Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub

Size: px
Start display at page:

Download "Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub"

Transcription

1 Contents ÉCOLE POLYTECHNIQUE FÉÉRLE E LUSNNE Bridging Jean-Yves Le Boudec Fall 007!.Transparent bridging!. Spanning Tree Protocol (STP) "#specification $#an exotic version of Bellman-Ford %#the STP protocol, main &#topology changes '#synchronization with forwarding (#efficiency!. Rapid Spanning Tree Protocol (RSTP). Transparent Bridging Bridging in General! Bridges are intermediate systems that forward MC frames to destinations based on MC addresses! Interconnect systems beyond one LN segment, keeping main characteristics of LN without additional addresses MC addresses used to identify end systems preserve sequence integrity! The LN segments can be of different nature Ex: WiFi and Ethernet Transparent Bridging (TB)! End systems ignore that there are transparent bridges bridge is transparent MC frames not changed by bridges frames not sent to bridge, but rather: bridge is promiscuous (listens to all frames)! Bridges are required to be plug and play (i.e. no configuration by system manager)! Q. Is an Ethernet hub a bridge or a repeater? What s the difference? hub! There are several possible methods, only one is wide-spread: Transparent Bridging hub hub 4

2 Transparent Bridging uses forwarding tables Bridges learn addresses by observing traffic! Table maps MC addresses to port numbers No IP addresses here! B C Forwarding Table Repeater port Bridge port port B C Forwarding Table est Port MC Nb addr B C port Bridge port port B C 5! How can a bridge build its table? No equivalent to routing protocols, we need a plug and play! Bridge builds routing table by reading all traffic table built by learning from S field in MC frame learnt addresses times out if not re-learnt! If destination address not in table broadcast to all ports same for group addresses Can this method of learning addresses be extended to a network of bridges? The method of learning does not work if there are loops in the topology! On this example, yes.! Q. How does B see the network?! Q. What happens when send a frame to B? assume empty forwarding tables at the beginning port port port port B port port B B Y C Z port port B port port B B Y C Z 7 8

3 Transparent Bridges force the ctive Topology to be loop-free! Learning bridge works well if there is no loop in the topology The topology can be represented as a bidirectional graph where vertex = bridge, edge = connection through collision domains (called here: LN) for such graphs : Loop- free and connected tree On a tree, there is only one path from one host to one bridge. Therefore, a bridge sees a host on exactly one port.! network of bridges may have redundant connections (as in previous example). This is good for reliability, but this causes loops in the topology.! The adopted by transparent bridges is: maintain an active topology that is loop-free i.e. decide that some ports are blocked This should be done automatically, without configuration (plug and play) The Spanning Tree Protocol! What does it do? Prevent loops in the active topology ecide which ports should be blocked or opened ports that are allowed to forward frames are said to be in the forwarding state or called forwarding ports dapt to changes in the physical topology! How does it work? See next section 9 0 Summary: what a transparent bridge does. The Spanning Tree Protocol Individual PU forwarding Copy all frames on all forwarding ports Frame received on port i -> /* port i is forwarding */ If is unicast, is in forwarding table with port j and j is a forwarding port then copy to port j else flood all forwarding ports! i Update forwarding table with (i, S) We present the Spanning Tree Protocol in 4 steps : )"*Specification )$*esign of main algorithm )%*Main Protocol )&*Topology Changes and Synchronization with Packet Forwarding Control Method Run the Spanning Tree Protocol

4 (a) Specification )"*We now specify the STP method (ie what it does, in more details than before, not how)! There are many ways to build a tree on a graph. Minimum Spanning Tree (Kruskal or Prim s algorithms) The STP chose to use the set of shortest paths towards some selected vertex.! Each bridge has a bridge label, based on MC address + configurable offset. Bridge with smallest label is selected and called root. Each LN between bridges has a cost, by default, decreasing function of bit rate: Port Type uplex Cost 00BSE-T / 00BSE-F (VLT) Full 5 Half 0BSE-T Full Half 700! What: The STP computes a tree of shortest paths to the root bridge Specification of STP (cont d)! STP gives a role to all ports Root or designated (ports on spanning tree) Blocked (ports not on spanning tree)! Root ports One per bridge := port towards root along shortest path in case of equal costs, lowest port id chosen! esignated ports On every LN ( collision domain), choose one designated bridge all ports on LN for which the bridge is designated are designated ports esignated bridge one per LN defined by : it has the shortest path to root possibly root itself! Ports other than root or designated are blocking 4 Understanding the Specification! Q. find the root, root ports, designated bridges, designated ports and blocking ports! Q. find the forwarding table at all bridges T B84 B8 B90 B4 cost = Z (b) STP: design of main algorithm! STP uses a variant of the Bellman-Ford algorithm (see dv.ppt), which we call the Bellman-Ford algorithm for Bridges! Like the original Bellman-Ford algorithm, it is a distributed algorithm, but it is easier to understand it by studying first the centralized version Y B9 B99 cost = 5

