© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture 12: LAN Redundancy Switched Networks Assistant Professor Pongpisit.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Advertisements

CCNA3 v3 Module 7 v3 CCNA 3 Module 7 JEOPARDY K. Martin.
Part 2: Preventing Loops in the Network
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement VTP LAN Switching and Wireless – Chapter 4.
1 CCNA 3 v3.1 Module 7. 2 CCNA 3 Module 7 Spanning Tree Protocol (STP)
Spanning Tree protocol- Chapter 5
Spanning Tree Protocol
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Introducing Spanning Tree Protocol.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Layer 2 Switching. Overview Introduction Spanning Tree Protocol Spanning Tree Terms Spanning Tree Operations LAN Switch Types Configuring Switches.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: LAN Redundancy Scaling Networks.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning-Tree Protocol Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – Chapter 2 Spanning tree Protocol 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols LAN Switching and Wireless – Chapter 5 Part.
Cisco 3 - Switch Perrine. J Page 110/3/2015 Chapter 7 How does STP provide a loop-free network? 1.By placing all ports in the blocking state 2.By placing.
Sybex CCNA Chapter 8: Layer-2 Switching Instructor & Todd Lammle.
Instructor & Todd Lammle
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Switching and Wireless Implement Spanning Tree Protocols (STP) Chapter.
Steffen/Stettler, , 4-SpanningTree.pptx 1 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 802.1D-2004 Prof. Dr. Andreas Steffen Institute for.
Cisco 3 – Switching STP Perrine. J Page 110/19/2015 Chapter 8 Spanning Tree Protocol (STP) Having redundancy in a network is important, and allows the.
Switching Basics and Intermediate Routing CCNA 3 Chapter 7.
LOGO Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Local Area Network (LAN) Layer 2 Switching and Virtual LANs (VLANs) Chapter 6.
Configuring Cisco Switches Chapter 13 powered by DJ 1.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 7: Layer 2 Switching.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Instructor & Todd Lammle
Spanning Tree V1.2 Slide 1 of 1 Purpose:
STP LAN Redundancy Introduction Network redundancy is a key to maintaining network reliability. Multiple physical links between devices provide redundant.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols-PART-I LAN Switching and Wireless – Chapter.
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
CCNP 3: Chapter 3 Implementing Spanning Tree. Overview Basics of implementing STP Election of Root Bridge and Backup Enhancing STP RSTP MSTP EtherChannels.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Switching in an Enterprise Network Introducing Routing and Switching in the.
CCNA3-1 Chapter 5-1 Chapter 5 Spanning Tree Protocol (STP) Part I.
Spanning Tree protocol
Topic 5 Spanning tree protocol
CO5023 LAN Redundancy.
Chapter 5: Link Aggregation
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—1-1 Configuring Catalyst Switch Operations Identifying Problems That Occur in Redundant Switched.
Copyright 2003 CCNA 3 Chapter 8 Spanning Tree Protocol By Your Name.
Lecture3 Secured Network Design W.Lilakiatsakun.  Spanning Tree Protocol (STP)  Attack on Spanning Tree Protocol Topics.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Spanning Tree Protocols (STP) LAN Switching and Wireless – Chapter.
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
Exploration 3 Chapter 5. Redundancy in Switched Networks Switches learn the MAC addresses of devices on their ports so that data can be properly forwarded.
Instructor Materials Chapter 3: STP
Implement Spanning Tree Protocols
Spanning Tree Protocol
Implement Spanning Tree Protocols-PART-I
Implement Spanning Tree Protocols
Spanning Tree Protocols
Instructor & Todd Lammle
Lecture#10: LAN Redundancy
Configuring Catalyst Switch Operations
Spanning Tree Protocol
Implement Spanning Tree Protocols
© 2002, Cisco Systems, Inc. All rights reserved.
Spanning Tree Protocol
NT2640 Unit 9 Activity 1 Handout
CCNA Routing and Switching Scaling Networks v6.0
Spanning Tree Protocol (STP)
Cisco networking CNET-448
Implement Spanning Tree Protocols
Presentation transcript:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Lecture 12: LAN Redundancy Switched Networks Assistant Professor Pongpisit Wuttidittachotti, Ph.D. Faculty of Information Technology King Mongkut's University of Technology North Bangkok (KMUTNB)

