VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology
|
|
- Zoe Griffin
- 5 years ago
- Views:
Transcription
1 VLN and bridges dvanced Computer Networks Interconnection Layer : bridges and VLNs Contents Transparent bridges Spanning Tree Protocol (STP) apid Spanning Tree Protocol (STP) VLNs Prof. ndrzej uda duda@imag.fr Interconnection structure utonomous systems router autonomous system border router internal router interconnection layer subnet switch (bridge) interconnection layer switch (bridge) subnetwork subnet subnetwork VLN interconnection layer VLN host host Internet Interconnection of S autonomous system NP, GI, IP subnetworks order routers interconnect S NP or GI, or IP exchange of traffic - peering oute construction based on the path through a series of S based on administrative policies routing tables: aggregation of entries works if no loops and at least one route - routing protocols (EGP - External outing Protocols) border router 6
2 VLN and bridges Transparent ridging (T) ridges are intermediate systems that forward MC frames to destinations based on MC addresses Interconnect systems beyond one LN segment, keeping main characteristics of LN without additional addresses MC addresses used to identify end systems End systems ignore that there are transparent bridges bridge is transparent MC frames not changed by bridges frames not sent to bridge, but rather: bridge is promiscuous listens to all frames and retransmits if needed Transparent ridging (T) dministrator creates the forwarding table T operation connectionless forwarding, unstructured addresses Forwarding Table Forwarding Table est Port MC Nb port ridge port addr C port C 7 8 L: Learning ridge epeater port ridge port port C Forwarding Table est Port MC Nb addr Forwarding Table est Port MC Nb addr C ridge builds forwarding table by reading all traffic bridges are plug and play: no address configuration (no IP address needed) table built by learning from S field in MC frame a table entry has limited life (MaxLife, minutes) Flooding if destination address unknown or group address 9 Several Learning ridges Can the learning bridge be extended to a network of bridges? How does see the network? port port port port C Z 0 Loops What happens when sends a frame to? assume empty forwarding table port port Loop-Free topology Learning bridge works well on Loop-Free topology only idirectional graph: node = bridge, edge = connection through LN Loop free - bidirectional graph = bidirectional tree examples: line, star On a tree, there is only one path from to port port port port C Z
3 VLN and bridges Spanning Tree ridges ased on learning bridge: table driven forwarding, flooding if unknown or multicast, learning Forces topology to a tree Spanning Tree algorithm run by all bridges Some ports blocked to prevent loops ports that are allowed to forward frames (in either way) are said to be in the forwarding state or called forwarding ports Interconnection of bridges several parallel paths for reliability Spanning Tree algorithm chooses one path at a given instant Forwarding Method Individual PU forwarding Copy all frames on all forwarding ports Frame received on port i -> /* port i is forwarding */ If is unicast, is in forwarding table with port j and j is a forwarding port then copy to port j else flood all forwarding ports i Update forwarding table with (i, S) Maintain spanning tree and port states Control method Learn addresses on reading traffic T Spanning Tree Specification Spanning Tree Specification Set of bridges with - bridge Id and prio - bridge ports on LNs - LN s T Spanning Tree ridges viewed as a bidirectional graph (nodes = bridges) Selection of the root bridge lowest priority with lowest identifier One bridge selected as root On every bridge - one root port - designated ports (other ports are blocked) Spanning Tree = shortest path tree from root to all bridges edge s set by management, high = less traffic based on distributed ellman-ford (distance vector) _to_root = best_announced_ + local_ oot port on one bridge = port towards root, shortest path in case of equal s, lowest id chosen esignated bridge one per LN it has the shortest path to root via root port esignated ports all ports for which the bridge is designated connect LNs to the spanning tree Ports other than root or designated are blocked Configuration messages rootid._to_root.senderid.port (..9.) simplified: rootid._to_root.senderid 6 Spanning Tree example Spanning Tree example est root: est : + =, on port or (=) oot port:, because < New message:..9 Ports and are designated:..9 is better than and.9. Port and are blocked:..9 is not better than.. nor Message..9 sent periodically on ports and Ports,, participate in forwarding (they are in the Spanning Tree) 8
