The Analysis of the Message by the Bridge: The check of Backup port The analysis of the CST information in the message.The analysis of the CST information.

Slides:



Advertisements
Similar presentations
Multiple Spanning Trees Shyam Kaluve ( ) IEEE 802.1s 05/21/2001 St. Louis Interim.
Advertisements

Communication Networks Recitation 3 Bridges & Spanning trees.
Part 2: Preventing Loops in the Network
Joining LANs - Bridges. Connecting LANs 4 Repeater –Operates at the Physical layer no decision making, processing signal boosting only 4 Bridges –operates.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Fundamentals of Computer Networks ECE 478/578 Lecture #13: Packet Switching (2) Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Connecting LANs: Section Figure 15.1 Five categories of connecting devices.
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—3-1 Implementing Spanning Tree Spanning Tree Protocol Enhancements.
Sept 14, 2004CS573: Network Protocols and Standards1 Spanning Tree Algorithm Network Protocols and Standards Autumn
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Layer 2 Switching. Overview Introduction Spanning Tree Protocol Spanning Tree Terms Spanning Tree Operations LAN Switch Types Configuring Switches.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Connecting LANs, Backbone Networks, and Virtual LANs
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
Routing and Routing Protocols Dynamic Routing Overview.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
Cisco 3 - Switch Perrine. J Page 110/3/2015 Chapter 7 How does STP provide a loop-free network? 1.By placing all ports in the blocking state 2.By placing.
1 Spanning Tree Algorithm Advanced Computer Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
© UNIVERSITY of NEW HAMPSHIRE INTEROPERABILITY LABORATORY The Multiple Spanning Tree Protocol 802.1Q
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Scaling Broadcast Ethernet Some slides used with.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Spanning Tree V1.2 Slide 1 of 1 Purpose:
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
Implementing MST on a Large Campus Implementing MST in a Large Campus Environment February 13, 2007 Rich Ingram
Topic 5 Spanning tree protocol
CO5023 LAN Redundancy.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Instructor Materials Chapter 3: STP
Spanning Tree Protocol
The Underlying Technologies
Advanced Computer Networks
3. Internetworking (part 2: switched LANs)
Spanning Tree Algorithm
Lecture#10: LAN Redundancy
Spanning Tree Protocol
Spanning Tree Protocol
LAN switching and Bridges
NT2640 Unit 9 Activity 1 Handout
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Spanning Tree Protocol (STP)
LAN switching and Bridges
Dr. Rocky K. C. Chang 23 February 2004
LAN switching and Bridges
Presentation transcript:

The Analysis of the Message by the Bridge: The check of Backup port The analysis of the CST information in the message.The analysis of the CST information in the message. The analysis of the other MSTIs information in the message.The analysis of the other MSTIs information in the message.

performed for the CST and MSTIs together. If the message is from this bridge, the only thing the message is used for is to determine if the port should become a backup port. The comparison is between: –The cost of the ports –The priority of the ports –The id of the ports

If the message claims the CST root is “worse” than the root the bridge holds – a message is sent and this message is ignored. The bridge determines port roles for the CST. Determining whether the bridge has a Master port or not.Master port

The port is a MasterPort: 1) the port is a root port 2) the message is from another region The port is no longer a Master port: 1)the port is no longer a root port 2)the message that changed the port is from the bridge region (the IST root of the Bridge initialized by message) When a bridge finds out it has a Master Port: it claims to be the “IST root” of its’ region. initializes its’ data. sends a message announcing that the IST root in the region has changed Bridge1 Config 1 Bridge3 Config 2 Bridge2 Config 2 R R

The bridge checks if the message is not from its’ region If the message is from outside the region: – The information on the MSTIs is ignored. If the message is from inside the region: –If the message announces of a new IST root in the region: the bridge initializes its’ data. –Else: the bridges determines the port roles for its’ ports in all of the different MSTIs.

The Message class string m_ISTroot int* m_BridgePrio ROLE* m_PortRoles int m_PortId string* m_root int* m_RootPrio int* m_PathCost string m_config string m_mac

int m_PortId ROLE* m_roles int* m_priority queue m_NewMsg Port* m_port Int* m_cost HARDWARE m_ConnectedTo int m_LanId The Port Class string m_BridgeConfig int m_BridgeId string m_ISTroot string m_mac string m_OutOfRegionBridge bool m_OutOfRegion int* m_BackupTo

string m_name int m_NumPorts int* m_priority int m_id string m_mac string m_config int m_region Port* m_ports bool m_MasterPort int* m_MinCost string m_ISTroot string* m_RootMac int* m_RootPrio int* m_RootPort The Bridge class

int m_LanId int m_PortsNum list m_ports The Lan Class

MSTP (802.1s) Multiple Spanning Tree Protocol

Topics Introduction –What is MSTP. –Benefits of MSTP to previous protocols. The distributed algorithm –MSTP BPDUs –Port roles –Implementation

Topics (cont.) The Non-distributed algorithm –How the algorithm finds the network topology and tree –Main parts of the algorithm –Implementation details

Topics (cont.) The Presenter™ –Overview –Input file (Input.txt) –Parser –Drawing builder –Drawer –User configuration

Introduction

What is MSTP? The network divided into regions, each region performs as a super-bridge in the main tree (CST) Each region contains all interconnected bridges and LANs that have the same MSTP Configuration (a LAN is considered in the same region as the bridge designated on that LAN in MSTI 0) –An alphanumeric configuration name (32 bytes) –A configuration revision number (two bytes) –A 4096-element table that associates each of the potential 4096 VLANs supported to a given instance

What is MSTP? Inside each region 16 (CISCO) spanning trees are generated and are referred as MSTIs (MST Instances) MSTI 0 also know as the IST (Internal Spanning Tree). The IST root has a special port that can send frames to other regions (Master Port). The MSTP BPDU is the regular TSTP BPDU with additional data at its end. The MSTP part of the BPDU will not leave the region (boundary ports will not transmit that part)

Benefits of MSTP to previous protocols Enables load balancing by forwarding messages on different paths. Less data to store and “spares” the CPU for each switch. System administrator can configure better paths for certain connections.

