BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements.

Slides:



Advertisements
Similar presentations
BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS DEPARTMENT OF TELECOMMUNICATIONS AND MEDIA INFORMATICS BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Communication Networks Recitation 3 Bridges & Spanning trees.
Part 2: Preventing Loops in the Network
Ethernet Automatic Protection Switching (EAPS)
Spanning Tree Protocol
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
Request For Proposal (RFP) A request for proposal (RFP) is a solicitation made, often through a bidding process, by an agency or company interested in.
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Spanning Tree Protocol Enhancements.
Sept 14, 2004CS573: Network Protocols and Standards1 Spanning Tree Algorithm Network Protocols and Standards Autumn
RSTP vsSTP Instructors : Assoc ’ Prof ’ Reuven Cohen Mr. Itay Dabran Mr. Mordo Shalom Submitting : Danny Kalmar Gilad Wallach Omer.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
MUSE Winter School 2006 BE M Traffic Engineering in Ethernet-based Access Networks MUSE Winter School BB Europe Geneva December 11.
Spanning Tree Protocol
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – Chapter 2 Spanning tree Protocol 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5 Part.
Cisco 3 - Switch Perrine. J Page 110/3/2015 Chapter 7 How does STP provide a loop-free network? 1.By placing all ports in the blocking state 2.By placing.
1 Spanning Tree Algorithm Advanced Computer Networks.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
Cisco 3 – Switching STP Perrine. J Page 110/19/2015 Chapter 8 Spanning Tree Protocol (STP) Having redundancy in a network is important, and allows the.
S7C5 – Spanning Tree Protocol And other topics. Switch Port Aggregation Bundling –Combining 2 to 8 links of FE (Fast Ethernet) or GE (Gigabit) Full duplex.
Instructor & Todd Lammle
Spanning Tree V1.2 Slide 1 of 1 Purpose:
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
Implementing MST on a Large Campus Implementing MST in a Large Campus Environment February 13, 2007 Rich Ingram
Spanning Tree protocol
Topic 5 Spanning tree protocol
CO5023 LAN Redundancy.
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
1 RST _05_2001_c1 © 2001, Cisco Systems, Inc. All rights reserved. LAN Protocols Bill Dufresne SE-IV Cisco Systems CCIE, Content/Video Specialist.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Exploration 3 Chapter 5. Redundancy in Switched Networks Switches learn the MAC addresses of devices on their ports so that data can be properly forwarded.
Instructor Materials Chapter 3: STP
Implement Spanning Tree Protocols
Spanning Tree Protocol
3. Internetworking (part 2: switched LANs)
Spanning Tree Algorithm
Implement Spanning Tree Protocols
Lecture#10: LAN Redundancy
Configuring Catalyst Switch Operations
Spanning Tree Protocol
Implement Spanning Tree Protocols
© 2002, Cisco Systems, Inc. All rights reserved.
Spanning Tree Protocol
NT2640 Unit 9 Activity 1 Handout
Spanning Tree Protocol (STP)
COS 561: Advanced Computer Networks
Dr. Rocky K. C. Chang 23 February 2004
Implement Spanning Tree Protocols
Virtual LAN (VLAN).
Presentation transcript:

BUDAPEST UNIVERSITY OF TECHNOLOGY AND ECONOMICS Budapest University of Technology and Economics Verification of RSTP Convergence and Scalability by Measurements and Simulations István Moldován, Saad Abuguba, Csaba Lukovszki December 2006

WPC1 — 2 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Background  Metro Ethernet, Ethernet Access, Ethernet aggregation  All using Spanning Tree Protocol  In the LAN  No special requirements, just simplicity  In the provider’s network  Carrier grade requirements!  Carrier Grade Questions:  How fast is the restoration?  Does it scale?

