximum value [0:7] [0:5] MessAge: 20 Delays the recovery because first needs to remove the looping BPDUs The count-to-infinity is caused because information about the failed Root stored in alternate ports is disseminated 25 13

14 Root failure and count-to-infinity Appearance of a virtual Root The looping BPDUs result into a complex scenario if several physical loops exist The crossing of BPDUs with particular vectors results into the selection of two root ports at both sides of the link This creates a stable virtual Root between the two root ports The two root ports are in a deadlock because they wait for the virtual Root to send refreshing BPDUs They trigger a reconfiguration after 3 not-received BPDUs (6 seconds) Each deadlock represents a temporary stop of the count-to-infinity 26 Root failure and count-to-infinity RSTP in Root failure scenarios: Recovery Time (RT) Ring-based topologies 100 executions, random BridgeIds, B0 fails MaxAge = N 27 14

15 Outline Motivation State of the Art RSTP description Analysis if the RSTP Behavior RSTP-Conf: avoiding count-to-infinity in RSTP" RSTP-SP: shortest path extension to RSTP Conclusion 28 RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-Conf: a confirmation technique The cause of the count-to-infinity is the use of information in alternate ports RSTP-Conf avoids count-to-infinity introducing a confirmation before using vectors in alternate ports The mechanism is triggered when a Root neighbor detects a failure on its Root port The neighbor floods a request asking whether the Root is alive The neighbor only reconfigures the tree after receiving the confirmation that the Root is still alive Request ( rd ) Confirmation ( ra ) UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 29 15

16 RSTP-Conf: avoiding count-to-infinity in RSTP Tree reboot after a Root failure recovery If the Root fails, all neighbors send requests All nodes receive the requests, arise as Root and select the new tree Request from B4 Request from B2 Request from B3 Common BPDUs Global tree reboot that takes one round-trip at most UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 30 RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-Conf in Root failure scenarios: Recovery Time (RT) Ring-based topologies 100 executions, random BridgeIds, B0 fails 1 hop = 1.33 msec Higher size, higher CT cold start Higher redundancy, lower CT 31 16

17 Outline Motivation State of the Art RSTP description Analysis if the RSTP Behavior RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-SP: shortest path extension to RSTP" Conclusion 32 RSTP-SP: shortest path extensions to RSTP RSTP-SP: a shortest path extension RSTP-SP addresses all requirements: shortest paths, use of redundancy and recovery time How? One tree rooted at each node Optionally introduce RSTP-Conf (Count-to-infinity is not that harmful) Design challenges N trees configured by N protocol instances Ensure symmetrical paths UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 33 17

18 RSTP-SP: shortest path extensions to RSTP N trees configured by N protocol instances Independent single tree instances running in parallel Per-tree variables Per-tree event processing UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 34 RSTP-SP: shortest path extensions to RSTP Selection of not symmetrical paths In the multiple tree scenario: The path S=>D is through tree T2 (B6 selects B1 as parent) The path D=>S is through tree T6 (B2 selects B0 as parent) The unidirectional paths are not symmetrical The priority vector comparison uses local information (neighbor identifier) and hence takes different decisions at different sides of the path UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 35 18

19 RSTP-SP: shortest path extensions to RSTP Guaranteeing path symmetry The path-array is composed of all the traversed IDs The array is sorted; the elements are sequentially compared; a lower element wins. B6" B B B2" B B UPF - July 16 th 2012 B The unidirectional paths are symmetrical because global information is used to select the paths Building Ethernet Connectivity Services for Provider Networks 36 RSTP-SP: shortest path extensions to RSTP Extension to incorporate the path-array The path-array is introduced in the priority vectors The comparison of vectors is updated considering the path-array instead of the Bridge field Priority Vector Root ID of the Root Cost Cost to it Path-Array IDs of the Bridges Building the path-array Port is Port of the Bridge straightforward because the BPDUs propagate from the Root of each tree BPDUs keep track of the visited bridges UPF - July 16 th 2012 Building Ethernet Connectivity Services for Provider Networks 37 19

