SlideShare a Scribd company logo
Chapter 2: LAN
Redundancy
Scaling Networks
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 2
2.0 Introduction
2 1 Spanning Tree Concepts2.1 Spanning Tree Concepts
2.2 Varieties of Spanning Tree Protocols
2 3 S i T C fi ti2.3 Spanning Tree Configuration
2.4 First-Hop Redundancy Protocols
2.5 Summary
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 2: Objectives
 Describe the issues with implementing a redundant network.
 Describe IEEE 802.1D STP operation.
 Describe the different spanning tree varieties.
 Describe PVST+ operation in a switched LAN environment.Describe PVST operation in a switched LAN environment.
 Describe Rapid PVST+ operation in a switched LAN environment.
C fi PVST+ i it h d LAN i t Configure PVST+ in a switched LAN environment.
 Configure Rapid PVST+ in a switched LAN environment.
 Identify common STP configuration issues.
 Describe the purpose and operation of first hop redundancy protocols.y
 Describe the different varieties of first hop redundancy protocols.
 Use Cisco IOS commands to verify HSRP and GLBP
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Use Cisco IOS commands to verify HSRP and GLBP
implementations.
2.1 Spanning Tree
CConcepts
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
Purpose of Spanning Tree
Redundancy at OSI Layers 1 and 2
Multiple cabled paths between switches:
 Provide physical redundancy in a switched network.
 Improves the reliability and availability of the network.
 Enables users to access network resources, despite path
disruption.
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
MAC D t b I t bilitMAC Database Instability
 Ethernet frames do not have a time to live (TTL) attributeEthernet frames do not have a time to live (TTL) attribute.
• Frames continue to propagate between switches endlessly, or
until a link is disrupted and breaks the loop.p p
• Results in MAC database instability.
• Can occur due to broadcast frames forwarding.g
 If there is more than one path for the frame to be forwarded out, an
endless loop can result.p
• When a loop occurs, it is possible for the MAC address table
on a switch to constantly change with the updates from the
b d t f lti i MAC d t b i t bilitbroadcast frames, resulting in MAC database instability.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
B d t StBroadcast Storms
 A broadcast storm occurs when there are so many broadcast
frames caught in a Layer 2 loop that all available bandwidth is
consumed. It is also known as denial of service
 A broadcast storm is inevitable on a looped network.
• As more devices send broadcasts over the network, more
traffic is caught within the loop; thus consuming moretraffic is caught within the loop; thus consuming more
resources.
• This eventually creates a broadcast storm that causes theThis eventually creates a broadcast storm that causes the
network to fail.
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
B d t StBroadcast Storms
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
D li t U i t FDuplicate Unicast Frames
 Unicast frames sent onto a looped network can result in duplicateUnicast frames sent onto a looped network can result in duplicate
frames arriving at the destination device.
 Most upper layer protocols are not designed to recognize, or copepp y p g g , p
with, duplicate transmissions.
 Layer 2 LAN protocols, such as Ethernet, lack a mechanism toy p
recognize and eliminate endlessly looping frames.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Purpose of Spanning Tree
Issues with Layer 1 Redundancy:
D li t U i t FDuplicate Unicast Frames
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introductionp g g
 STP ensures that there is only one logical path between all
destinations on the network by intentionally blocking redundantdestinations on the network by intentionally blocking redundant
paths that could cause a loop.
 A port is considered blocked when user data is prevented frompo t s co s de ed b oc ed e use data s p e e ted o
entering or leaving that port. This does not include bridge protocol
data unit (BPDU) frames that are used by STP to prevent loops.
 The physical paths still exist to provide redundancy, but these
paths are disabled to prevent the loops from occurring.
 If the path is ever needed to compensate for a network cable or
switch failure, STP recalculates the paths and unblocks the
necessary ports to allow the redundant path to become activenecessary ports to allow the redundant path to become active.
