Wireless LAN MSTP Dr. Paul Chen

advertisement
Wireless LAN
MSTP
Dr. Paul Chen
paulpchen@hotmail.com
March, 2004
Dr. Paul Chen
1
IEEE802.11 Wireless LAN
• 802.11b was defined in an attempt to increase the original
bandwidth of 802.11 (1-2 Mbps) in the range of 2.4GHz
operational frequency using direct sequence spread spectrum
(DSSS). Its bandwidth capacity is set to be between 5.5Mbps
and 11Mbps.
• 802.11a
As the need for bandwidth grew, 802.11a was specified in
1999 as a Physical Layer (PHY) standard to operate at 5GHz
frequency band with possible data rates between 6-54 Mbps.
Those products are slowly becoming available to a wider
public. The additional advantage of 802.11a over 802.11b is
that there is also much less interference with radio at its 5GHz
frequency in comparison to 802.11b and 802.11g.
March, 2004
Dr. Paul Chen
2
IEEE802.11 Wireless LAN (continued)
• 802.11c
To help define the standard of development of access points (APs)
for wireless technologies to bridge the information flow, 802.11c was
established and its work has already been concluded.
• 802.11d
As the operation, especially in the 5GHz range, may differ from
country to country (or domain to domain), the 802.11d protocol was
established. It also better defined interoperability issues.
• 802.11e
With the expansion of wireless device technologies and the featurerich applications already in development for video and audio (voice),
it was apparent that the 802.11 PHYs were not quite optimized to
fulfill such tasks. This lead to the development of 802.11e which
refines a 802.11 medium access layer (MAC) to prioritize traffic to
improve quality of service (QoS) for support of video and audio
March, 2004
Dr. Paul Chen
3
IEEE802.11 Wireless LAN (continued)
• 802.11f
This protocol specification addresses the roaming need for
transmission for a user from one access point (AP) to another
and ensures the continuity of transmission; it would ultimately
provide inter-access point protocol.
• 802.11g
The "g" technology specification is still in the works and is the
most recent redefinition for 802.11. Its goal is defined as
extension to 20+ Mbps rate by adding one more channel to
the current three in the operation spectrum of 2.4GHz, which
would compete with 802.11a rates.
• 802.11h
802.11h is an extension of 802.11a to satisfy regulations in
Europe for the spectrum band of 5GHz by providing dynamic
channel selection (DCS) and transmit power control (TPC).
March, 2004
Dr. Paul Chen
4
IEEE802.11 Wireless LAN (continued)
•
•
•
•
•
802.11i
802.11j
802.11k
802.11m
802.11n
March, 2004
Security Enhancements
Extending 802.11a to Japanese brand
Radio Resource Measurement
Maintenance
High Throughput (100 Mbps)
Dr. Paul Chen
5
The Problems of RF
•
•
•
•
Fixed resources / shared media
Coverage extends outside the physical building
RF problems are statistical in nature
The air space is constantly changing
- signal strength
- interference
- signal to noise ratio
- coverage area
- throughput
- load
March, 2004
Dr. Paul Chen
6
Taking A System Level Approach for Wireless Networks
•
•
•
•
•
•
•
•
•
Mobility
RF Physical layer security
Layer 2 security (802.1x, WPA, 802.1i)
Layer 3 security (VPN)
Client security
Physical layer management / visibility
Client management
Planning / deployment
Location
March, 2004
Dr. Paul Chen
7
802 Architecture and Relation to Bluetooth
March, 2004
Dr. Paul Chen
8
Functions of 802.15.1 lower layer protocols
• RF layer
The air interface is based on antenna power range starting from 0
dBm up to 20 dBm. Bluetooth operates in the 2.4 GHz band and the
link range is anywhere from 10 centimeters to 10 meters.
• Baseband layer
The Baseband layer establishes the Bluetooth physical link between
devices forming a piconet -- a network of devices connected in an
ad hoc fashion using Bluetooth technology. A piconet is formed
when two Bluetooth devices connect, and can support up to eight
devices. In a piconet one device acts as the master and the other
devices act as slaves.
• Link manager
The link manager sets up the link between Bluetooth devices. Other
functions of the link manager include security, negotiation of
Baseband packet sizes, power mode and duty cycle control of the
Bluetooth device, and the connection states of a Bluetooth device in
a piconet.
March, 2004
Dr. Paul Chen
9
Functions of 802.15.1 lower layer protocols (continued)
• Logical Link Control and Adaptation Protocol (L2CAP)
This layer provides the upper layer protocols with connectionless
and connection-oriented services. The services provided by this
layer include protocol multiplexing capability, segmentation and
reassembly of packets, and group abstractions.
March, 2004
Dr. Paul Chen
10
Differences Between WPAN (802.15) and WLAN (802.11)
March, 2004
Dr. Paul Chen
11
IEEE 802.1w RSTP Overview
• RSTP significantly reduces the time to reconfigure the active
topology of the network when changes
occur to the physical topology or its configuration parameters. RSTP
selects one switch as the root of a
spanning tree-connected active topology and assigns port roles to
individual ports of the switch,
depending on whether that port is part of the active topology.