20 RSTP-SP: shortest path extensions to RSTP RSTP-SP evaluation: Convergence Time (CT) Grid of degree 4, 64 nodes, 100 executions with random BridgeIDs RSTP RSTP-SP RSTP-SP-Conf SPB RSTP-SP RSTP-SP-Conf SPB Time from startup/failure until last port is set to Forwarding Traffic received during recovery from a central link failure Recoveries in RSTP-SP almost do not affect data reception 38 RSTP-SP: shortest path extensions to RSTP RSTP-SP evaluation: Message Overhead (MO) Amount of BPDUs transmitted to construct or recover the trees RSTP RSTP-SP RSTP-SP-Conf SPB Amount of BPDUs transmitted RSTP-SP requires a higher message overhead during recoveries 39 20

21 Outline Motivation and problem definition State of the Art RSTP description Analysis if the RSTP Behavior RSTP-Conf: avoiding count-to-infinity in RSTP RSTP-SP: shortest path extension to RSTP Conclusion" 40 Conclusion and open issues Conclusion Global solution that (1) provides quick recovery, (2) uses available redundancy, and (3) operates with optimal paths Characterization of RSTP Initial tree construction modeled as wave-fronts propagation Identification of causes and consequences of count-to-infinity Design and evaluation of RSTP-Conf Introduces delay in failure recoveries Recovers from Root failure in one round-trip at most Design and evaluation of RSTP-SP Deploys optimal paths and makes use of redundancy Compared to SPB: better CT worse MO 41 21

22 Conclusion and open issues Open issues and future guidelines Extend analysis Computational analysis to dimension nodes and feasibility of a real implementation Enhance performance Reduce message overhead in RSTP-SP by sharing information among different tree instances Extend functionalities Different comparison rules for path-arrays Use of the path-array to provide path control 42 Thank you for your attention" " " Questions?" " 22

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Communication Redundancy User s Manual

Communication Redundancy User s Manual User s Manual Fifth Edition, June 2015 www.moxa.com/product 2015 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Characterization of the Spanning Tree Protocol

Characterization of the Spanning Tree Protocol Characterization of the Spanning Tree Protocol Eduard Bonada Master thesis submitted in partial fulfillment of the requirements for the degree: Master Program in Information, Communication and Audiovisual

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee Lecture (06) STP (I) By: Dr. Ahmed ElShafee CS IT Problem statement If your network consists of layer 2 switches that allow computers connect and exchange data, you will need to consider the design that

More information

Understanding Rapid Spanning Tree Protocol (802.1w)

Understanding Rapid Spanning Tree Protocol (802.1w) Understanding Rapid Spanning Tree Protocol (802.1w) Contents Introduction Support of RSTP in Catalyst Switches New Port States and Port Roles Port States Port Roles New BPDU Format Full View of the Cisco

More information

Table of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w)

Table of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w) Table of Contents Understanding Rapid Spanning Tree Protocol (802.1w)...1 Introduction...1 Support of RSTP in Catalyst Switches...2 New Port States and Port Roles...2 Port States...2 Port Roles...3 New

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

Local Restoration in Metro Ethernet Networks for Multiple Link Failures

Local Restoration in Metro Ethernet Networks for Multiple Link Failures Local Restoration in Metro Ethernet etworks for Multiple Link Failures Shibu. V Department of Computer Applications. Preetha Mathew K Department of Computer Applications. Jabir.K.V.T Department of Information

More information

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38 Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How

More information

Configuring Optional Spanning-Tree Features

Configuring Optional Spanning-Tree Features CHAPTER 20 This chapter describes how to configure optional spanning-tree features on the Catalyst 3750-E or 3560-E switch. You can configure all of these features when your switch is running the per-vlan

More information

Table of Contents 1 MSTP Configuration 1-1

Table of Contents 1 MSTP Configuration 1-1 Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard. CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on

More information

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w) Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Redundancy in a converged network Spanning-Tree Protocol (STP) STP Operation

More information

Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration?

Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? Volume: 629 Questions Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? A. Root switch B. Slave switch C. Non-root switch

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end

More information

MSTP Technology White Paper

MSTP Technology White Paper MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm

More information

Managing Network Spanning Trees

Managing Network Spanning Trees CHAPTER 8 This chapter describes, the IEEE 802.1d Spanning Tree Protocol (STP), and how to use and configure Cisco s proprietary spanning-tree protocols, Per VLAN Spanning Tree (PVST), Multiple Spanning

More information

Upgrading From a Successful Emergency Control System to a Complete WAMPAC System for Georgian State Energy System

Upgrading From a Successful Emergency Control System to a Complete WAMPAC System for Georgian State Energy System Upgrading From a Successful Emergency Control System to a Complete WAMPAC System for Georgian State Energy System Dave Dolezilek International Technical Director Schweitzer Engineering Laboratories SEL