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introductionp g g
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introductionp g g
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Introductionp g g
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Port Rolesp g g
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Root Bridgep g g g
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Spanning Tree Algorithm: Path Costp g g
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
802.1D BPDU Frame Format
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
BPDU Propagation and Processp g
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
BPDU Propagation and Processp g
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Operation
Extended System IDy
STP was enhanced to include support for VLANs, requiring the
VLAN ID to be included in the BPDU frame through the use of the
t d d t ID
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
extended system ID
STP Operation
Extended System IDy
In the example, the priority of all the switches is 32769. The value is
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
p , p y
based on the 32768 default priority and the VLAN 1 assignment
associated with each switch (32768+1).
2.2 Varieties of Spanning
Tree Protocols
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23
Overview
List of Spanning Tree Protocolsp g
 STP or IEEE 802.1D-1998
S PVST+
 IEEE 802.1D-2004
 Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w
 Rapid PVST+p
 Multiple Spanning Tree Protocol (MSTP) or IEEE 802.1s
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Overview
Characteristics of the Spanning Tree
Protocols
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Overview of PVST+
Networks running PVST+ have these characteristics:
802 1 S f A network can run an independent IEEE 802.1D STP instance for
each VLAN in the network.
O ti l d b l i lt Optimum load balancing can result.
 One spanning-tree instance for each VLAN maintained can mean
a considerable waste of CPU cycles for all the switches in thea considerable waste of CPU cycles for all the switches in the
network. In addition to the bandwidth that is used for each instance
to send its own BPDU.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Overview of PVST+
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Port States and PVST+ Operationp
STP introduces the five port states:
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+
Extended System ID and PVST+
Operationp
 In a PVST+ environment, the extended switch ID ensures each
switch has a unique BID for each VLANswitch has a unique BID for each VLAN.
 For example, the VLAN 2 default BID would be 32770; priority
32768, plus the extended system ID of 2.3 68, p us t e e te ded syste o
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
Overview of Rapid PVST+p
 RSTP is the preferred protocol for preventing Layer 2 loops in a
switched network environmentswitched network environment.
 With Rapid PVST+, an independent instance of RSTP runs for
each VLAN.eac
 RSTP supports a new port type: an alternate port in discarding
state.
 There are no blocking ports. RSTP defines port states as
discarding, learning, or forwarding.
 RSTP (802.1w) supersedes STP (802.1D) while retaining backward
compatibility
 RSTP keeps the same BPDU format as IEEE 802.1D, except that
the version field is set to 2 to indicate RSTP, and the flags field
ll 8 bit
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
uses all 8 bits.
Rapid PVST+
Overview of Rapid PVST+p
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
RSTP BPDU
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
Edge Portsg
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+
Link Typesyp
The link type can determine whether the port can immediately
transition to forwarding state. Edge port connections and point-to-
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
point connections are candidates for rapid transition to forwarding
state.
2.3 Spanning Tree
C fConfiguration
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35
PVST+ Configuration
Catalyst 2960 Default Configurationy g
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
Configuring and Verifying the Bridge IDg g y g g
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
Configuring and Verifying the Bridge IDg g y g g
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PortFast and BPDU Guard
 When a switch port is
configured with PortFastg
that port transitions from
blocking to forwarding
state immediately.state immediately.
 BPDU guard puts the port
in an error disabled statein an error-disabled state
on receipt of a BPDU.
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancingg
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancingg
 Another method to specify the root bridge is to set the spanning
tree priority on each switch to the lowest value so that the switch istree priority on each switch to the lowest value so that the switch is
selected as the primary bridge for its associated VLAN.
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancingg
 Display and verify spanning tree configuration details.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
PVST+ Configuration
PVST+ Load Balancingg
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Rapid PVST+ Configuration
Spanning Tree Modep g
Rapid PVST+ is the Ciscop
implementation of RSTP. It
supports RSTP on a per-
VLAN basisVLAN basis.
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Analyzing the STP Topologyy g p gy
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Expected Topology versus Actual TopologyExpected Topology versus Actual Topology
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Overview of Spanning Tree Statusp g
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Spanning-Tree Failure Consequencesp g q
 STP erroneously moves
one or more ports into the
forwarding state.
 Any frame that is floodedAny frame that is flooded
by a switch enters the
loop.
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
STP Configuration Issues
Repairing a Spanning Tree Problemp g p g
 One way to correct spanning-tree failure is to manually removey p g y
redundant links in the switched network, either physically or
through configuration, until all loops are eliminated from the
topologytopology.