4 VLN and bridges Spanning Tree example Spanning Tree example STP - Spanning Tree protocol STP (IEEE 80.d) IEEE 80. istributed in all bridges ridges exchange messages with neighbours in order to both elect a root determine shortest path tree to root root port = port towards root on shortest path tree designated ports = connect LNs to the spanning tree designated bridge = one per LN, has shortest path to root via root port Each bridge has a ridge Identifier number, based on MC address + configurable offset ridge with smallest ridge Identifier is the root Each link has a Link it ate Cost Mb/s 0 0 Mb/s 00 6 Mb/s 6 Mb/s 9 00 Mb/s 9 Mb/s 6 Mb/s 6 Gb/s 0 Gb/s ridge PUs Control method uses control frames called ridge PUs (PUs) 80. encapsulation, LLC frame with SP = x MC = all bridges (multicast) 0 80 C PUs are not forwarded by bridges unlike all other frames PUs are sent by one bridge to all bridges on the same LN segment reminder: a data frame is never sent to bridge by end system Configuration PU contains root Id to root (from sender of config PU) id of sender port number (omitted in the examples) Initialization of Spanning Tree ridge initially assumes self as a root ridge computes own new config PU based on received information determine best root so far distance to root with ellman-ford distance from me to root = min [(me, neighbor) + (neighbor, root)] On every port, ridge transmits config PU until it receives a better config PU on that port better = closer to root (lower or lower Id) On every port, bridge maintains copy of best config PU sent or received
5 VLN and bridges asic ST Procedure Complex example config PU received on any port or port enabled -> = compute new root; compute new to root; /* ellman Ford */ build new_config_pu; for all ports i do if new_config_pu better than stored_config[i] then store and send on port i; end = T = Z compute root port /* smaller distance to root */ designated ports = ports where config PU was sent blocked ports = other ports r.c.s better than r.c.s iff (r<r ) or (r=r and c<c ) or (r=r and c=c and s<s ) = = 9 99 = 6 Initialization of Spanning Tree ridge 90 prepares config PU and sends on all ports; 90 configuration tables: < , > < > oot Port : esignated Ports :, locked Ports : message received on port : <.0. oot Port : esignated Ports : locked Ports : message format: rootid._to_root.senderid 7 Comments When receiving a message we compare the (with the local included), but we store the message received (without the ) On receiving.0. on port :.. < ? yes -> becomes root new config msg = < ? yes -> becomes designated..90 < ? yes -> becomes designated On receiving..99 on port :..99 <..? yes -> becomes root new config msg = <..90? yes -> becomes designated..90 <.0.? no -> becomes blocked 8 Constructed ST = = 8 = T Z 8 90 = 99 = 9 = Forwarding Tables: : :Z :T 8 :ZT root port designated port 8 :ZT 90 :ZT : blocked port 9 :ZT : 99 : :ZT 9 STP Topology Management Topology change can be local - a configuration msg changes the state of a port (one port changes into the Forwarding or locking state) global - topology update mechanism via root etection configuration message is too old (the path to the root is no longer available) receive a new better configuration When topology change detected inform root restart spanning tree computation purge the forwarding table (force bridges to use a shorter timeout interval) 0
6 VLN and bridges Synchronization with Forwarding Topology changes cause loops or loss of connectivity during reconfiguration, topology is not yet (in general) loop free even transient loops should be avoided Solution: Forwarding state is not immediately operational pre-forwarding states: Listening (accept config msgs, no forwarding): wait for stabilization of ST (Forwardelay, sec) Learning (learn MC addresses, no forwarding): wait for addresses to be learnt (Forwardelay, sec) ctions State Forward ST Learn Forwarding Table entry timers MaxLife = duration of an entry in the forwarding table Two timer values are used long timer (mn): normal case short timer = Forwardelay ( s): after spanning tree updates Timer switching mechanism ridge detects change in ST -> MaxLife = Forwardelay locking Listening Learning Forwarding Configuration monitoring root sends a configuration message every HelloTime ( s) message received with ge = 0, retransmitted with ge = 0 if not received, retransmitted with ge > 0 if ge = Maxge (0 s), delete the stored configuration and restarts basic ST procedure oot sends config PUs every HelloTime; ridge receives config PU on root port i -> eset timer ge on stored_config[i] for all designated ports j sends own config PU resets timer ge on stored_config[j] Topology change When one bridge detects a topology change bridge sends topology update PU towards root and enters Listening state (upstream bridges repeat PU up to root) root forwards new config PU with topology change flag set during Forwardelay ( s) + Maxge (0 s) causes all bridges to use the short timeout value for the forwarding table