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

Chapter 5. Spanning Tree Protocol (STP) Part II

Chapter 5. Spanning Tree Protocol (STP) Part II Chapter 5 Spanning Tree Protocol (STP) Part II CCNA3-1 Chapter 5-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol

More information

Improving network convergence with Multiple Spanning Tree Protocol

Improving network convergence with Multiple Spanning Tree Protocol CEAI, Vol.15, No.1 pp. 79-87, 2013 Printed in Romania Improving network convergence with Multiple Spanning Tree Protocol Roxana Stănică SC Civitas Systems S.R.L., Craiova, Romania (e-mail: roxana_batm@yahoo.com)

More information

13. Spanning Tree Protocols

13. Spanning Tree Protocols P0.aq/D.++suggested changes May, 00 0 0 0 0 0. Spanning Tree Protocols The spanning tree algorithms and protocols specified by this standard provide simple and full connectivity throughout a Bridged Local

More information

Chapter 5. Spanning Tree Protocol (STP) Part I

Chapter 5. Spanning Tree Protocol (STP) Part I Chapter 5 Spanning Tree Protocol (STP) Part I CCNA3-1 Chapter 5-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist

More information

IMPROVING LOAD BALANCE AND MINIMIZING SERVICE DISRUPTION ON ETHERNET NETWORKS WITH IEEE 802.1S MSTP

IMPROVING LOAD BALANCE AND MINIMIZING SERVICE DISRUPTION ON ETHERNET NETWORKS WITH IEEE 802.1S MSTP EuroFGI Workshop on IP QoS and Traffic Control P. Pereira (Ed.) Lisbon, Portugal, December 6-7, 2007 IMPROVING LOAD BALANCE AND MINIMIZING SERVICE DISRUPTION ON ETHERNET NETWORKS WITH IEEE 802.1S MSTP

More information

Configuring MSTP CHAPTER

Configuring MSTP CHAPTER CHAPTER 16 Configuring MSTP This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the Catalyst 2960 switch. Note The multiple spanning-tree (MST) implementation

More information

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54 Index Numerics 802.1p priority (QoS) 802.1Q VLAN standard 5-7 802.1w as a region 5-54 A active path 5-5 address IP 7-8 advertisement 3-3 applicable products 1-ii ARP age setting 7-10 cache 7-4 cache table

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Principles Broadcast

More information

Configuring MST Using Cisco NX-OS

Configuring MST Using Cisco NX-OS This chapter describes how to configure Multiple Spanning Tree (MST) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About MST, page

More information

4 Spanning Tree Protokoll 802.1D-2004

4 Spanning Tree Protokoll 802.1D-2004 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 82.1D-24 Prof. Dr. Andreas Steffen Institute for Information Technologies and Applications Steffen/Stettler, 6.1.213, 4-SpanningTree.pptx 1 What happens

More information

Configuring STP and Prestandard IEEE 802.1s MST

Configuring STP and Prestandard IEEE 802.1s MST 20 CHAPTER This chapter describes how to configure the Spanning Tree Protocol (STP) and prestandard IEEE 802.1s Multiple Spanning Tree (MST) protocol on Catalyst 6500 series switches. Note The IEEE 802.1s

More information

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) 13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................

More information

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating

More information

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5 Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of redundancy in a converged

More information

Chapter 5: STP. * What is STP? How does STP work?

Chapter 5: STP. * What is STP? How does STP work? Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between

More information

Objectives. 1. Introduction:

Objectives. 1. Introduction: University of Jordan Faculty of Engineering & Technology Computer Engineering Department Advance Networks Laboratory 0907529 Exp.5 Spanning-Tree Protocol (STP) Objectives 1. Explain the role of redundancy

More information

GUIDELINES FOR USING DEVICE LEVEL RING (DLR) WITH ETHERNET/IP. PUB00316R ODVA, Inc. Page 1 of 18

GUIDELINES FOR USING DEVICE LEVEL RING (DLR) WITH ETHERNET/IP. PUB00316R ODVA, Inc. Page 1 of 18 GUIDELINES FOR USING DEVICE LEVEL RING (DLR) WITH ETHERNET/IP PUB00316R2 2017-2018 ODVA, Inc. Page 1 of 18 Guidelines for Using Device Level Ring (DLR) with EtherNet/IP Contents 1. Introduction... 3 2.