 Before restoring the redundant links, determine and correct the
cause of the spanning-tree failurecause of the spanning tree failure.
 Carefully monitor the network to ensure that the problem is fixed.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2.4 First-Hop Redundancy
ProtocolsProtocols
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 50
Concept of First-Hop Redundancy Protocols
Default Gateway Limitationsy
 If the default gateway
cannot be reached thecannot be reached, the
local device is unable
to send packets off the
local network segmentlocal network segment.
 Even if a redundant
t i t th t ldrouter exists that could
serve as a default
gateway for that
segment, there is no
dynamic method by
which these deviceswhich these devices
can determine the
address of a new
default gateway
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
default gateway.
Concept of First-Hop Redundancy Protocols
Router Redundancyy
 Multiple routers are
configured to workconfigured to work
together to present
the illusion of a
single router to thesingle router to the
hosts on the LAN.
Th bilit f The ability of a
network to
dynamically
recover from the
failure of a device
acting as a defaultacting as a default
gateway is known
as first-hop
redundancy
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
redundancy.
Concept of First-Hop Redundancy Protocols
Steps for Router Failoverp
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Varieties of First-Hop Redundancy Protocols
First-Hop Redundancy Protocolsp y
 Hot Standby Router Protocol (HSRP)
S f 6 HSRP for IPv6
 Virtual Router Redundancy Protocol version 2 (VRRPv2)
 VRRPv3
 Gateway Load Balancing Protocol (GLBP)y g ( )
 GLBP for IPv6
 ICMP Router Discovery Protocol (IRDP) ICMP Router Discovery Protocol (IRDP)
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Varieties of First-Hop Redundancy Protocols
First-Hop Redundancy Protocolsp y
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
FHRP Verification
HSRP Verification
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
FHRP Verification
GLBP Verification
 Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary
solution to allow automatic selection and simultaneous use ofsolution to allow automatic selection and simultaneous use of
multiple available gateways in addition to automatic failover
between those gateways.
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
2.5 Summaryy
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58
Chapter 2: Summary
 IEEE 802.1D is implemented on Cisco switches on a per-VLAN
basis in the form of PVST+. This is the default configuration on
Cisco switchesCisco switches.
 RSTP, can be implemented on Cisco switches on a per-VLAN basis
in the form of Rapid PVST+.in the form of Rapid PVST .
 With PVST+ and Rapid PVST+, root bridges can be configured
proactively to enable spanning tree load balancing.p y p g g
 First hop redundancy protocols, such as HSRP, VRRP, and GLBP
provide alternate default gateways for hosts in the switchedg y
environment.
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PPTX
Spanning Tree Protocol (STP)
PDF
STP (spanning tree protocol)
DOCX
Lan network with Redundancy
PDF
Chapter 2 LAN redundancy
DOCX
Ccna 3 chapter 2 exam answer v5
PPTX
Stp premdeep gill-lu045310-14aug12
PDF
RSTP (rapid spanning tree protocol)
PDF
2.3.1.5 packet tracer configuring rapid pvst+ answer
Spanning Tree Protocol (STP)
STP (spanning tree protocol)
Lan network with Redundancy
Chapter 2 LAN redundancy
Ccna 3 chapter 2 exam answer v5
Stp premdeep gill-lu045310-14aug12
RSTP (rapid spanning tree protocol)
2.3.1.5 packet tracer configuring rapid pvst+ answer

What's hot (20)

PPTX
CCNA 2 Routing and Switching v5.0 Chapter 3
PPTX
Lan Network with Redundancy.ppt
PPTX
Attacking the spanning tree protocol
PDF
Exercise 4c stp rapid pvst+ question
PDF
Overview of Spanning Tree Protocol (STP & RSTP)
PDF
STP Protection
PPT
Protocolo Spanning Tree
PDF
Brk 135 t-ccna_switching
PDF
Linux Bridging: Teaching an old dog new tricks
PPTX
CCNA3 Verson6 Chapter3
PDF
CCNA R&S-12-Spanning Tree Protocol Concepts
PPTX
CCNA2 Verson6 Chapter2
DOCX
Ccna new syllabus
PPT
Chapter 3 vlans
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 6
PDF
VLAN Trunking Protocol
PDF
Layer-2 VPN
PDF
CCNAv5 - S1: Chapter 6 - Network Layer
PPT
CCNA PPP and Frame Relay
PPT