until PU from root received with topology change flag cleared ridge timeouts (Maxge) stored_config[j]-> delete stored_config[j]; performs basic ST procedure; Timers Timers used in topology management HelloTime ( s): time interval between Config PUs sent by the oot ridge. Forwardelay ( s): time interval that a bridge port spends in both the Listening and Learning states Maxge (0 s): time interval that a bridge stores a PU before discarding it Time to update detect and rebuild: s = 0 s + s Time to change from blocking to forwarding state detect, rebuild, and learn addresses: 0 s = 0 s + s + s Example New link added to bridge Topology update sent to root Topology update sent by root on ST for Maxge + Forwardelay ll bridges recompute ST + set forwarding tables in learning state Source: CISCO STP White Paper 6 6
7 VLN and bridges Example ridge newly connected to root. What happens?. and root run ST procedure on new ports.. This triggers new PUs sent to and C. computes port p as new root. p at is set to listening state for s. p at is set to learning state for s Source: CISCO STP White Paper topology change is fast (in this case), but forwarding is not enabled immediately 7 8 Example 99 powered off; stored config at 90:.0. timeout..99 [], []..90 < Spanning Tree after failure?.0., > oot Port : esignated Ports : locked Ports : Comments fter timeout:.. is the best configuration -> becomes root new config msg =..90 and becomes designated On receiving..8 on port :.6.99 <..? no -> stays root new config msg =..90 stays designated..90 <..8? no -> becomes blocked 9 0 ST after failure STP - apid ST protocol = 8 = T 8 = = 9 90 U = 99 = Z IEEE 80.W Evolution of STP Goal: fast reconfiguration Improvement of handling topology changes and synchronization with packet forwarding avoids use of timers as much as possible Main improvements are fast reconfiguration: use of alternate paths to root or backup path to a LN fast transition to forwarding state with negotiation protocol instead of relying on timers fast flushing of forwarding tables after topology changes 7
8 VLN and bridges Port oles in STP port role is one of: root, designated, alternate, backup, blocked root port = port towards root (same as STP) designated port = connects LN to the spanning tree (same as STP) Port that is not root nor designated is alternate: connects the bridge to root after topology update (alternate path to root) is backup: connects LN to the spanning tree after topology update (alternate path to root for the LN) is blocked: not in the spanning tree nother example of STP L L9 6 L L L L0 L L8 L L L7 Constructed ST ST constructed by STP L L9 6 L L L0 L L L9 U 6 L L L0 L L L L8 L7 L L L L8 L7 U L - root - root ports, - designated ports, - blocked ports - root - root ports, - designated ports, - blocked ports - alternative ports, U - backup ports 6 L fails L fails L L9 U 6 L L L L0 L L L9 U 6 L L L L0 L L L8 L7 U L L L8 L7 U L - root - root ports, - designated ports, - blocked ports - alternative ports, U - backup ports On port on L becomes and state estruction port on L becomes and state Forwarding 7 8 8
9 VLN and bridges fails fails L L9 U 6 L L L L0 L L8 L7 U L L L L9 U 6 L L L L L0 L L8 L7 L U - root - root ports, - designated ports, - blocked ports - alternative ports, U - backup ports On port on becomes U and state estruction port on L becomes and state Forwarding 9 0 STP - apid ST protocol If topology change same reconstruction protocol as STP topology change notification flooded accross ST apid recovery Proposal/greement sequence between bridges that change state of a port: immediate transition to Forwarding state link failure detection by MC layer change to and to U (order of 0 ms) but similar delay to STP, if topology update VLN - Virtual LN Keep the advantages of Layer interconnection auto-configuration (addresses, topology - Spanning Tree) performance of switching Enhance with functionalities of Layer extensibility spanning large distances ridge/switch traffic filtering Limit broadcast domains Security separate subnetworks C E VLN VLN Virtual LNs VLNs No traffic between different VLNs VLNs build on bridges or switches trunk ridge/switch ridge/switch C E Z U VLN VLN VLN VLN T How to define which port belongs to a VLN? per port simple, secure, not flexible for moving hosts (one host per port) per MC address several hosts per port, flexible for moving hosts, not secure, difficult to manage, problems with protocols Layer (should be coupled with dynamic address negotiation - HCP) per Layer protocol allows to limit frame broadcast (VLN: IP, VLN: IP) per Layer address one VLN per IP subnetwork flexible for moving hosts less efficient (requires inspecting packets) per IP Multicast group hosts that join an IP multicast group can be seen as members of the same virtual LN 9
