Nirmala Shenoy, Daryl Johnson, Bill Stackpole, Bruce Hartpence Rochester Institute of Technology 1.

Slides:



Advertisements
Similar presentations
CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Advertisements

Communication Networks Recitation 3 Bridges & Spanning trees.
Part 2: Preventing Loops in the Network
Joining LANs - Bridges. Connecting LANs 4 Repeater –Operates at the Physical layer no decision making, processing signal boosting only 4 Bridges –operates.
SPANNING TREE PROTOCOL (STP) VARIANTS Rapid Spanning Tree Protocol (RSTP) -The reason behind the word «rapid» Multiple Spanning Tree Protocol (MSTP)
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
STP Spanning tree protocol. Trunk port : A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a specific.
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
MULTICASTING Network Security.
Sept 14, 2004CS573: Network Protocols and Standards1 Spanning Tree Algorithm Network Protocols and Standards Autumn
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Spanning Tree Protocol
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
Chapter 4: Managing LAN Traffic
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture 12: LAN Redundancy Switched Networks Assistant Professor Pongpisit.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
Connecting LANs, Backbone Networks, and Virtual LANs
TRansparent Interconnection of Lots of Links (TRILL) March 11 th 2010 David Bond University of New Hampshire: InterOperability.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – Chapter 2 Spanning tree Protocol 1.
CN2668 Routers and Switches (V2) Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 Spanning Tree Algorithm Advanced Computer Networks.
Example STP runs on bridges and switches that are 802.1D-compliant. There are different flavors of STP, but 802.1D is the most popular and widely implemented.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 22.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
© J. Liebeherr, All rights reserved 1 Multicast Routing.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
Configuring Cisco Switches Chapter 13 powered by DJ 1.
Click to edit Master subtitle style
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Routing and Routing Protocols
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
Switching Topic 6 Rapid spanning tree protocol. Agenda RSTP features – Port states – Port roles – BPDU format – Edge ports and link types – Proposals.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
Topic 5 Spanning tree protocol
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Ch. 15 Connecting LANs.
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
March th IETF - Prague1 TRILL Working Group Changes from draft-trill-rbridge-protocol-02.txt to draft-trill-rbridge-protocol-03.txt Dinesh Dutt,
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Single Area OSPF Module 2, Review How routing information is maintained Link-state routers apply the Dijkstra shortest path first algorithm against.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Exploration 3 Chapter 5. Redundancy in Switched Networks Switches learn the MAC addresses of devices on their ports so that data can be properly forwarded.
Instructor Materials Chapter 3: STP
Multi Node Label Routing – A layer 2.5 routing protocol
Spanning Tree Algorithm
Configuring Catalyst Switch Operations
NT2640 Unit 9 Activity 1 Handout
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Dynamic Routing and OSPF
Bridges and Link Layer Switches
Virtual LAN (VLAN).
Presentation transcript:

Nirmala Shenoy, Daryl Johnson, Bill Stackpole, Bruce Hartpence Rochester Institute of Technology 1

Objectives What is the problem to be solved Current Tree Solutions Meshed Trees Algorithm  How can it be used  Convergence  Multi Meshed Trees Why is the group Some operational scenarios  Link Failures  Packet forwarding  Broadcast 2

Apply meshed trees algorithm for loop free forwarding at layer 2 Leveraging properties of Multi Meshed Trees Candidate – Spanning Tree, Dijkstra Tree (IS-IS) 3

Current Tree algorithms – logically undo the mesh topology attributes Spanning Tree: Single tree rooted at a single bridge that touches all nodes (segments) once.  MSTP Dijkstra Tree: Every node is a root and has a tree that touches all nodes once. Meshed Tree: single root – several tree branches mesh– nodes / segments reside on several branches  Use the mesh topology capabilities to mesh the branches 4

Single Tree Algorithms  Messages reach all nodes to construct the tree  Link/node failure – tree resolve by sending messages  Link State – flood the topology changes  Run Dijkstra after Link State Database (LSDB) stabilizes  Back up paths can be constructed – overhead/complexity  convergence delays Meshed Trees Algorithm  Constructed using local messaging  Link/ Node failure – resolved locally  Tree branch pruned  without impacting frame forwarding  Without impacting other tree branches 5

Convergence time = Failure detection time + resolution time by protocol Failure detection time – depends on layer Resolution time by protocol  Meshed Trees – node that detects resolves locally  Local decision time  Bypasses frame forwarding through another branch  Prunes the broken branch  Transparent to rest of the network 6

Changes in topology  Tree has to be resolved  Messages are exchanged  Convergence time  RSTP – speeded convergence 7

IS-IS based SPB and TRILL on RBridges Link State Database Dijsktra algorithm Designated forwarder Still uses RSTP Complexity 8

9

Multiple trees/ tree branches from a single root Tree branches overlap at nodes Nodes reside on multiple branches / Fallback to another branch on link failure  No resolution impacts (a) Normal tree (b) Meshed tree (limited meshing) Root tree branch 1 tree branch 2 tree branch 3 10

Single root Multiple tree branches Tree construction uses local information Low overhead / quick resolution How to? Loop Avoidance Broadcasting Packet forwarding Resolution on Link Failure 11