The distributed Algorithm

The Data Structures used: – Message classMessage class – Port classPort class – Bridge classBridge class – Lan classLan class

Main Global Parameters: – A list of Bridges: BridgeList – An array of Lans: LanArray

The Driving Mechanism: Initializing The Global Parameters By the file argv[1] (user parameter) Do for every Bridge B – send an “I am root” message on all the designated ports (which are all his ports).

Until there are no changes in the system – For each Bridge B go through all its’ ports and handle the new messages.go through all its’ ports and handle the new messages. Print the results to argv[2] (user parameter)

–Backup Port A message is received from the bridge itself –Root Port A message is received with a better root A message is received with the same root –Designated Port Initialization A message with a better path cost to root A message with the same path cost to root –Alternate Port The port it not backup, not root port and not designated The port is a Master Port – in the MSTIs The port is connected to a LAN or a bridge in a different region

Non-Distributed Algorithm

General Idea General representation of the algorithm –Separating the network into regions. –Reduction to shortest path problem. –Executing Dijkstra algorithm. –Determining spanning tree topology.

Dijkstra Computes in a graph G=(V,E) shortest paths from a source vertex s to all other vertices in V. We denote the weight of edge (u,v) by Wuv. Let u be a vertex in T so that d[u] is minimum For all

Main parts of implementation Analyzing the input file. Adding LANs. Separating the network into regions (building the CST). Reduction to Dijkstra. Dijkstra. Defining ports roles for root and designated ports. Calculating cost to root per bridge. Defining port roles. Writing to GUI. Repeat for each region and for each MSTI.

Implementation details separating the network into regions: Creating the CST: the entire network is considered to be one region. Separating the network into Regions: The root of CST gets 0 as region number. BFS algorithm is applied on the CST tree. For each Region, a vector of Bridge* is created

Implementation details Reduction to shortest path problem Every connection between bridge and LAN or between two bridges is converted to two opposite directed arcs. Each arc directed from bridge to LAN gets the weight of 0. Each arc directed from LAN vertex to bridge vertex gets the weight of the port cost. Each arc directed from bridge vertex to another bridge vertex gets the weight of the port cost of the bridge that is represented by the arc’s end.

Implementation details defining port roles for all Port that connects father to son in tree is designated, port that connects son to father is root port. All ports that are not root port nor designated and connect bridge to LAN are back up ports. All ports that connect two bridges that are in son-father or father-son relation and not signed yet are alternate ports. For all other yet not-signed ports special condition is checked.

The Presenter™

Overview Input file Translato r Input.txt Drawing builder Drawing Drawing Instructions Drawer Presenter™

Input file Includes bridge information per MSTI –Each bridge record includes: MAC Address Name Region Port roles per MSTI –16 MSTIs where MSTI 0 represents the CST –Specifications file included

Parser Single pass reader Generates internal tables –Bridge to bridge connections (per MSTI) –Bridge to LAN connections (per MSTI) –Bridge to region mapping –LAN to region mapping Stores costs and connection types Stores extra bridge information (i.e. Name)

Drawing Builder 3 Types of trees –CST Generated by comparing regions of LANs and bridges on their active connections. –Regional Tree Generated by reading the connections within a region. Each bridge and LAN is given a layer in the drawing. All MSTIs are created. –Super Tree Generated by disregarding the regions in the Regional Tree algorithm. Allows viewing the connections between the regions.

Drawing Builder (cont.) Generates Drawing Instructions –Each MSTI has its own drawing instructions. –Calculated once for each window. –Include information about the default positions of the bridges and the LANs and about the connection types and costs. Also includes bridge information to display.

Drawer Displays the tree components on screen using the drawing instructions. Displays various connection types with different colours and styles and writes the costs. Displays bridge and LAN information as a hint and in the status-bar (pressing Ctrl will show it on the drawing area). Allows repositioning the tree components (the labels and connections are redrawn automatically to accommodate the changes) Easy to scroll through MSTIs Allows comparison of MSTIs, regions and even different topologies.

User configuration MSTP.ini file –Allows to change to colours of all connection types. –Allows to change the widths of all connection types. –Allows to change the default distance between bridges. –Auto created on startup..BMP files –Bridge image is dynamically loaded from bridge.bmp file (root bridge image is loaded from rootbridge.bmp file and it must be the same width and height as the bridge.bmp image). –LAN image is dynamically loaded from lan.bmp file.

Frame forwarding algorithm Frame received without error on port x Destination found in forwarding databases Calculate frame's VLAN and MSTI Is x blocking on that MSTI? Discard frame yes no yes Send frame on every forwarding port != x (including Master port) no x is the destination port for this message yes Discard frame Forward frame on the indicated port no

END