The Spanning Tree Protocol

Similar documents
Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP and RSTP

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+

Configuring Rapid PVST+

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments

Some portions courtesy Srini Seshan or David Wetherall

Spanning Tree Protocol

Configuring Spanning Tree Protocol

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

EIGRP Features and Operation

Chapter 5: STP. * What is STP? How does STP work?

Understanding Issues Related to Inter VLAN Bridging

CSE 123A Computer Networks

Spanning Tree Protocol(STP)

Cisco Exam Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ]

Transparent Bridging and VLAN

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Objectives. 1. Introduction:

Bridging Transmitting Non-IP Traffic or Merging Two Networks

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

STP (Spanning Tree Protocol) - Step by Step Configuration Tutorial

Configuring Spanning Tree Protocol

Implement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008

Configuring Spanning Tree

Spanning-Tree Protocol

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee

Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration?

Configuring STP and Prestandard IEEE 802.1s MST

isco Understanding Spanning Tree Protocol Topology Chan

Configuring MST Using Cisco NX-OS

Token Ring VLANs and Related Protocols

Buy full file at

Chapter 4 Configuring Switching

Configuring Spanning Tree Protocol

Lecture 10: Internetworking"

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

Implementing Spanning Tree Protocol

Lecture 9: Bridging & Switching"

Spanning Trees and IEEE 802.3ah EPONs

Introduction to OSPF

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)

Lecture 8: Networks to Internetworks

CSE 461: Bridging LANs. Last Topic

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

Understanding and Configuring STP

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Improving network convergence with Multiple Spanning Tree Protocol

Configuring Optional Spanning-Tree Features

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Chapter 5. Spanning Tree Protocol (STP) Part I

Layer 2 Engineering Spanning Tree

802.1AS Fast Master Clock Selection

Spanning-Tree Protocol

Top-Down Network Design

Packet Switching on L2 (LAN Level)

PrepKing. PrepKing

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

Chapter. Managed Switch Software Monitoring. In This Chapter...

Top-Down Network Design

MSTP Technology White Paper

Spanning Tree Configuration

NetWare Link-Services Protocol

Communication Redundancy User s Manual

Advanced Computer Networks

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

4 Spanning Tree Protokoll 802.1D-2004

Traditional network management methods have typically

CSEP 561 LAN Switches. David Wetherall

Packet Switching on L2 (LAN Level)

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Lecture 9: Switched Ethernet Features: STP and VLANs

CCNA Layer 2 switching. Revision no.: PPT/2K605/03

SPANNING TREE PROTOCOL GUIDE FOR ARAKNIS NETWORKS EQUIPMENT

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CIS 83 Lab Assignment

Lab 6 Spanning Tree Protocol

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Token Ring VLANs and Related Protocols

Table of Contents 1 MSTP Configuration 1-1

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38

Configuring Transparent Bridging

Switching and Forwarding

RSTP Configuration. Page 1 of 26

Moxa Managed Ethernet Switch Redundancy Protocol (UI 2.0) User s Manual

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents

PASS4TEST IT 인증시험덤프전문사이트

Transcription:

Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009

Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description Control protocol 3 Port states Ageing and hello packets Electing root Managing ports

Introduction Local intertnetworking Local internetworking Motivations We have local internetworking when we want to connect a set LANs e.g. within the same company This can be done at network level (with routers) or at Data Link level (with Bridges) Connecting at Data Link level allows any protocol at Network level (IP or others) If the LANs use different standards several problems arise (See Tanenbaum, Computer Networks, Sec. 4.7.1) We consider the case of 802.3 LANs

Transparent bridges Introduction Local internetworking Motivations Transparent Bridges are used to connect different LANs They do not need configuration They learn the network topology by the analysis of the traffic (backward learning) They use a dynamic table to keep the pairs destination/output lines They react to changes in the network topology When they don t know where they have to forward a message they apply the flooding over all the lines

Example Introduction Local internetworking Motivations

Purposes Introduction Local internetworking Motivations In order to increment the dependability of LAN inter-connections redundant bridges are often used This causes loops in the LAN topology flooding interrupts connectivity Spanning tree protocol (STP)... Avoids loops by reducing network connectivity Reacts to changes in the network topology (either good news or bad news) Is completely transparent to the user STP implements fault tolerance at data link level!

Preliminaries Introduction High level description Control protocol The network topology is seen as a graph The net segments are the nodes Bridge connections are the edges Edge weights depends on the characteristics of the network between the bridges The spanning tree is sub-graph of this graph that... has the same set of nodes has not any loop in the topology The algorithm will not compute the minimum spanning tree The algorithm computes the minimum spanning tree given a root node (just like Prim s algorithm)

Phases Introduction High level description Control protocol 1 Select a root bridge (attention! Are bridges nodes or edges?) 2 Determine the least cost path from each bridge/network to the route bridge Attention to ties! 3 Disable unused edges

Port states Introduction High level description Control protocol A port in the bridge is in one of the following states: Blocked Root Designated Blocked ports do not forward or receive any data message, but just control messages

Introduction Selecting the root bridge High level description Control protocol The system administrator assigns to each bridge a priority The bridge with the lowest priority is the root bridge In case of same priority, the bridge with the lowest MAC address is selected

Introduction High level description Control protocol Least cost from the bridge to the root Every bridge determines the lowest cost path to the root Use of the Bellman principle of optimality The root port of the bridge is the port connecting the bridge to the root using the lowest cost path

Introduction High level description Control protocol Least cost from the network segment to the root All the bridges connected to the same LAN segment decide which has the lowest cost path to the root The port connecting the LAN segment to the right bridge becomes the designed port for that segment All the ports that are not designed or root become blocked

