ISAM Protocols
ISAM Protocols
2
Ethernet framing & VLAN technology
Table of contents TOC
Ethernet Framing . . . . . p. 3
Virtual Local Area Network . . . p.13
4
Ethernet framing
Ethernet-,Ethernet and Ethernet TOC
LAN
6
Common fields in the different “flavors" of Ethernet TOC
7B 1B 6B 6B 4B
pre-
amble SFD DA SA XXX FCS
7
IEEE 802.3 Ethernet frame interpretation TOC
6B 6B 2B 4B
Length or
DA SA Type
XXX FCS
8
IEEE 802.3 frame with type field TOC
6B 6B 2B 4B
DA SA
length DSAP SSAP CONTR P A Y L O A D (43–1497 Bytes) FCS
1B 1B 1B
10
IEEE 802.3 frame with 802.2 LLC/ 802.3 SNAP header TOC
11
Ethernet frames - summary TOC
12
IP over Ethernet/IEEE 802 – example TOC
Destination Source
FCS
Preamble Address Address 0800 IP datagram (4)
(8 bytes) (6 bytes) (6 bytes)
ETHERNET II
Destination Source
Preamble Address Length IP datagram FCS
(8 bytes) (6 bytes)
Address
(2 bytes)
06 06 (4)
(6 bytes)
IEEE 802.3/ IEEE 802.2 LLC LSAP
Destination Source
Preamble Address Length AA AA 03 00 0800 IP FCS
Address
(8 bytes) (6 bytes) (2 bytes) datagram (4)
(6 bytes)
IEEE 802.3/ IEEE 802.2 LLC/SNAP LSAP SNAP
13
Virtual Local Area Networks - VLAN
What is a LAN? TOC
Corporate LAN
15
What is VLAN? TOC
• Inter-VLAN communication:
only via higher-layer
devices (e.g. IP routers)
Corporate LAN
Administration LAN
16
VLAN benefits TOC
Performance
• VLANs free up bandwidth by limiting traffic.
Formation of Virtual Workgroups
• Users and resources that communicate frequently with each other can be
grouped into a VLAN, regardless of physical location.
Simplified Administration
• Adding or moving nodes => can be dealt with quickly and conveniently
from the management console rather than the wiring closet
Reduced Cost
• Use of VLANs can eliminate the need for expensive routers
• With a VLAN-enabled adapter, a server can be a member of multiple
VLANs.
Security
• VLANs create virtual boundaries that can only be crossed through a
router.
17
How VLANs Work TOC
18
Layer 1 VLAN: Membership by port TOC
PORT VLAN
1 2 3 4 5 6 7 8 9
1
19
Layer 2 VLAN : Memberschip by MAC address TOC
Disadvantages
• Too many addresses need to be entered and managed
• Notebook PCs change docking stations
MAC@ VLAN 1 2 3 4 5 6 7 8 9
MAC@A
MAC@B
MAC@C MAC@D
MAC@D
MAC@A MAC@C
20 MAC@B
Layer 3 VLAN: Membership by Protocol type TOC
pre- Length
amble SFD DA SA or Type P A Y L O A D (46–1500 Bytes) FCS
PROTOCOL VLAN
IP 1
IPX 2
21
Layer 3 VLAN: Membership by IP Subnet Address TOC
IP@:
IP@: 138.22.24.10
IP@: IP@:
138.21.35.47 138.21.35.58
138.22.24.5
22
VLAN types - Glossary/Terminology TOC
23
VLAN link types: Access Link TOC
Access link
• Link that is a member of only one VLAN
• Contain VLAN unaware devices
• All frames on access link are untagged
• Normal ports to which we connect our network devices such as
PCs.
VLAN unaware
workstation
Access Link
24
VLAN link types: Trunk Link TOC
Trunk Link
• Capable of carrying multiple VLANs
• Used at links between switches
Allowing VLANS to span over all network switches
Trunk Link
25
VLAN link types: Hybrid Link TOC
Hybrid Link
• Contain both VLAN aware and VLAN unaware devices
All frames for specific VLAN are tagged or untagged
VLAN aware
workstation
VLAN aware Bridge VLAN aware Bridge
Hybrid Link
VLAN unaware
workstation
26
Q-VLAN tag (IEEE 802.1Q) TOC
pre- length
SFD DA SA TPID TCI P A Y L O A D (46–1500 Bytes) FCS
amble type
2 bytes 2 bytes
Untagged frame
• A frame doesn’t contain a tag header
Priority-tagged frame
• A frame with tag header carries priority but no VID (VID=0)
VLAN-tagged frame
• A frame with Q-tag header carries both priority and VID.