10 VLN and bridges VLNs How to extend VLN to several bridges/switches? needs frame identification - tagging Frame tagging explicit tagging add VLN identifier to MC frames implicit tagging VLN Id deduced from port number, MC address, layer protocol, layer address, IP Multicast group implicit tagging makes use of filtering database mapping between VLN Id and the appropriate field (e.g. layer address) Frame tagging VLN identifier in frames usually done by the first switch/bridge host is not aware of tagging Standards CISCO: ISL (Inter-Switch Link) IEEE 80.Q/80.P 6 ISL (Inter-Switch Link) 80.Q VLN trunk VLN trunk frame ISL frame CC S T data S tag T data 80. frame 80./P frame CISCO: ISL (Inter-Switch Link) proprietary solution: encapsulates a frame in an ISL frame (6 bytes header, bytes CC) incompatible with other vendors - accepts increased maximal length of 80. frame Frame encapsulation of IEEE 80.P extension for assigning frame priority and VLN tag bytes of TPI (Tag Protocol Information): x800 bytes of TCI (Tag Control Information): priority ( bits), VLN Id ( bits) length may exceed 00 bytes (a standard project extends the maximal size of the data to bytes) Q ridge/switch keeps track of VLN members based on dynamic filtering entries ynamic egistration: specify ports registered for a specific VLN added and deleted using GP VLN egistration Protocol (GVP), GP is the Generic ttribute egistration Protocol Group egistration: indicate frames to a group MC address added and deleted using Group Multicast egistration Protocol (GMP) multicasts sent on a single VLN without affecting other VLNs GP efines method to declare attributes to other GP participants frame type to use (GPU) rules for registering/deleting attributes How does it work? bridge wants to declare an attribute send a declaration other bridges propagate the declaration
11 VLN and bridges GP GP attribute to next bridge N O P attribute ttribute propagation ridge/switch C attribute stored at bridge multiple attributes are filtered out - only one declaration is propagated E ttributes on VLN memebership are sent over the spanning tree Frames are forwarded according to this information blocked : VLN : VLN : VLN M C: VLN : VLN C: VLN : VLN C propagation follows the spanning tree of bridges 6 6 Conclusion Ethernet switches/bridges dominate 00 Mb/s switches for hosts, Gb/s in the backbone Complex interconnection parallel paths may exist for reliability SPT or STP guarantees loop-free interconnection VLNs help to structure the interconnection separate broadcast domains limited scalability Products Switch/outer - integrated ports: Layer and Layer administrator chooses the right level for each port 6
Advanced Computer Networks
Advanced Computer Networks Interconnection Layer 2: bridges and VLANs Prof. Andrzej uda duda@imag.fr http://duda.imag.fr 1 Contents Transparent bridges Spanning Tree Protocol (STP) Rapid Spanning Tree
More informationContents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub
Contents ÉCOLE POLYTECHNIQUE FÉÉRLE E LUSNNE Bridging Jean-Yves Le Boudec Fall 007!.Transparent bridging!. Spanning Tree Protocol (STP) "#specification $#an exotic version of Bellman-Ford %#the STP protocol,
More informationComputer Networks Principles LAN - Ethernet
Computer s Principles LN - thernet Prof. ndrzej Duda duda@imag.fr Interconnection structure - layer subnetwork interconnection layer interconnection layer subnet subnet router switch (bridge) VLN http://duda.imag.fr
More informationConfiguring STP and RSTP
7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains
More informationComputer Networks Principles LAN - Ethernet
Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2
More informationConfiguring Rapid PVST+ Using NX-OS
Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:
More informationConfiguring Rapid PVST+
This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco
More informationBridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges
ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number
More informationConfiguring Rapid PVST+
This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the
More informationConfiguring Spanning Tree Protocol
Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page
More informationDD2490 p Layer 2 networking. Olof Hagsand KTH CSC
DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges
More informationToken Ring VLANs and Related Protocols
Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationImplementing Spanning Tree Protocol
Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.
More informationMaintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking
Maintaining Specific VLAN Identification Specifically developed for multi-vlan interswitch communications Places a unique identifier in each frame Functions at Layer 2 2003, Cisco Systems, Inc. All rights
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationThe multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.
CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on
More informationChapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1
Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is
More informationWhy Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda
Why Packet Switching on LN? Packet Switching on L2 (LN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing LN was primarily designed for shared media
More informationImplement VTP. LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008
Implement VTP LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you see any mistake on my PowerPoint
More informationÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents
Bridging ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Jean-Yves Le Boudec Fall 0 Algorhyme I think that I shall never see a graph more lovely than a tree. A tree whose crucial property is loop-free connectivity.
More informationConfiguring STP. Understanding Spanning-Tree Features CHAPTER
CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol
More informationConfiguring Spanning Tree Protocol
Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25
More information3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)
3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist
More informationSpanning Tree Protocol(STP)
Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create
More informationToken Ring VLANs and Related Protocols
CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might
More informationCIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer
CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationUnderstanding Issues Related to Inter VLAN Bridging
Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 3550 switch. It includes information about VLAN
More informationRSTP Configuration. Page 1 of 26
RSTP Configuration Page 1 of 26 Content Chapter 1 STP Configuration... 1 1.1 STP Overview... 1 1.1.1 Function of STP...1 1.1.2 Protocol Packets of STP...1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationPacket Switching on L2 (LAN Level)
Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol
More information62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38
Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How
More informationLoop Cutting in the Original and Rapid Spanning Tree Algorithms
Loop utting in the Original and apid Spanning Tree lgorithms Introduction Mick Seaman This note compares the different strategies for preventing temporary loops in the original (STP) and rapid reconfiguration
More informationGuide des Configurations du switch HYC5310-C2
Guide des Configurations du switch HYC5310-C2 200Mbps x 4 liaisons aggrégées = 800Mbps Link A 200Mbps 192.168.1.242 192.168.1.243 192.168.1. 237 192.168.1. 238 Link B 200Mbps 192.168.1.244 192.168.1.245
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More information2D1490 p Bridging, spanning tree and related issues. Olof Hagsand KTHNOC/NADA
D490 p4 007 Bridging, spanning tree and related issues Olof Hagsand KTHNOC/NADA Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:
More informationConfiguring Spanning Tree Protocol
CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in
More informationPacket Switching on L2 (LAN Level)
Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Principles Broadcast
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationSpanning Tree Protocol
For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1
More informationDD2490 p Bridging, spanning tree and related issues. Olof Hagsand KTH/CSC
DD490 p4 009 Bridging, spanning tree and related issues Olof Hagsand KTH/CSC Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:
More informationConfiguring PIM. Information About PIM. Send document comments to CHAPTER
CHAPTER 3 This chapter describes how to configure the Protocol Independent Multicast (PIM) features on Cisco NX-OS switches in your IPv4 networks. This chapter includes the following sections: Information
More informationBridging Transmitting Non-IP Traffic or Merging Two Networks
10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................
More informationAdvanced Computer Networks
istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of
More informationChapter 4 Configuring Switching
Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!
More informationConfiguring MST Using Cisco NX-OS
This chapter describes how to configure Multiple Spanning Tree (MST) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About MST, page
More informationTable of Contents 1 MSTP Configuration 1-1
Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction
More informationLecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?
Lecture 6: ridging & Switching SE 3: omputer Networks hris Kanich Project countdown: 5 days Last time How do multiple hosts share a single channel? Medium ccess ontrol (M) protocols hannel partitioning
More informationSpanning-Tree Protocol
Spanning-Tree Protocol Agenda» What Problem is Solved by STP?» Understanding STP Root Bridge Election» BPDU Details and Pathcost» Understanding STP Root and Designated Port Election» Understanding and
More informationExam Questions
Exam Questions 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) https://www.2passeasy.com/dumps/200-105/ 1.At which layer of the OSI model is RSTP used to prevent loops? A. physical
More informationConfiguring Private VLANs
Finding Feature Information, on page 1 Prerequisites for Private VLANs, on page 1 Restrictions for Private VLANs, on page 1 Information About Private VLANs, on page 2 How to Configure Private VLANs, on
More informationExpert Reference Series of White Papers. How a Spanning Tree Works
Expert Reference Series of White Papers How a Spanning Tree Works 1-800-COURSES www.globalknowledge.com How a Spanning Tree Works Carol Kavalla, Global Knowledge Instructor, S, CCSI, CCDP Introduction
More informationConfiguring Resilient Ethernet Protocol
CHAPTER 19 This chapter describes how to use Resilient Ethernet Protocol (REP) on the Catalyst 4500 series switch. REP is a Cisco proprietary protocol that provides an alternative to Spanning Tree Protocol
More informationImplement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008
Implement Spanning Tree Protocols-PART-I LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you
More informationExtending Switched Networks with Virtual LANs. 2000, Cisco Systems, Inc. 7-1
Extending Switched Networks with Virtual LANs 2000, Cisco Systems, Inc. 7-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Configure a VLAN Configure VLAN
More informationEECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.
EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect
More informationCampus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs
Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information
More informationTransparent Bridging and VLAN
Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationCCNA 3 (v v6.0) Chapter 3 Exam Answers % Full
CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers
More informationConfiguring Private VLANs
CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco
More informationMSTP Technology White Paper
MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm
More informationThe Spanning Tree Protocol
Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description
More informationConfiguring IP Multicast Routing
34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration
More informationConfiguring EtherChannels and Link-State Tracking
CHAPTER 37 Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed
More informationOSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190
Chapter 17 OSPF Protocol Overview The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information
More informationTable of Contents 1 MSDP Configuration 1-1
Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring Basic Functions of MSDP
More informationTopics for This Week
Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN modes and the VLAN Membership
More informationConfiguring VLAN CHAPTER
CHAPTER 10 LMS collects data about devices so that you can configure and manage Virtual Local Area Network (VLAN) in your network. You must set up your LMS server properly to ensure that Data Collection
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information
More informationVLANs and Trunking C H A P T E R. 6-1: VLAN Configuration. Section 6-1
C H A P T E R 6 Section 6-1 VLANs and Trunking See the following sections for configuration information about these topics: 6-1: VLAN Configuration Describes the method for configuring, creating, and configuring
More informationVLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains
Traditional Campus Networks Broadcast Domain VLANs Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc.
More informationRSTP Configuration. RSTP Configuration
RSTP Configuration Contents 16. STP Configuration...1 1.1 STP Overview...1 1.1.1 Function of STP... 1 1.1.2 Protocol Packets of STP... 1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree Interface States...
More informationVLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1
VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.
More informationVLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1
VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.
More informationBSCI. Section 5. Intermediate System-to- Intermediate System (IS-IS)
BSCI Section 5 Intermediate System-to- Intermediate System () Intermediate System-to-Intermediate System () is a routing protocol developed by the ISO. It is a link-state protocol and behaves much like
More informationLab 5: Inter-VLANs Routing
Lab 5: Inter-VLANs Routing Network Topology:- Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/0.10 10.5.0.1 255.255.255.192 ----- R1 Fa 0/0.20 10.6.0.1 255.255.255.192 ----- Fa 0/0.30 10.10.0.1
More informationIntroduction to OSPF
Introduction to OSPF ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Agenda OSPF Primer OSPF in Service Provider Networks OSPF BCP - Adding Networks OSPF Command Summary 2 OSPF Primer 3
More informationConfiguring IP Multicast Routing
39 CHAPTER This chapter describes how to configure IP multicast routing on the Catalyst 3560 switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationUpon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to
Upon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to improve network performance. Identify what role the switch
More informationFor information about configuring these settings from Cluster Management Suite (CMS), refer to the online help.
Configuring VLANs This chapter provides information about configuring virtual LANs (VLANs). It includes command-line interface (CLI) procedures for using commands that have been specifically created or
More informationCommunication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationTable of Contents 1 OSPF Configuration 1-1
Table of Contents 1 OSPF Configuration 1-1 Introduction to OSPF 1-1 Basic Concepts 1-2 OSPF Area Partition 1-4 Router Types 1-7 Classification of OSPF Networks 1-9 DR and BDR 1-9 OSPF Packet Formats 1-11
More informationIntroduction to OSPF
Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license
More informationConfiguring Spanning Tree
CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast
More informationConfiguring VLANs. Understanding VLANs CHAPTER
7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN
More informationRouting Protocols --- Exterior Gateway Protocol
Content Routing Protocols --- Exterior Gateway Protocol Linda Wu (CMPT 471 23-3) Limiting router interaction Autonomous system BGP protocol BGP messages Other issues on BGP Reference: chapter 15 Notes-13
More informationHUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date
HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
More informationConfiguring IGMP Snooping
This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites
More informationvines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description
vines access-group vines access-group To apply an access list to an interface, use the vines access-group command in interface configuration mode. To remove the access list, use the no form of this command.
More informationResilient Ethernet Protocol (REP)
The is a Cisco proprietary protocol that provides an alternative to the Spanning Tree Protocol (STP). REP provides a way to control network loops, handle link failures, and improve convergence time. It
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More information