• RSTP provides rapid connectivity following the failure of a switch,
switch port, or a LAN. A new root
port and the designated port on the other side of the bridge
transition to forwarding using an explicit
handshake between them. RSTP allows switch port configuration so
that the ports can transition to
forwarding directly when the switch reinitializes.
March, 2004
Dr. Paul Chen
12
IEEE 802.1w RSTP Overview (continued)
•
RSTP as specified in 802.1w supersedes STP specified in 802.1D, but
remains compatible with STP.
• RSTP selectively sends 802.1D-configured BPDUs and topology
change notification (TCN) BPDUs
on a per-port basis.
• When a port initializes, the migration-delay timer starts and RSTP
BPDUs are transmitted. While the migration-delay timer is active,
the bridge processes all BPDUs received on that port.
• If the bridge receives an 802.1D BPDU after a port’s migration-delay
timer expires, the bridge assumes it is connected to an 802.1D
bridge and starts using only 802.1D BPDUs.
• When RSTP uses 802.1D BPDUs on a port and receives an RSTP
BPDU after the migration-delay expires, RSTP restarts the
migration-delay timer and begins using RSTP BPDUs on that port.
March, 2004
Dr. Paul Chen
13
RSTP Port Roles
• Root—A forwarding port elected for the spanning tree topology.
• Designated—A forwarding port elected for every switched LAN
segment.
• Alternate—An alternate path to the root bridge to that provided by
the current root port.
• Backup—A backup for the path provided by a designated port
toward the leaves of the spanning tree. Backup ports can exist only
where two ports are connected together in a loopback by a point-topoint link or bridge with two or more connections to a shared LAN
segment.
• Disabled—A port that has no role within the operation of spanning
tree.
• Port roles are assigned as follows:
- A root port or designated port role includes the port in the active
topology.
- An alternate port or backup port role excludes the port from the
active topology.
March, 2004
Dr. Paul Chen
14
RSTP Port States
•
•
The port state controls the forwarding and learning processes and provides
the values of discarding, learning, and forwarding.
Comparison Between STP and RSTP Port States
March, 2004
Dr. Paul Chen
15
RSTP Port States (continued)
• In a stable topology, RSTP ensures that every root port and
designated port transition to forwarding, and ensures that all
alternate ports and backup ports are always in the discarding
state.
March, 2004
Dr. Paul Chen
16
IEEE 802.1s MST (Multiple Spanning Tree Protocol)
• MST extends the IEEE 802.1w rapid spanning tree (RST) algorithm
to multiple spanning trees. This extension provides both rapid
convergence and load balancing in a VLAN environment.
• MST is backward compatible with 802.1D STP.
• MST allows you to build multiple spanning trees over trunks.
You can group and associate VLANs to spanning tree
instances. Each instance can have a topology independent of
other spanning tree instances.
• This new architecture provides multiple forwarding paths for
data traffic and enables load balancing.
• Network fault tolerance is improved because a failure in one
instance (forwarding path) does not affect other instances.
March, 2004
Dr. Paul Chen
17
IEEE 802.1s MST (continued)
• A spanning tree instance can exist only on bridges that have
compatible VLAN instance assignments. You must configure a set of
bridges with the same MST configuration information, which allows
them to participate in a specific set of spanning tree instances.
• Interconnected bridges that have the same MST configuration are
referred to as an MST region.
• MST runs a variant of spanning tree called internal spanning
tree (IST). IST augments the common spanning tree (CST)
information with internal information about the MST region.
The MST region appears as a single bridge to adjacent single
spanning tree (SST) and MST regions.
• CST (802.1Q) is a single spanning tree for all the VLANs.
March, 2004
Dr. Paul Chen
18
IEEE 802.1s MST (continued)
• A bridge running MST provides interoperability with single
spanning tree bridges as follows:
– MST bridges run IST, which augments the common
spanning tree (CST) information with internal information
about the MST region.
– IST connects all the MST bridges in the region and appears
as a subtree in the CST that includes the whole bridged
domain. The MST region appears as a virtual bridge to
adjacent SST bridges and MST regions.
– The common and internal spanning tree (CIST) is the
collection of ISTs in each MST region, the CST that
interconnects the MST regions, and the SST bridges. CIST is
the same as an IST inside an MST region and the same as
CST outside an MST region. The STP, RSTP, and MSTP
together elect a single bridge as the root of the CIST.
March, 2004
Dr. Paul Chen
19
IEEE 802.1s MST (continued)
• MST establishes and maintains additional spanning trees
within each MST region. These spanning trees are referred to
as MST instances (MSTIs). The IST is numbered 0, and the
MSTIs are numbered 1,2,3, and so on. Any MSTI is local to
the MST region that is independent of MSTIs in another
region, even if the MST regions are interconnected. MST
instances combine with the IST at the boundary of MST
regions to become the CST as follows:
• – Spanning tree information for an MSTI is contained in an
MSTP record (M-record).
M-records are always encapsulated within MST BPDUs (MST
BPDUs). The original spanning trees computed by MSTP are
called M-trees. M-trees are active only within the MST region.
M-trees merge with the IST at the boundary of the MST region
and form the CST.
March, 2004
Dr. Paul Chen
20
Network with Interconnected SST and MST Regions
March, 2004
Dr. Paul Chen
21
STP Default Configuration
March, 2004
Dr. Paul Chen
22
Download