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter Introduction 4.1 Spanning Tree Concepts 4.2 Varieties of Spanning Tree Protocols 4.3 Spanning Tree Configuration 4.4 First-Hop Redundancy Protocols 4.5 Summary

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Chapter 4: Objectives  Describe the issues with implementing a redundant network.  Describe IEEE 802.1D STP operation.  Describe the different spanning tree varieties.  Describe PVST+ operation in a switched LAN environment.  Describe Rapid PVST+ operation in a switched LAN environment.  Configure PVST+ and Rapid PVST+ in a switched LAN environment.  Identify common STP configuration issues.  Describe the purpose and operation of first hop redundancy protocols.  Describe the different varieties of first-hop redundancy protocols.  Use Cisco IOS commands to verify HSRP and GLBP implementations.

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Spanning Tree Concepts

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Redundancy

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Redundancy Redundant paths create loops in the network. How are they controlled? Spanning Tree Protocol How are they controlled? Spanning Tree Protocol

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Purpose of Spanning Tree Issues with Layer 1 Redundancy: MAC Database Instability  If there is more than one path for the frame to be forwarded out, an endless loop can result.  Ethernet frames do not have a Time to Live (TTL) attribute.  Frames on a switched network, they continue to propagate between switches endlessly.  This continued propagation between switches can result in MAC database instability.

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Issues with Redundancy PC1 sends a broadcast. S2 receives the frame and updates the MAC table. S2 floods the broadcast out all ports except the receiving port. S3 and S1 update their MAC tables S3 and S1 now flood the broadcast. S3 and S1 update their MAC tables with the wrong information S3 and S1 forward the broadcast back to S2. S2 updates its MAC table with the wrong information S2 floods the broadcast again S3 and S1 update their MAC tables again with the wrong information Issues with Redundancy

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Issues with Redundancy  Broadcast Storms: PC1 sends a broadcast No STP so a loop is created PC4 sends a broadcast Another loop PC3 sends a broadcast and creates yet another loop PC2 sends a broadcast Because of the high level of traffic, it cannot be processed. In fact, the entire network can no longer process new traffic and comes to a screeching halt.

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Issues with Redundancy  Duplicate Unicast Frames: PC1 sends a unicast frame to PC4 S2 has no entry for PC4 so the frame is flooded out the remaining ports Both S3 and S1 have entries for PC4 so the frame is forwarded S1 also forwards the frame it received from S3 End result…. PC4 receives two copies of the same frame. One from S1 and one from S3. End result…. PC4 receives two copies of the same frame. One from S1 and one from S3.

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Real-World Redundancy Issues  Loops in the Wiring Closet: Usually caused by an error in cabling.

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Operation Spanning-Tree Algorithm: Introduction  STP ensures that there is only one logical path between all destinations on the network by intentionally blocking redundant paths that could cause a loop.  A port is considered blocked when user data is prevented from entering or leaving that port. This does not include bridge protocol data unit (BPDU) frames that are used by STP to prevent loops.  The physical paths still exist to provide redundancy, but these paths are disabled to prevent the loops from occurring.  If the path is ever needed to compensate for a network cable or switch failure, STP recalculates the paths and unblocks the necessary ports to allow the redundant path to become active.

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Spanning-Tree Algorithm (STA)  Terminology: Root Bridge: A single switch used as the reference point for all calculations. Root Ports: The switch port closest to the root bridge. Designated Port: All non-root ports that are still permitted to forward traffic on the network. Non-designated Ports: All ports configured to be in a blocking state to prevent loops.