802.1Q Tag VLAN
• Each VLAN group has unique VID
• Each member of VLAN group can talk to each other
VLAN-aware
• The device can recognize and support VLAN-tagged frame
VLAN-unaware
• The device can't recognize VLAN-tagged frame
28
Forwarding engine - Glossary/Terminology TOC
Ingress
• Towards the forwarding
Engine Forwarding End-user
engine
Ethernet
Egress port End-user
Upstream Egress
Upstream
Downstream
• From network to user
29
802.1Q Process TOC
Ingress Rule
• Classify the received frames belonging to a VLAN
Forwarding Process
• Decide to filter or forward the frame
Egress Rule
• Decide if the frames must be sent tagged or untagged
30
Ingress Rule TOC
Untagged frame:
• A tag is added onto this untagged frame (with the PVID)
• Then the tagged frame is sent to the forwarding engine
PVID
• Default Port VLAN ID for incoming untagged frames
31
Forwarding Process TOC
32
Egress Rule TOC
33
Principles of operation in a VLAN Bridge TOC
34
Objective of VLAN stacking TOC
35
IEEE 802.1ad - Systems TOC
36
IEEE 802.1ad - Tags TOC
Tag-Type: TBD
2 bytes 2 bytes
37
IEEE 802.1ad - Ports TOC
to customer equipment
to customer equipment to customer equipment
38
Operation in a provider edge bridge: single tag TOC
Customer
NW Port
C-VLAN aware
Edge Port
Bridge comp
Provider
Customer
Provider
NW Port
NW Port
Internal
EISS
= S-VLAN tag
= Q/C-VLAN tag
Customer
NW Port
= S-VLAN tag
e.g. Outgoing port supports only tagged
C-VLAN aware
bridge comp
Edge Port
Provider
Customer
NW Port
Provider
Internal
NW Port
EISS
An incoming frame on a provider edge port is forwarded
internally depending on the C-TAG.
This two-step approach enables a translation of C-VID to S-
VID.
Incoming frame is forwarded according to forwarding
information base associated with respectively the C-VLAN / S-
VLAN to which the frame belongs.
Outgoing frame may carry S-TAG or not (egress rule)
40
Dual VLAN – VLAN Stacking TOC
Single VLAN tag Frame size : Min 68 bytes , Max 1522 bytes
pre- length
SFD DA SA TPID TCI P A Y L O A D (46–1500 Bytes) FCS
amble type
2 bytes 2 bytes
41
Dual VLAN – VLAN Stacking TOC
Q-in-Q VLAN
• Not standardized
• The second VLAN tag protocol identifier is 802.1Q tag type just like
in Single VLAN tagged frames
Dual VLAN tag” Frame size : Min 72 bytes , Max 1526 bytes
(“Vlan stacking”)
S-Vlan C-Vlan
pre- length
SFD DA SA TPID TCI TPID TCI P A Y L O A D (46–1500 Bytes) FCS
amble type
2 bytes 2 bytes
tag-type (value 81 00) Tag Control Information
42
Operation in a Provider Bridge: VLAN stacking TOC
= Q/C-VLAN tag
Customer
NW Port
= S-VLAN tag
C-VLAN aware
bridge comp
Edge Port
Provider
Customer
NW Port
Provider
Internal
NW Port
EISS
We now have two tags
• The S-TAG may be added and removed independently of the C-
tag.
A Provider Bridge ignores C-tags, except on Provider Edge
Ports
VLAN-stacking can occur even if the incoming frame is
untagged (at provider edge port).
43
DHCP & DHCP Relay
Table of contents TOC
Why DHCP? . . . . . . p. 3
What is DHCP? . . . . p.10
DHCP scenario’s . . . . p.19
DHCP Relay . . . . . . p.22
45
Why DHCP ?
