Beruflich Dokumente
Kultur Dokumente
Perrine / Brierley
Chapter 7
05/27/15
Page 1
Chapter 7
Spanning Tree Protocol (STP)
Broadcast storms
2.
3.
Perrine / Brierley
05/27/15
Page 2
Chapter 7
Spanning Tree Protocol (STP)
What is redundancy?
Ideally for business, it is 24/7 uptime. Though this is some what impossible,
so business are looking for 5 nines, 99.999%. Which would be 5.25
minutes of downtime per year!
The goal of redundant topologies is to eliminate network outages that are
caused by a single point of failure.
So if you have redundant switches for reliability, then until the switches
learn the MAC address of all devices, this topology will cause:
Broadcast storms
Perrine / Brierley
05/27/15
Page 3
Chapter 7
Spanning Tree Protocol (STP)
Perrine / Brierley
05/27/15
Page 4
Chapter 7
Spanning Tree Protocol (STP)
Server/host
switch A
switch B
When switch B gets the ARP, it will broadcast it out every port;
switch B will then broadcast it out every port; and on, and on.
05/27/15
Page 5
Chapter 7
Multiple Frame Transmission
Perrine / Brierley
05/27/15
Page 6
Chapter 7
Multiple Frame Transmission
Server/host X
Router Y
segment 1
switch A
switch B
segment 2
When host X sends a unicast frame to router Y, one copy is received over the segment 1, while
switch A receives a copy & puts it into its buffers.
if switch A examines the destination address field in the frame and finds no entry in the
MAC address table for router Y, it floods the frame on all ports except for the originating port.
when switch B receives a copy of the frame through switch A on segment 2, it also forwards a
copy of the frame onto segment 1 if there is not entry in the MAC address table for router Y.
router Y receives a copy of the same frame for the second time!
A loop avoidance solution would eliminate the problem of duplicate transmissions by logically
breaking the loop & preventing one of the four interfaces from transmitting frames during normal
operation.
Perrine / Brierley
05/27/15
Page 7
Chapter 7
MAC Database Instability
Server/host X
Router Y
segment 1
PORT 0
PORT 0
switch A
switch B
PORT 1
PORT 1
segment 2
Switch B initiates a mapping between the MAC address of Host X and its Port 0, which
connects to segment 1 when the first frame arrives.
Sometime later, when the copy of the frame that was transmitted through switch A arrives at port
1 of switch B, switch B must remove the first entry and install one that incorrectly maps the MAC
address of station X to the Port 1 that connects to segment 2.
Depending on the internal architecture of the switch, it might or might not cope well
with rapid changes in its MAC database.
So a loop-avoidance solution would eliminate the problem of the switch not coping well
with the rapid change of the MAC address.
Perrine / Brierley
05/27/15
Page 8
Chapter 7
Spanning Tree Overview
Blocking
2.
Listening
3.
Learning
4.
Forwarding
5.
Disabled
Perrine / Brierley
05/27/15
Page 9
Chapter 7
Spanning Tree Overview
Perrine / Brierley
05/27/15
Page 10
Chapter 7
Spanning Tree (STP) - Terms
Root Bridge:
The root bridge is determined by combining the priority of the bridge and the
MAC address. (If two bridges/switches have the same priority value, then the
MAC address is used to determine which one has the lowest ID.)
There is only one (1) root bridge per network
Designated ports:
Ports on a root bridge are called designated ports
Each segment will have one designated port selected
Non-root Bridges:
Other bridges/switches in your network are called non-root bridges
Root port
Is the port with lowest cost (determined by a links bandwidth) to the root
bridge
Perrine / Brierley
05/27/15
Page 11
Chapter 7
segment 1- 100BASET
MAC: 0c00c8111111
Priority: 32768
PORT 0
switch A
switch B
PORT 1
PORT 1
MAC: 0c00c8222222
Priority: 32768
segment 2 10BASET
switch B
PORT 0 of switch B
Because the connection from switch B to the root switch (A) is
from PORT 0 using a 100Mbps link and has the best cost.
Each segment has one designated port. Since PORT 0 & PORT 1
of switch A are designated ports (because it is the root bridge)
there are no other designated ports.