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Spanning-Tree Algorithm (STA)  STP uses the Spanning Tree Algorithm (STA) to determine which switch ports on a network need to be configured for blocking to prevent loops. Through an election process, the algorithm designates a single switch as the root bridge and uses it as the reference point for all calculations. The election process is controlled by the Bridge-ID (BID). Bridge Priority MAC Address

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Root Bridge  Election Process: All switches in the broadcast domain participate. After a switch boots, it sends out Bridge Protocol Data Units (BPDU) frames containing the switch BID and the root ID every 2 seconds. The root ID identifies the root bridge on the network. By default, the root ID matches the local BID for all switches on the network. In other words, each switch considers itself as the root bridge when it boots.

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Root Bridge  Election Process: As the switches forward their BPDU frames, switches in the broadcast domain read the root ID information from the BPDU frame. If the root ID from the BPDU received is lower than the root ID on the receiving switch, the receiving switch updates its root ID identifying the adjacent switch as the root bridge. The switch then forwards new BPDU frames with the lower root ID to the other adjacent switches. Eventually, the switch with the lowest BID ends up being identified as the root bridge for the spanning-tree instance.

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Best Path  Now that the root bridge has been elected, the STA starts the process of determining the best paths to the root bridge from all destinations in the broadcast domain.  The path information is determined by summing up the individual port costs along the path from the destination to the root bridge.  The default port costs are specified by the IEEE and defined by the speed at which the port operates. Link Speed Cost 10Gbps2 1Gbps4 100Mbps19 10Mbps100

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Best Path  You are not restricted to the defaults. The cost of a path can be manually configured to specify that a specific path is the preferred path instead of allowing the STA to choose the best path. Realize, however, that changing the cost of a particular path will affect the results of the STA. The ‘no’ form of the following command will return the cost to its default value. switch(config)#interface fa0/1 switch(config-if)#spanning-tree cost [value] switch(config-if)#end

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Best Path  Verifying the port and path cost. Port Cost Path Cost

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Operation Spanning-Tree Algorithm: Port Roles

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Operation Spanning-Tree Algorithm: Root Bridge

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Operation Spanning-Tree Algorithm: Path Cost

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Operation 802.1D BPDU Frame Format

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Operation BPDU Propagation and Process

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Operation Extended System ID

Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Port Roles  The root bridge is elected for the spanning-tree instance.  The location of the root bridge in the network topology determines how port roles are calculated. Root Port: The switch port with the best path to forward traffic to the root bridge. Designated Port: The switch port that receives and forwards frames toward the root bridge as needed. Only one designated port is allowed per segment. Non-designated Port: A switch port that is blocked, so it is not forwarding data frames.

Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Port Roles  The STA determines which port role is assigned to each switch port.  To determine the root port on a switch: The switch compares the path costs on all switch ports participating in the spanning tree. When there are two switch ports that have the same path cost to the root bridge: The switch uses the customizable port priority value, or the lowest port ID to break the tie. The port ID is the number of the connected port.

Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Port Roles – Root Port  For Example: Default Port Priority = 128 F0/1 and F0/2 have the same path cost (19). F0/2 Priority = 128,2 F0/1 Priority = 128,1

Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Port Roles – Root Port  You can specify the root port: Configure Port Priority: Priority values , in increments of 16. Default port priority value is 128. The lower the port priority value, the higher the priority.

Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential Port Roles – Root Port  Verifying the Port Priority:

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Varieties of Spanning Tree Protocols

Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Overview List of Spanning Tree Protocols  STP or IEEE 802.1D-1998  PVST+  IEEE 802.1D-2004  Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w  Rapid PVST+  Multiple Spanning Tree Protocol (MSTP) or IEEE 802.1s

Presentation_ID 33 © 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential STP Overview Spanning Tree Protocol Characteristics