WPC1 — 3 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics STP – Why needed?  Ethernet does not have TTL field  Loop protection is required  Spanning Tree Protocol reduces the active topology to a tree  Alternatives  Disable STP – not needed on tree topologies  VLAN based trees  VLAN topologies configured as p2p or p2mp connections  management is responsible for loop control  a configuration error becomes FATAL

WPC1 — 4 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Spanning Tree standards, problems  Basic STP – IEEE 802.1D – 1998  timer based operation  slow (~1minute restoration)  does not scale  Rapid STP– IEEE 802.1w – IEEE 802.1D  much faster  but still no upper bound on convergence  several problems revealed (like count to infinity)  Scalability?  Multiple STP – IEEE 802.1s  multiple regions  multiple trees within regions  scalable

WPC1 — 5 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Loop-free Connectivity Spanning Tree Basics  One root bridge per network  One root port per non-root bridge  One designated port per segment  Non-designated ports are blocked Root Port (Fwd): Port receiving the best BPDU for the bridge – shortest path to the Root in terms of path cost Designated Port (Fwd): Port sending the best BPDU on a segment Alternate Port (Disc): Port blocked by BPDUs from a different bridge – redundant path to the Root Backup Port (Disc): Port blocked by BPDUs sent from the same bridge – redundant path to a segment A B D R Root AB RR DD D AB

WPC1 — 6 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Bridge Protocol Data Unit (BPDU)

WPC1 — 7 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Proposal Block Proposal Agreement Forward Edge port Proposal Agreement Forward IEEE 802.1w sequence of events  Receive a proposal  Block all other non-edge ports  Send an agreement back  Put the new root port to forwarding  Send out proposals on other ports  Receive agreement from others  Put ports into forwarding

WPC1 — 8 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Simulations on convergence  We used OPNET Modeler 10.5 simulation tool  RSTP supported by default  RSTP standard compliance verified (bug removed)  Simulations on different resilient topologies  Dual Homing topologies  deep: multiple levels  wide: high aggregation  Ring topologies  Mixed ring and dual homing  Simulation objective: restoration time after failure

WPC1 — 9 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Dual-homing scenarios  Dual homing connections for resilience  Simulations with increasing number of layers  Traffic between node_5 and node_8  primary path fails  we measure restoration time Recovery happens almost instantaneously by accepting a proposal sent earlier on the other link We have found similar results for all investigated dual-homing topologies -no matter of the width, depth and failure location, since there is always an alternate port to the root

WPC1 — 10 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics RSTP restoration on ring topology  Different ring sizes  from 6-14  Different bridge BPDU processing times  BPDU/s  Recovery time observed  From port state changes Basically limited by the bridge BPDU processing time Measured BPDU processing time on real bridge: s, std. deviation of 0.001s

WPC1 — 11 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Hold Timer  TxHoldCount  At least one BPDU per HelloTime interval, and not more than (TxHoldCount + 1) BPDUs in one second  By Standard selectable  Between 1-10  The value of 1 introduces delays  Hello BPDU + other BPDU can not go in the same second

WPC1 — 12 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Count to infinity problem  Documented behavior  On failure of root long failover times  Several seconds!  Reason:  Old information persists and circulates  Until  message ages out or  Root path costs reaches maximum value Root

WPC1 — 13 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics RSTP scalability issues  Big ring  BPDU information ages  ports where BPDU ages out becomes forwarding (standard says so)  Two spanning trees formed!  2 roots LOOP CONDITION!

WPC1 — 14 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Maximum Bridge Diameter  IEEE 802.1D – 2004 does not contain this statement  Diameter limit is given by the value of Maximum Age value  20 by default, up to 40  Thus theoretically topologies with diameter up to 40 hops can be created  Diameter  distance from root!  Diameter = the maximum length path in the network  Important since in case of failure longer paths may be formed  2 trees, possible loops

WPC1 — 15 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Conclusions  RSTP convergence is limited by BPDU processing speed  Fast convergence in typical topologies (below 1 second)  No upper limit on convergence  Depends on topology and bridge BPDU processing speed  Vulnerable to count to infinity problem  Limited scalability  By default up to diameters of 20  Can be tuned up to 40 (theoretical limit)

WPC1 — 16 Broadband Europe, Geneva 2006 Budapest University of Technology and Economics Thank you for your attention! Questions?