Environment history (HSIA) TOC
Proxy
AAA AAA
Analog
Radius
PPP Modem
ISDN
ISP1 RAN
www PSTN
POP NT
“username/passwd”
setup PPP – IP-address
47
Environment history (HSIA) TOC
USB
Proxy
AAA PPPoA CPE
AAA PC
Radius
ATM
DSLAM
www ISP1 BRAS
POP “username/passwd”
setup PPP – IP-address
48
Environment history (HSIA) TOC
Proxy CPE
AAA AAA DSLAM PC
accept/IP-address PPPoE
Radius
ATM PC
49
Environment history (HSIA) TOC
50
Evolution to DHCP-based access? TOC
51
DHCP, the end-game for non HSI subscriber mgmt TOC
DHCP
BTV
Agr NW
CPE
IP edge
node
VoD DHCP for VoIP phone, IADs,
Set Top boxes
DHCP server
DHCP PPP PPP / L2TP
Automatic IP@ configuration Yes Yes Yes
Simplicity of the protocol and network
implementation Yes No No
Video over DSL support (Set top boxes) with QoS Yes No No
DHCP option 82 providing additional security features with physical DSL lines identification
Legacy PPP traffic goes to external BRAS
52
What is DHCP?
DHCP – Dynamic Host Configuration Protocol TOC
54
DHCP TOC
55
Addressing in case of DHCP TOC
BTV
Agr NW
Ethernet
switch
VoD
DHCP server
xDSL CPE
DHCP option 82
IP-address
56
DHCP scenario – What happens when booting up? TOC
DHCP DHCP
Client Server 1 Server 2
DHCP Discover (broadcast)
Wait 1 sec
DHCP Ack
57
DHCP: No session concept TOC
DHCP Ack
58
DHCP Message Format TOC
59
Options in DHCP TOC
• Examples :
– Pad Option – Tag 0
– End Option – Tag 255
– Requested IP Address – Tag 50, Length 4: four byte address
61
DHCP scenarios
DHCP scenario – no relay TOC
63
DHCP scenario – no relay TOC
64
DHCP relay
BOOTP/DHCP Relay Agent TOC
Server Unicast
Relay Unicast or Broadcast Client
Agent
IP Network 1 IP Network 2
66
DHCP relay Agent principle TOC
Relay agent
• Terminates messages and then generates new messages
• DHCP message relayed within the respective VLAN
67
DHCP scenario – with relay TOC
DHCP Relay
DHCP IPS configured
Server
IPS IP Network 2 IPR IP Network 1
MacS MacR IP=?
MacA
ci@ yi@ si@ gi@ Cl-Mac@ ci@ yi@ si@ gi@ Cl-Mac@
nul nul nul IPR MacA nul nul nul nul MacA
UD-port67 UD port68 UD-port68 UD port67
IPR IPS nul IPBC
MACR MACS MACA MACBC
DHCP Discover : Unicast DHCP Discover : Broadcast
68
Issues still to be solved TOC
69
DHCP Relay Agent Information option TOC
70
DHCP Relay Agent Information option: The process TOC
Client
Parameter 1
Parameter 2 Binding
Parameter 3
...
IP Network 1 IP Network 2
71
DHCP Relay Agent Information Option TOC
82 N i1 i2 i3 i4 iN
1 N s1 s2 s3 s4 sN
2 N s1 s2 s3 s4 sN
72
Security Considerations solved by option 82 TOC
Broadcast forwarding
DHCP Address Exhaustion
Static Assignment
IP Spoofing
MAC Address Spoofing
73
Multicast
Table of contents TOC
75
Unicast versus Multicast
Routing Types TOC
Unicast Broadcast
Multicast Anycast
77
Unicast TOC
Principle
• Server application sends 1 copy of data for every client
Routing
• Entries for every destination in routing table
Server-Application
78
Streaming content with unicast TOC
BTV
www
= News
79
Broadcast TOC
Principle
• Server application sends 1 copy to all hosts
Even if only few users are interested
Routing
• Routers typically block broadcast packets
• Broadcast to users on the LAN
same subnet
Server-Application
80
Multicast TOC
Principle
• Server application sends 1 copy of data to a group of users
• Network nodes replicate at last possible hop
Routing
• Reverse path forwarding
Server-Application
client
Multicast tree
81
leaf
Streaming content with multicast in core TOC
BTV
www
= News
82
Streaming content with multicast in core & access TOC
BTV
www
= News
83
Requirements to multicast data across multiple TOC
networks
84
IP multicasting and IGMP TOC
sender
JOIN Multicast
IGMP 224.10.10.10
87
IP Multicast Protocol TOC
28
CLASS D 1110 MULTICAST 224 239
88
Addressing TOC
Transient addresses
• Dynamically assigned to a multicast group
• Cease to exist when membership to the group drops to zero
89
Layer 2 multicast addresses TOC
multicast bit
multicast bit:
• 1 – multicast (or even broadcast)
the frame is destined to all hosts or a subset of hosts on the network
• 0 – unicast
the frame is destined to one single host on the network
90
L3 to L2 address mapping TOC
5 bits lost
=
Multicast MAC address
00000001-00000000-01011110-01111111-00001010-00000001
(01-00-5E-7F-0A-01)
48 bits
91
What is 802.1x?