5 The Centralized Bellman Ford lgorithm for Bridges uses Special Link and Path ttributes! Represent the network by a graph, where a vertex is a bridge. For this algorithm, we treat the graph as directed.! We are given link costs c(i,j) (costs of LNs, see later for default values) We assume c(i, j) > 0 and c(i,j) = " when i and j are not connected.! We are also given vertex labels l(i)(concatenation of bridge priority and serial number, set by manufaturer)! efinition: a link attribute is (i,j) := [l(j), c(i,j)] concatenation of attributes: [l,c] [l, c ] = [min(l,l ), c+c ] the attribute of a path i i ik is the concatenation of the attributes of the links i.e.: [minimum label, sum of costs] comparison of attributes lexicographic: [l, c]! [l c ] iff [(l < l ) or (l = l and c! c )] a total order on N x [0, "] path p is better than p if attribute of p attribute of p Examples of Path ttributes! Q. Q. What are the attribute of the following paths? Which one is best? 0! 50! ! 0! 0! 40 0! 0! ! 50! 40! What are Best Paths in this Setting?! ssume the graph is fully connected; all vertex labels are different; all link costs are > 0! path p that starts at is best (among all paths that start at i) iff It goes through the vertex i 0 that has the smallest label in the graph (the minimum label is reached at only one vertex, by hypothesis) It stops at i 0 It is a shortest path from i to i 0! Thus: the best paths in this graph are the shortest paths to the node with the smallest label The Centralized Bellman-Ford lgorithm for Bridges! What: Given a directed graph with links attributes as above, computes one tree of best paths from any vertex let (i,j):= attribute of link (i,j) =[l(j), c(i,j)]! How: efine p k (i) as the cost of the best path from i to anywhere in at most k hops.! Theorem +#If the graph is fully connected, the algorithm stops at the latest at k=number of vertices ; at the end, p k (i) is the attribute of a best path,# best path from is obtained by letting pred(i) = the index (j or i) that achieves the minimum in () If the min is achieved by the term [l(i),0] then pred[i]=i; this happens only when vertex i has the smallest label 9 0

6 ! The algorithm is the same as the classical Bellman-Ford algorithm [dv.ppt], with the following modifications Exotic algebra instead of usual algebra: costs are replaced by attributes; addition of costs is replaced by concatenation ( ) and comparison by the lexicographic order. ll paths instead of paths to a specific node: add a virtual node 0 such that (i,0)=[l(i), 0] and (0,i)=[, ]. pply the classical Bellman-Ford to compute the shortest (i.e. best) paths from all nodes i to node 0. Remove the final edge from these paths and obtain the best paths we are looking for. Indeed, with these modifications, the classical Bellman-Ford becomes Run the Centralized Bellman Ford lgorithm for Bridges on this Example! Q. Write p k (i), pred(i) and draw the spanning tree One can easily see that () is equivalent to (), given that we set p k- (0) to [, 0], and that the impact of the initialization for p 0 (i) disappears after one step.! Note: in the algorithm, min is the lexicographic min (derived from the comparison of attributes)! The proof of the algorithm is similar to the classical case. It relies on the fact that is associative. Impact of Initial Conditions on the Bellman-Ford lgorithm for Bridges! The classical Bellman-Ford algorithm continues to work if we take different initial conditions but the interpretation that p k (i) is the distance from i to in at most k hops is no longer true! oes this still hold for the Bellman-Ford algorithm for Bridges? Q. write p k (i), pred(i) and draw the spanning tree, with initial conditions as shown. The dotted link does not exist in the current configuration. It existed before, and explains why node 0 starts with these initial conditions. 09 p k (i): (format: label, cost) k \ i ,0 0,0 09, 40,0 50, The Bellman-Ford lgorithm for Bridges is sensitive to initial conditions Theorem If the initial conditions in the centralized Bellman-Ford lgorithm for Bridges satisfy: 8 i : p 0 (i)=(m i, c i ) with m i # min j l(j) the algorithm converges to the correct value else the algorithm diverges with lim k! p k (i)=(m 0,) where m 0 =min i m i Proof: first show that the label converges to the minimum of all initial conditions (it can only decrease). Then use the property of Bellman-Ford in the usual algebra (see chapter distance vector ) Comment: the convergence may be much longer than with the initial conditions in theorem ll-path variant of Bellman Ford Note that there is a condition on the initial label, not on the initial cost. 4