Spanning tree protocol
CCNA 2 Routing and Switching v5.0 Chapter 3
Lan Network with Redundancy.ppt
Attacking the spanning tree protocol
Exercise 4c stp rapid pvst+ question
Overview of Spanning Tree Protocol (STP & RSTP)
STP Protection
Protocolo Spanning Tree
Brk 135 t-ccna_switching
Linux Bridging: Teaching an old dog new tricks
CCNA3 Verson6 Chapter3
CCNA R&S-12-Spanning Tree Protocol Concepts
CCNA2 Verson6 Chapter2
Ccna new syllabus
Chapter 3 vlans
CCNA 1 Routing and Switching v5.0 Chapter 6
VLAN Trunking Protocol
Layer-2 VPN
CCNAv5 - S1: Chapter 6 - Network Layer
CCNA PPP and Frame Relay
Spanning tree protocol
Ad

Similar to Sca n instructorppt_chapter2_final (20)

PDF
CCNAv5 - S3: Chapter2 Lan Redundancy
PPTX
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
PPTX
SRWE_Mod-5.pptxZXcvgbhjkiolp;'[]\';l,kmjnhbgvfcdxszaAZSXDcfvgbhnjmk,.
PPTX
SRWE_Module_5-STP Concepts.pptx
PPTX
ENCOR_Capitulo 2.pptx
PDF
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
PPT
Icnd210 s02l02
PPTX
CCNP Switching Chapter 4
PDF
Overview of Spanning Tree Protocol
DOCX
Cisco Network Proposal Part 1by Jesse HolmesSubmission d.docx
PPT
Stp premdeep gill-lu045310-14aug12
PPTX
ENCOR_Chapter_2_Spanning_Tree presentation
PPT
CCNA Exploration 3 - Chapter 5
PPTX
Cisco Switch details required to troubleshoot PPT.pptx
PPT
Day 15.1 spanningtreeprotocol
PDF
Spanning tree protocol (stp)
PPT
ACIT - CCNA Training Course Topic - Switch Stp ACIT
PDF
Day 4 LAYER 2 SWITCHING
PPTX
LAYER 2 SWITCHING
PDF
Spaning Tree Protocol
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
SRWE_Mod-5.pptxZXcvgbhjkiolp;'[]\';l,kmjnhbgvfcdxszaAZSXDcfvgbhnjmk,.
SRWE_Module_5-STP Concepts.pptx
ENCOR_Capitulo 2.pptx
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Icnd210 s02l02
CCNP Switching Chapter 4
Overview of Spanning Tree Protocol
Cisco Network Proposal Part 1by Jesse HolmesSubmission d.docx
Stp premdeep gill-lu045310-14aug12
ENCOR_Chapter_2_Spanning_Tree presentation
CCNA Exploration 3 - Chapter 5
Cisco Switch details required to troubleshoot PPT.pptx
Day 15.1 spanningtreeprotocol
Spanning tree protocol (stp)
ACIT - CCNA Training Course Topic - Switch Stp ACIT
Day 4 LAYER 2 SWITCHING
LAYER 2 SWITCHING
Spaning Tree Protocol
Ad

Recently uploaded (20)

PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
artificial intelligence overview of it and more
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
Internet___Basics___Styled_ presentation
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
innovation process that make everything different.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
E -tech empowerment technologies PowerPoint
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Introuction about ICD -10 and ICD-11 PPT.pptx
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Paper PDF World Game (s) Great Redesign.pdf
artificial intelligence overview of it and more
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Internet___Basics___Styled_ presentation
522797556-Unit-2-Temperature-measurement-1-1.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
INTERNET------BASICS-------UPDATED PPT PRESENTATION
innovation process that make everything different.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
E -tech empowerment technologies PowerPoint
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Power Point - Lesson 3_2.pptx grad school presentation
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Tenda Login Guide: Access Your Router in 5 Easy Steps
SAP Ariba Sourcing PPT for learning material
RPKI Status Update, presented by Makito Lay at IDNOG 10
Unit-1 introduction to cyber security discuss about how to secure a system
APNIC Update, presented at PHNOG 2025 by Shane Hermoso

Sca n instructorppt_chapter2_final

  • 1. Chapter 2: LAN Redundancy Scaling Networks © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