Root bridge , , 1213 A B F E C D Uses a smart numbering scheme – Virtual IDs (VID) Assume A is root bridge – has BridgeID/ VID = 1 Hello messages, one-hop bridges decide to join the root – get a Virtual ID (VID) Advertising bridge – assigns VID to listening bridge by append Port number) VIDs are associated to ports on which the VID was acquired Packet take the path of VIDs – route – no loops 12

13

Root bridge , , 1213 A B F E C D To forward broadcast packets, packets to unknown destinations RULE (still working) Packets from non primary VID port - send on primary VID port Packet from primary VID port - send on all other ports where a child bridge has a primary VID derived from parent primary VIDs Send on all ports that have end nodes – Differentiate edge nodes/switches Edge nodes do not join the Meshed Tree 14

Root bridge , 1212 Primary VID Tree after Failure of Link CE/ Tree is pruned / Packet forwarding continues on backup VID 1. CE Link failure 2. Bridge E detects loss of VID Loss of VID 122 announced to ‘F’ 4. F invalidates VID 1221 E C , 1112, 1213 A B F D 15

16

17 Root ElectionSecurity 00 – Bridges will participate in dynamic election.00 – Default, non-secure 01 – Bridge cannot be a root 01 – Administratively assigned certificates 10 – 11 – Bridge is the designated root 11 –

18

19 Root bridge , , 1213 A B F E C D Let us Assume C is another root – C can remove the first digit from its shortest VID – prepend its BID. Is it necessary for every node to be a root – optimalilty?

Slides that follow are operational comparison with TRILL on RBridges Most arguments would apply to IS-IS based solutions. 20

Operates above layer 2 Uses IS-IS protocol  Compute pair-wise optimal paths between bridges To avoid inconsistencies and loops  Use hop counts Operation  Designated RBridge election (typical of link sate)  Learn membership of end nodes on that link  Egress Rbridge encapsulates all forwarding frames  Hop count in the header  Also calculate spanning tree for multicasting / unknown dest  End Station Address distribution – ESADI  used by RBridge to inform other RBridges of end node addresses connected on its link  An appointed forwarder responsible for loop avoidance  Blocks frame transmission when RBridge change is noticed 21

22

Replace with Meshed Tree algorithm ENVIRONMENT FRIENDLY – GREEN SWITCHING 23

FeatureTRILL on RbridgesMeshed Tree on Bridges Tree structure  One shortest path spanning tree originating at the root Rbridge  Each Rbridge is present on only one branch of a single tree originating from a root bridge  Several overlapped spanning trees with one of them being the shortest path spanning tree  Each bridge can reside on multiple branches of a single meshed tree originating from a root bridge Multiple trees originating at different bridges Possible Knowledge of network topology requiredNOT required Has Path Knowledge Flooding of topology messages requiredNOT required 24

 Action on link failure  Addition / removal of bridges and links  Generate link state updates and disseminate.  Flood topology control messages  Repair locally.  Inform bridges downstream that have a VID which is derived from the lost VID. Prune tree.  Build tree branches as nodes join Formation of temporary loops Yes. Loop is broken when hop count (6 bits in the header) reaches 0. Loop formation prevented – Path Vector Avoidance of loop formation Not completely avoided.Avoided using the numbering scheme – Path Vector Unicast frames (known destination address)  Forwarded on pair-wise optimal paths determined by the link state routing protocol if ESADI is used.  Next hop path should be specified.  Encapsulated in TRILL header  Every Rbridge that forwards decapsulates and encapsulates again  As per optimization 1, neighboring bridges can forward directly to the appropriate port.  Forwarded on the optimal path decided by primary VID tree at the originating bridge.  During the path – when packet reaches a bridge that has knowledge – forwarded directly 25

Multicast traffic Unicast frames (destination unknown)  Forwarded on distribution trees, using multi path to multi destination.  Tree pruning advised ( no specifications provided)  Can follow the current process using multicast addresses at layer 2.  Meshed tree at originating bridge can be used as explained End node address learning  Open the internal Ethernet frame to determine the source address  Use ESADI protocol and inform all RBRridges  Learn from source address as no encapsulation is used  Can use ESADI protocol Computing complexity (Dijkstra’s algorithm)  O(n 2 ) in a dense network for node selection with ‘n’ nodes.  O(m) for edge (link) updates with ‘m’ edges  O(m log n) by using an adjacency list representation and a partially ordered tree data structure for organizing the set of edges. Convergence or decision making iteration is of O(1) on every new VID that is heard. Greener Solution Less control traffic Less computation 26

Implementations  Dynamic nickname protocol to reduce TRILL header  Topology control message dissemination  Encapsulation and de-encapsulation at forwarding Rbrdiges. Every transit frame has to be encapsulated with an external Ethernet header. Overhead per encapsulation equals 144 bits  End Station Address Dissemination (ESADI) protocol is optional  Election of a designated Rbridge per link  Designated VLAN required for Rbridge communication  Differentiate between IS_IS at layer 2 and layer 3  Requires ‘reverse path forwarding check” to control looping traffic  Replace the ST algorithm with the MT algorithm.  Define software to run the MT algorithm  Works on the same principle as STA. VIDs will be sent in BPDUs. 27

Ad hoc joining mode – non-secure Configured joining mode – secure mode  Key distribution BPDUs will be encrypted False BPDU injection avoided Designated root failure / compromised 1 hop bridges by default will be backup Monitor root bridge 28

Questions and Discussions 29

C may join under D with VID 1113 It will not join under 121 – as 12 is its VID , 121 A B C D Root bridge