7 Example! Q. write p k (i), pred(i) and draw the spanning tree, with initial conditions as shown. The dotted link does not exist in the current configuration. It existed before, and explains why node 0 starts with these initial conditions. oes the algorithm converge to the correct values? p k (i): (format: (label, cost)) k \ i ,0 0,0 0, 40,0 50,0 istributed Bellman-Ford lgorithm for Bridges! Like the classical Bellman-Ford (i.e. BF in dv.ppt), the Bellman-Ford lgorithm for Bridges can be distributed: It is the algorithm used by STP every node, say i, maintains an estimate q(i) of p(i), the attribute of a best path from i and of pred(i), the next node on a best path; initially q(i)=[l(i),0] and pred(i)=i from time to time, i sends its value q(i) to all its neighbours when node i receives a value q(j0) from any neighbour j0, it sets q(j0) to the received value and updates q(i) by recomputing eq () if j0 == pred(i) then q(i):=min { (i,j 0 ) q(j 0 ), [l(i),0] } else q(i) := min{(i,j 0 ) q(j 0 ), q(i) } 5 if eq () causes q(i) to be modified, pred(i) is set to j 0 if (i,pred(i)) changes (including if pred(i) stops being a neighbour ) then q(i) is set to [l(i),0] and pred(i) is set to i. Sample Run of the istributed Bellman-Ford lgorithm for Bridges The istributed Bellman-Ford lgorithm for Bridges may need to be reset > > 0 0 -> > > > > > > > 0 link breaks 50 -> 0 0 -> > 0 possible run : i ,0 0,0 0,0 40,0 50,0 0, 0, 0,4 0,7 0,5 0,4 0, 0, 0,4 50 does as if received q(40)= (", "); pred(50)=40 thus 50 does q(50)=(50,0); similarly 40 does a new computation but this does not change 40 0, 50,0 0,0 0,4 0,5! Like the centralized algorithm, the distributed algorithm is robust to changes in configuration as long as the node with the smallest label (called root bridge ) is still present and reachable from all bridges. If this is not true, the algorithm does not converge to a true value. It needs to be reset by some additional mechanism. Q. Compare to the classical distributed Bellman-Ford algorithm. 7 8

8 (c) STP Main Protocol! Standardized by IEEE 80.! ll bridges run it! Implements the istributed Bellman Ford lgorithm for Bridges best attribute = [root bridge label, distance to root bridge] pred(i) is kept in the form of root port instead of bridge label bridge periodically sends its values to neighbours, and whenever a change occurs! We explain by examples in the next slides. Bridge PUs! STP uses control frames called Bridge PUs (BPUs) MC = all bridges (multicast) 0 80 C SP = SP is a field in the IEEE format, which replaces the Ethertype in the Ethernet format.! BPUs are not forwarded by bridges unlike all other frames BPUs are sent by one bridge to all bridges on the same LN segment reminder: a data frame is never sent to bridge by end system! Configuration BPU contains root Id (priority) cost to root (from sender of config BPU) id of sender port number (omitted in the examples) 9 0 Back to Example Spanning Tree Protocol seen by B90! Bridge B90 prepares config BPU and sends on all ports; B90 configuration tables: B8 B4 cost = < , > T B84 B90 Z < > Y B9 B99 cost = Root Port : esignated Ports :, Blocking Ports : Root Port : esignated Ports : Blocking Ports : message received on port : < message format: rootid.cost_to_root.senderid

9 ! Bridges store information per port instead of keeping the info q(i), pred(i). The stored information on every port is the last sent Config BPU, or the last received, whichever happened last.the config BPU format is shown on the figure.! When receiving a message the bridge runs the distributed bellman ford algorithm, updates the states of ports, and decides whether to send a new message on every port:! Initially, the bridge has the same config on all ports. This means that q(90)=[90, 0] and pred(90)=90. We now give explanations to the arrows to 4 on the previous page +#On receiving on port : port is not the root port, in other words, the message is not received from pred(90), thus we are in the else part of Eq (). 4. < 90.0 thus q(90)=[4,] and pred(90)= 4 the bridge stores this information indirectly by storing on port,#since the local state q(90) has changed, an update should be sent to all neighbours, in fact, here the algorithm uses an optimization that exploits the facts that the LNs are broadcast medium. The optimization is that we assume all neighbours that are on port have also received the message we received, so we do not need to forward any new information to this port. the update is 4..90, which means the state information is q(90)=[4,] and it is sent by bridge 90. The information on all ports allows the bridge to know that pred(90)=4 -#On receiving on port : port is not the root port, in other words, the message is not received from pred(90), thus we are in the else part of Eq (). 4. < 4. thus q(90)=[4,] and pred(90)= 99 the bridge stores this information indirectly by storing on port.#since the local state q(90) has changed, an update is sent to all neigbours. Here too, an optimization is done. s before, no update is sent on port, since the last message arrived on this port. Further, the last message received on port was better than the one we would send 4. > 4.0 thus we do not send it on port. The assumption here is that all bridges on port have already received the information ! The figure also shows the status of the ports at instants, marked and the port status is computed by comparing the state information on all ports at : the root port is (this follows from the Bellman-Ford algorithm, as explained above) the bridge with the shortest path to root on ports and is this bridge,s since we sent a config BPU on these two ports. Hence this bridge is designated bridge on the LNs behind ports and, and ports and are designated ports for this bridge. at : the root port is port is designated port is neither root nor designated hence is blocking (d) Topology changes! Topology changes occur due to changes in configuration failures, recoveries! It changes occur, the behaviour depends on whether the root bridge is still reachable from all bridges if so, let distributed Bellman Ford do the job else, we need some additional mechanism: STP uses root monitoring for this: root refreshes validity of STP by periodically sending a refresh message every HelloTime (s) the refresh message is propagated along the spanning tree a bridge that does not receive refresh message for Maxge restarts STP basic procedure from fresh initial conditions (= reset) 5