What is EAP? TOC
93
What is IEEE 802.1X? TOC
94
What does 802.1X do? TOC
Authentication Server
Supplicant PAE = client to be authenticated
Any EAP Server
Ethernet, Token Ring, Wireless etc
Typically RADIUS
Authenticator PAE
95 Ethernet Switch, Router…
802.1x - Port Based Network Access Control TOC
96
Principle TOC
EAP
EAP Server EAP Client
97
Principle TOC
Authenticator PAE
User activates
“Is user authorized to access LAN?” link
Authority access
e.g. controlled port opened
98
Control plane requirements: 802.1X / EAP TOC
EAPOL
EAPOL-Start
EAP-Request/Identity RADIUS
EAP-Response/Identity (MyID)
EAP
EAP-Request/OTP,OTPChallenge
Radius - Access Request ()
EAP-Response/OTP,OTPpw
Radius - Access Accept ()
99
Control plane requirements: 802.1X / EAP TOC
EAPOL
EAPOL-Start
EAP-Request/Identity RADIUS
Radius - Access Request ()
EAP-Response/Identity (MyID)
Radius - Access Challenge ()
EAP
EAP-Request/OTP,OTPChallenge
Radius - Access Request ()
EAP-Response/OTP,OTPpw
Radius Accounting
EAPOL
EAPOL-Logoff
100
EAPOL – 802.1x : frame format
Ethernet II Frame Format TOC
DA SA Type
P A Y L O A D (46–1500 Bytes)
6B 6B 2B
0800=IP
0806 = ARP
ARP Req PAD
8035 = RARP 0806
ARP Reply (28 Bytes) (18 Bytes)
888E = 802.1x
8863 = PPPoE Control
frames
8864 = PPPoE Data 888E 802.1x – EAPOL EAP
frames
102
Ehernet II versus LLC/SNAP Frame format TOC
DA SA Type
P A Y L O A D (46–1500 Bytes)
6B 6B 2B
0180C2-000003
888E 802.1x / EAPOL
ORG
DA SA
length DSAP SSAP SSAP UI Type P A Y L O A D (46–1500 Bytes)
1B 1B 1B 3B 1B
length
DA SA AA AA 03 00-00-00 888E 802.1x / EAPOL
PV PT PBL
EAP packet – Packet Body
1B 1B 2B
104
QoS – Quality of Service
QoS in the public Internet TOC
Internet today:
• Native IP:
– offers global any-to-any connectivity
106
Why QOS? TOC
Goals
• Improve network service perceived by applications
• Give the network administrator control over network
resource usage
• These are really the same
107
What is QOS? TOC
108
QOS parameters TOC
109
Implementing QOS: resolving 2 main issues TOC
Resource allocation
• Who should get the resources and how much?
Layer 2 : ATM , 802.1p
Layer 3: Integrated Services , Differentiated Services
110
Implementing QoS TOC
Classification
Marking
Mapping
Connection Admission Control (CAC)
Policing – User Parameter Control (UPC)
Buffer Admission Control (BAC)
Traffic scheduling
Shaping
111
Classification TOC
113
802.1p, IP precedence, and DSCP TOC
Layer 3
IPv4
IP Precedence (3 bits)
DSCP (6 bits)
114
BAC - Buffer Admission Control TOC
115
QoS and traffic scheduling (1/2) TOC
Shaping
Scheduler
• Each queue is scheduled
according to a pre-defined traffic S
rate.
• Bandwidth in excess cannot be
reused
116
QoS and traffic scheduling (2/2) TOC
Priority
1
• High priority queue served until empty,
then lower priority queue
N
• Ideal for delay sensitive applications
• No traffic guarantee for low priority queue
NGCR GCR
• Each queue gets a minimum guaranteed
WFQ
1s 1
bandwidth + fair share of the bandwidth in
excess
GCR = 4 c/s, Weight = 50% N
• No priority CDV can be impacted
117
Policing - Token bucket mechanism TOC
Goal
• limit traffic not to exceed declared parameters
• Flow specifications needed (Traffic description)
Three common-used criteria:
• r = (Long term) Average Rate:
rate at which tokens arrive at the bucket
• b= (Max.) Burst Size (= size of bucket)
• P= (Short term) Peak Rate
highest rate at which a source can
generate traffic
Token Bucket
• limit input to specified Burst Size
and Average Rate.
over interval of length t, number of packets admitted (r * t + b).
118
QOS end-to-end TOC
119
Architectural layers and QoS TOC
120
MAC prioritization TOC
Bits 3 1 12
User CFI VLAN ID
Priority
8 user-defined
levels of service
121
QoS in Ethernet networks (1/2) TOC
122
QoS in Ethernet networks (2/2) TOC
No of Switch Queues
Traffic Type
1 2 3 4 5 6 7 8
Network Control 1 1
1 1 1 1
“Voice”, < 10ms Latency and Jitter 2 2
1
“Video”, < 100ms Latency and Jitter 2 2 3 3
2 2
Delay Sensitive - no bound 3 3 4 4
1
Reserved 4 5 5
3 4
Reserved 5 6 6
2 3
Reserved - less than best-effort 7
4 5 6 7
Default - best-effort 8
123
QoS in ATM networks TOC
ATM Bearer
10/100 Mbps LAN
ABR
VBR
VBR
UBR
124
IntServ service classes TOC
125
IntServ concepts TOC
126
IntServ traffic management/control functions TOC
Host Router
Application RSVP Routing RSVP
process Policy RSVP process process Policy
control control
Data Data
Admission Admission
control control
Classifier Packet Classifier Packet
scheduler Data scheduler
Data
127
RSVP - Resource ReSerVation Protocol TOC
128
Path/Resv message exchange TOC
Resv
129
From IntServ to DiffServ TOC
Scheduler Scheduler
130
DiffServ concepts TOC
131
DiffServ key concepts TOC
Service Level
Specification (SLS)
User
DiffServ Edge Router
Classification – aggregation DiffServ Core Router
Traffic Conditioning (TC) - Per-class queuing
(policing/marking/dropping) - Weighted scheduling
- Priority dropping
132
Per hop behavior: split of functionality in a DS domain TOC
DiffServ
Edge
Router
DiffServ
Core Select PHB PHB
PHB Local
Router PHB
PHB conditions
Extract Packet
DSCP treatment
133
DiffServ service classes – Per hop behavior TOC
134
IPv4 header TOC
135
ToS and precedence (RFC 1349) TOC
Bits 3 4 1
TOS
Precedence ToS Field MBZ
Byte
Check
Bit
6 2
DS 1/0 1/0 0 Unused
Byte
Default 0 0 0
CS1 0 0 1 Example:
CS2 0 1 0
CS3 0 1 1 Class Selector Point 4 (CS)
CS4 1 0 0 1 1 0 DSCP AF42
CS5 1 0 1 Decimal value 36
CS6 1 1 0
CS7 1 1 1
137
Internet Group Management Protocol
IGMP
Terminology TOC
IGMP
BTV
Multicast Routing
• Router to Router – PIM DM/SM, DVMRP, MOSPF etc.
• Client to Router – IGMP (internet group management protocol) version 1,2,3
Multicast Control Termination (MCT) – entity which terminates the IGMP signaling which
is used to initiate channel zapping; this protocol is initiated within the customer device
(usually a STB) when channel changes are requested
Multicast Engine (ME) – entity which actually copies the stream in order that multiple
users can view the same content. Depending upon the architecture the ME function may
be done in more than one place.
139
Situating IGMP TOC
ICMP IGMP
Protocol value (IP header)
IP (2)
ARP
Frame type (Ethernet header)
Ethernet driver
Incoming frame
140
IGMP – Internet Group Management Protocol TOC
141
IGMP – Internet Group Management Protocol TOC
142
IGMP Packet Format TOC
IGMPv1 IGMPv2
• IGMPv1 = query / response • IGMPv2 = introduction of leave
model messages and group specific
• age out mechanism queries
No “leave”-messages.