More information

Layer 2 Engineering Spanning Tree

Layer 2 Engineering Spanning Tree Layer 2 Engineering Spanning Tree Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges. Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures

More information

Spanning Trees and IEEE 802.3ah EPONs

Spanning Trees and IEEE 802.3ah EPONs Rev. 1 Norman Finn, Cisco Systems 1.0 Introduction The purpose of this document is to explain the issues that arise when IEEE 802.1 bridges, running the Spanning Tree Protocol, are connected to an IEEE

More information

An Update on Bridging Technologies. Change and evolution: Why, what, and how. Mick Seaman

An Update on Bridging Technologies. Change and evolution: Why, what, and how. Mick Seaman An Update on Bridging Technologies Change and evolution: Why, what, and how Mick Seaman mick_seaman@ieee.org Agenda Why has bridging evolved Bridging basics What has changed/is changing And how! 802 July

More information

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal www.computerscijournal.org ISSN: 0974-6471 December 2011, Vol. 4, No. (2): Pgs. 399-404

More information

RSTP Configuration. Page 1 of 26

RSTP Configuration. Page 1 of 26 RSTP Configuration Page 1 of 26 Content Chapter 1 STP Configuration... 1 1.1 STP Overview... 1 1.1.1 Function of STP...1 1.1.2 Protocol Packets of STP...1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree

More information

Implementation of the meshed tree algorithm on a switched network

Implementation of the meshed tree algorithm on a switched network Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 12-10-2016 Implementation of the meshed tree algorithm on a switched network Kuhu Sharma kxs3104@rit.edu Follow

More information

Bridging Transmitting Non-IP Traffic or Merging Two Networks

Bridging Transmitting Non-IP Traffic or Merging Two Networks 10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................

More information

Moxa Managed Ethernet Switch Redundancy Protocol (UI 2.0) User s Manual

Moxa Managed Ethernet Switch Redundancy Protocol (UI 2.0) User s Manual Moxa Managed Ethernet Switch Redundancy Protocol (UI 2.0) User s Manual Edition 4.0, September 2017 www.moxa.com/product Models covered by this manual: EDS-528E, EDS-518E, EDS-510E, EDS-G508E, EDS-G512E,

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might

More information

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more

More information

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda Why Packet Switching on LN? Packet Switching on L2 (LN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing LN was primarily designed for shared media

More information

CSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes

CSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes CSE 46 Routing Routing Focus: How to find and set up paths through a network Distance-vector and link-state Shortest path routing Key properties of schemes Application Transport Network Link Physical Forwarding

More information

Connexium Managed Switches - Redundancy Capabilities

Connexium Managed Switches - Redundancy Capabilities Connexium Managed Switches - Redundancy Capabilities Connexium Managed Switch Redundancy The goal of network redundancy is to provide high network availability with automatic communication recovery in

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Configuring Resilient Ethernet Protocol

Configuring Resilient Ethernet Protocol CHAPTER 19 This chapter describes how to use Resilient Ethernet Protocol (REP) on the Catalyst 4500 series switch. REP is a Cisco proprietary protocol that provides an alternative to Spanning Tree Protocol

More information

RSTP Configuration. RSTP Configuration

RSTP Configuration. RSTP Configuration RSTP Configuration Contents 16. STP Configuration...1 1.1 STP Overview...1 1.1.1 Function of STP... 1 1.1.2 Protocol Packets of STP... 1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree Interface States...

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments CHAPTER Troubleshooting Transparent Bridging Environments Transparent bridges were first developed at Digital Equipment Corporation (Digital) in the early 1980s and are now very popular in Ethernet/IEEE

More information

Configuring Spanning Tree

Configuring Spanning Tree CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast

More information

Understanding and Configuring STP

Understanding and Configuring STP CHAPTER 14 This chapter describes how to configure the Spanning Tree Protocol (STP) on a Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes

More information

Chapter 16: Switched Ethernet in Automation. Wenbo Qiao

Chapter 16: Switched Ethernet in Automation. Wenbo Qiao Chapter 16: Switched Ethernet in Automation Wenbo Qiao Ethernet Basics What is Ethernet? Why Ethernet? ( not FieldBus?) Flexibility, Scalability and Performance Key Strength: many protocols running simultaneously