10 Topology Change That is Handled by Bellman-Ford B99 crashes; we look at B90 B90 detects absence of B99 (absence of hello, or other mechanism); this is equivalent to receiving (in Bellman-Ford s algorithm) a state information: from B90: best attribute (", ") a new local computation is started: timeout on [], > < Topology Change That Requires Reset! If B4 dies, what happens? Root Port : esignated Ports : Blocked Ports : Q. What is the spanning tree after the failure? 7 8 (e) Synchronization with Forwarding! Bridges learn MC source addresses; during transients of the spanning tree, this should be disabled before a port is forwarding (root or designated) it goes through two intermediate states listening: wait for stabilization of ST (forwarding timer, 5 sec) learning: wait for addresses to be learnt (forwarding timer, 5 sec); all packets are forwarded by broadcast in this mode (no forwarding table is used) role/state event Port enabled Blocking by network management isabled Blocking Listening Learning Forwarding Port disabled isabled isabled isabled isabled (NM, failure) Port Selected Listening as Root or designated Port no longer Blocking Blocking Blocking root or designated Example. and root run STP procedure on new ports.. This triggers new BPUs sent to B and C. computes port p as new root. p at is set to listening state for 5 s. p at is set to learning state for 5 s $ topology change is fast (in this case), but forwarding not enabled immediately Forwarding Learning Forwarding timer expires 9 Source: CISCO RSTP White Paper 40

11 Host Cache Timers (f) Efficiency ()?! Timer used for validity of forwarding tables Two timer values are used long timer (5mn): normal case short timer = forwarding timer (5 sec): after spanning tree updates! Timer switching mechanism Bridge B detects change in ST -> maxlife := shorttimer how can bridges detect changes in ST"?! When one bridge senses a topology change topology change = one port changes out of or into blocking role bridge sends topology update BPU towards root (upstream bridges repeat BPU up to root) root forwards new config BPU with topology change flag set for a time duration = ForwardingTimer (5s) + Maxge timer (0s)S causes all bridges to use short timer value for caches until BPU from root received with topology change flag cleared i.e. broadcast from root! No loops, but paths may be not optimal ll frames go through the spanning tree 4 4 Efficiency ()?! elay to recover from a topology change is sec detect change : 0 to 0 s up to 0s if detected by absence of, or new, hello message, in average 0s immediate if detected by local physical link error message rebuild ST: s to a few seconds change port status to learning and forwarding: = * 5 s total: 0 s s = sec Q. If you want to improve the responsiveness of STP, which part would you improve in priority?. RSTP - Rapid ST protocol! Goal: fast reconfiguration Ethernet starts to be used as a public telecom service! Uses the same distributed Bellman-Ford algorithm changes are only to part (e) of STP: synchronization with packet forwarding Still a spanning tree parallel paths excluded!! Main improvements are fast transition to forwarding state with negotiation protocol instead of timeout fast flushing of forwarding tables after topology changes 4 44

12 Port Roles in RSTP port role is one of: root, designated, alternate, up root port = port towards root (same as STP) designated port = ports on which the bridge is designated for this LN (same as STP) Port that is not root nor designated is alternate, if the bridge is not designated for the LN connected to the port is up, if this is a second. parallel port to the same LN for which the bridge is already designated Other Port ttributes! port state discarding learning forwarding! edge / non edge! duplex (= point to point) / half duplex (= shared medium)! there are constraints on the combinations of role and state an alternate or up port is always in discarding state a root or designated can be any state alternate port = connects the bridge to root after topology update (alternative path to root) up port = connects LN to the spanning tree after topology update (alternative path to root for the LN) 45 4 Example Fast Transition to Forwarding L5 L9 R B B4 B R L4 R L L0 L8 U B L R L7 R L4 L L R - root ports - designated ports - alternative ports U - up ports! when a port is transitioned to designated or root it is put into the blocking state! a designated + blocking port starts the proposal agreement sequence in order to change its state to forwarding! RSTP produces the same ST as STP! L, L and are edge links, others not! L and L are half-duplex, others are full duplex new link opened ports blocking non edge downstream ports set to blocking upstream link set to forwarding 47 48