Perrine / Brierley
05/27/15
Page 12
Chapter 7
Spanning Tree Operation
Perrine / Brierley
05/27/15
Page 13
Chapter 7
Spanning Tree
Switches flood traffic out all ports when to a destination that is not yet known.
Broadcast and multicast traffic is forwarded out every port other than the port on
which the traffic arrived (floods).
This traffic is caught in a loop, because the Layer 2 header has no TTL (time to
live). [Layer 3 devices have TTL].
A physical topology may contain switching or bridging loops necessary for
redundancy and reliability,
Perrine / Brierley
05/27/15
Page 14
Chapter 7
Spanning Tree Algorithm
STP establishes a root node, called the root bridge, and constructs a topology
that has one path for reaching every network node. The resulting tree originates
from the root bridge.
Redundant links that are not part of the shortest path tree are blocked.
A loop-free topology is possible because certain paths are blocked. Data
frames that are received on blocked links are dropped.
STP requires network devices to exchange messages to detect bridging loops.
The messages that switches send that allow the forming of a loop-free logical
topology are called BPDUs (bridge protocol data units).
Perrine / Brierley
05/27/15
Page 15
Chapter 7
Spanning Tree Algorithm
The BPDUs contain enough information so that all switches can do the following:
1.
select a single switch that will act as the root of the spanning tree.
2.
3.
for each LAN segment, designate one of the switches as the closest one
to the root. This bridge is called the designated switch. The designated
switch handles all communication from that LAN toward the root bridge.
4.
each non-root switch chooses one of its ports as its root port. This is the
interface that gives the best path to the root switch.
5.
select ports that are part of the spanning tree, the designated ports. Nondesignated ports are blocked.
Perrine / Brierley
05/27/15
Page 16
Chapter 7
Spanning Tree Algorithm
When the spanning tree is creating a loop-free logical topology, it always uses the
same 4-step decision sequences. As every BPDU arrives, it is checked against
this 4-step sequence to see if it has a lower value than the existing BPDU that is
saved for that port.
1.
2.
3.
4.
Lowest port ID
When a bridge first becomes active, all of its ports are sending BPDUs every 2
seconds (default).
Perrine / Brierley
05/27/15
Page 17
Chapter 7
Spanning Tree Algorithm
When STP is enabled, every bridge in the network goes through the blocking and
transitory states of listening and learning at power up.
If ports are properly configured, they then stabilize to the forwarding or blocking
state.
Forwarding ports provide the lowest-cost path to the root bridge.
Two transitional states, listening & learning, occur when a bridge recognizes a
change in the network topology.
When the bridge first boots up, it thinks it is the root bridge and transitions to the
listening state.
When a port is in the transitional listening state, it can send & receive BPDUs to
determine the active topology. At this point, no user data is being sent.
Perrine / Brierley
05/27/15
Page 18
Chapter 7
Spanning Tree Algorithm
Ports that remain as designated or root ports after 15 seconds (forward delay)
transition to the learning state. When the port is in a learning state, it can populate
its MAC address table with MAC addresses that are heard on its port, but does
not yet forward user frames.
Ports that are not the designated or root ports transition back to the blocking state.
The normal time that it takes for a port to transition from the blocking state to the
forwarding state is 30 to 50 seconds.
The time that it takes for a port to transition from the listening state to the learning
state or from the learning state to the forwarding state is called the forward delay
(default value 15 seconds.)
Perrine / Brierley
05/27/15
Page 19
Chapter 7
Spanning Tree Algorithm
Note:
Each segment in a bridged network has one designated port. This port functions
as the single bridge port that both sends and receives traffic to and from that
segment and the root bridge.
The idea behind this is that if only one port handles traffic for each link, all the
loops have been broken.
Note:
When STP is faced with a tie, it goes with the lowest BID.
Perrine / Brierley
05/27/15
Page 20
Chapter 7
Spanning Tree Path Cost
Spanning-tree path cost is an accumulated total path cost based on the bandwidth
of all the links in the path.
With the introduction of 10 Gigabit Ethernet, IEEE had to revise its path cost.