Breaking ties Introduction High level description Control protocol Breaking ties for root ports Two or more bridges give the same cost path to the root The root port is the port connecting to the bridge with the lowest id Breaking ties for designated ports Two or more bridges give the same cost path from a network segment to the root The designated port is that of the bridge with the lowest id

Introduction What does a bridge know? High level description Control protocol When the bridge are switched on, they don t know the network topology! We don t want the system administrator to configure nothing but the priorities of the bridges and the cost of the LAN segments Need a control protocol

Introduction High level description Control protocol Bridge Protocol Data Units (BPDUs) BPDUs are special frames Source address is the source port Destination address is the destination port or a special multicast address 01:80:C2:00:00:00:00 Three types of messages 1 Configuration (C)BPDU 2 Topology change notification (TCN)BPDU 3 Topology change notification acknowledge (TCA)BPDU BPDUs are exchanged regularly (default every 2 seconds)

Introduction Adding the learning states High level description Control protocol A port can then be in one of the following states: Blocking Listening: The switch processes BDPUs and acquires information about the network topology Learning: The switch port does not forward messages yet but starts to acquire addresses Forwarding: the port receives and sends data and BDPUs

State of the ports Introduction Port states Ageing and hello packets Electing root Managing ports Forwarding Backup (blocking) PRE-Forwarding (not yet forwarding but ready to become) PRE-BACKUP (not yet backup but ready to become)

HELLO messages Introduction Port states Ageing and hello packets Electing root Managing ports HELLO messages are transmitted by the designed bridges to all the other bridges They are transmitted regularly A HELLO message contains: Transmitting bridge ID SourceId ID of the bridge assumed to be root RootId Distance from the assumed root DistanceRoot Age of the HELLO (time since last information from the root arrived) Age Link identifier (local to the transmitter) MAX-AGE

Introduction Managing ages of HELLO Port states Ageing and hello packets Electing root Managing ports Root node sends HELLO with age 0 When a designated bridge receives a HELLO it updates its age since last communication from root with the age of the packet: ThisBridge.Age ReceivedHello.Age ThisBridge.Age is kept updated as time passes When Packet.Age > MAX-AGE the HELLO must be discarded and contact to the root is assumed to be lost

Election of the root Introduction Port states Ageing and hello packets Electing root Managing ports Initially a bridge assumes to be root ThisBridge.Root ThisBridge.id, ThisBridge.age 0 It broadcast packets with age 0, RoodId ThisBridge.id, DistanceRoot 0 When a bridge receives a hello packed Hello it compares ThisBridge.root with Hello.Root: <: do nothing >: ThisBridge.root Hello.Root and ThisBridge.DistanceRoot Hello.DistanceRoot + 1 =: if ThisBridge.DistanceRoot > Hello.DistanceRoot + 1 then ThisBridge.DistanceRoot Hello.DistanceRoot + 1

Introduction Election of the designated bridge Port states Ageing and hello packets Electing root Managing ports A bridge assumes to be the designated bridge on each on its link It sends HELLO packets communicating all the other bridges on the link its known root, and the distance to it When a bridge receives a HELLO from a LAN segment in which a bridge claims to be closer to the root or with same distance but smaller ID, then the bridge stop sending hello packets on that LAN and renounce to be a designated bridge for that LAN

Introduction Port states Ageing and hello packets Electing root Managing ports Using HELLO messages to check the topology The root broadcasts hello packets regularly They are forwarded by the bridges which also updates they Age status A designated bridge can send a HELLO in a LAN segment when it receives a HELLO packet HELLO in which Age is greater than MAX-AGE are discarded so errors in network topology can be identified

Introduction Transitions among link states Port states Ageing and hello packets Electing root Managing ports

Introduction Transition events for root Port states Ageing and hello packets Electing root Managing ports Upon startup a bridge sets all its link to PRE-FORWARDING and claims to be Root and designated bridge on every port When the information about root are expired the bridge tries to become root Arrival of a HELLO message with a good Age and better information about root (a new root, or a better distance) Distance to root is recomputed The bridge may be not anymore a designated bridge for a LAN After a delay transitions from PRE-FORWARDING to FORWARDING and from PRE-BACKUP to BACKUP occur

Introduction Port states Ageing and hello packets Electing root Managing ports Transition events for non-root for the root-port or designated-port The root (designated) port has to be set to FORWARDING If the actual state is FORWARDING or PRE-BACKUP it is changed to FORWARDING If the actual state is PRE-FORWARDING nothing is done If the actual state if BACKUP it is changed to PRE-FORWARDING

Introduction Port states Ageing and hello packets Electing root Managing ports Transition events for non-root for the other ports The port has to be set to BACKUP If the actual state is BACKUP or PRE-FORWARDING it is changed to BACKUP If the actual state is PRE-BACKUP nothing is done If the actual state is FORWARDING it is changed to PRE-BACKUP

Data traffic Introduction Port states Ageing and hello packets Electing root Managing ports Data traffic in FORWARDING ports is treated as for standard transparent bridges Data traffic in PRE-FORWARDING and PRE-BACKUP is examined only for source addresses Data traffic is forwarded in FORWARDING and PRE-BACKUP states Data traffic is ignored in BACKUP state

Conclusion Introduction Port states Ageing and hello packets Electing root Managing ports Allow interconnection of LANs with redundant bridges Self-configuring Low memory requirements and bandwidth usage Minimizes the probability of transient loops The algorithms allow the specification of parameters