13 applies only to edge or full-duplex ports when a port is designated and blocking, it starts a proposal/agreement procedure by sending a proposal message when it receives an agreement in response, it is set to forwarding when a bridge receives a proposal message checks it is on root port starts a synchronization of all its ports, by blocking all designated, nonedge ports then it sets the root port to forwarding then it responds to the proposal message with an agreement Example of Fast Transition L5 L9 R B B4 B L4 R L4 R L L0 L8 U L B L R L7 R L! fails; the failure is detected immediately by physical layer alarms at B4 and B. What happens next? Solution Fast Flushing of Forwarding Tables Example! fter topology change (port becomes forwarding or blocking), STP puts cache timer to forwardingtimer (5s)! RSTP uses an active flushing all bridges send a BPU to neighbours every hellotimer ( = *s = 4s) ; L5 R L9 R B B4 B R L4 L L0 L4 L5 R L9 R B B4 B R L4 L L0 L4 when a non-edge port becomes forwarding (only; not when it becomes blocking) it sets the TC bit into the BPUs it will send for the next *hellotimer ( = *s = 4s) on all designated and root ports. This is done by setting the TC While timer on these ports. when a bridge receives a BPU with TC bit set, it flushes the forwarding tables on all designated and root ports except the one where received it sets the TC While timer on these ports causes all forwarding entries to be flushed in a few seconds flushing is thus piggyed into the ST re-computation BPUs Q: compare to STP 5 B L L8 R L7 R U L L L5 R L9 R B B4 B L4 R L4 L B L L8 R L7 R L0 U L L! fails; flushing propagates along spanning tree and lasts for a few seconds B L L8 R L7 R U L L L5 R L9 R B B4 B L4 R L4 L B L L8 R L7 R L0 U L L TC While time runs 5

14 Backup Ports RSTP - Rapid ST protocol L5 R L9 R B B4 B R L4 L L0 L8 B L R L7 R U L4 L L! Q: what are the main improvements over STP?! Q: what is not improved?! Q: o you know other technologies that recover from changes more quickly?! On shared medium LNs! failed port is immediately replaced by up port 5 54 Transparent Bridging (TB) nswers to questions! End systems ignore that there are transparent bridges bridge is transparent MC frames not changed by bridges frames not sent to bridge, but rather: bridge is promiscuous (listens to all frames)! Q. Is an Ethernet hub a bridge or a repeater? What s the difference?!. It can be either a bridge or a repeater. hub is a product name, not an architecture name. Modern hubs are bridges. Old ones are repeaters. The difference is: a repeater is a layer intermediate system (acts on bits) whereas a bridge is a layer intermediate system (acts on entire MC frames). lso: a bridge separates collision domains, a repeater does not hub hub hub 55 5

15 Can this method of learning addresses be extended to a network of bridges?! On this example, yes.! Q. How does B see the network?. B sees that,, B and Y are on port (B is transparent!) Its forwarding table is B C Y Z B port port B Y B C Z The method of learning does not work if there are loops in the topology! Q. What happens when send a frame to B? assume empty forwarding tables at the beginning. frame is sent by B to ports and. B learns that is on port. sends it to port. B sends it to ports and. B now learns that is on port. B sends frame to ports and etc the frame is multiplied a number of times. B receives several copies port port B port port port B port port B Y C Z Understanding the Specification cost = B8 B4 T Z B84 B90 B99 B9 Y cost = Examples of Path ttributes! Q. What are the attribute of the following paths? 0! 50! 40 [40, ] 0! 0! 0! 40 [0, 9] 0 0! 0! 0 [0, 7] 0! 50! 40! 0 [0, 4] The best path is the last root port blocking port designated port Forwarding Tables: B4 YZ T B84 YZT B9 ZT Y B8 YZT B90 ZT Y B99 ZT Y 59 0

16 Run the Centralized Bellman Ford lgorithm for Bridges on this Example p k (i): (format: (label, cost)) k \ i ,0 0,0 0,0 40,0 50,0 0,0 0, 0, 0, 0, 0,0 0, 0,7 0, 0, 0,0 0, 0,4 0, 0, i pred(i) Impact of Initial Conditions on the Bellman-Ford lgorithm for Bridges Q. write p k (i), pred(i) and draw the spanning tree, with initial conditions as shown. The dotted links do not exist in the current configuration. They existed before, and explain why nodes 0 and starts with these initial conditions.. no, it does not work. fter a few steps, all nodes believe the best label is 09, and start computing the best path towards 09. Then they start a count to infinity ( we are computing the usual distance to 09, which is infinite). The algorithm does not converge p k (i): (format: label, cost) k \ i ,0 0,0 09, 40,0 50,0 0,0 09,8 0, 0, 09, 09,9 09, 09,4 09,4 09, 09, 09,7 09, 09,9 09,0 4 09,8 09, 09, 09,0 09,0 5 09, 09,9 09, 09,0 09,0 09,0 09, 09, 09, 09, Example! Q. write p k (i), pred(i) and draw the spanning tree, with initial conditions as shown. The dotted link does not exist in the current configuration. It existed before, and explains why node 0 starts with these initial conditions.. The algorithm converges since the initial labels are not below the smallest one. 0 p k (i): (format: (label, cost)) 0 0 k \ i ,0 0,0 0, 40,0 50,0 0,0 0, 0, 0, 0, ,0 0, 0, 0, 0, 0,0 0, 0,4 0, 0, 4 0,0 0, 0,4 0, 0, The istributed Bellman-Ford lgorithm for Bridges may need to be reset! Like the centralized algorithm, the distributed algorithm is robust to changes in configuration as long as the node with the smallest label (called root bridge ) is still present and reachable from all bridges. If this is not true, the algorithm does not converge to a true value. It needs to be reset by some additional mechanism. Q. Compare to the classical distributed Bellman-Ford algorithm.. It does not need to be reset, since it always converges to the true value. 4

17 Topology Change That is Handled By Bellman-Ford Topology Change That is not Handled By Bellman- Ford! Q: If B4 dies, what happens?! : root monitoring at all bridges detect that B4 does not send a refresh message anymore T B84 B8 B4 B90 cost = Z all bridges start the STP procedure from fresh initial conditions and converge to a new spanning tree rooted at B8 Y B9 U B99 cost = 5 Efficiency ()?! elay to recover from a topology change is sec detect change : 0 to 0 s up to 0s if detected by absence of, or new, hello message, in average 0s immediate if detected by local physical link error message rebuild ST: s to a few seconds change port status to learning and forwarding: = * 5 s total: 0 s s = sec Q. If you want to improve the responsiveness of STP, which part would you improve in priority?. etection of changes and synchronization with forwarding B Example of Fast Transition L5 R L9 R B B4 B L4 R L4 L L0 L R L8 L7 R U L L B4 senses failure and clears state on port to ; sends new ST updates to neighbours; this converges to L5 being on the spanning tree 7 8

18 Example of Fast Transition Example of Fast Transition L5 R L9 R B B4 B R L4 L L0 L4 L5 R L9 R B B4 B R L4 L L0 L4 B L R L8 L7 R U L L B L R L8 L7 R U L L port on L5 at B starts proposal/agreement sequence; B4 blocks L9; L5 is opened port on L5 at B starts proposal/agreement sequence; B4 blocks L9; L5 is opened 9 70 Example of Fast Transition Fast Flushing of Forwarding Tables L5 R L9 R B B4 B R L4 L L0 L8 U B L R L7 R L4 L L! Q: STP propagates updates only from the root. Hello messages are generated by the root and relayed unchanged by the bridges. When a bridge receives an update, it simply sets the cache timer to a smaller value (5s) port on L9 at B4 starts proposal/agreement sequence; no port is blocked at B; L9 is opened. 7 7

19 RSTP - Rapid ST protocol! Q: fast move to forwarding state after topology changes! Q: what is not improved? flushing stale forwarding entries takes several seconds, not a large improvement over STP parallel paths are not used, except as up! Q: self healing double rings 7

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents Bridging ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Jean-Yves Le Boudec Fall 0 Algorhyme I think that I shall never see a graph more lovely than a tree. A tree whose crucial property is loop-free connectivity.

More information

VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology

VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology VLN and bridges dvanced Computer Networks Interconnection Layer : bridges and VLNs Contents Transparent bridges Spanning Tree Protocol (STP) apid Spanning Tree Protocol (STP) VLNs Prof. ndrzej uda duda@imag.fr

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Interconnection Layer 2: bridges and VLANs Prof. Andrzej uda duda@imag.fr http://duda.imag.fr 1 Contents Transparent bridges Spanning Tree Protocol (STP) Rapid Spanning Tree

More information

Distance Vector Routing

Distance Vector Routing ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Routing in General Distance Vector Routing Jean Yves Le Boudec Fall 22 Contents. Routing in General 2. Distance vector: theory. Distance vector: practice 4. Dynamic

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Table of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w)

Table of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w) Table of Contents Understanding Rapid Spanning Tree Protocol (802.1w)...1 Introduction...1 Support of RSTP in Catalyst Switches...2 New Port States and Port Roles...2 Port States...2 Port Roles...3 New

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number

More information

Distance Vector Routing

Distance Vector Routing ÉOL POLYTHNIQU FÉÉRL LUSNN istance Vector Routing Jean Yves Le oudec 20 ontents. Routing in General 2. istance vector: theory 3. istance vector: practice (RIP) 4. Software efined Networking (SN) Textbook

More information

Table of Contents 1 MSTP Configuration 1-1

Table of Contents 1 MSTP Configuration 1-1 Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction

More information

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard. CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4

More information

Understanding Rapid Spanning Tree Protocol (802.1w)

Understanding Rapid Spanning Tree Protocol (802.1w) Understanding Rapid Spanning Tree Protocol (802.1w) Contents Introduction Support of RSTP in Catalyst Switches New Port States and Port Roles Port States Port Roles New BPDU Format Full View of the Cisco

More information

Rapid spanning tree protocol

Rapid spanning tree protocol Rapid spanning tree protocol Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Pietro Nicoletti Studio Reti http://www.studioreti.it Based on chapter 4 of: M. Baldi, P. Nicoletti, Switched

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol

More information

MSTP Technology White Paper

MSTP Technology White Paper MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Principles Broadcast

More information

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 34, 2014/02/17 14:41:48) Monday, February 17, 2014 Bridge loops Two bridges

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra) ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor

More information

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda Why Packet Switching on LN? Packet Switching on L2 (LN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing LN was primarily designed for shared media

More information

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 18.4, 2018/11/16 13:23:04) Friday, November 16, 2018 Bridge loops Two bridges

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

RSTP Configuration. Page 1 of 26

RSTP Configuration. Page 1 of 26 RSTP Configuration Page 1 of 26 Content Chapter 1 STP Configuration... 1 1.1 STP Overview... 1 1.1.1 Function of STP...1 1.1.2 Protocol Packets of STP...1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 44, 2015/02/18 12:55:30) Thursday, February 19, 2015 Bridge loops Two bridges

More information

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38 Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How

More information

Table of Contents Chapter 1 MSTP Configuration

Table of Contents Chapter 1 MSTP Configuration Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2015

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2015 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Link State Routing Jean Yves Le Boudec 2015 1 Contents 1. Link state 2. OSPF and Hierarchical routing with areas 3. Dynamic metrics and Braess paradox 2 1. Link

More information

Configuring Spanning Tree

Configuring Spanning Tree CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast

More information

Managing Network Spanning Trees

Managing Network Spanning Trees CHAPTER 8 This chapter describes, the IEEE 802.1d Spanning Tree Protocol (STP), and how to use and configure Cisco s proprietary spanning-tree protocols, Per VLAN Spanning Tree (PVST), Multiple Spanning

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page

More information

RSTP Configuration. RSTP Configuration

RSTP Configuration. RSTP Configuration RSTP Configuration Contents 16. STP Configuration...1 1.1 STP Overview...1 1.1.1 Function of STP... 1 1.1.2 Protocol Packets of STP... 1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree Interface States...

More information

802.1AS Fast Master Clock Selection

802.1AS Fast Master Clock Selection 802.1AS Fast Master Clock Selection Moving 802.1AS closer to RSTP Version 2 Norman Finn Cisco Systems 1 Introduction 2 Introduction IEEE 1588 networks that contain transparent clocks and the current draft

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end

More information

Loop Cutting in the Original and Rapid Spanning Tree Algorithms

Loop Cutting in the Original and Rapid Spanning Tree Algorithms Loop utting in the Original and apid Spanning Tree lgorithms Introduction Mick Seaman This note compares the different strategies for preventing temporary loops in the original (STP) and rapid reconfiguration

More information

Improving network convergence with Multiple Spanning Tree Protocol

Improving network convergence with Multiple Spanning Tree Protocol CEAI, Vol.15, No.1 pp. 79-87, 2013 Printed in Romania Improving network convergence with Multiple Spanning Tree Protocol Roxana Stănică SC Civitas Systems S.R.L., Craiova, Romania (e-mail: roxana_batm@yahoo.com)

More information

Bridging Transmitting Non-IP Traffic or Merging Two Networks

Bridging Transmitting Non-IP Traffic or Merging Two Networks 10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 20: Bridging Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui

More information

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) 13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Understanding and Configuring STP

Understanding and Configuring STP CHAPTER 14 This chapter describes how to configure the Spanning Tree Protocol (STP) on a Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes

More information

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

Configuring MST Using Cisco NX-OS

Configuring MST Using Cisco NX-OS This chapter describes how to configure Multiple Spanning Tree (MST) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About MST, page

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1

More information

Configuring STP and Prestandard IEEE 802.1s MST

Configuring STP and Prestandard IEEE 802.1s MST 20 CHAPTER This chapter describes how to configure the Spanning Tree Protocol (STP) and prestandard IEEE 802.1s Multiple Spanning Tree (MST) protocol on Catalyst 6500 series switches. Note The IEEE 802.1s

More information

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

Configuring Resilient Ethernet Protocol

Configuring Resilient Ethernet Protocol CHAPTER 19 This chapter describes how to use Resilient Ethernet Protocol (REP) on the Catalyst 4500 series switch. REP is a Cisco proprietary protocol that provides an alternative to Spanning Tree Protocol

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel? Lecture 6: ridging & Switching SE 3: omputer Networks hris Kanich Project countdown: 5 days Last time How do multiple hosts share a single channel? Medium ccess ontrol (M) protocols hannel partitioning

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 9: Bridging Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

Chapter 4 Configuring Switching

Chapter 4 Configuring Switching Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information

Implement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008

Implement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 Implement Spanning Tree Protocols-PART-I LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you

More information

Chapter 16: Switched Ethernet in Automation. Wenbo Qiao

Chapter 16: Switched Ethernet in Automation. Wenbo Qiao Chapter 16: Switched Ethernet in Automation Wenbo Qiao Ethernet Basics What is Ethernet? Why Ethernet? ( not FieldBus?) Flexibility, Scalability and Performance Key Strength: many protocols running simultaneously

More information

Spanning Tree Protocol

Spanning Tree Protocol For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1

More information

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating

More information

Implementing Spanning Tree Protocol

Implementing Spanning Tree Protocol Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.

More information

Supplemental Note on Count-to-Infinity Induced Forwarding Loops in Ethernet Networks

Supplemental Note on Count-to-Infinity Induced Forwarding Loops in Ethernet Networks Supplemental Note on Count-to-Infinity Induced Forwarding Loops in Ethernet Networks Khaled Elmeleegy, Alan L. Cox, T. S. Eugene Ng Department of Computer Science Rice University Abstract Ethernet forwarding

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might

More information

What LinkSec Should Know About Bridges Norman Finn

What LinkSec Should Know About Bridges Norman Finn What LinkSec Should Know About Bridges Norman Finn What LinkSec Should Know About Bridges Rev. 2 Norman Finn, Cisco Systems IEEE 802 LinkSec SG 1/20 What Do Bridges Do? (1) A network of bridges emulates

More information

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016 9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:

More information

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

MSTP Configuration. Page 1 of 24

MSTP Configuration. Page 1 of 24 MSTP Configuration Page 1 of 24 Contents Chapter1 Configuring MSTP... 3 1.1 Brief Introduction to MSTP...3 1.2 BPDU...3 1.2.1 Basic Concepts in MSTP... 4 1.2.2 Roles of Ports... 6 1.3 Algorithm Implementation...9

More information

MSTP Configuration. Configuration

MSTP Configuration. Configuration MSTP Configuration Contents 1. Configuring MSTP...2 1.1 Brief Introduction to MSTP... 2 1.2 BPDU... 2 1.2.1 Basic Concepts in MSTP...2 1.2.2 Roles of Ports...4 1.3 Algorithm Implementation... 7 1.3.1 MSTP

More information

Spanning Trees and IEEE 802.3ah EPONs

Spanning Trees and IEEE 802.3ah EPONs Rev. 1 Norman Finn, Cisco Systems 1.0 Introduction The purpose of this document is to explain the issues that arise when IEEE 802.1 bridges, running the Spanning Tree Protocol, are connected to an IEEE

More information

The fundamentals of Ethernet!

The fundamentals of Ethernet! Building Ethernet Connectivity Services for Provider Networks" " Eduard Bonada i Cruells" Tesi Doctoral UPF / 2012 Dirigida per Dra. Dolors Sala i Batlle Departament de Tecnologies de la Informació i les

More information

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

CSEP 561 LAN Switches. David Wetherall

CSEP 561 LAN Switches. David Wetherall CSEP 561 LAN Switches David Wetherall djw@cs.washington.edu How to combine links into a simple network Topics: Switch internals Plug and play LANs (switched Ethernet) Application Transport Network Building

More information

2.2 Cisco IOS Commands for the Catalyst 4500 Series Switches snmp ifindex clear. This command has no arguments or keywords.

2.2 Cisco IOS Commands for the Catalyst 4500 Series Switches snmp ifindex clear. This command has no arguments or keywords. Chapter 2 2.2 snmp ifindex clear snmp ifindex clear To clear any previously configured snmp ifindex commands that were entered for a specific interface, use the snmp ifindex clear command. snmp ifindex

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also were

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w) Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Spanning Tree Protocol (IEEE 802.1D 1998), Rapid STP (IEEE 802.1D 2004), Cisco PVST+, MSTP Page 07-1 Agenda Spanning Tree Protocol (STP) Introduction Details Convergence Some more

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Rapid Spanning Tree Protocol and Ethernet applications development

Rapid Spanning Tree Protocol and Ethernet applications development Rapid Spanning Tree Protocol and Ethernet applications development Embedded switches, specific protocols, SW support Simone Cilli (simone.cilli@t3lab.it) T3LAB Consortium, Via S. Bassanelli 9/11, Bologna

More information

Chapter 5. Spanning Tree Protocol (STP) Part II

Chapter 5. Spanning Tree Protocol (STP) Part II Chapter 5 Spanning Tree Protocol (STP) Part II CCNA3-1 Chapter 5-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

Agenda. Spanning-Tree Protocol. Spanning Tree Protocol (STP) Introduction Details Convergence Some more details

Agenda. Spanning-Tree Protocol. Spanning Tree Protocol (STP) Introduction Details Convergence Some more details Agenda Spanning-Tree Protocol Spanning Tree Protocol (STP) Introduction Details Convergence Some more details Rapid Spanning Tree Protocol (RSTP) Cisco PVST, PVST+ Multiple Spanning Tree Protocol (MSTP)

More information

Routing in the Internet

Routing in the Internet ÉOLE POLYTEHNIQUE FÉÉRLE E LUSNNE Routing in the Internet Jean-Yves Le oudec 1 ontents. Introduction. Unicast Routing: istance Vector. Unicast Routing: Link State. Multicast Routing E. The Spanning Tree

More information

Implementation of the meshed tree algorithm on a switched network

Implementation of the meshed tree algorithm on a switched network Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 12-10-2016 Implementation of the meshed tree algorithm on a switched network Kuhu Sharma kxs3104@rit.edu Follow

More information