(latency 3 minutes)
0 3 7 15 31 0 7 15 31
Max Resp
Ver Type Unused Checksum Type Checksum
time
• Version = 1 Type:
- 0x11 = Query
• Type:
- 0x12 = Version 1 Report
- 1 = Query
- 0x16 = Version 2 Report
- 2 = Report
- 0x17 = Leave Report
• Group address:
- Multicast Group Address Maximum Response Time:
- Max. time before sending a
responding report
143
IGMP version 1 (RFC1112) TOC
Query-response model
IGMP query
BTV “want to watch something?”
IGMP report
“join News”
144
IGMP version 1 (RFC1112) - cont’d TOC
Query-response model
IGMP query
BTV “want to keep watching?”
No IGMP report
“no”
145
IGMP version 2 (RFC2236) TOC
IGMP report
BTV “join News”
IGMP report
“leave News”
146
IGMP version 2 (RFC2236) TOC
No answer
stop sending data
= News
147
IGMP – Versions and their future TOC
Messages
Group Destination Address
Query Report Leave = Multicast IP address of Class D type IP address
(224.0.0.0 - 239.255.255.255)
IGMPv1
= added to/removed from multicast routing table
IGMPv2
IGMPv3 adds concept of “source filtering” + join/leave
IGMPv3 for groups
v3 (e.g. WinXP) client falls back to v2 if v2
message received
148
Terminology IGMP Snooping vs Proxy
Terminology TOC
Static MC stream
• MC stream sent/available on switch no matter if there is a subscriber or
not
Dynamic MC stream
• MC stream sent to the switch only when there is a subscriber for it.
IGMP for stream Nb s
IGMP snooping
Ethernet Switch
Ethernet switch VLAN bridging
ISAM
1
1
1
IP Backbone
1
1 Ethernet Switch IP edge
ISAM (BAS, IP router)
Ethernet Switch
ISAM
150
IGMP snooping/Proxy functionality TOC
151
IGMP snooping: GMQ and Report TOC
IGMP snooping
IGMP report
H
IGMP report
H
IGMP GMQ
R IGMP report
H
IGMP report
H
152
IGMP proxy: GMQ and Report TOC
IGMP proxy
”IGMP report
H
”IGMP report
H
IGMP GMQ ”IGMP GMQ
R H R ”IGMP report
GMP report H
”IGMP report
GMP report H
153
IGMP snooping: Join TOC
MC
Dynamic Multicast
IGMP snooping
Static Multicast
IGMP proxy
IGMP JOIN
R
MC H R
IGMP JOIN
Dynamic Multicast
IGMP proxy
R
H R
IGMP JOIN
155
IGMP snooping: IGMP Leave TOC
IGMP snooping
Static Multicast
Dynamic Multicast
IGMP snooping
156
IGMP proxy: IGMP Leave TOC
IGMP proxy
”IGMP GSQ
”IGMP GSQ
MC
R H R ”IGMP GSQ ”IGMP Leave
”IGMP GSQ
”IGMP GSQ
”IGMP GSQ
IGMP GMQ
H R ”IGMP GSQ ”IGMP Leave
”IGMP GSQ
IGMP Leave
157
Rapid Spanning Tree Protocol
RSTP
IEEE 802.1 Protocol overview TOC
159
Bridged networks and forwarding loops TOC
160
Example of a loop TOC
1
P1 P2
Phys2 Phys1
2 1
P1 P2
5
Phys MAC addr. Port nbr
P1 1 2
P1 2 4
161
STP – Spanning Tree Protocol TOC
162
STP – Spanning Tree Protocol TOC
163
BPDU Field Format TOC
164
Bridge and port definitions TOC
R R DESIGNATED
165
Spanning tree – Example TOC
0 root
2 2
Bridge
(identifier) 11 10
4 4 4 path cost
12 13 9
LAN 19 19
19 Path cost
4
19 5 1 2 3 10Mbps 100
4 100Mbps 19
100 100 100 1000Mbps 4
10Gbps 2
6 7 8
168
RSTP (Rapid Spanning Tree Protocol) TOC
IEEE802.1w RSTP
• Evolution of 802.1d STP
• Most parameters remain the same
• Capable of reverting back to 802.1d on a per port basis
Enhancements
• Only 3 port states: discarding, learning and forwarding
• All bridges send BPDUs periodically i.s.o relaying root-BPDU
• Rapid transition to forwarding state which speeds up convergence when
links are added / changed (sometimes within hundreds of ms)
• New topology change mechanisms
169
TOC
www.alcatel.com
170