  • 2. Chapter 2 2.0 Introduction 2 1 Spanning Tree Concepts2.1 Spanning Tree Concepts 2.2 Varieties of Spanning Tree Protocols 2 3 S i T C fi ti2.3 Spanning Tree Configuration 2.4 First-Hop Redundancy Protocols 2.5 Summary Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 3. Chapter 2: Objectives  Describe the issues with implementing a redundant network.  Describe IEEE 802.1D STP operation.  Describe the different spanning tree varieties.  Describe PVST+ operation in a switched LAN environment.Describe PVST operation in a switched LAN environment.  Describe Rapid PVST+ operation in a switched LAN environment. C fi PVST+ i it h d LAN i t Configure PVST+ in a switched LAN environment.  Configure Rapid PVST+ in a switched LAN environment.  Identify common STP configuration issues.  Describe the purpose and operation of first hop redundancy protocols.y  Describe the different varieties of first hop redundancy protocols.  Use Cisco IOS commands to verify HSRP and GLBP Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Use Cisco IOS commands to verify HSRP and GLBP implementations.
  • 4. 2.1 Spanning Tree CConcepts © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
  • 5. Purpose of Spanning Tree Redundancy at OSI Layers 1 and 2 Multiple cabled paths between switches:  Provide physical redundancy in a switched network.  Improves the reliability and availability of the network.  Enables users to access network resources, despite path disruption. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 6. Purpose of Spanning Tree Issues with Layer 1 Redundancy: MAC D t b I t bilitMAC Database Instability  Ethernet frames do not have a time to live (TTL) attributeEthernet frames do not have a time to live (TTL) attribute. • Frames continue to propagate between switches endlessly, or until a link is disrupted and breaks the loop.p p • Results in MAC database instability. • Can occur due to broadcast frames forwarding.g  If there is more than one path for the frame to be forwarded out, an endless loop can result.p • When a loop occurs, it is possible for the MAC address table on a switch to constantly change with the updates from the b d t f lti i MAC d t b i t bilitbroadcast frames, resulting in MAC database instability. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 7. Purpose of Spanning Tree Issues with Layer 1 Redundancy: B d t StBroadcast Storms  A broadcast storm occurs when there are so many broadcast frames caught in a Layer 2 loop that all available bandwidth is consumed. It is also known as denial of service  A broadcast storm is inevitable on a looped network. • As more devices send broadcasts over the network, more traffic is caught within the loop; thus consuming moretraffic is caught within the loop; thus consuming more resources. • This eventually creates a broadcast storm that causes theThis eventually creates a broadcast storm that causes the network to fail. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 8. Purpose of Spanning Tree Issues with Layer 1 Redundancy: B d t StBroadcast Storms Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 9. Purpose of Spanning Tree Issues with Layer 1 Redundancy: D li t U i t FDuplicate Unicast Frames  Unicast frames sent onto a looped network can result in duplicateUnicast frames sent onto a looped network can result in duplicate frames arriving at the destination device.  Most upper layer protocols are not designed to recognize, or copepp y p g g , p with, duplicate transmissions.  Layer 2 LAN protocols, such as Ethernet, lack a mechanism toy p recognize and eliminate endlessly looping frames. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 10. Purpose of Spanning Tree Issues with Layer 1 Redundancy: D li t U i t FDuplicate Unicast Frames Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 11. STP Operation Spanning Tree Algorithm: Introductionp g g  STP ensures that there is only one logical path between all destinations on the network by intentionally blocking redundantdestinations on the network by intentionally blocking redundant paths that could cause a loop.  A port is considered blocked when user data is prevented frompo t s co s de ed b oc ed e use data s p e e ted o entering or leaving that port. This does not include bridge protocol data unit (BPDU) frames that are used by STP to prevent loops.  The physical paths still exist to provide redundancy, but these paths are disabled to prevent the loops from occurring.  If the path is ever needed to compensate for a network cable or switch failure, STP recalculates the paths and unblocks the necessary ports to allow the redundant path to become activenecessary ports to allow the redundant path to become active. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 12. STP Operation Spanning Tree Algorithm: Introductionp g g Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 13. STP Operation Spanning Tree Algorithm: Introductionp g g Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 14. STP Operation Spanning Tree Algorithm: Introductionp g g Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 15. STP Operation Spanning Tree Algorithm: Port Rolesp g g Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 16. STP Operation Spanning Tree Algorithm: Root Bridgep g g g Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 17. STP Operation Spanning Tree Algorithm: Path Costp g g Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 18. STP Operation 802.1D BPDU Frame Format Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 19. STP Operation BPDU Propagation and Processp g Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 20. STP Operation BPDU Propagation and Processp g Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 21. STP Operation Extended System IDy STP was enhanced to include support for VLANs, requiring the VLAN ID to be included in the BPDU frame through the use of the t d d t ID Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential extended system ID
  • 22. STP Operation Extended System IDy In the example, the priority of all the switches is 32769. The value is Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential p , p y based on the 32768 default priority and the VLAN 1 assignment associated with each switch (32768+1).
  • 23. 2.2 Varieties of Spanning Tree Protocols © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23
  • 24. Overview List of Spanning Tree Protocolsp g  STP or IEEE 802.1D-1998 S PVST+  IEEE 802.1D-2004  Rapid Spanning Tree Protocol (RSTP) or IEEE 802.1w  Rapid PVST+p  Multiple Spanning Tree Protocol (MSTP) or IEEE 802.1s Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 25. STP Overview Characteristics of the Spanning Tree Protocols Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 26. PVST+ Overview of PVST+ Networks running PVST+ have these characteristics: 802 1 S f A network can run an independent IEEE 802.1D STP instance for each VLAN in the network. O ti l d b l i lt Optimum load balancing can result.  One spanning-tree instance for each VLAN maintained can mean a considerable waste of CPU cycles for all the switches in thea considerable waste of CPU cycles for all the switches in the network. In addition to the bandwidth that is used for each instance to send its own BPDU. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 27. PVST+ Overview of PVST+ Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 28. PVST+ Port States and PVST+ Operationp STP introduces the five port states: Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 29. PVST+ Extended System ID and PVST+ Operationp  In a PVST+ environment, the extended switch ID ensures each switch has a unique BID for each VLANswitch has a unique BID for each VLAN.  For example, the VLAN 2 default BID would be 32770; priority 32768, plus the extended system ID of 2.3 68, p us t e e te ded syste o Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 30. Rapid PVST+ Overview of Rapid PVST+p  RSTP is the preferred protocol for preventing Layer 2 loops in a switched network environmentswitched network environment.  With Rapid PVST+, an independent instance of RSTP runs for each VLAN.eac  RSTP supports a new port type: an alternate port in discarding state.  There are no blocking ports. RSTP defines port states as discarding, learning, or forwarding.  RSTP (802.1w) supersedes STP (802.1D) while retaining backward compatibility  RSTP keeps the same BPDU format as IEEE 802.1D, except that the version field is set to 2 to indicate RSTP, and the flags field ll 8 bit Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential uses all 8 bits.
  • 31. Rapid PVST+ Overview of Rapid PVST+p Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 32. Rapid PVST+ RSTP BPDU Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 33. Rapid PVST+ Edge Portsg Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 34. Rapid PVST+ Link Typesyp The link type can determine whether the port can immediately transition to forwarding state. Edge port connections and point-to- Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential point connections are candidates for rapid transition to forwarding state.