Link Speed
Cost(revised)
Cost(previous)
10 Gbps
1 Gbps
100 Mbps
19
10
10 Mbps
100
100
Perrine / Brierley
05/27/15
Page 21
Chapter 7
Spanning Tree Timers
Timer
Purpose
Default
Hello Time
2 seconds
15 seconds
Max Age
20 seconds
Perrine / Brierley
05/27/15
Page 22
Chapter 7
Spanning Tree Convergence
ave
h
s
t
por
e
g
d
d bri
n
a
itch
w
s
the state.
l
l
a
ich ocking
h
w
in
bl
e
e
t
h
a
t
t
a s ing or
s
n
a
rd
e
a
m
w
r
P
ST r the fo
n
i
d
rge to eithe
e
v
n
Co itioned
trans
Perrine / Brierley
05/27/15
Page 23
Chapter 7
Rapid Spanning Tree Protocol
(RSTP)
Perrine / Brierley
05/27/15
Page 24
Chapter 7
Rapid Spanning Tree Protocol
(RSTP)
To achieve fast convergence on a port, the protocol relies on two new variables:
Edge port
Edge ports are those that are directly connected to end stations.
Though RSTP is only able to achieve rapid transition to forwarding on edge ports
and on point-to-point links.
Perrine / Brierley
05/27/15
Page 25
Chapter 7
Module 7
Spanning Tree Protocol
Perrine / Brierley
05/27/15
Page 26
Chapter 7
Redundancy
Redundancy in a network is needed in case there
is loss of connectivity in one segment.
But redundancy in itself presents problems
loops.
The Spanning-Tree Protocol is used in switched
networks to create a loop free logical topology
from a physical topology that has loops.
Links, ports, and switches that are not part of the
active loop free topology do not participate in the
forwarding of data frames.
Perrine / Brierley
05/27/15
Page 27
Chapter 7
Redundancy
Companies want 100% uptime, but 99.999% (5
nines) is the goal.
Remember the goal is reliability without faults.
Fault tolerance is achieved by redundancy.
Example of having 1 car versus 2 cars 1 is
always available redundancy
So companies should:
eliminate single points of failure and
design alternate routes to a destination
Perrine / Brierley
05/27/15
Page 28
Chapter 7
Perrine / Brierley
05/27/15
Page 29
Chapter 7
05/27/15
Page 30
Chapter 7
Perrine / Brierley
05/27/15
Page 31
Cisco 3 Switching
(1 ) 0 0 -A 1 s e n d s fra m e to C C -2 3
STP S w i t c h 1 a n d S w i t c h 2 l e a r n a b o u t 0 0 - A 1
0 0 -A 1
Chapter 7
B B -4 4
SAT
P o rt 1
P o rt 2
0 0 -A 1
SAT
P o rt 1
P o rt 2
0 0 -A 1
P o rt 1
P o rt 1
L A N S w itc h 1
L A N S w itc h 2
P o rt 2
Perrine / Brierley
P o rt 2
A A -1 1
05/27/15
C C -2 3
Page 32
(2 ) L A N S w itc h 1 F lo o d s p a c k e t o u t P o r t 2
Chapter 7
s in c e C C -2 3 is n o t k n o w n
0 0 -A 1
B B -4 4
SAT
P o rt 1
P o rt 2
0 0 -A 1
SAT
P o rt 1
P o rt 2
0 0 -A 1
P o rt 1
P o rt 1
L A N S w itc h 1
L A N S w itc h 2
P o rt 2
Perrine / Brierley
P o rt 2
A A -1 1
05/27/15
C C -2 3
Page 33
0 0 -A 1
B B -4 4
SAT
P o rt 1
P o rt 2
0 0 -A 1
SAT
P o rt 1
P o rt 2
0 0 -A 1
P o rt 1
P o rt 1
L A N S w itc h 1
L A N S w itc h 2
P o rt 2
Perrine / Brierley
P o rt 2
A A -1 1
05/27/15
C C -2 3
Page 34
Chapter 7
Or, A Broadcast
Storm. . .
Perrine / Brierley
05/27/15
Page 35
Chapter 7
Switch A
Host A
Hub
00-90-27-76-96-93
Switch B
1 2
100BaseT Ports
Host B
00-90-27-76-5D-FE
Perrine / Brierley
05/27/15
Page 36
Chapter 7
Switch A
Host A
Hub
00-90-27-76-96-93
Switch B
1 2
100BaseT Ports
Host B
00-90-27-76-5D-FE
Perrine / Brierley
05/27/15
Page 37
Chapter 7
Switch A
Duplicate
frame
Duplicate
frame
Host A
Hub
00-90-27-76-96-93
Switch A
1 2
100BaseT Ports
Host B
00-90-27-76-5D-FE
Perrine / Brierley
05/27/15
Page 38
Chapter 7
Switch A
Host A
Hub
Duplicate
Frame
Duplicate
Frame
00-90-27-76-96-93
Switch B
1 2
100BaseT Ports
Host B
00-90-27-76-5D-FE
Perrine / Brierley
05/27/15
Page 39
Chapter 7
Switch A
Host A
Hub
00-90-27-76-96-93
Switch B
1 2
Host B
00-90-27-76-5D-FE
Perrine / Brierley
05/27/15
Page 40
Chapter 7
Redundant Topology
The traffic that switches flood out all ports can be caught
in a loop, because in the Layer 2 header there is no TTL.
(Remember that in Layer 3 the TTL is decremented and
the packet is discarded when the TTL reaches 0)
You need switching (bridging) for reliability, but now the
problem of loops a switched network cannot have loops
if it is to do what it is supposed to do.
Solution? Allow physical loops, but create a loop-free
topology
Perrine / Brierley
05/27/15
Page 41
Chapter 7
Spanning Tree
Protocol
Perrine / Brierley
05/27/15
Page 42
Chapter 7
Frame
Standby Link
Perrine / Brierley
05/27/15
Page 43
Chapter 7
Root Bridge
B
C
J
Server
= Forwarding Path
F
Root
Bridge
= Backup Link
Server
G
The Spanning-Tree Protocol specifies an algorithm (Spanning-Tree
Algorithm) that ultimately creates a logical loop-free topology
Perrine / Brierley
05/27/15
Page 44
Chapter 7
These BPDUs are used to determine the shortest path to the root
bridge, and which ports will forward frames as part of the
spanning tree BPDUs sent out every 2 seconds
Perrine / Brierley
05/27/15
Page 45
Chapter 7
Spanning Tree
For every switched
network:
One root bridge
One root port per
non root bridge
One designated
port per segment
Unused, nondesignated ports
Perrine / Brierley
05/27/15
Page 46
Chapter 7
Bridge Priority
Bridge ID
Root Bridge
Root Port
Perrine / Brierley
Page 47
Chapter 7
Perrine / Brierley
05/27/15
Page 48
Chapter 7
Bridge Priority
Perrine / Brierley
05/27/15
Page 49
Chapter 7
Bridge Priorities
A
AB
Perrine / Brierley
05/27/15
100BaseT
Ports
AB
100BaseT
Ports
AB
100BaseT
Ports
Page 50
Chapter 7
Perrine / Brierley
05/27/15
Page 51
Chapter 7
Perrine / Brierley
Page 52
Chapter 7
Perrine / Brierley
05/27/15
Page 53
Chapter 7
Priority: 32768
ID: 00-B0-64-26-6D-00
AB
Priority: 32768
100BaseT
Ports
AB
ID: 00-B0-64-58-CB-80
Priority: 32768
100BaseT
Ports
AB
ID: 00-B0-64-58-DC-00
05/27/15
Page 54
Chapter 7
Priority: 32768
ID: 00-B0-64-26-6D-00
AB
Priority: 32768
100BaseT
Ports
ID: 00-B0-64-58-CB-80
AB
Priority: 32768
ID: 00-B0-64-58-DC-00
05/27/15
AB
Page 55
Chapter 7
Blocking
Listening
Learning
Forwarding
Disabled
05/27/15
Page 56
Chapter 7
50 seconds
from
blocking to
forwarding
Perrine / Brierley
Page 57
Chapter 7
Point to point
Edge-type
Shared
Perrine / Brierley
05/27/15
Page 58
Chapter 7
Module 7
Spanning Tree Protocol
Perrine / Brierley
05/27/15
Page 59