More information

ABridges: Scalable, self-configuring Ethernet campus networks

ABridges: Scalable, self-configuring Ethernet campus networks ABridges: Scalable, self-configuring Ethernet campus networks G. Ibáñez *, A. García-Martínez, A. Azcorra, I. Soto Departamento de Ingeniería Telemática, Universidad Carlos III, Madrid, Spain Received

More information

Configuring Private VLANs Using NX-OS

Configuring Private VLANs Using NX-OS This chapter describes how to configure private VLANs on Cisco NX-OS devices. Private VLANs provide additional protection at the Layer 2 level. This chapter includes the following sections: Finding Feature

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters

More information

Benchmarking and Compliance Methodology for White Rabbit Switches

Benchmarking and Compliance Methodology for White Rabbit Switches Benchmarking and Compliance Methodology for White Rabbit Switches July 2011 Cesar Prados (c.pradosi@gsi.de) i Table of Contents Introduction....................................................... 1 1 Benchmarking

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Contents. Configuring EVI 1

Contents. Configuring EVI 1 Contents Configuring EVI 1 Overview 1 Layer 2 connectivity extension issues 1 Network topologies 2 Terminology 3 Working mechanism 4 Placement of Layer 3 gateways 6 ARP flood suppression 7 Selective flood

More information

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication

More information

isco Understanding Spanning Tree Protocol Topology Chan

isco Understanding Spanning Tree Protocol Topology Chan isco Understanding Spanning Tree Protocol Topology Chan Table of Contents Understanding Spanning Tree Protocol Topology Changes...1 Interactive: This document offers customized analysis of your Cisco device...1

More information

EIGRP Features and Operation

EIGRP Features and Operation EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as

More information

MSTP Configuration. Page 1 of 24

MSTP Configuration. Page 1 of 24 MSTP Configuration Page 1 of 24 Contents Chapter1 Configuring MSTP... 3 1.1 Brief Introduction to MSTP...3 1.2 BPDU...3 1.2.1 Basic Concepts in MSTP... 4 1.2.2 Roles of Ports... 6 1.3 Algorithm Implementation...9

More information

Introduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era

Introduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era Massimiliano Sbaraglia Network Engineer Introduction In the cloud computing era, distributed architecture is used to handle operations of mass data, such as the storage, mining, querying, and searching

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring Avaya C363T RSTP to Interoperate with Extreme Networks MSTP to Support Avaya Communication Manager and Avaya G650 Media Gateway

More information

Index. Numerics. Index 1

Index. Numerics. Index 1 Index Numerics 802.1p priority (QoS) definition 8-6 802.1q VLAN in mesh 7-23 802.1Q VLAN standard 6-6 802.1w as a region 6-54 802.1x, mesh, not supported 7-5 A ABC enabled on edge switch 7-26 in mesh domain

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Configuring StackWise Virtual

Configuring StackWise Virtual Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 2 Information About Cisco Stackwise Virtual, page 2 Cisco StackWise

More information

Cisco EXAM Cisco ADVDESIGN. Buy Full Product.

Cisco EXAM Cisco ADVDESIGN. Buy Full Product. Cisco EXAM - 352-001 Cisco ADVDESIGN Buy Full Product http://www.examskey.com/352-001.html Examskey Cisco 352-001 exam demo product is here for you to test the quality of the product. This Cisco 352-001

More information

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich

More information

Introduction to OSPF

Introduction to OSPF Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Improving Bandwidth Efficiency When Bridging on RPR. November 2001

Improving Bandwidth Efficiency When Bridging on RPR. November 2001 Improving Bandwidth Efficiency When Bridging on RPR November 2001, Nortel Networks Anoop Ghanwani, Lantern Communications Raj Sharma, Luminous Robin Olsson, Vitesse CP Fu, NEC 11/1/01 Page 1 Components

More information

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 351-001 Title : CCIE Cisco Certified InterNetworking Expert Vendors : Cisco

More information

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

PON Functional Requirements: Services and Performance

PON Functional Requirements: Services and Performance PON Functional Requirements: Services and Performance Dolors Sala Ajay Gummalla {dolors,ajay}@broadcom.com July 10-12, 2001 Ethernet in the First Mile Study Group 1 July 2001 Objective Outline the PON-specific

More information

Traditional network management methods have typically

Traditional network management methods have typically Advanced Configuration for the Dell PowerConnect 5316M Blade Server Chassis Switch By Surendra Bhat Saurabh Mallik Enterprises can take advantage of advanced configuration options for the Dell PowerConnect

More information