  • 35. 2.3 Spanning Tree C fConfiguration © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35
  • 36. PVST+ Configuration Catalyst 2960 Default Configurationy g Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 37. PVST+ Configuration Configuring and Verifying the Bridge IDg g y g g Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 38. PVST+ Configuration Configuring and Verifying the Bridge IDg g y g g Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 39. PVST+ Configuration PortFast and BPDU Guard  When a switch port is configured with PortFastg that port transitions from blocking to forwarding state immediately.state immediately.  BPDU guard puts the port in an error disabled statein an error-disabled state on receipt of a BPDU. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 40. PVST+ Configuration PVST+ Load Balancingg Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 41. PVST+ Configuration PVST+ Load Balancingg  Another method to specify the root bridge is to set the spanning tree priority on each switch to the lowest value so that the switch istree priority on each switch to the lowest value so that the switch is selected as the primary bridge for its associated VLAN. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 42. PVST+ Configuration PVST+ Load Balancingg  Display and verify spanning tree configuration details. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 43. PVST+ Configuration PVST+ Load Balancingg Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 44. Rapid PVST+ Configuration Spanning Tree Modep g Rapid PVST+ is the Ciscop implementation of RSTP. It supports RSTP on a per- VLAN basisVLAN basis. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 45. STP Configuration Issues Analyzing the STP Topologyy g p gy Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 46. STP Configuration Issues Expected Topology versus Actual TopologyExpected Topology versus Actual Topology Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 47. STP Configuration Issues Overview of Spanning Tree Statusp g Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 48. STP Configuration Issues Spanning-Tree Failure Consequencesp g q  STP erroneously moves one or more ports into the forwarding state.  Any frame that is floodedAny frame that is flooded by a switch enters the loop. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 49. STP Configuration Issues Repairing a Spanning Tree Problemp g p g  One way to correct spanning-tree failure is to manually removey p g y redundant links in the switched network, either physically or through configuration, until all loops are eliminated from the topologytopology.  Before restoring the redundant links, determine and correct the cause of the spanning-tree failurecause of the spanning tree failure.  Carefully monitor the network to ensure that the problem is fixed. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 50. 2.4 First-Hop Redundancy ProtocolsProtocols © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 50
  • 51. Concept of First-Hop Redundancy Protocols Default Gateway Limitationsy  If the default gateway cannot be reached thecannot be reached, the local device is unable to send packets off the local network segmentlocal network segment.  Even if a redundant t i t th t ldrouter exists that could serve as a default gateway for that segment, there is no dynamic method by which these deviceswhich these devices can determine the address of a new default gateway Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential default gateway.
  • 52. Concept of First-Hop Redundancy Protocols Router Redundancyy  Multiple routers are configured to workconfigured to work together to present the illusion of a single router to thesingle router to the hosts on the LAN. Th bilit f The ability of a network to dynamically recover from the failure of a device acting as a defaultacting as a default gateway is known as first-hop redundancy Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential redundancy.
  • 53. Concept of First-Hop Redundancy Protocols Steps for Router Failoverp Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 54. Varieties of First-Hop Redundancy Protocols First-Hop Redundancy Protocolsp y  Hot Standby Router Protocol (HSRP) S f 6 HSRP for IPv6  Virtual Router Redundancy Protocol version 2 (VRRPv2)  VRRPv3  Gateway Load Balancing Protocol (GLBP)y g ( )  GLBP for IPv6  ICMP Router Discovery Protocol (IRDP) ICMP Router Discovery Protocol (IRDP) Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 55. Varieties of First-Hop Redundancy Protocols First-Hop Redundancy Protocolsp y Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 56. FHRP Verification HSRP Verification Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 57. FHRP Verification GLBP Verification  Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary solution to allow automatic selection and simultaneous use ofsolution to allow automatic selection and simultaneous use of multiple available gateways in addition to automatic failover between those gateways. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 58. 2.5 Summaryy © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58
  • 59. Chapter 2: Summary  IEEE 802.1D is implemented on Cisco switches on a per-VLAN basis in the form of PVST+. This is the default configuration on Cisco switchesCisco switches.  RSTP, can be implemented on Cisco switches on a per-VLAN basis in the form of Rapid PVST+.in the form of Rapid PVST .  With PVST+ and Rapid PVST+, root bridges can be configured proactively to enable spanning tree load balancing.p y p g g  First hop redundancy protocols, such as HSRP, VRRP, and GLBP provide alternate default gateways for hosts in the switchedg y environment. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential