RSP 100 Lab Answer
RSP 100 Lab Answer
Student Guide
Revision 0619
RSP 100
All or some of the products detailed in this document may still be under development and certain
specifications, including but not limited to, release dates, prices, and product features, may
change. The products may not function as intended and a production version of the products may
never be released. Even if a production version is released, it may be materially different from the
pre-release version discussed in this document.
Nothing in this document shall be deemed to create a warranty of any kind, either express or
implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights with
respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim, ZoneFlex
and OPENG trademarks are registered in the U.S. and other countries. Ruckus Networks,
MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and Dynamic PSK are
Ruckus trademarks worldwide. Other names and brands mentioned in this document or website
may be claimed as the property of others. 18-1-B
RSP 100
Routing and Switching Protocols
Module 1
Course Introduction
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Course Overview
This self-paced course provides an extensive view of networking concepts and technologies
while exploring the standardized protocols used in networks today. It can also serve as a
foundational course preparing students that are entering into the IP networking field
needing a working knowledge of a networks structure and function. Studies include the
physical and logical understanding of basic networking operations, layer2/3 addressing and
standardized multi-vendor supported core, management and monitoring protocols.
Multicast forwarding using PIM and IGMP protocols are discussed as well as an overview of
popular WAN technologies deployed in the past and present.
Course Objectives
– Describe management protocols such as Simple Network Management Protocol (SNMP) and Network
Time Protocol (NTP)
– Discuss network service protocols
• Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) and Internet Control Message
Protocol (ICMP)
– Discuss several common protocols including FTP, TFTP, Telnet, SSH and HTTP
– Describe Quality of Service (QoS) concepts
– Discuss sFlow and OpenFlow 1.3 concepts
– Describe the function of Virtual Router Redundancy Protocol (VRRP)
– Describe authentication protocols as well as networking features including access control lists (ACLs),
and Network Address Translation (NAT)
Course Agenda
• M01 Introduction
• M02 Networking Fundamentals
• M03 Standards and Protocols
• M04 Ethernet and Media Access Control
• M05 Virtual LANs
• M06 Layer 2 Redundancy
• M07 Link Aggregation and L2 Discovery
• M08 IP Addressing
• M09 IP Routing Fundamentals
• M10 Dynamic IP Routing Protocols
• M11-Multicast Routing
Course Agenda
Ruckus Education
YouTube Channel
End of Module 1
Course Introduction
Module 2
Networking Fundamentals
Revision February 2017
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
Network Concepts
Network Types
Footnote 1: Early Local Area Networks were identified as broadcast and collision
domains. Because of the media and architecture used (BUS technology) LANs were
broken into LAN segments. To limited the degradation of a LAN and limiting the
frequency of possible collisions. Modern networks use more efficient devices and no
longer use BUS architecture thus the definition of a LAN more refers to a geographical
area instead of a single segment.
The fundamental components of a LAN include:
Computers
Interconnections (NICs and the media)
Networking devices (switches, and routers)
LANs ability to connect large amount of devices though physical hardwiring or
wireless (Wi-Fi) connections provide an efficient way for devices to share network
resources.
Footnote 2: WAN connections can either be dedicated circuits like ATM or a shared
resource similar to Frame Relay. Either are provided by a telecommunication carrier
allowing the data to be transported on their established networks. Many different
WAN solutions can be used depending on the customer requirements. More details
about WAN technologies will be explained later in this module.
Footnote 1: Public networks are generally created and maintained by Internet Service
Providers. The internet is a collection of ISP public networks with interconnections to
other providers as well as connections to private networks. No one person or
organization owns the internet because it is a collection of independently owned
public networks that are interconnected.
Footnote 2: Private networks are generally connected to public networks (internet)
allowing access to public services it offers. Because the private network often provide
access to sensitive company data, access into the private network is highly protected.
Rules and restrictions are put in place based on the network owners preferences.
153_LAN.png
• Created and managed by an company or organization providing network services to its employees or
customers
– Generally established in a small geographical area known as a Local Area Network (LAN) 1
– Most LANs have connections to public networks providing access to services outside the private network
– Often private IP addresses are used within the LAN2
IP Phone
Server
Footnote 1: Because of the close proximity of devices that connect to the same LAN,
speeds are usually faster between these devices. Private LANs often connect to the
internet or other private LANs through the use of a Wide Area Network (WAN). WANs
will be discussed in more detail later in this module.
Footnote 2: Private IP addresses are officially identified by the Internet Assigned
Numbers Authority (IANA) and can be used by anyone that creates and maintains a
private network. Because IP address used on the Internet are required to be unique
(public) these addresses cannot be used on the internet and will be dropped by the
provider if attempted. When a device on a private network requires access to a public
service its private address is translated to a public address (at the firewall) before it is
forwarded to the internet. When the reply is received by the firewall it will then
replace the public IP address with the requesters private address and forward to the
requester. This process is known as Network Address Translation (NAT) and will be
discussed further in later modules.
Footnote 3: Intranet web servers are often used in companies allowing access to
sensitive proprietary company information accessible by its employees. This
information is only accessible on the private network (LAN).
Footnote 1: Because of their proximity of each other the need for a service provider
is eliminated. This allows the intra connections to be personally managed therefore
there is not a significant increase in cost for higher speeds unlike with a service
provider.
Branch Networks
VPN WAN
Branch B
Provider
WAN Circuit
Central Site
Branch A
Footnote 1: Many times a branch office will have its local server to allow for faster
connections to users. This sever can offer services such as Point-of-Sale completion or
a proprietary application used by employees. Some branch servers will have either a
constant connection back to the central office or may periodically connect for
updates through the WAN connection.
Footnote 2: Private WAN circuits are dedicated connections provided by a local
telecommunication provider. These links are generally a point-to-point connecting the
two locations sometimes called a private circuit. Other technologies like Virtual
Private networks can be leveraged to provide a secure tunnel through the branch
internet connection. Provider WAN technologies will be discussed later in module.
Internet Evolution
• The internet originated from the US Government seeking to create a fault tolerant
computer network in the 1960s
• US DoD led in the development of packet switched ARPANET which was the first network
based on the Internet Protocol (IP)
• Commercial Internet Service Providers began offering services in late 1980s causing the
decommission of ARPANET in 1990
• Early devices were generally servers and PCs however it has now evolved to many unique
dedicated devices using the benefits of the Internet1
• This has caused the internet to be known now as the Internet of Things (IoT)
Footnote 1: Because of the TCP/IP suite and its adaptability has caused the growth of
purpose build devices such as IP cameras, home/building automation appliances, and
phones. It is not uncommon to have most any electronic device to connect to the
internet and provide remote connection of services to the device. Companies now
take advantage of the internet by offering services and conveniences to its customers
as well as remote capabilities for its employees.
Network Devices
153_early
• Hub
– Provided connectivity for Server
in a collision domain1
• Bridge2 Hub
Host
Diagram Description: that provides a port allowing connectivity to the network. The
graphic shows a single LAN with two collision domains. Early networks used hubs and
bridges to provide connectivity however these technologies had limitations.
Footnote 1: When a hub is used each device connected has to wait until the network
is free before it can use the network to transmit. The more devices that are
connected to that segment the chance for collisions increase.
Footnote 2: Before bridges there were large collision domains which greatly degraded
network performance. Not only do collisions decrease when collision domains are
separated but also allows local devices increased utilization of the network resource.
Footnote 3: Hubs and bridges are rarely found in modern networks today and have
been replaced by switches. Switches perform the same tasks of both of these devices
but treat each of its ports as a bridge to other ports on the switch. As a result most
devices connected to a switch have their own LAN segment and do not have to share
its LAN resources.
153_modern
• Switch1
– Intelligent layer 2 device (Improvement
WAN
over hubs/bridges)
– Segments collision domains
and provides enhanced features
• Can be segmented into multiple LANs WLAN
Router
known as VLANs Router
• Filters traffic by only forwarding frames
out the port connected to its destination
Switch
• Router2
– Functions at layer 3 and is used to
route traffic between LANs allowing
the forwarding of traffic from source to
destination
– WLAN routers operate as a router as well as a
wireless access point that transmits and
receives Wi-Fi signals
Footnote 1: Each switch port is a LAN segment with its own collision domain. Filters
incoming data frames and limits forwarding only to ports the frames destination. This
this increases network utilization and reduces congestion. Switches also have the
ability to be divided up into multiple logical LAN segments known as a virtual LAN.
The most common switch used in networks today are Ethernet. OSI layers and VLANs
will be discussed in more detail later in this course.
Footnote 2: Routers provide routing decisions and forward data frames from one
layer 3 segment to another using IP addresses.
• Broadcast Domain includes Ethernet segments connected by repeaters, hubs, bridges, and
switches
– Broadcast frame will be sent out on all Ethernet segments in the Ethernet network
– A broadcast domain generally defines a LAN separated by a Layer 3 device1
IP Router
Switch Switch
Hub Hub
Multiple
Collision
Domains
• A collision domain is a logical network segment where data frames can collide with each
other when they are transmitted2
• Special Functions
• Proxy server1
– Intermediary device that can filter and/or cache web content for a group of users
– Provides content control and improved performance
• Firewall2
– Acts as a barrier between a private network (high trust) and a public network (low trust)
– Policies and rules can be applied based on the level of protection needed
• Load balancer (Layers 4-7)3
– Provide the distribution of traffic among multiple servers allowing for redundancy and greater
throughput
Special Functions
HTTP
Firewall
Proxy Server
Hacker
HTTP
Load Balancer
Network Topologies
Network Topologies
Backbone Cable
Terminator Terminator
Node
Network Topologies
• Star topology
– Can consist of a layer 2/3 device providing a central connection for devices which can then share a common uplink
– Traffic is isolated to the links connected to the sender and receiver providing efficient forwarding
• Hybrid or Tree topology1
– Multiple star topologies can be connected to a tree providing aggregation of uplinks to a core network
– Tree topologies are the a common deployment in modern networks
Star Hybrid/Tree
Switch
Node
• Full Mesh1
– Creates interconnection between all other
network devices in the environment Full Mesh
Footnote 1: Because of the full mesh devices can forward traffic directly towards its
destination providing the shortest path however if the direct link fails many alternate
paths can be used to deliver traffic. Full mesh is usually deployed where high
availability is critical because it can be more expensive due to its port utilization and
maintenance. Because of the high redundancy chances for detrimental loops can
occur. Care should be taken when deploying a full mesh topology.
Footnote 2: Partial mesh is a common deployment when redundancy is required.
Requires less port utilization and is easier to create and manage. More cost effective
if WAN circuits are used in the topology
Network Considerations
– Budget2
• Redundancy within a network increases reliability however increases costs
– Cabling3
• Edge switches are best placed close to the end devices they are serving and connect back to a central location
– Future growth4
• As demands on the network increase networks will have to handle larger traffic loads
Network devices that allow for pay as you grow options where additional ports or higher
speeds can be unlocked as demands increase are effective ways to ensure your network can
keep up with the pace of progress.
Mobile
Clients
Access
Distribution
Core
The most common network architecture uses a classic three-tier design, known as a
hierarchical network design. These layers or tiers are:
• LAN access layer – Provides user access to the network at the level where host
devices are connected.
• Distribution layer – Controls the boundary between the access and core layers.
Also known as the aggregation layer, it acts as an aggregation point for access layer
devices and provides policy-based connectivity.
• Core layer – Provides fast transport between distribution layer devices and routes
large amounts of traffic.
This design is advantageous in an environment where clients consume applications
running on dedicated physical servers, and network traffic typically flows from the
client, through the data center network tiers, to the application, and back out. This
traffic pattern is typically referred to as north-south. This environment tolerates
oversubscription in the switching components because, on average, each server
connection uses a relatively small portion of network bandwidth. To help ensure
application availability, network resiliency is delivered through redundant switching
components and network connections.
Deployment Topologies
Client Connectivity
• Within data centers with high a concentration of server racks the distribution may be
deployed as:
– Top-of-Rack
– Middle-of-Row
– End-of-Row
153_ToR_deployments.png
• Aggregation switches connect to access switches located within the same or adjacent racks
• Top-of-rack design enables subscription ratio to be handled at the rack
Top-of-Rack
Aggregation
Switches
Switches
Copper
Fiber
Many organizations are increasingly deploying not just servers but racks of servers,
blade systems, and integrated rack-and-blade systems. With the reduced size of
servers and other network systems the rack size remains constant, making it the
deployment “choke point” in many data centers. Top-of-Rack solutions simplify and
shorten cable runs facilitate the replication of rack configurations. This offers a
solution by placing switching resources in each rack so that server connectivity can be
aggregated and interconnected with the rest of the data center through cables
connected to end-of-row aggregation-layer switches.
For on-demand data centers, network access can then be deployed and cabled when
servers are deployed. Cabling is simple and cost effective by using inexpensive copper
cable within the rack and fiber optic cable for uplinks. With a modular solution at the
end-of-row, optical cables may be used for all server connections, and available
connections in the modular switches should be forecasted long before the servers are
deployed.
• Very scalable server aggregation to high availability switches with full redundancy
• High-performance: Flexible choice of wire-speed or oversubscribed interfaces, lower
latency
• Cuts down access layer switches, but requires more cabling across racks
• Allows the use of more efficient chassis based switches
End-Of-Row Middle-Of-Row
Stacking
• Many stacking technologies allows for management of the switches as a single virtual
switch1
• Hot insertion or removal of stack members
• Cross-unit link aggregation from the stack2
• Local switching of data within the stack
• Stacking can be established either vertically or horizontally as seen below3
1 GbE
10 GbE+ for stacking
Footnote 1: Stacking is most often found in wiring closets of a campus network. The
switches are literally stacked on top of each other in a rack and connected together
with short copper cables. Horizontal stacking allows the switch to remain at the top
of each server rack and they are connected with longer, more flexible cable options.
For example, copper cables can be used to connect switches together and then one
fiber optic cable can be used to complete the stack loop. This solution drastically
reduces management of edge switches since the stack appears as a single switch.
Footnote 2: Link aggregation is the idea of having multiple physical links between two
switches to logically be considered one. This allows the forwarding of traffic on all
port members while all combined are considered one link. More details on link
aggregation will be discussed in later modules.
Footnote 3: Vertical stacking is common when deployed providing end users
connectivity such as an IDF or on a building floor. Horizontal stacking provides a Top-
of-Rack solution within a data center to simplify management and flatten the
network. With modern datacenters many times servers need to talk to other servers
(east/west traffic) as much as to its end clients (north/south traffic). This solution
provides an effective way to provide both flow types at the same time.
A wide area network (WAN) is a computer network that covers a broad area (that is,
any network whose communications links cross metropolitan, regional, or national
boundaries). Contrast this with LANs or MANs, which are usually limited to a room,
building, campus, or specific metropolitan area (such as a city), respectively. The
largest and most well-known example of a WAN is the Internet.
Many WANs are built for one organization and are private. Others, built by ISPs,
provide connections from an organization's LAN to the Internet.
WANs are often built by using leased lines. At each end of the leased line, a router
connects to the LAN on one side and a hub within the WAN on the other. Leased lines
are permanent dedicated connections established through a public
telecommunications carrier (for example, T1 or T3).
• ATM - Protocol that is used over a SONET backbone that makes up the traditional public
switched telephone network (PSTN)1
• Frame Relay – Packet switched service providing cost-effective solution because it does not
require private or circuit switched leased lines
• MPLS – Multiprotocol Label Switching provides the ability to support many different WAN
technologies over a single IP network
– Highly scalable to provide private layer 2 and layer 3 services by the use of labels
– Enhanced features such as QoS and fault tolerance are possible as well as traffic engineering capabilities
– Cost effective solution because of its versatility and high utilization of shared resources
• CWDM/DWDM
• Is a technology that uses multiple lasers transmitting several wavelengths of light
simultaneously over a single optical fiber
Dark Fiber
• Dark refers to the fact that these are extra unused fibers were laid by service providers
anticipating future growth2
• Often used when companies want to implement WDM or extend their LANs
Footnote 1: Depending on the needs of the client dark fiber can be a simple link
between two sites or have repeaters to extend the range. Many times the client is
responsible for providing the end devices to perform the light generation and
forwarding of traffic. Virtual dark fiber can be available where a provider offers a
single wavelength within a fiber limiting the client to light up that wavelength only.
This cuts the cost of leasing the whole fiber.
Footnote 2: The largest expense of a provider when running fiber is the labor.
Considering that it is wiser to include plenty of extra fiber when laying fiber avoiding
having to go back and lay more. This also allows them to recover some of their costs
by leasing out the unused fiber to companies or other providers.
LAB EXERCISE
End of Module 2
Networking Fundamentals
Module 3
Standards and Protocols
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
• The physical medium provides interconnectivity between computer systems and devices
but does not define how communication should occur
• Internetworking standards and protocols define the format of communications and the
methods in which data should be transmitted between interconnected computer systems
and devices
PCs
Switch
Servers
Network protocols define the rules and conventions that allow network devices to
communicate. They define the techniques necessary for network devices to send and
receive messages.
Networking protocols include methods for devices to identify and connect with each
other. They also define rules for how the sent and received data must be formatted.
Many networking protocols have been developed over the years. Some were
developed for very specific purposes and environments. While others were
developed to allow a common form of communications between devices all over the
world.
• Many organizations1 have contributed to the standards that networking devices adhere to
that allow a common form of communication
– ISO – International Organization for Standardization
– ANSI – American National Standards Institute
– EIA – Electronics Industries Association
– IEEE – Institute of Electrical and Electronic Engineers
– IAB – Internet Activities Board
• Internet Research Task Force (IRTF)
• Internet Engineering Task Force (IETF)
– ITU-T – International Telecommunication Union Telecommunication Standardization Sector
• Formerly CCITT
RFC Process
“Use the existing protocol standards
whenever such standards apply,
invent new protocols only when existing
protocols are insufficient, but be
prepared to migrate to international
Message Formats standards when they become available
and provide equivalent functionality.“
• Layered models provide framework for defining and explaining the networking concepts
and technologies that facilitate communication between interconnected devices
• OSI and TCP/IP are two different, but related, layered network models
Network 3 Packet
Transport
Layers
Data Link 2 Frame
Footnote 1: The OSI model uses seven logical layers, each with specific functions that
transfer information among applications. In this model, communications originate at
the top layer (Layer 7) of the transmitting device, move down to its lowest layer
(Layer 1), and travel across the network to the receiving device. The message arrives
at the lowest layer of the receiving device and moves back up through the layers on
this device to Layer 7.
The seven layers are described in detail on the following slides.
Footnote 2: As a message is passed down, the lower layer adds a header to it. This is
called encapsulation, because it is like placing an object into a capsule. The header is
sometimes called a wrapper. Each successive lower layer encapsulates what it
receives from the layer above it. The inverse happens on the receiving side as the
message is first stripped of its header, and then the inner contents (the "data"
portion) is passed up. This can be described as a decapsulation process. Each
successive upper layer receives the data message from the layer below, and then
removes its own header and passes the data on.
Network 3 Packet
Transport
Layers
Data Link 2 Frame
Footnote 1: A web browser is, in itself, not a part of the network interconnection
process. The browser is an program that uses the data in the Application layer
message to display content, such as web pages.
Footnote 2: Network protocols evolve over time. New protocols become important
and existing protocols lose their prominence. Current, widely used protocols include:
• HTTP – Hypertext Transfer Protocol is the protocol used by the World Wide Web
• FTP – File Transfer Protocol is used to transfer data
• SNMP – Simple Network Management Protocol is used to manage devices in your
network
• DNS – Domain Name System is a service that resolves host names to IP addresses
• The Presentation Layer takes data provided OSI Model Layer Units
Network 3 Packet
Transport
Layers
Data Link 2 Frame
The Presentation Layer can be thought of as a translator. It ensures that data from the
sending application can be read successfully by the receiving application.
The Presentation Layer implementations are not typically associated with a particular
protocol stack. Some well-known standards for video include QuickTime and Motion
Picture Experts Group (MPEG). QuickTime is an Apple Computer specification for
video and audio, and MPEG is a standard for video compression and coding.
Footnote 1: Among the well-known graphic image formats are:
• Moving Picture Experts Group (MPEG) – Is a standard for audio and video
compression and transmission.
• Joint Photographic Experts Group (JPEG) – Is a compression and coding standard
for still graphic images that works well on photographs, but not well on lettering or
black-and-white line drawings.
• Graphics Interchange Format (GIF) – Is a standard for compressing and coding
graphic images that does not degrade as it is compressed.
• Tagged Image File Format (TIFF) – Is a standard, flexible coding format for graphic
images that uses no compression.
• The Session Layer establishes, maintains, and OSI Model Layer Units
Network 3 Packet
Transport
Layers
Data Link 2 Frame
Footnote 1: The following services and protocols are defined on the Sessions layer:
• Remote Procedure Call (RPC )
• AppleTalk Session Protocol (ASP)
• Network File Services (NFS)
• Session Control Protocol (SCP )
Protocols that work at this layer, such as NetBIOS and RPC, ensure that requests and
responses between applications are completed correctly.
• Is responsible for routing data (packets) through OSI Model Layer Units
the network
Application 7 Message
– Handles the addressing and delivery of data
• Performs these functions1: Application
Presentation 6 Message
Layers
– Host addressing
– Message forwarding
Session 5 Message
– Fragmentation and Reassembly
• IP is the predominant L3 protocol in use today Transport 4 Segment
• The Data Link Layer defines how upper-level data OSI Model Layer Units
Network 3 Packet
Transport
Layers
Data Link 2 Frame
• The Physical Layer defines the electrical, mechanical, OSI Model Layer Units
Session 5 Message
Transport 4 Segment
Network 3 Packet
Transport
Layers
Data Link 2 Frame
Multiple specifications are sometimes used to complete all details of the Physical
Layer. For example, RJ-45 defines the shape of the connector and the number of
wires or pins in the cable. Ethernet and the 802.3 standard defines the use of wires or
pins 1, 2, 3, and 6.
Within the OSI network architecture model, the Physical Layer translates
communication requests from the Data Link Layer into hardware-specific operations.
It deals with details such as connector types, cable specifications and lengths, and
voltages.
Session Message
Network IP Packet
• The TCP/IP protocol suite is the set of communication protocols used for the Internet and
other similar networks
– Defined in RFC 1122 and 1123
• The TCP/IP suite transitioned the responsibility of reliability of delivery from the network to
the end devices, resulting in TCP
Footnote 1: The Internet Protocol Suite is commonly also known as TCP/IP, named
from two of the most important protocols in it: The Transmission Control Protocol
(TCP) and the Internet Protocol (IP), which were the first two networking protocols
defined in this standard. The Internet Protocol Suite, like the OSI model, is
constructed in a set of layers. Each layer performs a specific function involving the
transmission of data. In particular, the layers define the operational scope of the
protocols within.
The TCP/IP model consists of four layers (RFC 1122 and 1123). From lowest to
highest, these are the:
• Link Layer
• Internet Layer
• Transport Layer
• Application Layer
• Has four layers OSI Model Layers TCP/IP Layers TCP/IP Protocol Suite
– Transport Presentation Layer Application Layer HTTP FTP SMTP DNS RIP SNMP
Footnote 1: The Link Layer of the TCP/IP model is often compared directly with the
combination of the Data Link layer and the Physical Layer in the OSI protocol stack.
Although they are congruent to some degree in technical coverage of protocols, they
are not identical. The Link Layer in TCP/IP is wider in scope and in principle is a
different concept and terminology of classification. This may be observed when
certain protocols, such as the Address Resolution Protocol (ARP), which is confined to
the Link Layer in the TCP/IP model, is often said to fit between the OSI Data Link Layer
and the Network Layer. In addition, TCP/IP expects applications to be responsible for
everything above the Transport Layer. In general, direct or strict comparisons should
be avoided.
Internet Layer protocols are:
• IPv4 - Internet Protocol version 4
• IPv6 - Internet Protocol version 6
• ICMP - Internet Control Message Protocol (IPv4)
• ICMPv6 - Internet Control Message Protocol Version 6 (IPv6 version of ICMP)
• IGMP - Internet Group Management Protocol
Link Layer protocols are:
• ARP - Address Resolution Protocol (IPv4)
• NDP - Neighbor Discovery Protocol (IPv6 version of ARP)
Footnote 1: A Protocol Data Unit (PDU) is an OSI term referring to the information
added during the encapsulation process by the Protocol Layer to next the layer above
it. For example, it might add a TCP or UDP port number to identify the application, a
network address to help with routing, a code to identify the type of data in the packet
such as an EtherType or IP data type, or error-checking information such as CRC. The
PDU contains the structured information that is passed to a matching protocol layer
further along on the data's journey that allows the layer to perform its intended
function or service. The matching layer decodes the data to extract the original data
unit, decide if it is error-free, and decide where to send it next.
Session Layer
Network Layer
Internet Layer
• Link Layer
– Controls the hardware devices and media that make up the network TCP/IP Layers
Transport Layer
Internet Layer
Link Layer
Branch
Corp Router Router Web Server
Router
• Internet Layer
– Identifies a path through the network TCP/IP Layers
Transport Layer
Internet Layer
Link Layer
Router
Ethernet Frames Ethernet Frames Ethernet Frames
Internet
IP Datagrams
Web Server
• Transport Layer
– Supports communication between diverse devices across diverse networks TCP/IP Layers
Transport Layer
Internet Layer
Link Layer
Router
Ethernet Frames Ethernet Frames Ethernet Frames
Internet
IP Datagrams
Web Server
“Here is the data, did you get it? (TCP)”
153_laptop.png
• Application Layer
– Represents data to the user and controls dialogue TCP/IP Layers
Transport Layer
Internet Layer
Link Layer
Ethernet Frame
• The Ethernet frame header provides information about the source and destination
endpoints for the frame on the LAN
• EtherType is used to identify upper layer protocol
Ethernet
7 1 6 6 2 45-1500 4
S 4
Destination Source Ty
by
Preamble O Type
pe Data FCS
Address Address tes
F
FC
S
Layer 2 (MAC) Addresses
EtherType =
Upper Layer Protocol
Ethernet Header
Ethernet EtherType
• Identifies the type of data encapsulated in an Ethernet frame
IPv4 Packet
• The IPv4 packet header provides information for routing the packet and how to handle the
data it contains
• IP protocol number is used to identify upper layer protocol
The format of the IPv4 header is shown in the figure. It includes information that
pertains to IP packet forwarding, handling, size, upper layer protocols, lifetime and
integrity.
To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a
32-bit logical address known as an IP address. This address must be unique for each
device in the internetwork. The address is part of the IPv4 header. An IP packet is sent
from an L3 device to another L3 device; therefore, both the source and destination
device addresses must be included in the header.
The IP Protocol field is used to identify the upper-layer protocol that should be used
to interpret the data in the frame payload.
IP Protocol Numbers
TCP Segment
Bit 0 8 16 24 Bit 32
Source Port Number Destination Port Number
Sequence Number
Acknowledgement Number
Data C E U A P P S F
Reserved W C R C S S Y I Window Size
Offset R E G K H T N N
Options Padding
Bit 0 8 16 24 Bit 32
Source Port Number Destination Port Number
Length Checksum
Data
Data Encapsulation
• When data flows down the layers, each lower level adds a header or wrapper to the data
and encapsulates the data it receives from the layer above
• As data flows up the layers, the outside header is stripped from the data through
Decapsulation and the remaining data portion is passed up to the next level
Encapsulation Walkthrough
HTTP
Application Layer Data
Transport Layer
Internet Layer
Link Layer
HTTP
Application Layer Data
Internet Layer
Link Layer
HTTP
Application Layer Data
Link Layer
HTTP
Application Layer Data
• Internet and Link Layers help to deliver the HTTP data to the destination web server
• Transport Layer is used by the end-points (client and server) to confirm receipt
• Application Layer carries data used by client and server
HTTP
Application Layer Data
Internet
Decapsulation Walkthrough
HTTP
Application Layer Data
HTTP
Application Layer Data
HTTP
Application Layer Data
HTTP
Application Layer Data
Web Server
Ethernet
Frame
IP
Packet
Decapsulation
Encapsulation
TCP
Segment
HTTP
LAB EXERCISE
End of Module 3
Standards and Protocols
Module 4
Ethernet and Media Access Control
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
• There are currently three basic forms of network media used in modern networks:1
– Copper (category 5/6 unshielded twisted pair cable)
– Fiber (single mode/multi mode)
– Wireless (IEEE 802.11 common wireless standards b,a,g.n)
• The physical layer accepts the frames from the upper layers and places signals onto the
media in series as binary bits
– Provides encoding of data and control information
– Transmitter and receiver circuitry on the network devices
Footnote 1: Although other media such as coax (bus technology) and shielded
twisted pair have been used in the past modern network deployments incorporate
either or all of the above media types. There are however many different
termination/connection types used especially when it comes to fiber. These will be
discussed in the following slides.
Cable Types
Footnote 1: Shielded twisted pair (STP) cabling adds a metal shielding over each pair
of copper wires. Aids in the shielding of external EMI. Unshielded twisted pair (UTP):
cabling has does not have and metal but Instead are twisted at different rates to
minimize crosstalk and help cancel electromagnetic interference
Footnote 2: Categories range from category 3 through category 7
Footnote 3: Most connections between network devices use fiber due to its higher
speeds and resistance to outside interference. Both can be used as long as the
correct optical connectors are used. Many times distance is the factor on which type to use.
Connectors
• RJ45 RJ45
Most common connecter used with copper
• MRJ21
High density for 1Gb/s connections1 MRJ21
• ST
Spring-loaded, Less commonly used in modern
networks standardized in TIA-604-2
ST
• SC
Snap-in connector providing excellent performance Duplex SC
Standardized in TIA-568-A2
• LC
Most commonly used in modern network due to is Duplex LC
small form factor connector half the size of the SC
standardized in TIA-604-103
• MT_RJ MT_RJ
Duplex connector with both fibers in a single polymer
ferrule - it uses pins for multimode only
Footnote 1: Mini-RJ21 connectors support six 1 GbE ports each. Options include:
• A cable connects from the MRJ-21 connector on the line card to 6 RJ-45 male
connectors
• A MRJ-to-MRJ cable providing connectivity to MRJ capable patch panel2
Footnote 2: Was used for its high quality connections and reliability however its size
became problematic as optic receivers became smaller and smaller due to size
constraints. SC was replaced with the thinner yet reliable LC connectors.
Footnote 3: Because of their compact size and reliability they widely used in
networks today.
• Different versions of SFPs provide increased speed and lower power consumption
– SFP provides up to 4.25Gb/s
– SFP+ provides up to 10Gb/s and 1.5W of power
Footnote 1: There were older transceivers that have now become obsolete such as
GBICs due to their cost, size and slower speeds. Small form-factor pluggable (SFP)
transceivers were specified for up to 4.25 Gb/s. SFP+ refers to transceivers that are
capable of up to 10 Gb/s data rate. SFP was modified to handle more power and the
higher 10Gb/s bit rate to become SFP+.
SFP+ has a slightly modified SFP cage for dissipating the additional heat that is
generated.
Footnote 1: Special cables are used providing a QSFP on one end and 4 x 10Gbits/s
SFPs on the other.
• Hot-pluggable optical transceiver supporting 40Gbit/s and 100Gbit/s using single or multi-
mode fiber
• The CFP was designed after the SFP transceiver interface, but is significantly larger to
support 100 Gb/s
• CFP2
• Uses less power than CFP (12w power)
• 10x10G, 4x25G or 8x25G lane options available
• Future plans to provide 400GE forwarding
• PoE technology passes electrical power along with data on Ethernet cabling
• The standards for PoE requires Category 5 cable or higher for high power levels
– Can operate with Category 3 cable for low power levels
• Power is supplied in common mode over two or more of the differential pairs of wires
found in the Ethernet cables
Footnote 1: The 802.3af specification defined the original standard for PoE and has
been superseded by the 802.3at (PoE+) standard. The 802.3at specification expands
the standards to support higher power levels for more demanding powered devices.
Except where noted, this document will use the term PoE to refer to both PoE and
PoE+
Power over Ethernet (PoE) is a method whereby power is transmitted to Ethernet-
connected equipment (VoIP telephones, WLAN transmitters, security cameras) from
the central switch. By using the existing CAT-5 cabling, the need for AC power (and
wiring costs) can be eliminated. The switch is also able to control power distribution
to the powered devices allowing sophisticated uninterruptible power management
for vital systems.
Devices labeled as PoE are compliant with the IEEE 802.3af standard.
Devices labeled as PoE+ are compliant with both the 802.3af and 802.3at standards.
• Defines terminology to describe a port that acts as a power source to a powered device
• Defines how a powered device is detected
• Defines two methods of delivering PoE to the discovered device
– End-Point PSE — On a PoE-capable Ethernet port power may be delivered to a powered device using the
active data wires of an Ethernet port or the spare wires
• An end-point PSE, such as a PoE-capable Ethernet switch may implement either scheme
– Mid-span PSE — Can be used to deliver PoE if an existing non-PoE-capable Ethernet switch is used
Note: Only one mechanism may be used at a time to deliver power to a powered
device.
PoE Terminology
PD PSE
IP
Intermediary IP Phone
Switch Device
IP
Power
Data
All 802.3af and 802.3at compliant power consuming devices are required to support
both delivery modes defined in the specifications. With both modes, power is
transferred over four conductors between the two pairs. 802.3af and 802.3at
compliant PDs are able to accept power from either set of pairs.
Most PoE switches use the End span method, compliant with the 802.3af and 802.3at
standards.
Note: GbE networks have no spare pairs, as such, only Mode A power delivery can be
used in GbE environments.
• PoE devices support a wide range of IP powered devices including the following:
– Voice over IP (VoIP) phones
– Wireless LAN access points
– IP surveillance cameras
VoIP
Voice over IP (VoIP) is the convergence of traditional telephony networks with data
networks, utilizing the existing data network infrastructure as the transport system
for both services. Traditionally, voice is transported on a network that uses circuit-
switching technology, whereas data networks are built on packet-switching
technology. To achieve this convergence, technology has been developed to take a
voice signal, which originates as an analog signal, and transport it within a digital
medium. This is done by devices, such as VoIP telephones, which receive the
originating tones and place them in UDP packets, the size and frequency of which is
dependent on the coding / decoding (CODEC) technology that has been implemented
in the VoIP telephone or device. The VoIP control packets use the TCP/IP format.
IP surveillance cameras
IP surveillance technology provides digital streaming of video over Ethernet,
providing real-time, remote access to video feeds from cameras. The main benefit of
using IP surveillance cameras on the network is that you can view surveillance images
from any computer on the network. If you have access to the Internet, you can
securely connect from anywhere in the world to view a chosen facility or even a
single camera from your surveillance system. By using a Virtual Private Network (VPN)
or the company intranet, you can manage password-protected access to images from
the surveillance system. Similar to secure payment over the Internet, images and
information are kept secure and can be viewed only by approved personnel.
Ethernet
Layer 2 Devices
• Communicate directly with each other within a LAN using physical and data link
specifications
• First standardized and the most popular L2 protocol used today is Ethernet1
• Able to encapsulate many different protocols received from upper layers of OSI
• Are uniquely identified and forwarded by the use of the Media Access Control (MAC)
address2
– Filtering is limited on MAC addresses
Footnote 1: Although there are other layer 2 protocols Ethernet by far is the most
popular and supported layer 2 protocol today. As such all references made in this
course when referring to layer 2 will be in reference to Ethernet protocol.
Footnote 2: A MAC address is not a logical address; it is a physical address burned
into the network interface controller (NIC) at the factory. The MAC address is used to
uniquely identify each node on the Ethernet network
Ethernet Specifications
Ethernet
LLC Sub-layer
Layer 2
802.3an 10GBASE-T
(Gigabit Ethernet)
Ethernet
(Fast Ethernet)
MAC Sub-layer
IEEE 802.3ab
IEEE 802.3u
IEEE 802.3z
IEEE 802.3
(Ethernet)
Ethernet
Cropper)
Copper)
Layer 1 Layer 1
Physical Layer Physical Layer
Footnote 1: Ethernet separates the functions of the data link layer into two distinct
sublayers:
• Logical Link Control (LLC) sublayer—Defined in the 802.2 standard
• MAC sublayer—Defined in the 802.3 standard
Footnote 2: Many adaptations and enhancements have been applied to Ethernet
allowing it be to even more functional in modern networks. New features such as
VLAN tagging (802.1q), metro Ethernet, Provider Backbone Bridging (PBB),
Multiprotocol Label Switching (MPLS), Data Center Bridging (DCB) and many others
allow additional features and scalability. Many upper protocols have been adapted to
be forwarded by Ethernet due to its popularity and ease of use.
• Ethernet has evolved over its 30-year history to accommodate faster bandwidth speeds
– 10BASE–T 10 Mbit/s 802.3i (half/full duplex) (cat 3 copper)
– 100BASE–TX 100 Mbit/s 802.3u (half/full duplex) (cat 5 copper)
– 1000BASE–SX 1000 Mbit/s 802.3z (fiber)1
– 1000BASE–T 1000 Mbit/s 802.3ab (copper cat 5e)
– 10GBASE-SR/LR 10 Gb/s 802.ae (fiber)2
– 10GBASE-T 10 Gb/s 802.3an (copper cat 6a)
– 40GBASE-SR4/LR4 40 Gb/s 802.3ba (Multi mode/Single mode fiber)
– 100GBASE-SR4 100 Gb/s 802.3bm (multi mode fiber)
• Ethernet frames can encapsulate many upper layer protocols and forward it as payload in a
LAN (broadcast domain)
• Ethernet adds an additional header and footer to what it is forwarded
S F E
O Header Payload C O
F S F
Start of Frame Destination Source Length/ Data Field Frame Check End of Frame
Preamble
Delimiter Address Address EtherType Sequence Delimiter
(46-1500
(7 bytes)
(1 byte) (6 bytes) (6 bytes) (2 bytes) bytes) (4 bytes) (1 byte)
Start of Frame Destination Source Length/ Data Field Frame Check End of Frame
Preamble
Delimiter Address Address EtherType Sequence Delimiter
(46-1500
(7 bytes)
(1 byte) (6 bytes) (6 bytes) (2 bytes) bytes) (4 bytes) (1 byte)
• The Preamble (7 bytes) is followed by a Start of Frame Delimiter (1 byte) totaling a 64-bit
(8 byte) field
– After synchronization is established, the preamble is used to locate the first bit of the frame
Start of Frame Destination Source Length/ Data Field Frame Check End of Frame
Preamble
Delimiter Address Address EtherType Sequence Delimiter
(46-1500
(7 bytes)
(1 byte) (6 bytes) (6 bytes) (2 bytes) bytes) (4 bytes) (1 byte)
• The Destination Address (DA) field is a 48-bit (6 byte) field that specifies the device to
which the packet should be sent
– Each station examines this field to determine whether it should accept the frame
• The Source Address (SA) field is a 48-bit (6 byte) field that contains the unique address of
the station that is transmitting the frame
Start of Frame Destination Source Length/ Data Field Frame Check End of Frame
Preamble
Delimiter Address Address EtherType Sequence Delimiter
(46-1500
(7 bytes)
(1 byte) (6 bytes) (6 bytes) (2 bytes) bytes) (4 bytes) (1 byte)
• The Destination Address (DA) and Source Address (SA) fields each contain a MAC address
• Media Access Control (MAC) Address is also known as:
– Ethernet Address
– Data Link Address
– IEEE Address
– Physical Address
– Hardware Address
A MAC address is not a logical address; it is a physical address burned into the
Network Interface Controller (NIC) at the factory. The MAC address is used to
uniquely identify each node on the Ethernet network
• Ethernet uses a 48-bit (6-byte) Media Access Control (MAC) address to uniquely identify
every physical device
• MAC address is typically represented in hexadecimal format
– e.g. C4:10:8A:6E:6B:21
• The first 24-bit section is an OUI (Organizational Unique Identifier); the last 24-bit section
is the unique serial number of the device which has been created by the manufacturer
Start of Frame Destination Source Length/ Data Field Frame Check End of Frame
Preamble
Delimiter Address Address EtherType Sequence Delimiter
(46-1500
(7 bytes)
(1 byte) (6 bytes) (6 bytes) (2 bytes) bytes) (4 bytes) (1 byte)
Start of Frame Destination Source Length/ Data Field Frame Check End of Frame
Preamble
Delimiter Address Address EtherType Sequence Delimiter
(46-1500
(7 bytes)
(1 byte) (6 bytes) (6 bytes) (2 bytes) bytes) (4 bytes) (1 byte)
• A standard Ethernet frame can contain a maximum of 1500 bytes of payload known as
Maximum Transmission Unit (MTU)
• Jumbo Frames:
– The data field can be up to 9000 bytes in size
– Must be supported on all devices end-to-end in the network1
Footnote 1: Today, most network infrastructures are not configured for Jumbo
frames.
Store-and-forward1 Cut-through
The switch will receive the The switch will receive only the
Store-and-Forward Cut-Through
complete frame into the switch Operation Operation destination MAC address, which
memory buffers and computes a is located in the first six bytes of
cyclic redundancy check the frame before it begins
(CRC) for errors before forwarding the frame to its
forwarding it on destination
A B
Switch Switch
• Broadcast:
– Used when a device is unaware of the MAC address of the destination device
– Forwarding a frame with all the destination address bits set to
FF FF FF FF FF FF is a BROADCAST and is received and processed by all devices within the broadcast
domain
• Multicast:
– MAC addresses with an odd value in the first octet
– IP multicast traffic maps to the first half of the IANA multicast MAC OUI – 01.00.5e
Example multicast MAC address: 01:00:5e:0a:00:01
MAC Learning
Footnote 1: If the sending device is unaware of the destinations MAC it will set the
MAC address to broadcast (FF FF FF FF FF FF).
Footnote 2: When the MAC is placed in the database it will record the source MAC
along with the port it came in on and start a timer which is known as dynamic MAC
learning. If new packets are received on that port from the same source device the
timer is restarted. If no more packets are received from the sending device after the
timer expires the MAC is flushed and removed from the database. The timer provides
maintenance of the database preventing it becoming too large or containing outdated
entries that no longer reside on the LAN. Static MAC addresses can be also configured
in the table causing them to remain until manually deleted.
Footnote 3: Devices will not flood the packet out the port the frame was received on
to avoid duplication of the frame on that link.
Returning traffic
1. The destination device return traffic by swapping the source and destination addresses and placing the
frame on the media
A
2. The switch receiving the frame
will record the source MAC and
its associated port in its database Frame 2
• MAC addresses are learned dynamically on each switch and maintains its own MAC
database
• Example output:
LAB EXERCISE
End of Module 4
Ethernet and Media Access Control
Module 5
Virtual LANs
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
Virtual LANs
Benefits of VLANs
– Improved utilization of a switch and ports by breaking up a physical switch into segregated logical LANs
• Segmenting allows devices to be placed into smaller LANs shrinking broadcast domains
– Improved security by providing isolation of sensitive data into its own Virtual LAN
• Security policies can easily be implemented to traffic residing within a VLAN
– Separating time sensitive data such as IP voice traffic and video feeds from data traffic
• Allows the ability to provide preferred treatment (QoS) to time sensitive data 2
VLAN Types
• MAC-based: Incoming untagged packets assigned to a VLAN based on the source MAC
address of the packet
• Private VLANs: Provides further isolation between ports in the same broadcast domain
VLAN Properties
• A VLAN is:
– A subgroup within a LAN
– A separate broadcast domain
– A logical partitioning of a physical LAN into one or more VLANs
VLAN 10 VLAN 20
Port-based VLAN
VLAN 10 VLAN 20
153_mac
• Devices attached to the same physical port can belong to different VLANs
• Very useful for virtualized servers
0000.5E00.5371 VLAN 20
0000.5E00.53B2 VLAN 30
0000.5E00.5398 VLAN 30
e10
0000.5E00.530F VLAN 40
e1 e4
Router
0000.5E00.5371 0000.5E00.5398
0000.5E00.53B2 0000.5E00.530F
domain IP-Subnet 2
IP-Subnet 3
IPX Net 1
• In this example there are five Appletalk Cable 100
separate VLANs e25
– Three based on IP Subnet FSX
Private VLANs
• A private VLAN is often used in hotels, hospitals, entertainment venues and many public
Wi-Fi networks
– Groups customers within the same VLAN however:
• Preserves the privacy of guests connecting to the public service the owner provides
• Policies can still be applied to the VLAN providing easy management
• VLANs can be configured to isolate its members not allowing them to discover or
communicate with other VLAN members
– Traffic is forwarded to the gateway of the VLAN allowing external communication
• A private VLAN has the properties of standard Layer 2 port-based VLAN but also provides
additional control over the flooding packets on a VLAN
– Provides L2 isolation between ports within the same broadcast domain
• Types of private VLANs:
– Primary (Promiscuous)– Can communicate with all the isolated private VLAN and community private VLAN
ports in the isolated and community1
– Isolated – Broadcasts and unknown unicasts received on isolated ports are sent only to the primary port
• Not flooded to other ports in the isolated VLAN
– Community – Broadcasts and unknown unicasts received on community ports are sent to the primary
port as well as other ports in the community VLAN
• The private VLAN secures traffic between hosts and the rest of the network using a firewall
– Ports (ports e5-6 and e9-10) rely on the firewall to secure
traffic between the hosts and the rest of the network
– Ports e5-6 are in a community private VLAN, and thus can communicate with one another as well as the
firewall
– Ports e9-10 are in an
isolated VLAN and thus
only communicate to
the firewall VLAN 7 VLAN 901.903 VLAN 902
• The two hosts are secured Primary Community Isolated
e2 e5 e6 e9 e10
Firewall
By default, the private VLAN does not forward broadcast or unknown-unicast packets
from outside sources into the private VLAN. If needed, you can override this behavior
for broadcast packets, unknown-unicast packets, or both.
All ports within a VLAN constitute a common Layer broadcast domain No Yes
Broadcasts and unknown unicasts are forwarded to all the VLAN’s ports No (isolated VLAN) Yes
by default Yes (community VLAN)
Known unicasts Yes Yes
VLAN Tagging
VLAN 10 VLAN 20
• VLAN tagging allows multiple VLANs to span switches over a single physical link
– Better utilization of bandwidth and port utilization
• VLAN tagging provides VLAN membership information within the frame when forwarded
to other devices
VLAN 10 VLAN 20
e9
VLAN 10 VLAN 20
VLAN tagging is necessary when VLANs span multiple switches. When VLANs span
multiple switches, a trunk data link is required between the switches. Frames moving
between switches are tagged so that the next switch in the traffic flow path knows
the destination VLAN of the frame.
Network segments that are VLAN-aware include VLAN tags. The VLAN tag represents
the VLAN membership of the frame's port or the port/protocol combination,
depending on whether the network uses port-based or port-and-protocol-based
VLAN classification. The VLAN ID that is in the tag enables each device that receives
the frame to determine the VLAN the frame belongs to. Each frame must be
distinguishable as being within exactly one VLAN.
A port can belong to only one port-based VLAN, unless 802.1Q tagging is applied to
the port.
VLAN identifier (VLAN ID) — A 12-bit field specifies the VLAN to which the frame
belongs. The VLAN ID is determined by the VLAN on which the frame is being
forwarded.
VLAN 802.1Q tagging — The tag contains the tag value that identifies the data as a
tag. It also contains the VLAN ID of the VLAN from which the frame is sent.
Tag Protocol Identifier (TPID) — A 16-bit field is set to a value of 0x8100 in order to
identify the frame as an IEEE 802.1Q-tagged frame. This field is located at the same
position as the Ether Type/Size field in untagged frames, and is thus used to
distinguish the frame from untagged frames.
802.1p Priority Code Point (PCP) — This three-bit field refers to the IEEE 802.1p
priority. It indicates the frame priority level from 0 (lowest) to 7 (highest), which can
be used to prioritize different classes of traffic (voice, video, data, etc.) A value of 0
means that the frame does not belong to any VLAN. In this case, the 802.1Q tag
specifies only a priority and is referred to as a priority tag. The hexadecimal value of
0xFFF is reserved. All other values may be used as VLAN identifiers, allowing up to
4096 VLANs.
determine which VLAN gets the forwarded Port Port Port Port Port
frame Port 1
16 15 14
Tagged
13 12
802.1Q tagged
802.1Q tagged
• If a device is connected to a port in a Port 4 Port 5 Port 6
single VLAN only, the port is untagged untagged
Port 3 Port 7
untagged
Footnote 1: Otherwise one side may interpret frames incorrectly (the 802.1Q tag
field gets treated incorrectly as a length/type field).
If tagging is used on multiple devices, each device must be configured for tagging and
must use the same tag value. In addition, the implementation of tagging must be
compatible on the devices.
• Untagged port - When a PC or other device is connected to a port in a single VLAN,
the port is untagged.
• Tagged ports - Tagging means that traffic from multiple VLANs can be forwarded
by a single switch port. The example in the slide illustrates tagged ports.
• Link Aggregation – The traffic of several VLANs combined on one link might
require more bandwidth than can be provisioned by a single physical link. It is
common to satisfy this need with link aggregation where several physical ports
group together to form one logical port for the inner switch link. Another name for
this logical port is a trunk.
LAB EXERCISE
End of Module 5
Virtual LANs
Module 6
Layer 2 Redundancy
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
Broadcast Domains
PC 1 PC 2
Switch Switch
DDD EEE
PC 1 PC 2
Single broadcast
frame sent by PC 1
The slide shows the replication of traffic if loops are allowed to exist on an L2
network. Each host NIC (for example, PC 1) that is attached to one of the switches
must process all of the traffic that passes through that LAN, regardless of the packet’s
destination MAC. This can result in a broadcast storm, which leads to contention of
available bandwidth and resources. As a result, a lock up of the entire network
broadcast domain occurs.
PC 1 PC 2
The slide graphic shows that the loops have been broken and there is only one path
between any two points in the network. In this slide, the network interface cards
(NICs) are not overloaded with broadcasts, so they are free to process their own
traffic.
• The variations of the Spanning Tree Protocol have all been rolled into the 802.1Q
specifications1
Footnote 1: 802.1D, 802.1w and 802.1s are all incorporated in the current 802.1Q-
2014 specification. The original specifications are still commonly used when
comparing the functionality of one version against another.
If multiple paths exist between different nodes in the Ethernet network, then STP will
place those redundant paths in standby mode (blocked).
Note: The titles on the switch icons are a shorthand representation of a STP/RSTP
Bridge ID. For example: 32K|AAA = 32,768 | AA-AA-AA-AA-AA-AA where the first two
bytes are the bridge priority, in decimal format, and the last six bytes are the bridge’s
MAC address, in hex format.
RSTP provides rapid convergence and leverages the point-to-point wiring topology of
modern networks. Failure in one forwarding path does not affect other forwarding
paths. RSTP improves the operation of the spanning tree while maintaining backward
compatibility.
Rapid Spanning Tree Protocol (RSTP; IEEE 802.1w) is an enhancement of the 802.1D
standard designed to incorporate changes in network structure and devices after
802.1D was written. The This left IEEE 802.1D terminology primarily the same. Most
parameters device IDs and priorities have been left unchanged so that users familiar
with 802.1D can easily configure the new protocol.
IEEE 802.1w is backward compatible to IEEE 802.1D in order to interoperate with
legacy bridges on a per-port basis. When this happens, this drops the benefits that
RSTP introduces.
The latest revision of the 802.1D standard, IEEE 802.1D-2004, incorporates IEEE
802.1t-2001 and IEEE 802.1w standards.
Switch Switch
32K | DDD 32K | EEE
PC 1 PC 2
The root bridge is the one with the numerically lowest bridge ID. Each bridge has a
unique identifier (MAC address) and a configurable priority number; the bridge ID the
combination of both of these values used for Spanning Tree elections of root bridges
and designated bridges, the bridge IDs are compared. If two bridges have equal
priority you still have a winner in the election since the MAC address portion of the
MAC is globally unique. For example, if switches AAA (MAC=AA:AA:AA:AA:AA:AA)
and BBB (MAC=BB:BB:BB:BB:BB:BB) both have the default priority of 32,768, then
AAA will be selected as the root bridge because its MAC address is lower. If the
network administrator would like BBB to become the root bridge, its priority must be
set to a number less than 32,768.
RP RP
Switch Switch
32K | DDD 32K | EEE
PC 1 PC 2
RP = Root Port
Switch DP DP Switch
32K |BBB 32K |CCC
• Non-designated port DP DP
– The ports that lose the election for designated port
• These are blocked by STP RP RP NDP
Switch Switch
NDP
32K | DDD 32K | EEE
DP DP
PC 1 PC 2
DP = Designated Port
NDP = Non-Designated Port
The ports that are neither root ports nor designated ports are blocked by STP so they
cannot forward user traffic.
• BPDU
– Messages exchanged between switches on a LAN segment used to form and maintain a loop-free
topology
– Contain information about switches, ports, addresses, priorities, and costs
• STP uses two types of BPDUs:
– Configuration
• Generated only by the root bridge and sent to non-root bridges
– Topology Change Notification (TCN)
• Generated by the designated bridge of a LAN segment and sent toward the root bridge when the designated port
goes down
• RSTP uses a single BPDU type (RSTP BPDU)
– Flags field is used to denote the purpose of the BPDU
103_RSTP_BPDU_frameFormat.png
Protocol Version
BPDU Type
Flags
Root Identifier
Bridge Identifier
Port Identifier
Message Age
Max Age
Hello Time
Forward Delay
Version 1 Length
Copyright 2018 – ARRIS Enterprises, LLC. All rights reserved
Protocol Identifier — Defines the various protocols supported by the 802.1D and
802.1w standards.
Protocol Version — Defines the version of the Spanning Tree protocol being used, for
RSTP this value will be 2.
BPDU Type — Defines the type of BPDU being transmitted, RSTP BPDUs are type 2.
Flags — In RSTP this is used to define the type of BPDU as well as the current or
proposed port state.
Root Identifier — Who the sending device thinks is the root bridge.
Root Path Cost — The sum of all path costs between this bridge and the root bridge.
Bridge Identifier — The sending bridge’s bridge ID.
Port Identifier — The senders port ID.
Message Age — Number of bridges this BPDU has traversed.
Max Age — The maximum number of bridges a BPDU is allowed to traverse.
Hello Time — The configured hello interval value.
Forward Delay — The configured forward delay value.
Version 1 Length — For RSTP this value is 0. Required for potential future versions of
the protocol that can carry additional values.
• RSTP uses a value of 0x02 in the Type field for all BPDUs
Type = 0x02
Here is the description of the RSTP BPDU type that differentiates it from the STP
BPDU types.
• RSTP has added several flags used to communicate the role and state of a port that sends a
BPDU
– Proposal
– Port Role (2 bits) Topology Change 0
• 00 (0x0) – Unknown
Proposal 1
• 01 (0x1) – Alternate/Backup
• 10 (0x2) – Root Port Role 2
• 11 (0x3) – Designated 3
– Learning
Learning 4
– Forwarding
Forwarding 5
– Agreement
Agreement 6
• Only two flags are defined in STP
Topology Change ACK 7
– Topology Change and Topology Change ACK
Only two flags, Topology Change (TC) and TC Acknowledgment (TCA), are defined in
STP. However, RSTP uses all eight bits of the flag field in order to:
• Encode the role and state of the port that originates the BPDU
• Handle the proposal/agreement mechanism
• Note: The proposal and agreement processes will be discussed later in this
module.
• The bridge ID is the combination of the bridge priority and the bridge’s MAC address
• Lowest Bridge ID wins Root election
• Bridge Priority value can range (0 – 65535)
– Default is 0x8000 (32,768 decimal)
• Example of a Bridge ID you might see on an ICX switch:
0x800000e080547900
Root Bridge ID
2 Byte
Bridge 6 Byte MAC
Priority Address
Bridge Bridge
Priority MAC Address
2 Bytes 6 Bytes
80-00 00-e0-80-54-79-00
We can see that the bridge priority (0x8000) converts to 32,768 decimal.
• Root path cost is defined differently for RSTP than for STP
– These are the recommended default path costs defined in the IEEE standards
Link Speed Default 802.1w Path Cost Default 802.1D Path Cost
10 Mbps 2,000,000 100
100 Mbps 200,000 19
1 Gbps 20,000 4
10 Gbps 2,000 2
100 Gbps 200
1 Tbps 20
10 Tbps 2
This slide shows a side-by-side comparison of the defaults used by many vendor
switches for both STP and RSTP path costs. The STP protocol only has path costs
defined up to link speeds of 10 Gbps while RSTP defines path costs up through 10
Tbps links. This is just one example of the overall scalability of RSTP vs STP.
Note: The original STP and RSTP specifications recommends these ranges of values
for path costs but the ultimate decision is left to the equipment vendor. As a result
different vendors may use different default values. This should be kept in mind when
configuring switches to operate in heterogeneous environments.
153_bpdu
• The summation of port costs from Root Bridge to the bridge sending the BPDU
• Root path cost is applied at the ingress port
e1 e1
Root Path Cost
Looking out port e1 Looking out port e1
Root Path Cost = 2,000 e1 Root Path Cost = 2,000
The root path cost is the summation of port costs between the bridge sending the
BPDU and the Root Bridge. The individual port costs are added to the total listed in
the Root Path Cost field of the BPDU when the BPDU goes out another port on that
switch.
For example: In the above diagram a BPDU is sent from the Root Bridge with a Root
Path Cost of zero. When it goes out port e2 of BBB a Port Cost of 2,000 is added to
the Root Path Cost. The BPDU is received by port e2 of CCC with a cost of 2,000; CCC
will add the cost of the 1 Gbps link (20,000) and compute a total Root Path Cost of
22,000.
153_bpdu
• The Bridge ID of the device that sent this BPDU whose LAN segment is attached to the
receiving port
Sender Bridge ID
Root BID 32K|AAA Root BID 32K|AAA
Root Path Cost 0 Root Path Cost 2,000
Sender BID 32K | AAA Sender BID 32K | BBB
Port ID 0x8002 Port ID 0x8005
10 Gbps 1 Gbps
Port Cost = 2.000 Port Cost = 20.000
e2 e3 e5 e7
32K | BBB 32K | CCC
32K | AAA
Non-Root Non-Root
Root Bridge
Bridge Bridge
The above slide shows a configuration BPDU being transmitted from the Root Bridge
through a chain on non-Root Bridges. Each time a BPDU is forwarded, the sender's
Bridge ID and the sender's Port ID is changed.
Port ID
4 Bits 12 Bits
Priority Port Number
Comparing port IDs is the last step in the Device Election Process. After the Root ID,
the election compares: the path cost, sender bridge ID, and finally the port ID. If the
path cost and sender bridge ID result in a tie, the election tie breaker compares port
ID’s. If the ports priorities are set to default values, then ports e1 and e3 would be:
e1 = 0x8001, e3 = 0x8003.
If you reduced the port priority of e3 from 128 to 112, then port e3 would win over
e1.
Port Priority has to be in increments of 16 (0 – 255), the default is 128.
Note: The port ID is associated with the port of the sending bridge, not necessarily a
port on the root bridge. For a BPDU passing though a series of bridges,
beginning with the root bridge, the “port ID” value in the BPDU changes to reflect the
ID of the port that last transmitted the BPDU.
Port initialization
Non-designated ports:
• Port is blocked
Blocking state • MAC table remains empty
In the STP algorithm, a port transitions through the following states to determine if it
will either forward data traffic or block data traffic:
• Listening—This state blocks traffic, listens for BPDUs, and builds the STP tree
topology to ensure there are no loops in the network. Creation of the STP
topology, within a particular VLAN, involves election of the root bridge and a
designated bridge for each LAN segment inside of the VLAN. If the port is classified
as either a root port or designated port, it will move to the learning state when the
forwarding timer expires. If the port has no designation, then it moves to the
blocking state.
• Learning—In the Learning state, root ports and designated ports continue to block
data traffic as the switches learn MAC addresses and build their MAC tables.
• Forwarding—The second expiration of the forwarding timer moves root ports and
designated ports to the forwarding state to start forwarding traffic.
• Blocking—Data traffic is blocked for a non-designated port, but BPDUs are allowed
to circulate. The bridge priority, port priority, and path cost can be changed so that
a pre-determined outcome occurs in the election process (Learning state).
• In RSTP there are two steady port states: forwarding and discarding1
• Additional port roles have been added to facilitate rapid convergence through the tree
Final Port
STP State RSTP
Forwarding
Designated Port Designated Port
Forwarding
Alternate Port
No Role
Discarding
Blocking
Backup Port
Disabled
Footnote 1: RSTP ports, while progressing towards a forwarding state will briefly
enter a Learning state. This corresponds to the Learning state in STP. In this state the
port is building a MAC table, but not forwarding traffic yet
Forwarding Ports
Root Port — Port having the best path to the root switch.
Designated Port — On a given link, it is the port having the superior BPDU.
Edge Port — A special type of designated port. It is a port that has been identified
as being at the edge of the network, and hence, comes up immediately as a
designated port. This is similar to the proprietary fast port span in 802.1D.
Point-to-Point Port — A special type of designated port that has been identified via
manual configuration as linking two bridges together.
Note: The port state can be disabled if RSTP (or STP) is removed from the
configuration. No RSTP (or STP) algorithm/calculations are being done on the port,
but the port is still up and forwarding user traffic.
Discarding Ports
Alternate Port — A port that is not a root port, and can not be a designated port,
because it is receiving a superior BPDU from another switch on the same LAN
segment.
Backup Port — A port that is not a root port, and can not be a designated port,
because it is receiving a superior BPDU from another port on the same switch.
Disabled Port — A port not controlled by RSTP either because it is down,
Designated / Root /
Forwarding Forwarding
Root Bridge
e2/1/4 e1/3/1 e1/3/2
End Station
e2/3/1 e2/3/2
Edge Port Point-to-Point
Designated / Alternate /
Forwarding Discarding
Edge and point-to-point ports were defined in the RSTP standard in order to give
administrators more control over the behavior of Spanning Tree.
BDPU
BDPU
When multiple devices are in competition for any of the titles—root bridge, root port,
designated bridge, and designated port—they must exchange BPDUs. Inside each of
these packets is a report from the sending bridge about what it considers to be:
• Root bridge ID
• Root path cost
• Sender bridge ID (its own ID)
• Port ID (the port that the BPDU was sent from)
These are compared until there are two unequal values.
In the above diagram Bridge AAA wins in step 1a of the Device Title Election Process
since MAC portion of its Bridge ID is lowest (32K|AAA < 32K| BBB) between Bridge
AAA & Bridge BBB.
32K|AAA <32K|BBB
is elected Root Bridge
Election Ends
Switch
32K | AAA
BPDU from switch AAA thru BBB to DDD
Root BID 32K|AAA
Root Path Cost 2,000
Sender BID 32K | AAA Switch
32K | BBB
Port ID 0x8005
1 Gbps Link
Winner! BPDU from switch DDD to BBB
Root BID 32K|DDD
(AAA < DDD) Root Path Cost 0
Switch
32K | DDD Sender BID 32K | DDD
Port ID 0x8008
Bridge AAA wins again in step 1b of the Device Title Election Process since the MAC
portion of its Bridge ID is lowest (32K|AAA < 32K|BBB < 32K|DDD).
Switch
10 Gbps Link 32K | DDD
1 Gbps Link
• Bridge BBB & CCC: Path Costs are equal & Sender BID breaks tie
– 32K|BBB < 32K|CCC Root Bridge
Switch
32K | AAA
Switch Switch
32K | BBB 32K | CCC
Adv Cost = 2,000 Adv Cost = 2,000
Bridge EEE is determining if port e1 or e2 will be its Root Port. But, steps 1 and 2 in
the election result in a tie. In step 3 the Sender BID’s are compared. Sender BID
received on port e1, 32K|BBB wins over the Sender BID received on port e2, which is
32K|CCC (because 32K|BBB < 32K|CCC). Port e1 becomes switch EEE’s Root Port..
Election Ends
PC 1 PC 2
10 Gbps Link
1 Gbps Link
Footnote 1: Note that an additional 10 Gbps link has been added to between
switches CCC and EEE. This link will be used in upcoming slides to reflect switch
behavior in the event of a topology change.
Step 3 Determine which ports will be in Alternate ports, while blocking loops
DDD: The 1 Gbps port connecting to BBB will become an Alternate port because
the cost of the port is higher than the alternative 10 Gbps port.
DDD: The 10 Gbps port connecting to CCC will become an Alternate port because,
while the path cost is equal, the sender Bridge ID of CCC is higher than the
alternative.
EEE: Both ports connecting EEE to CCC will be Alternate ports because, while they
are equal cost to the root, the Bridge ID for switch BBB is lower that switch CCC.
Step 4 Discard on all non-designated ports
Non-designated (Alternate/Backup) ports are on non-designated bridges and are
not Root Ports. The ports are blocked to create a loop-free topology. The only non-
designated Bridges on the network are CCC and DDD.
RSTP Handshaking
The handshake process is used by RSTP bridges to establish port roles and to
communicate those roles to neighboring bridges. This handshake process, in addition
to the addition of the alternate/backup, port roles is what allows RSTP to perform
rapid reconvergance in the event of a failure.
Note: This is a highly simplified view of the handshake process. There are actually two
separate handshake processes, which one is used depends on if a root port has been
elected on the bridge. These examples show the process for a bridge that does not
have an existing root port. For more information on the election process consult the
IEEE 802.1w standard or the configuration guide for your switch.
• Designated port on the root bridge (AAA) sends a BPDU with the Proposal flag set
• The Proposal flag indicates that the designated port is ready to transition to a forwarding
state
Root Bridge
Switch Switch
Switch
32K | BBB 32K | CCC
32K | AAA
Proposing Proposed
The handshake process starts with the root bridge and works its way through the rest
of the tree. A BPDU is sent by the root bridge (AAA) with the proposal flag set, this
indicates that the designated port is ready to start forwarding traffic. Bridge BBB
receives the proposal and uses it to determine which of its ports will be root ports
and which will be alternate ports.
Note: That if the admin-pt2pt-mac is not enabled on the port the RSTP handshake
will be ignored for newly added links.
153_handshake
• Once the Root port on bridge BBB is determined the remaining ports are instructed to sync
• The Root port then sends back a BPDU with the Agreed flag set
• At this point the handshake between AAA and BBB is complete
Root Port
Root Bridge Forwarding Synched Switch Switch
Switch
32K | BBB 32K | CCC
32K | AAA Designated Port Discarding
Forwarding Synched
Agreed
During the agreement stage of the handshake process the agreeing switch will sync
it’s remaining ports (the ports that have not received the RSTP BPDU) and send an
agreed RSTP BPDU back to the originating bridge. In order to sync its ports bridge BBB
transitions them all to a discarding state then flushes the MAC tables.
The sync and synced processes are performed internal to the switch and thus are not
detailed here. It should be noted that the sync process occurs prior to the agreed flag
being sent from the root port.
• At this point the ports between AAA and BBB are in a Forwarding state
• The handshake process continues in the same fashion between BBB and CCC
Proposing Proposed
Agreed
Once the handshake process has completed between the root bridge and the
adjacent bridges the same process will continue through the tree. This propagates
the topology outwards from the root until all nodes have been touched.
STP/RSTP Convergence
• If the link between BBB and EEE goes down with STP enabled:
CCC Port# Port ID
e1 0x8001
– EEE learns its new path to the root bridge Route Bridge
e2 0x8002
Route Bridge
Switch
32K | AAA
Switch Switch
32K | BBB 32K | CCC
e1 e2
Switch Switch
32K | DDD 32K | EEE
Footnote 1: BPDUs are constantly exchanged between STP and RSTP switches, even
on ports that are Alternate ports. This is critical to for expedient resolution of a loop
free topology after a network change or event.
Election Ends
Switch Switch
– CCC and EEE will exchange BPDUs to determine 32K | BBB 32K | CCC
which port will go into blocking/alternate state e1 e2
Switch e1 Switch
32K | DDD 32K | EEE
Switch
32K | AAA
Switch Switch
32K | BBB 32K | CCC
e1 e2
e1
Switch Switch
32K | DDD 32K | EEE
Switch 2
In large switched networks, receipt of BPDUs is often delayed. This delay can cause
issues such as convergence time problems. Per-VLAN Spanning Tree (PVST) is a
solution for these problems.
PVST maintains a spanning tree instance for each VLAN configured in the network. It
uses Inter-Switch Link (ISL) trunking and enables a VLAN trunk to be forwarded for
some VLANs but blocks other VLANs. Because PVST treats each VLAN as a separate
network, it can load balance L2 traffic by forwarding some VLANs on one trunk and
other VLANs on another trunk without causing a Spanning Tree loop.
• PVST can be used to load share L2 traffic by sending traffic from different VLANs onto
different physical links
• Traffic from one VLAN can be forwarded over another VLAN without causing a loop
e1 e1
e2 e2
VLAN 100 e2 VLAN 100 e2
e3 e3 e3 e3
BLK 201
FWD 201 BLK 201
FWD 100 FWD 100
BLK 100
e3 e2 e3 e3 e2 e3
e2 e2 FWD 201
Switch 3 e1 Switch 4 Switch 3 e1 e1 Switch 4
e1 FWD 100
Root Bridge for Root Bridge for Root Bridge for Root Bridge for
VLAN 201 VLAN 100 VLAN 201 VLAN 100
• Multiple Spanning Tree Protocol (MSTP) was originally defined in IEEE 802.1s
– This was later incorporated into the 802.1Q standard
• It allows multiple VLANs to be managed by a single STP instance
– This protocol configures a separate spanning tree instance for each group of VLANs and blocks all but one
of the possible paths
• MSTP isolates failures within an MST instance, thus reducing the impact of a link failure
• VLAN 4092 is reserved for instance 0, the Internal Spanning Tree (IST)
Common Spanning (CST) – Defined as one spanning-tree instance for the entire
bridged network regardless of the number of VLANs. In MSTP, an MSTP region
appears as a virtual bridge that runs CST.
IST Instance 0
Internal Spanning Tree (IST) – IST is a new terminology introduced in MST. An MSTP
bridge must handle at least these two instances: one IST and one or more MSTIs
(Multiple Spanning Tree Instances). Within each MST region, the MSTP maintains
multiple spanning-tree instances. Instance 0 is a special instance known as IST, which
extends CST inside the MST region. IST always exists if the switch runs MSTP. Besides
IST, this implementation supports up to 15 MSTIs, numbered from 1 to 4094.
An older switch that only supports 802.1D may be added as a part of the CST but not
inside a region; RSTP must be run within a region.
MSTP Instances
CST
Non-MST Device
Multiple Spanning Tree Instance (MSTI) – The MSTI is identified by an MST identifier
(MSTid) value between 1 and 4094.
Common and Internal Spanning Trees (CIST) – CIST is a collection of the ISTs in each
MST region and the CST that interconnects the MST regions and single spanning
trees.
Note: One or more VLANs can be mapped to one MSTP instance (IST or MSTI), but a
VLAN cannot be mapped to multiple MSTP instances.
MSTP Regions
• MSTP Regions
– Clusters of bridges that run multiple instances
of the MSTP protocol
– Multiple bridges detect that they are in the same region
by exchanging their configuration information
– One or more VLANs can be mapped to one MSTP
instance, but a VLAN cannot be mapped
to multiple MSTP instances
MSTI 1
VLANs 101-150
Non-MSTP Device
MSTP Region – These are clusters of bridges that run multiple instances of the MSTP
protocol. Multiple bridges detect that they are in the same region by exchanging their
configuration (instance to VLAN mapping), name, and revision-level. Therefore, if you
need to have two bridges in the same region, the two bridges must have identical
configurations, names, and revision-levels. Also, one or more VLANs can be mapped
to one MSTP instance (IST or MSTI), but a VLAN cannot be mapped to multiple MSTP
instances.
Note: One or more VLANs can be mapped to one MSTP instance (IST or MSTI), but a
VLAN cannot be mapped to multiple MSTP instances.
Common Spanning
Tree (CST)
CIST Instance
(Instance 0)
Region 1 Region 2
SW1 MST
SW2
MST MSTid3 = VLAN 11-15
MSTid3 = VLAN 11-15 MSTid4 = VLAN 16-20
MSTid4 = VLAN 16-20
e2
SW4 SW5
SW3
IST IST
(Instance 0) (Instance 0) e2
e2
Using MSTP, the entire network runs a common instance of RSTP. Within that
common instance, one or more VLANs can be individually configured into distinct
regions. The entire network runs the CST instance and the regions run a local instance
(IST). The CST treats each instance of IST as a single bridge. Consequently, ports are
blocked to prevent loops that might occur within an IST and also throughout the CST.
With the exception of the provisions for multiple instances, MSTP operates exactly
like RSTP.
For example, the network in the diagram above is configured with two regions:
Region1 and Region2. The entire network is running an instance of CST. Each of the
regions is running an instance of IST. In addition, this network contains Switch1
running MSTP that is not configured in a region and is running in the CIST instance. In
this configuration, the regions are each regarded as a single bridge to the rest of the
network, as is Switch1. The CST prevents loops from occurring across the network. As
a result, port e2 is blocked on switch6. Additionally, loops must be prevented in each
of the IST instances. Within IST Region1, port e2 on switch4 is blocked to prevent a
loop in that region. Within IST Region2, port e2 on switch3 is blocked to prevent a
loop in that region.
After the system is configured for MSTP, CIST is created and all existing VLANs inside
the MSTP scope are controlled by CIST. In addition, whenever a new VLAN is created
inside the MSTP scope, it is put under CIST control by default. CIST always controls all
ports in the system. (Configure the no spanning tree command under the specified
interface configuration to keep a specific port from running MSTP.)
LAB EXERCISE
End of Module 6
Layer 2 Redundancy
Module 7
Link Aggregation & Layer 2 Discovery
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
• A LAG is a method of interconnecting networking devices with two or more physical links,
which are combined to function as a single logical link
• LAGs are sometimes referred to as PortChannels or trunks1
• LAG requirements may vary for different platforms, such as the number of links in the LAG,
specific port boundaries, etc.
– Always check what is supported at each ends
e10 e4
e11 e5
Switch 1 Switch 2
Footnote 1: A link aggregation group (LAG) is a way to provide more than one link
between two switches. By aggregating links together in a group, the MAC client treats
it as a single link. The larger virtual link can carry increased bandwidth. A LAG is also
referred to as:
• Ethernet trunk
• NIC Teaming
• Port Channel
• Port Teaming
• Port Trunking
• Link Bundling
• EtherChannel
• Multi-Link Trunking (MLT), Distributed Multi-Link Trunking (DMLT) , Split Multi-
Link Trunking (SMLT) , Distributed Split Multi-Link Trunking (DSMLT), and
Routed-SMLT (R-SMLT)
• NIC bonding
• Network Fault Tolerance (NFT)
• Fast EtherChannel
LAG Advantages
• Load sharing
• Additional bandwidth
• Redundancy
– LAGs provide redundant, active alternate paths for traffic if any of the segments fail
• Reconvergence avoidance
Compared with a connection using a single cable, link aggregation enables faster
transmission speed and better availability. You can create a LAG for multiple Ethernet
ports with load-shared Layer 2 (L2) bridging traffic across the member links of this
group. This configuration provides redundancy and addresses traffic congestion
concerns as well.
A conventional port-to-cable-to-port connection presents three single points of
failure: the cable or the ports can fail. To work around this issue, you could make
multiple physical connections, but many high-level protocols are not designed for
seamless failover. As a component of high availability planning, a LAG reduces single
points of failure.
• Rules for LAGs are heavily dependent on the hardware type and code version in use
Footnote 1: Each port in the LAG will operate at the speed of the slowest link. For
example if one LAG is created with 2 ports and one is running at 10 Gbps and the
other is running at 1 Gbps; the 10Gbps link must be configured to operate at 1Gbps
speed in order for the LAG to form on both links.
Footnote 2: All physical links in the LAG must connect to the same adjacent switch,
which can be stackable switches. This typically results in a single point of failure if the
physical switch to which both links are connected goes offline.
• Link Aggregation Control Protocol (LACP) is the protocol used to control the bundling of
several physical ports together to form a single logical link
• LACP allows a network device to negotiate an automatic bundling of links by sending Link
Aggregation Control Protocol Data Units (LACPDUs) to a directly connected device
– Both devices must be configured to use LACP
Footnote 1: The IEEE 802.3ad standard describes Link Aggregation Control Protocol
(LACP), which is a method of automating the configuration and maintenance of the
LAG. LACP allows ports on both sides of a redundant link to form a trunk (aggregate
link) without the need for manual configuration of the ports into trunk groups. When
LACP is enabled on a group of switch ports, the ports can negotiate with the ports at
the remote ends of the links to establish LAGs.
SW1 SW2
e1 e1
e2 e2
Switch 2
You can specify the mode in which LACP packets are exchanged:
• Active mode – An LACPDU is automatically transmitted to the peer on the other
side of the link as soon as the link is online
• Passive mode – An LACPDU will only be transmitted if one has been received from
the peer on the other side of the link
SW1 SW2
e1 e1
e2 e2
Key 20 Key 20
e3 e3
e4 e4
e5 e5
e6 e6
Key 10 Key 40
e7 e7
e8 e8
As illustrated in the diagram, on SW1, because each four-port group has a different
key, ports 1 to 4 and 5 to 8 will not be in the same link aggregation group; neither will
ports 1 to 4 and ports 5 to 8 on SW2.
Keys on partner devices on the opposite side do not have to match.
NOTE: In conformance with the 802.3ad specification, the default key assigned to an
aggregate link is based on the port type (1 Gbps port or 10 Gbps port).
LACP message parameters include:
• Local system identifier (priority and system MAC)
• Local port identifier (priority and port number)
• Key assigned to the port
• Local state flags
• Is configured on each device running LACP, either automatically or through the CLI
The LACP system priority is used whenever devices encounter a conflict when
forming a LAG. For example, a conflict can occur if two devices are both configured
with the default setting of 127. The system priority value is assigned to resolve the
conflict - the lower the number, the higher the priority. The system with the lower
number (higher priority) becomes the controlling system. If both switches have the
same LACP system priority value, the switch with the lowest LACP system ID has
priority. The LACP system ID is the combination of the two-octet binary LACP system
priority value and the MAC address of the router.
A LACP system priority value is configured on each device running LACP, either
automatically or through a CLI.
• Port priority determines which ports should be put in standby mode if a hardware
limitation prevents all compatible ports from aggregating.
• LACP uses the port priority field with the port number to form the port identifier
• Ports are selected and assigned for aggregation starting with the highest priority port of
the highest priority system
When you enable LACP, you can configure the port priority automatically or through
the CLI. The port priority determines which ports should be put in standby mode if a
hardware limitation prevents all compatible ports from aggregating. Ports are
selected and assigned for aggregation starting with the highest priority port of the
highest priority system.
LACP uses the port priority field with the port number to form the port identifier. The
port priority value is the two most-significant octets of the LACP port ID; the port
number is the two least-significant octets. The port priority range is from 0 to 65,535.
Timers Flags
• Define the rate at which devices exchange • Communicate port state between systems
LACPDUs • If a unidirectional link failure occurs, link
• Short is one second transitions to LACP blocked state1
• Long is 30 seconds • The receiving system responds to the loss
• Allow LACP to keep the LAG active and of three consecutive LACPDUs by:
– Clearing its Synchronization, Collecting, and
forward traffic
Distributing flags
• Corresponding timeouts are 3 seconds or – Setting its Expired flag
90 seconds • The sending system responds by:
• You can configure the use of short or long – Clearing its Synchronization, Collecting, and
timeout values instead of following the Distributing flags
standard of short then long
Static LAGs
• Static configuration is used to connect an Ethernet switch to another switch or device that
does not support LACP
– Ports are manually added to a LAG
• When using a static configuration, a cabling or configuration mistake at either end of the
LAG could go undetected and cause undesirable network behavior
• Both dynamic and static use the same load-balancing forwarding methods.
• Because there is no sequencing method in Ethernet, frames must arrive in order at the
destination
• On egress, LAGs select one link for each conversation to ensure ordered delivery
LAGs use algorithms to determine how to distribute the traffic on the links. When a
LAG is configured to use a hashing algorithm, it uses frame or packet attributes to
determine the outgoing physical port. Hashing decisions are most commonly made
based on values in the frame/packet fields. The hashing algorithm attempts to
manage bandwidth by evenly load-balancing egress traffic among the physical ports
of the LAG.
• Device discovery protocols run over the Data Link Layer (Layer 2) to allows network devices
to learn about other devices that are connected to the network
• Using standard management tools makes physical topology information available and
helps network administrators detect and correct network malfunctions and inconsistencies
in configuration
• Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1AB, enables
standardized discovery of nodes
Footnote 1: LLDP is a vendor-neutral link layer protocol that is described in the IEEE
802.1AB standard.
Footnote 2: A MIB is a tree structured set of data values used in protocols such as
SNMP and LLDP
“I’m an IP “I’m a
Phone.” PC.”
LLDP Benefits
• Network management
– Enables discovery of accurate physical network topologies such as which devices are neighbors and the
ports through which they connect
– Enables discovery of stations in multi-vendor environments
• Network inventory data
– Supports optional system name, system description, system capabilities, and management address
– Provides device capability, such as switch, router, or WLAN access port
• Network troubleshooting
– Detects speed and duplex mismatches, VLAN mismatches, and IP misconfigurations
– Accurate topologies simplify troubleshooting in enterprise networks
• Are packets sent by LLDP agents with information about a sending device/port
• Consist of an untagged Ethernet header and a sequence of type, length, and value (TLV)
fields
– Type – Identifies the kind of information being sent
– Length – Indicates the length (in octets) of the information string
– Value – Is the actual information being sent
• Two types of LLDP TLVs are specified in the IEEE 802.3AB standard:
– Basic management TLVs consist of both optional general system information TLVs as well as mandatory
TLVs
– Mandatory TLVs are the first three TLVs in the LLDPDU and are part of the packet header
LLDP agents transmit information about a sending device/port in packets called LLDP
data units (LLDPDUs). All the LLDP information to be communicated by a device is
contained within a single 1500-byte packet.
Each LLDPDU consists of an untagged Ethernet header and a sequence of short,
variable length information elements known as TLVs. TLVs have type, length, and
value fields:
• Type identifies the kind of information being sent
• Length indicates the length (in octets) of the information string
• Value is the actual information being sent (for example, a binary bit map or an
alpha-numeric string containing one or more fields).
There are two types of LLDP TLVs, as specified in the IEEE 802.3AB standard:
• Basic management TLVs consist of both optional general system information TLVs
as well as mandatory TLVs.
• Mandatory TLVs cannot be manually configured. They are always the first three
TLVs in the LLDPDU and are part of the packet header.
LLDP TLVs
LAB EXERCISE
End of Module 7
Link Aggregation & Layer 2 Discovery
Module 8
IP Addressing
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
IP Basics
IP Addressing
• Introduction
• An IP address is a numerical identification (logical address) that is assigned to a device in
a network using IP for communication with other devices1
– Provides effective scalability due to its hierarchical design
– Provides the optimal forwarding of packets between networks
• IP addresses used to forward traffic across the Internet require a public, routable
address3
Footnote 1: IP addresses provide the ability to route traffic from one LAN to another.
It also provides a scalable way to allow many different devices and networks to be
accessible to each other. Layer 3 addressing can be deployed allowing hierarchical
design providing summarization or grouping of networks simplifying the routing table
within a device.
Footnote 2: A router can gather information either statically or dynamically from
neighbor routers allowing it to choose the best path for forwarding packets from LAN
to another. Identification of the destination IP address of a packet is then compared
to this gathered information and sent out an interface towards the optimal path.
Footnote 3: Devices that access to the Internet are represented by a public IP address
allowing it to be uniquely identified on the network. Devices that are associated with
a unique public IP address can have packets sent/received from that address.
Addresses can either be public or private depending on their what network they are
directly connected to. Private and public IP addresses will be discussed in more detail
later in this module.
• Though a LAN is created using L1 and L2 hardware, such as an L2 switch, the LAN is
identified by its L3 network address
IP Address IP Address
10.1.1.5 20.1.1.3
Layer 3 – IP Versions
Footnote 1: The Internet Protocol is the key element that defines the Internet.
Although IPv4 is the dominant protocol used in networks today it will eventually be
replaced by IPv6 protocol. Currently public IPv4 address have been exhausted
therefore any new public addresses issued by IANA are IPv6. Not only does IPv6 use
a 128 bit hexadecimal address it provides an extremely large number of unique
addresses. It not only overcomes some limitations of IPv4 such as neighbor discovery
by broadcast, it provides many enhancements.
Footnote 2: Each of the 8 groups within the IPv6 address represents 16 bits (two
octets). Each group is separated by colons and can be abbreviated which will be
further discussed later in this module.
Analogy
• The difference between an L2 MAC address and an L3 IP address is similar to the
difference between a persons name and street address
• Although the address of the physical location is permanent it will represent the occupant
while they reside there
Footnote 1: As your device (laptop) moves from your home to the coffee shop the L3
address assigned will change however your L2 (MAC) will remain the same.
IPv4 Header
20 bytes
Lifetime >=1 Time to Live (8) Protocol (8) Header Checksum (16) Integrity Check
The format of the IPv4 header is shown in the figure. It includes information that
pertains to IP packet forwarding, handling, size, upper layer protocols, lifetime and
integrity. An IP address must be unique value for each member device on the
network. The IPv4 header is used to route the traffic towards its destination. The
header contains the source and destination IPv4 addresses allowing both sender and
receiver to be identified. Additional information such as the encapsulated upper layer
protocol as well as its priority and time to live values are also included in the IP
header.
Header Fields:
Version: 4 bits The Version field indicates the format of the internet header. This
document describes version 4.
IHL: 4 bits Internet Header Length is the length of the internet header in 32 bit words,
and thus points to the beginning of the data. Note that the minimum value for a
correct header is 5.
Type of Service: Although replaced with Differentiated Services Code Point this field
is used to set the priority and effects the handling of the packet as it moves onto its
destination. More details on the DSCP will be discussed in later modules.
Total Length: 16 bits Total Length is the length of the datagram, measured in octets,
including internet header and data. This field allows the length of a datagram to be up
to 65,535 octets. Such long datagrams are impractical for most hosts and networks.
All hosts must be prepared to accept datagrams of up to 576 octets (whether they
IPv4 Addressing
• Transmission Types
• Network device transmission types based on Layer 3 (L3) forwarding:
– Unicast1—One-to-one communication
– Multicast2 —One-to-a (logical) grouping of devices or clients
– Broadcast3 —One-to-all communication
• This is still hard to read, so each octet is converted to its equivalent decimal number
– This format is called the dotted-decimal-notation or
dotted quad notation
192.168.100.10
Binary Positional
128 64 32 16 8 4 2 1
Values
Base-2 27 26 25 24 23 22 21 20
The binary numeral system, or Base-2 number system, represents numeric values
using two symbols of 0 and 1.
Bits on the far right of each octet is considered the lest significant bit therefore it is
the beginning of the binary chart. Each octet are visually independent when it comes
to its binary value but when these values are combined they collectively identify a
unique IPv4 address. To convert the binary address you must add up all the bits set
to 1 within each octet in order to produce the corresponding decimal based IP
address notation.
Binary Positional
128 64 32 16 8 4 2 1
Values
Base-2 27 26 25 24 23 22 21 20
Subnet Mask
192.168.200 .100
255.255.255 .0
Subnet Mask
• RFC 791 categorizes a range of numbers used by network devices into classes
Class 1st Octet From To Subnet Mask CIDR1
Class A 0xxxxxxx 1.0.0.0 126.255.255.255 255.0.0.0 /8
Class B 10xxxxxx 128.0.0.0 191.255.255.255 255.255.0.0 /16
Class C 110xxxxx 192.0.0.0 223.255.255.255 255.255.255.0 /24
Class D 1110xxxx 224.0.0.0 239.255.255.255 Multicast (No mask)
Class E 1111xxxx 240.0.0.0 255.255.255.255 Reserved (No mask)
• An IP address accompanied by a subnet mask defines the network portion and host
portion of a subnet
– Class-based subnet masks use 8-bit blocks to note network address boundaries
Address Blocks
10.0.0.0
10.0.0.1 10.255.255.254 10.255.255.255
255.0.0.0
172.168.0.0
172.168.0.1 172.168.255.254 172.168.255.255
255.255.0.0
192.168.200.0
192.168.200.1 192.168.200.254 192.168.200.255
255.255.255.0
Footnote 1: Any traffic that is needing to be sent to all devices residing within the
subnet will have its destination address set to this broadcast address. All devices
within the subnet will process packets with this destination address. Many networks
block any broadcast messaging that did not originate on the local subnet also referred
to as “targeted broadcast”
Private IP Addresses
• The public IPv4 address space has been depleted (as of October 2015)
• To allow for the continued allocation of IPv4 addresses, a range of addresses was identified
for use on private networks
• RFC 1918, “Address Allocation for Private Internets,” reserved the following address ranges
for use:
– Class A: 10.0.0.0/8 (10.0.0.0–10.255.255.255)
– Class B: 172.16.0.0/12 (172.16.0.0–172.31.255.255)
– Class C: 192.168.0.0/16 (192.168.0.0–192.168.255.255)
• These private addresses must remain in the LAN and will not be routed on the internet
– Traffic destined to the internet with a source address that is private will be translated to a public address
at the edge of the LAN before it is forwarded1
Footnote 1: As traffic leaves the private network the source address (private address)
will be translated to a public address. Any traffic that is returned and destined to the
private source then the destination IP address is translated back to the original
private address. This process of translating the private address to a public is a
common practice and is called Network Address Translation (NAT) or Port address
Translation (PAT). Both of these processes will be discussed further in later modules.
Network
Address
Network
Network Address Network
Address
Network Address
Address
Network
Address
Network Sub-Networks VLSM
Supernet
Supernet: the aggregation of networks into a single larger network address space
(the opposite of subnetting) and typically is used for route summarization to reduce
the size of routing tables.
Network: A classful network ( A, B, C) has a fixed-size host addressing space.
Sub-Networks: Subnetting provides the ability to segment or create multiple equal
size subnetworks from a network. Typically these subnetworks are shielded from the
external world and only the original network address is exposed.
VLSM: VLSM allows for subnets to be defined with different subnetwork sizes as
needed under a single network ID, thereby minimizing, if not eliminating, wasted
addresses.
Subnetting Overview
• Local LAN devices use the subnet mask to interpret the device’s subnetting information
– This identification allows hosts to identify other devices that reside within the same subnet3
IP Subnetting Benefits
40 Devices 40 Devices
• Considerations
when subnetting
– How many subnets L2 Switch L2 Switch
are needed?
– How many hosts
40 Devices 40 Devices
per subnet are needed?
domain causes less broadcasts to be sent to a device allowing its resources to be used to
process meaningful frames.
• Fault isolation – If a local device malfunctions and starts sending meaningless traffic (such
as a broadcast storm) on the local network only the local devices will be effected. This
isolates the problem and provides better stability for the network as a whole.
Classless Subnetting
• When subnetting additional bits originally allocated to the host portion of the address are
borrowed for additional network IDs
– This is termed classless inter-domain routing (CIDR) which causes less bits to be used for host addresses1
– This divides the host IDs of the classful network between the newly created subnets2
• Each subnet will now have its own network ID and broadcast address
– These acquired bits used for the network portion are now network IDs identifying subnets within a
classful address range3
Footnote 1: When bits are taken from the host portion of an address additional
subnetworks are created however less host addresses are allocated to each subnet.
Footnote 2: Each bit taken from the host ID portion for the subnet ID doubles the
number of subnets that are possible in the network however it will cause less than
half the number of hosts that are within each subnet on the network.
Footnote 3: Each subnet ID will now have its own host range of addresses. Each
network ID is identified by each unique value the borrowed bits can create. Example:
If 2 bits are borrowed from the host portion then 4 unique network IDs can be
created and used. (22 = 4)
• Pairing an IP address with its classful subnet mask does not result in additional
subnetworks1
– Example of the IP address (e.g. 192.168.1.2) paired with a subnet mask (e.g. 255.255.255.0)
• The pairing of an IP address with a default subnet mask is not considered subnetting because there is no creation
of additional subnetworks2
• Subnetting creates smaller sub-networks (subnets) by using a non-classful subnet mask value
– Example: To divide a Class C network, use a 255.255.255.128 (/25) value instead of the default subnet mask of
255.255.255.0)1
• Routers are used to manage traffic and constitute borders between subnets (used to route between subnets)
Multi-Network Example
Network 1 Network 2
Router Router
192.168.1.1 192.168.1.2 192.168.1.129 192.168.1.131
255.255.255.128 255.255.255.128 255.255.255.128 255.255.255.128
192.168.1.130
255.255.255.128 192.168.1.132
192.168.1.3 192.168.1.6
255.255.255.128
255.255.255.128 255.255.255.128
Footnote 1: In this example a second network was created and the mechanics how
will be discussed in upcoming slides. But because there are now two distinct
networks notice that it requires a router or routing mechanism to be able to
communicate between networks. In this example the default Class C subnet mask
was changed from 255.255.255.0 to 255.255.255.128 which indicates that a single bit
was set to 1 in the 4th octet of the subnet mask. If you remember from a previous
slide the first bit or the most significant bit in a binary format has the fixed value of
128. This leaves seven bits for the host ID portion of the IP address which leaves us
with 128-2 (for the network and broadcast addresses) hosts in each network.
Default 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000
Subnet Mask
Subnet Mask 255.255.255.192 1111 1111 1111 1111 1111 1111 1100 0000
– Some key questions from the subnet mask fields of this table
• How many additional subnets have been created using this subnet mask? 1
• How many host IDs are available per subnet?2
• What is the network ID and broadcast address for the IP address 3
You can apply the subnet mask to an IP address to be able to determine the
following:
• Number of subnets (subnetworks) created
• How many hosts per subnet
• The exact network and broadcast addresses for each subnet
• How to determine the subnetwork of a specified IP address
Footnote 1: Because 2 bits were taken from the host portion of the classful C address
the 2 bits taken can create 4 unique IDs 22=4. Therefore we have created 4 subnets
out of this class C network.
Footnote 2: Because there are 6 bits left for host IDs each subnet will have 64 unique
values (62=64). Each subnet however requires to have a network ID and a broadcast
address therefore each subnet will have 62 usable host addresses (IDs) 64-2=62.
Footnote 3: The simple way to identify the network ID and broadcast address is to
multiply the host ID bit value. We identified above each subnet has 6 bits providing
64 unique values (62=64). Starting with the classful network ID address which is
192.168.1.0 we will use 64 as our multiplier:
192.168.1.0+64 provides us the 2nd subnet network ID and provides the address
range of the 1st subnet (host range 192.168.1.1-62). Because the broadcast address is
the last address within a subnet we can identify the network address of the 1st
subnet (192.168.1.0) and the broadcast address which will be 192.168.1.63.
Subnet 1 ID 192.168.1.0 broadcast address 192.168.1.63
The second subnets network ID is 192.168.1.64 to identify its broadcast address and host ID
range we add 64 to the second subnets network id (192.168.1.64) resulting in the 3rd
subnets Network ID 192.168.1.64+64=128. Subtracting 1 from the value we can identify the
broadcast address of the 2nd subnet and can identify the unique host ids it provides
Subnet 2 ID 192.168.1.64 broadcast address 192.168.1.127
To identify the 4th subnet network ID we will add 64 to the 3rd subnet network ID
192.168.1.128+64=192. Subtracting 1 to identify the broadcast address for subnet 3 we now
can complete the subnet 3 range
Subnet 3 ID 192.168.1.128 broadcast address 192.168.1.191
Lastly we can identify the broadcast address of the 4th subnet by adding 64 to the 3rd
subnet network ID and subtracting 1. 192.168.1.192+64=256-1=255
Subnet 4 ID 192.168.1.192 broadcast address 192.168.1.255
As a result we can see that the address on the slide (192.168.1.100) falls in subnet 2 host
range.
1. To determine the number of possible (sub) networks take 2 to the power of the number
of subnet bits
– In this case 22 = 4 possible (sub) networks1
2. To determine the number of possible host addresses per subnetwork, take 2 to the
power of the number of host ID bits and then subtract 2 for the network and broadcast
address for the subnetwork2
– In this 26 -2 = 62 possible host addresses per subnetwork
Footnote 1: Remember there is only one possible network with the default subnet
mask of 255.255.255.0.
Footnote 2: It is important to note when subnetting each subnetwork created has an
identical number of host ID space created. In this example we can use up to four
subnetworks and each subnetwork has 62 unique host addresses that can be
deployed.
3. This chart illustrates the calculation of the 4 network and broadcast addresses
Binary Positional
128 64 32 16 8 4 2 1 Last Octet
Values (2 x).
Subnet Mask 1 1 0 0 0 0 0 0
Network ID Subnet ID Host ID1
0 0 0 0 0 0 0 0 0 Network
192.168.1.
63 0 0 1 1 1 1 1 1 Broadcast
64 0 1 0 0 0 0 0 0 Network
192.168.1.
127 0 1 1 1 1 1 1 1 Broadcast
128 1 0 0 0 0 0 0 0 Network
192.168.1.
191 1 0 1 1 1 1 1 1 Broadcast
192 1 1 0 0 0 0 0 0 Network
192.168.1.
255 1 1 1 1 1 1 1 1 Broadcast
Footnote 1: All host ID bits are set to zero so they do not factor into the equation.
The first rule to note is that when subnetting the traditional network ID (leftmost
table column) bits remain in place and only from the traditional classful host ID
address field comes the additional subnetwork addresses. Therefore the four subnet
network (and broadcast) addresses follow the format 192.168.1.x .
The network addresses are determined by looking at the subnet ID field and figure
out all the possible combinations using the binary positional values and place a 0
value in each host ID field. The four networks addresses are 192.168.1.0,
192.168.1.64, 192.168.1.128, 192.168.1.192.
The broadcast address requires the known subnet ID field to be added to the
combination of host ID fields which have been set to 1. Therefore the first broadcast
address of 192.168.1.63 is summation of the subnet ID value of zero + the host ID
value of 63. ( 32 + 16 + 8 + 4 + 2 + 1=63) The next broadcast address for the second
subnetwork of 192.168.1.127 is summation of subnet ID of 64 + the host ID value of
63.
– Router performs the ANDing operation to determine the subnetwork address of the IP address2
Footnote 1: By applying the subnet mask to the IP address through the use of
Boolean logic it is possible to determine the subnetwork for a particular IP address.
Boolean logic provides a true or false result allowing for the identification of the
subnet. When comparing the subnet mask using the Boolean AND function to the IP
address the network ID can be obtained. Boolean indicates that the result is 1 only
when both the address bit and the subnet bit have values of 1. If both bits do not
match this value then they will be set to 0.
Footnote 2: A router that performs this function is left with the address of the
subnetwork. Because it knows from the class of the network (due to the high order
bits) what part is the network ID, it also knows what subnet the address is on.
Supernetting
192.168.101.0/24 254 1111 1111 1111 1111 0110 0101 0000 0000
192.168.100.0/23 510 1111 1111 1111 1111 0110 0100 0000 0000
Footnote 1: Often in modern networks were switches are deployed allowing for
improved forwarding of frames larger amount of hosts can reside within a network.
Because a Class C is limited to 254 hosts two class C networks can be combined to
provide a larger network.
Footnote 2: Variable length subnet masks provides the ability to divide networks up
with un-proportional sizes. Instead on dividing classful networks into subnets with the
same host size we can divide subnets into different sizes. VLSM will be discussed later
in this module.
Footnote 1: When public IPv4 addresses are used for point-to-point links it is critical
to save as many addresses as possible. If a small company has only a public class C
address assigned to them they want to maximize its use allowing for smaller subnets
for its point-to-points and a larger host size for its server banks etc.
• Each block represents a /30 network (2 hosts, Network ID, Broadcast address)1
– Larger subnets with different masks can be created by combining blocks in hierarchical order
= 192.168.1.128/26 62 Hosts
= 192.168.1.192/27 30 Hosts
= 192.168.1.248/30
2 Hosts
= 192.168.1.252/30
= 192.168.1.224/28 14 Hosts = 192.168.1.240/29 6 Hosts
Footnote 1: As more /30 subnets are combined together the subnet mask (CIDR)
changes. Because bits can represent 2 unique values (0-1) blocks have to be chosen
by pairs. Each can be of different size as long as they are in hierarchical order and do
not overlap other subnets.
Network Examples
192.172.0.0/24
Customer A
192.172.0.0/23 192.172.1.0/25
192.172.1.128/25
Customer B
ISP 2 ISP 1 192.172.2.0/23
Internet
Customer D
192.172.8.0/21
In this scenario there is single route (route aggregation or supernet) advertised by the
ISP 2 for the multiple backend customer networks behind ISP 1.
There are two examples of VLSM occurring as:
• ISP 2 will typically divide a much larger address block and allocate a portion to ISP
1 who then can carve it up further up and allocate network address space to the
individual customers. Customer A has a traditional looking Class C IP address but
with a /23 mask indicating 9 bits for the host address space or 512 possible
devices.
• Then within Customer A’ s internal network, the VLSM technique can be applied to
create variable length subnetworks based on the needs of the organization.
Details include:
• Address block used: 192.172.0.0/23
• Number of IP addresses needed: 400
• Available IP addresses in block: 512
• IP addresses left in block: 110
• Amount of hosts per network address/mask
• 200 / 192.172.0.0/24
• 100 / 192.172.1.0/25
• 100 /192.172.1.128/25
IPv6 Addressing
IPv6 Addressing
The successor to IPv4 is IPv6. IPv4 uses 32-bit addresses (4 billion, or 4.3×109,
addresses) while IPv6 uses 128-bit addresses (340 undecillion, or 3.4×1038
addresses).
IPv6 Header
• Uses 128-bit address format composed of eight fields of 16-bit hexadecimal values,
separated by colons (:)
• Network prefix: The first four 16-bit fields denote the network prefix
– Global routing prefix: The first three fields (48 bits) are the global routing prefix which is the value
assigned to a site
– Subnet ID: The fourth field (16 bits) is the subnet ID, used to identify links within a site
• CIDR notation is used to define networks
• Interface ID: The last four 16-bit fields denote the host IDs
2001:0000:130F:0000 : 0000:00C0:876A:12E/64
Global Routing Prefix Subnet ID
IPv6 nodes on the same link use the Neighbor Discovery Protocol (NDP) to discover
each other's presence, to determine each other's link-layer addresses, to find routers,
and to maintain reachability information about the paths to active neighbors.
NDP performs functions for IPv6 similar to the tasks performed by Address Resolution
Protocol (ARP) and Internet Control Message Protocol (ICMP) for IPv4. However, NDP
was designed specifically for IPv6 and provides many enhancements, such as
formalizing the processes of router discovery and address resolution. It also includes
Neighbor Unreachability Detection (NUD), which improves the ability for packets to
be delivered if routers or links fail.
ICMPv6 packet types:
• Router solicitation
• Router advertisement
• Neighbor solicitation
• Neighbor advertisement
• Redirect
LAB EXERCISE
End of Module 8
IP Addressing
Module 9
IP Routing Fundamentals
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
IP Routing
Introduction to IP Routing
• IP routing is the process of selecting paths in a network along which to send network
traffic
– Data is routed across networks through a series of routers
– A set of IP routing protocols1 determine the path that data follows across networks from source to
destination
– The routing protocols enable routers to build up a forwarding or routing table that correlates destination
networks with next hop addresses
Network
Network 30.0.0.0/8
60.0.0.0/8
Network Network
50.0.0.0/8 40.0.0.0/8
Routing Tables
• A router uses its routing table to determine the next hop for the packet's destination and
forwards the packet appropriately
– The next router repeats this process using its own routing table until the packet reaches its destination
– At each stage, the IP address in the packet header is used to determine the next hop
– If either a destination network or a default route are not in the routing table, the packet is dropped
Network
Network 30.0.0.0/8
Router E 60.0.0.0/8
Network Network
Router D 50.0.0.0/8 Router B 40.0.0.0/8 Router A
• Destination and NetMask — The destination network and network mask of the route
• Gateway — The next-hop router
• Port — The local router port used to send packets to the destination route
• Cost — The route's cost or metric1
• Type — The source of the learned route
Footnote 1: The cost in the output provided displays two values, the administrative
distance and the cost of each route. The cost value is used for comparison within a
single route source, while the administrative distance is a comparative value between
route sources. In the example, the route identified as Connected (D) has an
administrative distance of 1 and a cost of 1. The routes identified as OSPF (O) have
costs ranging between 2-3 and an administrative distance of 110. The topic of
administrative distance will be covered more thoroughly in upcoming slides.
Learning IP Routes
PC Router Router PC
“Host A” “Router A” “Router B” “Host B”
10.1.200.0/24 If 1 If 2 172.16.1.0/30 If 1 If 2 192.168.18.0/24
.100 .1 .1 .2 .1 .100
• For IP packets destined for remote networks, the Gateway router MAC address must be
known
• ARP is a Layer 2 (L2) protocol used to determine a MAC address when only an L3 IP address
is known
– Each device caches any discovered MAC addresses in a table
• The table is a mapping of IP addresses to MAC addresses
• Addresses are typically cached for 300 seconds by default
– ARP is defined in RFC 826
If a host wants to send a message to some other device on the LAN and knows its
destination IP address, the host must discover the Ethernet MAC address of the
target. This requirement occurs because Ethernet hardware does not understand IP
protocols or IP addresses. The destination IP address is associated with a MAC
address belonging to the target, and is present on the LAN.
Before sending an IP packet, the host must send a broadcast message onto the LAN
using ARP to discover the MAC address of its intended target. The switch or router
that has that MAC address in its tables can now send its IP packet to the destination.
The host’s operating system also stores the newly discovered MAC address in a table
(the result is cached). This table of mappings from IP addresses to MAC addresses is
retained and consulted multiple times, so the ARP discovery procedure only has to be
performed if the ARP cache does not have an entry.
A timer is set when information is entered into the ARP cache. Mappings occur when
the timer expires (five minutes by default for most devices).
• The sending device checks to see if the destination is in the same IP subnet
– If yes, source will ARP for the destination MAC address
– If no, source will ARP for the default gateway MAC address
• Routers ARP for the MAC address of the next hop router on each LAN until the destination
subnet is reached
• The router on the destination LAN will ARP for the destination MAC address
PC Router Router PC
“Host A” “Router A” “Router B” “Host B”
If 2 If 2
PC Router Router PC
“Host A” “Router A” “Router B” “Host B”
10.1.200.0/24 If 1 If 2 172.16.1.0/30 If 1 If 2 192.168.18.0/24
.100 .1 .1 .2 .1 .100
If the destination host’s network was the same as the source host’s, then the
destination host would be considered local and on the same subnet.
Host A takes its own IP address and subnet mask and determines its own network
address and then doing the same operation with the destination IP and destination’s
subnet mask and comparing the results.
If they are the same then destination Host B would be considered local; otherwise
the packets will be forwarded to the default gateway in order to be sent to a remote
host.
In this example the destination Host B’s Network ID of 192.168.18.0 is different from
the source Host A’s Network ID of 10.1.200.0 and therefore the packets will need to
be routed to the destination Host B.
The source, Host A, must check its own Local Route Table for its default gateway (this
is the general behavior unless a special route has been defined).
The default gateway IP is the IP of the routing interface for that subnet.
In this example it is 10.1.200.1 which is the IP of RouterA Interface 1.
Since this is an Ethernet LAN, Host A will need to encapsulate the frame in order to
send it to the RouterA interface 1 and to do so it needs to know the MAC address of
the router interface.
If it is not in its local cache, an ARP broadcast will need to be initiated in order to send
the encapsulated frames to the routing interface: if1 on RouterA.
PC Router Router PC
“Host A” “Router A” “Router B” “Host B”
10.1.200.0/24 If 1 If 2 172.16.1.0/30 If 1 If 2 192.168.18.0/24
.100 .1 .1 .2 .1 .100
Once Interface 1 on RouterA receives the Ethernet frame it looks at the destination
MAC address of the frame to check it if matches his own in order to determine if he is
the recipient of the frame.
In this case RouterA interface 1 is the default gateway of Host A and therefore the
intended recipient.
RouterA checks the frame’s Type field of 0x800 which indicates that there is an IP
packet in the data portion of the Ethernet frame.
RouterA then proceeds to decapsulate the Ethernet frame in order to analyze the
destination IP of the packet.
The Router must then consult its routing table to determine what to do with the
packet:
In general terms it looks to identify network routes in its table which would include
the destination IP address as a host address on that network.
After viewing RouterA’s routing table it finds that the network address of
192.168.18.0 is the destination network where these packets need to be routed.
It also learns that the next hop IP of 172.16.1.2 which represents the next stop for
the packets on its way to the 192.168.18.0 network and this can be reached
through local interface 2.
In order for RouterA to do the frame encapsulation process it needs to know the MAC
address of the 172.16.1.2 interface. It must check its local ARP cache and again if the
MAC address is not found, it must send an ARP broadcast to request the MAC
address.
Also note that it also will decrement the Time to Live field of the packet (in the IP header) by
1. The packet is then sent on the wire.
PC Router Router PC
“Host A” “Router A” “Router B” “Host B”
10.1.200.0/24 If 1 If 2 172.16.1.0/30 If 1 If 2 192.168.18.0/24
.100 .1 .1 .2 .1 .100
Once Interface 1 on RouterB receives the Ethernet frame, it looks at the destination
MAC address of the frame to check it if matches its own in order to determine if it is
the recipient of the frame.
In this case, RouterB interface 1 is the next hop IP of RouterA and therefore the
intended recipient.
RouterB checks the frame’s Type field of 0x800 which indicates that there is an IP
packet in the data portion of the Ethernet Frame.
RouterB then proceeds to decapsulate the Ethernet frame in order to analyze the
destination IP of the packet.
RouterB must then consult its routing table and finds that the Network Address of
192.168.18.0 is the destination network where these packets need to be forwarded
and this is a directly connected route in its table through interface 2
In order for RouterB to do the frame encapsulation process it needs to know the MAC
address of the final destination host B with the IP 192.168.18.100.
RouterB will check its local ARP cache again and if the MAC address is not found it
must issue an ARP broadcast to resolve the IP Address to a matching physical MAC
address.
Notice that only the source and destination MAC addresses are all that change. Now
the frame(s) are sent on the wire.
Routing Metrics
Routing Metrics
• Metric values
– Hop count – Routing Information Protocol (RIP)
– Aggregated path cost – Open Shortest Path First (OSPF)
– Path length – Border Gateway Protocol (BGP)
In order to determine the optimal path among the available path in the network, a
router uses a routing metric. Routing metrics contain many different parameters and
other factors that are used by the router to determine points for comparisons among
the available paths. It is typically one of many fields in a routing table. For each path,
a cost is calculated; the cost varies depending on the routing protocol used.
The cost calculation takes into account bandwidth, path reliability, and hop count.
• A Routing Table Manager (RTM) determines which routes are added to the IP route table
• Each routing protocol selects it’s best discovered path based on metrics
• If multiple routes to the same destination network are submitted by multiple, different
routing protocols, the RTM will select the route submitted by the routing source with the
most favorable Administrative Distance
Administrative Distance
Footnote 1: An administrative distance of 255 will cause the router to ignore the
route entirely and not use it.
Path selection involves applying a routing metric to multiple routes, in order to select
(or predict) the best route.
In the case of computer networking, the metric is computed by a routing algorithm,
and can cover such information as bandwidth, network delay, hop count, path cost,
load, MTU, reliability, and communication cost . The routing table stores only the best
possible routes.
Because a routing metric is specific to a given routing protocol, multi-protocol routers
must use some external weighting in order to select between routes learned from
different routing protocols.
Administrative distance is the measure used to select the best path when there are
two or more different routes to the same destination from two different routing
protocols. Administrative distance defines the reliability of a routing protocol. Each
routing protocol is prioritized in order of most to least reliable using an administrative
distance value. A lower numerical value is preferred, e.g. an OSPF route with an
administrative distance of 110 will be chosen over a RIP route with an administrative
distance of 120.
• Routing strategy using distributing data across paths of equal cost towards a destination
– RTM installs multiple paths of equal cost into the routing table
– Distribution algorithms attempt to leverage each path equally
• Different packet flows will follow different paths
Core Router
Core 1
Router Router
Edge A Core Router Edge B
Packet Flow 1 Core 2
Packet Flow 2
Packet Flow 3 Core Router
Packet Flow 4 Core 3
Core Router
Core 4
Benefits of ECMP
• Splitting traffic over multiple paths avoids congestion and provides additional bandwidth
Routing Methods
Static Routes
Default Routes
• A default route is a routing table entry used to route packets when an explicit route to a
destination network is not in the routing table1
– Last resort in the order of execution of the routing table
Footnote 1: A default route, also known as the gateway of last resort, is the network
route used by a router when no other known route exists for a given IP packet's
destination address. All the packets for destinations not known by the router's
routing table are sent to the default route. This route generally leads to another
router, which treats the packet the same way: If the route is known, the packet will
get forwarded to the known route. If not, the packet is forwarded to the default-route
of that router which generally leads to another router. And so on.
The default route in IPv4 (in CIDR notation) is 0.0.0.0/0, often called the quad-zero
route. Since the subnet mask given is /0, it effectively specifies no network, and is the
"shortest" match possible. A route lookup that doesn't match anything will naturally
fall back onto this route. Similarly, in IPv6 the default address is given by ::/0.
Routers in an organization generally point the default route towards the router that
has a connection to a network service provider. This way, packets with destinations
outside the organization (typically to the Internet, WAN, or VPN) will be forwarded by
the router with the connection to that provider.
ISP 1 ISP 2
Router A Router B Router C
156.10.20.21/30 156.10.20.22/30 10.1.2.2/30 10.1.1.2/30 199.28.12.14/30 199.28.12.13/30
The configuration example above is adding two static default routes on Router_A.
One static route points to ISP 1 with a default metric of 1. The second command adds
another static default route pointing to ISP 2, however this route has a metric of 5. In
this scenario, the ISP 1 route would be added to the routing table and the ISP 2 route
would only be used in the event of a failure on the link connecting to ISP 1.
The example output shows a default route that has been statically configured on
Router_A.
• A group of routers under mutual administration that share the same routing methodology1
• An enterprise network or ISP network are examples of an individual AS
• Exchange routing information using Interior Gateway Protocols
Routing Protocol
Router A Router B
Footnote 1: The Internet, for the purpose of routing, is divided into Autonomous
Systems. An AS is a group of routers that are under the control of a single
administration and exchange routing information using a common routing protocol.
For example, a corporate enterprise network or an ISP network can usually be
regarded as an individual AS.
• An Interior Gateway Protocol (IGP) is a routing protocol used within a single AS1
– Calculates and exchanges route information within a single AS
– Common IGP protocols include:
• Routing Information Protocol (RIP)
• Open Shortest Path First (OSPF)
• Intermediate System-to-Intermediate System (IS-IS)
Routing Protocol
Router A Router B
Footnote 1: An Interior Gateway Protocol (IGP) calculates routes within a single AS.
The IGP enables nodes on different networks within an AS to send data to one
another. The IGP also enables data to be forwarded across an AS from ingress to
egress, when the AS is providing transit services.
RIP
Router A Network 1 Router B
Hops 3
Network 2 Network 4
Cost 1 Cost 10
Router D
Network 3 Network 5
Router C Cost 1 Cost 1 Router E
153_exteriorGatewayProtocols.png
BGP BGP
BGP
BGP
BGP
LAB EXERCISE
End of Module 9
IP Routing Fundamentals
Module 10
Dynamic IP Routing Protocols
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
• Router ID
– Layer 3 devices generally use the same identifier for the routing protocols it supports known as a Router
ID
– Simplifies troubleshooting by providing a single value to identify network devices regardless of what
protocol is being used
– Many devices support either manually configured (recommended) or dynamic router id configuration
• Loopback Interface
– Is a virtual interface within a router that emulates many characteristics of a physical interface
– Is always available and can be reached from any incoming physical interface by default1
– Often the Layer 3 address assigned to a loopback is also used as a Router ID
OSPF Overview
• OSPF is a robust Interior Gateway Protocol (IGP) for medium to large networks
• Route table (topology) is created based on Shortest Path First (SPF) algorithm—Dijkstra’s
algorithm
– Shortest path to a destination network
• Link state routing protocol
– After its initial adjacency process it monitors for changes in the network and sends updates
– No periodic table exchange1
– Link state information is exchanged between neighbors
• Convergence time reduced and increases scalability over distance vector protocols like
Routing Information Protocol (RIP)
• Route metric is based on aggregated link cost
Footnote 1: Unlike older routing protocols like RIP where the whole table is
advertised periodically, OSPF only advertises all routes at its initial adjacency and
partial exchange happens when changes occur. If no changes are detected it will
provide periodic updates every 30 minutes however is only a summarized list of
known routes.
OSPF terminology includes:
• SPF algorithm (shortest path first): Used to calculate the best path to a given
destination.
• Link state routing protocol: Sends LSAs rather than whole routing table.
• LSA: Rather than send the entire routing table, OSPF sends just the state (up or
down) of each link to other routers using LSAs.
• Variable length subnet masking (VLSM): Supported by OSPF because subnet mask
information is associated with each destination address.
• Cost: The OSPF metric based as an integer in the range of 1–65535. The higher the
bandwidth, the lower the cost. The ip ospf cost command is used to set cost on an
interface.
• Areas: To reduce the protocol’s impact on CPU and memory, an OSPF area contains
the flow of routing protocol traffic and makes possible the construction of
hierarchical internetwork topologies.
• Multicast: OSPF uses a reserved multicast address to reduce the impact on non-
Footnote 1: OSPF areas can also have different characteristics such as stubby and no
so stubby. More details on areas will be explained later in this module.
153_link
OSPF Terminology
Area 0
Collection of all the link
Link State Database states in a single area
Router A
Link state – or state of a link describes an interface and its relationship to neighboring
routers; includes: IP address of the interface, mask, type of network connected to,
routers connected to that network and so on.
Link state database – collection of all the link states in a single area.
• Shortest Path First algorithm (SPF): Each router uses the SPF algorithm (Dijkstra algorithm) to build
its own SPF tree, with itself as the root, using the information in the Link State Database
– The SPF tree is used to calculate the shortest path to each destination subnet
– Each router has its own view of the topology as all routers build their own SPF tree
Area 0
Collection of all the link
Link State Database states in a single area
Router A
The Shortest Path First algorithm (SPF) - places each router at the root of a tree and
calculates the shortest path to each destination; each router has its own view of the
topology as all routers build their own SPF tree.
OSPF routes in the routing table - based on the cumulative cost required to reach
that destination following the SPF tree, each router decides which routes to put in
the routing table.
• Cost (metric): Indicates the overhead required to send a packet across an interface
– Default cost is calculated by dividing reference-bandwidth, 100 Mbps by default, by the link speed1
• 10 Mbps = 10
• 100 Mbps = 1
• 1 Gbps = 1
reference
bandwidth Router B Router C SPF Algorithm Determines the best path
to be Cost = 1
Neighbors
Cost = 10
100 Mbps 10 Mbps
modified2
Cost = 10 Determines the overhead
10 Mbps
OSPF Cost for a given interface
_Reference-Bandwidth_
Link Cost =
Link Speed (Mbps)
AS, monetary costs may be used. For the sake of OSPF link cost is a dimensionless number
ranging 1 to 65,535.
Cost is per Interface - A single Link in OSPF can have 2 costs. One at each end of the link, or
in other words each of the two interfaces on the two different routers the link joins together.
Cost (or metric) of an interface in OSPF is an indication of the overhead required to send
packets across a certain interface. The cost of an interface is usually configured to be
inversely proportional to the bandwidth of that interface. A higher bandwidth indicates a
lower cost.
153_link
OSPF Terminology (cont.)
– In multi-area environments
all other areas need a direct New York
Los Angeles
San Jose
Area 2
Area 0
Backbone
LS Database Area 0
LS Database Area 2
Link State Advertisements
94_linkStateBehavior.png
OSPF Terminology (cont.)
Footnote 1: It is best practice to select one or the other method to define OSPF areas
within your environment rather than mix both methods in the same environment.
153_multi
Internet
BGP
Area 0
Backbone
Area 2
Area 3
Internal RIP
Routers
OSPF Autonomous
System
OSPF Autonomous System (AS) – the entire OSPF routing domain. An OSPF AS can be
divided into multiple areas.
• Area Border Router (ABR): A router that connects one or more areas to the backbone
– Considered a member of all areas it is connected to
– Each ABR maintains a separate topological database for each area the router is in
Internet
• Autonomous System BGP
Boundary Router (ASBR): Area 0
Backbone
A router that is sharing IP
information from a source ASBR
ABR
other than OSPF with ABR
routers inside the OSPF
Area 2
autonomous system ASBR
Area 3
Internal
Routers
RIP
OSPF Autonomous
System
The following discussion is useful for understanding metric values in the OSPF lab for
routes originating from External Subnets. Although the details are beyond the scope
of this course, the information is here for completeness.
OSPF’s Four Level Routing Hierarchy
Level Description
1 Intra-area routing
2 Inter-area routing
3 External Type 1 Metrics
4 External Type 2 Metrics
If there are two routing paths to choose from, paths that are internal to an OSPF
routing domain are preferred over external routes. External routes can be imported
into the OSPF domain at two separate levels, one that has Type 1 Metrics and the
other Type 2 Metrics. The use of Type 1 metrics assumes that in the path from the
OSPF router to the destination, the internal OSPF AS component (path to the ASBR
advertising the AS-external-LSA) and external component are of the same
importance. In Type 2 metrics, it is assumed that the external component is more
significant than the internal component.
In the OSPF labs that involve routes to destinations outside of the OSPF autonomous
system, the metric is set to 10. The aggregate cost to these external destinations
does not change when viewed from different routers, since the internal costs are not
important. But the cost of Intra-area and Inter-area destinations does change
depending on which router the cost is observed.
153_link
OSPF Link State Behavior
Creating a Data Base - Each router receiving an LSA from a neighbor records the LSA
in its Link State Database, and sends a copy of the LSA to all of its other neighbors
(this is called flooding LSAs).
LSA flooding - By flooding LSAs throughout an area, all routers will build identical link
state databases.
SPF tree - When the databases are complete, each router uses the SPF algorithm to
calculate a loop free graph describing the shortest (lowest cost) path to every known
destination, with itself as the root. This graph is the SPF tree.
Routes are placed into the route table - Each router builds its route table from the
SPF tree based on the cost to each network.
OSPF Packets
Footnote 1: Two distinct IP multicast addresses are used. Packets sent to these
multicast addresses should never be forwarded; they are meant to travel a single hop
only. To ensure that these packets stay within the broadcast domain and are only
seen by neighbors in the same subnet, the IP TTL is set to 1.
OSPF runs directly over the IP's network layer. OSPF packets are therefore
encapsulated solely by IP and local data-link headers. OSPF is IP number 89.
OSPF multicast addresses include:
• AllSPFRouters: This multicast address has been assigned the value 224.0.0.5. All
routers running OSPF should be prepared to receive packets sent to this address.
Hello packets are always sent to this destination.
• AllDRouters: This multicast address has been assigned the value 224.0.0.6. Both
the DR and BDR must be prepared to receive packets destined to this address.
• Type 1—Hello
– Discovers neighbors and builds adjacencies between them
– Facilitates election of DR and BDR
• Type 2—Database Description (DBD)
– Checks for database synchronization between routers
• Type 3—Link State Request (LSR)
– Requests specific link-state records from router to router
• Type 4—Link State Update (LSU)
– Sends specifically requested link-state records
• Type 5—Link State Acknowledgement (LSAck)
– Acknowledges the receipt of LSAs
Note: OSPF packets will only be sent between neighboring routers; they do not leave their
directly connected networks
Router ID
Authentication
Authentication
Network Mask
RouterDeadInterval
Designated Router
RTR 1 RTR 2
default priority is 1.
• Designated Router: The router ID of the DR if known by the sending router. During an
election process, this parameter may be the same as the sending router ID. By default, it
will assume that it is DR until it loses an election.
• Backup Designated Router: The router ID of the BDR if known by the sending router..
• Neighbor Router ID: If the sending router has received a valid Hello from any neighbor
within its Dead Interval, that neighbor’s router ID is included here.
DD Sequence Number
RTR 1
An LSA Header
0 1 2 3
01234567890123456789012345678901
Version # 3 Packet Length
Router ID
Area ID
LSR
Checksum AuType
I’ve seen your
database now please Authentication
give me the details of Authentication
these LSAs.
LS Mask
Link State ID
RTR 2
Advertising Router
Router ID
Area ID
LSR
Checksum AuType
Authentication
Here are the LSAs that Authentication
you requested.
Number of LSAs
RTR 1 LSAs
0 1 2 3
01234567890123456789012345678901
Version # 5 Packet Length
Router ID
Area ID
LSAck
Checksum AuType
Authentication
Thanks neighbor, I just
received the LSAs. Authentication
Link State ID
RTR 2 An LSA Header
Advertising Router
The LSAck packet indicates which LSAs have been received. The router responding to
an LSR packet will continue to propagate the requested LSAs until it receives the
corresponding LSA headers in an LSAck packet.
The LSA Headers are strictly for reference between the neighboring routers.
Adjacency Process
153_helloNeighbors.png
Subnet Mask
Router ID
Hello/Dead Intervals
Neighbors
Area-ID
Router Priority
DR Router ID
BDR Router ID
On a broadcast multi-access network such as Ethernet, Auth. Password
Hellos are sent by every router on the subnet to the “ all Stub Area Flag
SFP Routers” multicast group 224.0.0.5.
153_buildingAdjacencies.png
Building Adjacencies
• DR and BDR: To minimize the amount of information exchanged on a segment, OSPF elects
one router to be a DR and another router to be a BDR on each multi-access segment
– Creates a central
point of contact for
information exchange
BDR Adjacencies DR
RouterA
153_routerElection.png
BDR DR
Priority 30 Priority 40
Hello
My router ID = 10.10.10.1
Area ID = 0.0.0.2
Network mask = 255.255.255.0
Hello Int = 10 s, Dead Intl = 40 s
Router ID =
INIT STATE
Hello
My router ID = 10.10.10.2
Area ID = 0.0.0.2
Network mask = 255.255.255.0
Hello Int = 10 s, Dead Intl = 40 s
Router ID = 10.10.10.1
2-WAY
ExStart (Exchange Start)
DBD
My router ID = 10.10.10.2
Area ID = 0.0.0.2
Network mask = 255.255.255.0
Hello Int = 10 s, Dead Intl = 40 s
M/S = 1 (Master)
Exchange
DBD
My router ID = 10.10.10.1
Area ID = 0.0.0.2
Network mask = 255.255.255.0
Hello Int = 10 s, Dead Intl = 40 s
M/S = 0 (Slave)
There are several states within the neighborhood adjacency process, including:
• Down State: The OSPF router has not exchanged any information.
• Init State: When OSPF is enabled, a router enters the Init State and starts to send
Hello packets at regular intervals to the “AllSPFRouters” multicast address. When a
router receives its first Hello, it enters the Init state.
• 2-Way State: As soon as a router recognizes its router ID in the neighbor’s Hello
packet, it transitions to the 2-Way State.
• Exchange Start: The two neighbors negotiate which is the master of the database
exchange. The router with highest router ID becomes the master.
153_NAP2.png
10.10.10.1 10.10.10.2
DBD DBD
There are several states within the neighborhood adjacency process, including:
• Exchange State: The two OSPF neighbors exchange information that describes
what is located in their databases. This is performed using DD packets. A DBD lists
link states by their Link State type (LSType).
• Loading State: When a router sees a difference between Link States in its own
database and what is advertised in the neighbor’s DD packets, it sends out an LSR for
the Link States it is missing. It continues until it has exactly the same database as its
neighbor.
• Full Adjacency: Now that the two neighbors have synchronized databases, they can
execute the SPF algorithm and have consistent routes in their tables, because the
routing tables have been generated from the exact same database.
In the above slide, debug ip ospf packet is enabled on Salt Lake. The link between Salt
Lake and San Diego is down. When the link is connected, the subsequent adjacency
states are revealed by the packets that are transferred.
Note that contents of the packet types are indented under the packet title.
In the “Exchange” block, San Diego has advertised its Database contents. Note that
Salt Lake will recognize its own LSA and LSAs that are from Area 0.
The states that a router passes through during the adjacency process: Init, 2-way,
ExStart(Exchange Start), Exchange, Loading, and Full.
Note: Debug should not remain on after troubleshooting is complete due to its
possible load on the router CPU.
Each router generates Type 1 LSAs that list all active OSPF
1 Router LSA
links and their associated costs
Basic LSAs supporting IPv4 networks are described in RFCs 2328 and 3101:
• Type 1: Router LSA
• Type 2: Network LSA
• Type 3: Summary LSA
• Type 4: ASBR Summary LSA
• Type 5: AS External LSA
• Type 7: NSSA External LSA
Footnote 1: OSPFv2 also defines LSAs 9, 10, and 11 for use in Multiprotocol Label
Switching (MPLS) environments. These LSAs are beyond the scope of this class and
will not be discussed further. Types 6 and 8 were experimental LSAs for multicast
OSPF routing and passing BGP attributes through an OSPF network, these LSA types
never passed the experimental stage and were not widely adopted.
LSA Header
Link State Update (LSU)
0 1 2 3
01234567890123456789012345678901
Area ID
Authentication
sequence number and Authentication
information 0 1 2 3
01234567890123456789012345678901
LS Age Options LS Type
Link-State ID
Advertising Router
LSA Header
LS Sequence Number
LS Checksum Length
In the graphic above, Router A sends Type 1 LSAs to its neighbor (Router C) describing
its OSPF interfaces, their costs, and states.
In this topology, a broadcast network, Router A sends the Type 1 LSA to the
AllDRouters multicast address (224.0.0.6). The only routers that listen to this
multicast group address are the Designated Router (DR) and Backup Designated
Router (BDR). After being received by the DR, the DR will then re-send the LSA to the
AllSPFRouters multicast address (224.0.0.5) so all non-designated routers can
populate their LSDB.
• Number of Links
0 1 2 3
– The total number of different 01234567890123456789012345678901
links advertised in this LSA LS Age Options LS Type
• Link ID Link-State ID
LS Sequence Number
– Dependent on the Link Type field
LS Checksum Length
• Link Data 0 0 Number of Links
V E B
– Cost and state of interface Link ID
Link-State ID
– Network Mask
Advertising Router
• Subnet mask of attached LAN segment
– Attached Router ID LS Sequence Number
• The router ID of each OSPF router on the attached network LS Checksum Length
Network Mask
Attached Router ID
Attached Router ID
Attached Router ID
ABR
OSPF Area O A B C
LSU
Type 3 LSAs are produced only by the ABR. They tell routers outside of an area what
destinations are available to the ABR. Note that the above diagram only shows half
the flow of Type 3 LSAs for this two area system. Also, there is the Summary LSAs sent
from the ABR into Area 0 that describe destinations within area 2.
In the above topology, the ABR receives information regarding two paths to the
10.10.20.0 network. One path through router D has a cost metric of 120. The
alternative path through the “Low Speed WAN” is not advertised in the Summary LSA
due to it’s higher cost.
After the ABR has run the SPF algorithm, the alternate path is eliminated and only
forwards the best route to router “J”.
Footnote 1: LSA Types 3 and 4 use the same payload format. There are two key
differences in the LSA:
• The Network Mask field for a Type 3 LSA is the network mask for the advertised
network. This field in a Type 4 LSA must be 0.0.0.0
• The Link-state ID field in a Type 3 LSA header is the network number being
advertised. This field in a Type 4 LSA header is the router ID of the ASBR
Summary LSA Payload:
Network Mask – This the subnet mask for the remote-area network.
Metric – This is the cost of the advertised network.
TOS/TOS Metric – These fields are normally set to 0.
External Network
TYPE 4 LSA 10.10.60.0/24
10.10.4.0.1
Mask = 0.0.0.0 ASBR
J
Metric = 70 Area
LSU
2 10.10.40.1
ABR 10.10.40.2
A B C
OSPF Area 0 10.10.10.5 Normal
10.10.10.1 Area
Type 4 LSAs are produced only by the ABR. They inform routers outside of an area of
the presence of an ASBR in an adjoining area.
In order for an OSPF router to utilize external routing information, an LSA for the
originating router advertising external information must be known throughout the
AS. For that reason, the Type 4 LSA identifying these AS boundary routers are
summarized by the ABR.
In the graphic above, the ABR (router C) originates the Type 4 LSA allowing routers in
the adjoining area (area 0) to maintain an LSA identifying the router originating
external routes. This LSA is required for routers in an adjacent area to accept the Type
5 External LSAs advertised by the ASBR.
Link-State ID
• Notable Fields:
Advertising Router
– Link-state ID1
LS Sequence Number
• The router ID of the ASBR
LS Checksum Length
– Network Mask
Network Mask
• Always set to 0.0.0.0
0 Metric
– Metric
TOS TOS Metric
• The ABRs cost to reach the
…
ASBR
TYPE 5 LSA
10.10.60.0
External Network
Mask = 255.255.255.0 10.10.60.0/24
Metric = 80
Forwarding Address: LSU ASBR
0.0.0.0
J
Area 2
LSU 10.10.40.1
ABR 10.10.40.2
A B C
OSPF Area 0 Normal Area
10.10.10.5
10.10.10.1
Type 5 LSAs, or External LSAs, are originated by ASBRs and advertise either a
destination external to the OSPF system, or default routes external to the OSPF
autonomous system. This type of LSA is not associated with any particular normal
area, and is flooded throughout all normal areas within the OSPF autonomous
system.
In the graphic above, Router A, in OSPF area 0, uses Type 4 and 5 LSAs together to
determine how to access the 10.10.60.0 network, or any network outside the OSPF
autonomous system
Link-State ID
Advertising Router
• Notable Fields: LS Sequence Number
– Link-state ID LS Checksum Length
• The external network address
Network Mask
– Network Mask E 0 Metric
• The subnet mask of the
Forwarding Address
external network
– Forwarding address
External Route Tag
153_LSA
TYPE 5 LSA
10.10.60.0 External Network
10.10.60.0/24 TYPE 7 LSA
Mask = 255.255.255.0
10.10.60.0
Metric = 80
NSSA Area 2 ASBR Mask = 255.255.255.0
Forwarding Address:
10.10.40.1 Metric = 80
LSA 5 10.10.40.1
Forwarding Address:
ABR 10.10.40.2 10.10.40.1
A B C
OSPF Area 0 10.10.10.5
10.10.10.1 LSA 7
Type 7 NSSA LSAs are originated by ASBRs and advertise either a destination external
to the OSPF system or a default route.
In OSPF area 0, Router A uses Type 4 and 5 LSAs together to determine how to access
the 10.10.60.0 network or any network outside the OSPF AS. Therefore, the ABR
converts the Type 7 NSSA LSAs to Type 5 LSAs.
• Produced by the ASBR to advertise external destinations or default route inside NSSA
• ABR translates it to a Type 5 LSA before forwarding to the backbone area
• Notable fields: 0 1 2 3
01234567890123456789012345678901
– Link State ID
LS Age Options LS Type
– Network mask
Link-State ID
– Forwarding address
Advertising Router
• Either next-hop address from the ASBR or if this is not
LS Sequence Number
a native OSPF route then any forwarding IP on the ASBR
LS Checksum Length
Network Mask
Forwarding Address
• The LSDB maintains all LSAs received and sent from the router
• Example output:
Router# show ip ospf database link-state
Link States
Index Area ID Type LS ID Adv Rtr Seq(Hex) Age Cksum
1 0 Rtr 10.0.0.1 10.0.0.1 800000fe 1083 0x9c75
2 0 Rtr 10.0.3.1 10.0.3.1 800000ff 1639 0x13dc
3 0 Rtr 10.2.0.1 10.2.0.1 80000102 1004 0x52c0
4 0 Net 192.168.20.1 10.2.0.1 800000fc 1079 0x5a64
5 0 Net 192.168.30.2 10.0.3.1 800000fc 1081 0xeac2
6 0 Summ 192.168.10.0 10.2.0.1 800000fb 1000 0xdc07
7 0 Summ 10.2.2.1 10.2.0.1 800000fb 949 0x54f0
8 2 Rtr 10.2.0.1 10.2.0.1 800000fe 964 0x9798
9 2 Rtr 10.2.2.1 10.2.2.1 800000ef 1783 0x63d8
10 2 Net 192.168.10.2 10.2.2.1 800000eb 1753 0xede3
11 2 Summ 10.0.0.1 10.2.0.1 800000fb 1000 0xe658
Footnote 1: In a totally stubby area, no LSAs from the adjoining area are passed into
the area as Type 3 LSAs. The only Type 3 LSA seen in a totally stubby area is a default
route that is generated by the ABR.
The types of OSPF areas include:
• Normal: OSPF routers within a normal area can send and receive Type 3 Summary
LSAs, Type 4 Autonomous System Border Router (ASBR) Summary LSAs, and Type 5
external LSAs.
• Stub: OSPF routers within a stub area cannot send or receive external LSAs. In
addition, OSPF routers in a stub area must use a default route to the area’s Area
Border Router (ABR) or ASBR to send traffic out of the area.
• NSSA: The ASBR of an NSSA can import external route information into the area.
ASBRs advertise external routes into the NSSA as Type 7 LSAs. Type 7 external LSAs
are a special type of LSA generated only by ASBRs within an NSSA; they are flooded
to all the routers within the NSSA. ABRs translate Type 7 LSAs into Type 5 external
LSAs, which can then be flooded throughout the AS. You can configure address
ranges on the ABR of an NSSA so that the ABR converts multiple Type 7 LSAs into
one AS external LSA.
• Totally stubby: By default, the Layer 3 switch sends summary LSAs (Type 3 LSAs)
into stub areas. You can further reduce the number of LSAs sent into a stub area by
configuring the Layer 3 switch to stop sending summary LSAs into the area.
OSPF Authentication
• OSPF requires all non-backbone areas to be directly connected to the backbone area (Area 0)
Area 0 Area 5
OSPF virtual links allow administrators to work around the requirement that all other
areas must connect directly to the backbone. If the new area cannot connect directly
to the backbone area, two ABRs are set up to “bridge” the gap and recreate the
connectivity.
The configuration commands pass area information between ABRs in the
intermediary area. From the viewpoint of OSPF, each ABR has a direct connection to
three areas (Area 0, the outlying area, and the area traversed).
OSPFv2 vs OSPFv3
• BGP4 is standard Exterior Gateway Protocol (EGP) used on the Internet today for inter-
domain AS routing
94_glue_of_internet.png
The "Glue of the Internet"
• BGP is used to link customer sites to ISPs and ISPs to each other in order to create the
Internet
BGP
Customer ISP
BGP
Customer ISP
BGP
BGP—General Operation
153_EBGP_vs_IBGP.png
EBGP vs. IBGP
AS 10
AS 10 AS 30
• IBGP is like a tunnel through an AS from one EBGP router to another EBGP router
• Shields IGP (ie. OSPF) internal routers from the load of external routing updates (Internet
routing table)
• IBGP allows you to use policies to choose exit and entrance points for your data traffic
Note: IGP is used to establish required reachability. IBGP peers will never become
established unless there is IP connectivity between the two peers.
IBGP—Loopbacks
ISO
Customer 1 AS 100
AS 200
EBGP
BGP AS Numbers
BGP BGP
IGP
AS 100
Header
Footnote 1: The KEEPALIVE message is a 19-byte BGP message header with no data
following it.
OPEN Message
Header OPEN
Opt Parameter
BGP Identifier Length Optional
Version My AS Hold Time Parameters
Router ID
• The OPEN message is exchanged between peering BGP routers during the OpenSent and
OpenConfirm BGP session states.
UPDATE Message
• BGP update messages are comprised of a BGP header and the five additional fields:
Header UPDATE
Header UPDATE
Network Layer
Unfeasible Withdrawn Total Path Reachability
Routes Length Routes Attribute Length Path Attributes
Information (NLRI)
Note: BGP 4, is classless. The routes include both a network and a mask. These
routes are called NLRI - “Network-Layer Reachability Information”. If, in the list of
prefixes, there appears a prefix that was sent earlier, the earlier prefix is assumed to
NOTIFICATION Message
Header Notification
A notification is sent when there is some problem with the session. Examples include
a corrupted update, incorrect AS, or invalid attribute. The session is always closed
upon receiving a notification. Note that sending and receiving notifications is a
normal part of the “capability negotiation” process. BGP sends NOTIFICATION
messages when errors occur. The associated BGP session is always closed down. The
Error code indicates the type of Error. Error sub-code provides more specific
information about the nature of the error, and the Data field contains data relevant to
the error (such as a bad header or illegal AS number).
Error Codes Error subcodes
• Idle: Indicates that a BGP session is starting; searches for and certifies route to neighbor; new (or
incoming) BGP connections are not permitted
• Connect: The session enters this state while the router is waiting for the TCP connection to
complete
• OpenSent: After a successful TCP connection, the BGP sends an open message and waits for one in
return
• Active: The session enters this state if the TCP connection is unsuccessful, and then returns to the
Connect state
• OpenConfirm: The session enters this state when an open message is returned in the OpenSent
state
• Established: The session enters this state when peers send update messages to exchange
information about each route being advertised1
Footnote 1: Although many of these states sound good the established state is the
only state that indicates a stable peer adjacency.
Advertising a Network
Several methods can be used to insert a network into a BGP route advertisement:1
• Network command
– Define specific networks
• Redistributing connected networks
– All networks directly connected to the BGP speaker
• Redistributing static routes
– All static routes in the BGP speaker’s routing table
• Redistributing IGP routes
– All dynamically learned routes in the BGP speaker’s routing table
Note: Each eBGP speaker advertises (to its peers) routes to prefixes that it can reach
Optional, Non-transitive
May or may not be supported, but if received, it is not required that the router pass it on.
It may safely and quietly ignore the optional attribute.
Examples:
• MULTI_EXIT_DISC (MED)
• Local Preference Attribute: Used to select the pathway out of the local AS
• Multi-Exit Discriminator (MED): When there are multiple links to an AS, this is used to steer
incoming traffic from another AS in the preferred direction
• AS_path: When a route advertisement passes through an AS, the AS number is added to an
ordered list of AS numbers that the route advertisement has traversed
Footnote 1: Weight is not an attribute because its value is not carried in the update
message. It can however be configured locally on routers to override all BGP
attributes thus it can be confused as an attribute.
When multiple paths for the same route are known to a BGP4 router, the router uses
the following algorithm to weigh the paths and determine the optimal path for the
route.
The optimal path depends on various modifiable parameters:
0th Is the next hop accessible though an IGP route? If not, list the route as invalid.
Note: The device does not use the default route to resolve BGP4 next hop.
1st Use the path with the largest weight.
2nd If the weights are the same, prefer the route with the largest local preference.
Note: Weight – not advertised in BGP, not a BGP attribute, not in BGP
RFC, Cisco’s creation.
3rd If the routes have the same local preference, prefer the route that was
originated locally (by this BGP4 Layer 3 Switch).
4th If the local preferences are the same, prefer the route with the shortest AS-
path. An AS-SET counts as 1. A confederation path length, if present, is not
counted as part of the path length.
5th If AS-path lengths are the same, prefer route with the lowest origin type. From
low to high, route origin types are valued as:
• IGP is lowest
• EGP is higher than IGP but lower than INCOMPLETE
• INCOMPLETE is highest
6th If the routes have the same origin type, prefer the route with the lowest MED.
7th Routes received through eBGP from a BGP4 neighbor
LAB EXERCISE
End of Module 10
Advanced IP Routing
Module 11
Multicast Routing
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
Multicast Routing
• Multicast is a process in which one source sends a stream of data to many recipients over a
network
• Multicast addresses are recognizable to Layer-2 devices because each one is mapped to a
MAC address
• The first 24 bits of that MAC address are a specific OUI - 0100.5e, and the 25th bit is always
0
• The lower 23 bits are copied from the lower 23 bits of the multicast IP address
• This creates the situation where there are 32 multicast IP addresses for each multicast
MAC address
5 bits lost
XXXX X
32-bit IPv4 Address 1110XXXX X XXX XXXX XXXX XXXX XXXX XXXX
… 23 bits …
mapped
48-bit MAC Address 0000 0001 0000 0000 0101 1110 0 XXX XXXX XXXX XXXX XXXX XXXX
Because 5 bits are lost in the address translation, MAC addresses could match 32
different multicast IP addresses. Therefore, the hosts inspect multicast frame that has
the MAC address of the multicast source of the group it has joined, regardless of
which IP address the frame is traveling toward. The host then inspects the destination
IP address to verify that the IP multicast address is intended for a joined multicast
group. If not, the packet is discarded.
Convert Multicast MAC address to a Multicast IP address
Example MAC address: 01:00:5e:0a:00:01
Convert the hexadecimal MAC address 01:00:5e:0a:00:01 to binary:
0000 0001 : 0000 0000 : 0101 1110 : 0000 1010 : 0000 0000 : 0000 0001
Isolate the 23 low-order binary bits from the converted MAC address:
0000 0001 : 0000 0000 : 0101 1110 : 0000 1010 : 0000 0000 : 0000 0001
Take the low order 23 bits and apply it into the low-order 23 bits of the IP address (do
this in binary):
1110 xxxx : x000 1010 : 0000 0000 : 0000 0001
1110 - First 4 high-order bits of the IP address for the multicast
address space (224.x.x.x)
xxxx x - 5 remaining bits after the 23 bits of the IP address is mapped to the MAC
address plus the 4 high order bits 1110
This is equal to 32 total IP addresses (See next page for IP addresses)
IGMP Overview
IGMP v1
Footnote 1: If the multicast listener and source are on the same subnet, IGMP
operates directly between the endpoints without router involvement.
Multicast routers must inspect all IGMP messages looking for membership reports to
add hosts to the correct groups.
In intervals of one minute, a router (the querier) on each network segment sends a
query to the all-hosts address (224.0.0.1) and waits for a response from at least one
host remaining in the multicast group. Member hosts respond with a membership
report according to the response suppression mechanism:
• When a host receives the query, it starts a countdown timer for each multicast
group of which it is a member. The countdown timers are each initialized to a
random count within a given time range. (IGMP v1 has a fixed range of 10 seconds.
Therefore, the countdown timers were randomly set to some value between 0 and
10 seconds.)
• When a countdown timer expires, the host sends a membership report for the
group associated with the timer to notify the router that it is still active.
• If a host receives a membership report before its associated countdown timer
expires, it cancels its own countdown timer associated with the multicast group,
thereby suppressing its own report.
All multicast-capable hosts are inherently a member of multicast group 224.0.0.1,
and no formal IGMP exchange is necessary for group membership.
Routers do not keep a complete membership list for each active multicast group. They simply
maintain which multicast groups are active on which interfaces. Regardless of the number of
members in a group, the router sends only one copy of a multicast packet onto that segment
and needs to receive only one report in response to remain active.
IGMP v1 (cont.)
• IGMP v1 uses general queries on configured intervals to the all-hosts multicast address
(224.0.0.1)
– One minute by default
• There is no “query router” selection process within IGMP v1
– Depends on the underlying multicast protocol (for example PIM) to determine which router is queried1
• At least one host in the active group responds with a membership report using response
suppression
– These reports only have local significance; therefore, the time to live (TTL) 2 is set to 1
Footnote 1: PIM employs a selection process to ensure only one PIM router on a
single LAN segment become the designated IGMP querier for the segment.
Footnote 2: RFC 791: The TTL is an indication of an upper bound on the lifetime of an
Internet datagram. It is set by the sender of the datagram and reduced at the points
along the route where it is processed. If the TTL reaches zero before the Internet
datagram reaches its destination, the datagram is destroyed. The TTL can be thought
of as a self-destruct time limit.
IGMP v2
IGMP v2 (cont.)
Members may join a multicast group at any time by sending an unsolicited report to
the desired multicast address. Attached routers simply track whether there is at least
one client interested in a group.
IGMP v3
• To operate with routers running older versions of IGMP, the v3 routers must step down to
the highest common version of IGMP in each group
IGMP v3 (cont.)
• In order to join group 224.1.1.1, host H3 sends a report to the 224.0.0.2 address
Report
H1 H2 H3
192.168.1.111 192.168.1.112 224.0.0.2 192.168.1.113
192.168.1.11 Router 1
Hosts that wish to join a group can join asynchronously. They do not have to wait for
a query to join; they can send an unsolicited report. This decreases the time required
to join if no other members are present.
H1 H2 H3
192.168.1.111 192.168.1.112 192.168.1.113
192.168.1.11 Router 1
• Host H2 sends a report to the 224.0.0.22 address to join group 224.1.1.1 with an empty
include and exclude list
• Will accept any source traffic to 224.1.1.1
v3 Report
(224.0.0.22)
H1 Group: 224.1.1.1. H2 H3
192.168.1.111 Exclude: <empty> 192.168.1.112 192.168.1.113
192.168.1.11 Router 1
v3 Report
(224.0.0.22)
Group: 224.1.1.1.
H1 H2 H3
Include: 10.10.10.10
192.168.1.111 192.168.1.112 192.168.1.113
192.168.1.11 Router 1
When joining groups using an include list, hosts dictate to receive traffic only from a
specific set of sources sending to the group. When the include list is used, only the
specific sources listed in the include list are joined.
In the graphic:
• Host 2 is joining multicast group 224.1.1.1 and only wants to receive flows from
source 10.10.10.10 sending to the group.
• The router only forwards traffic from included sources. The graphic shows
10.10.10.10 destined to the 224.1.1.1 group.
From RFC 5186: If the source address in the multicast packet exists in the database
for the specified multicast group and is either in an include list or not listed in an
exclude list, the multicast routing protocol should add the interface to the list of
downstream interfaces. Otherwise, it should not be added based on local group
membership.
v3 Report
(224.0.0.22)
Group: 224.1.1.1.
H1 H2 H3
Exclude: 20.20.20.20
192.168.1.111 192.168.1.112 192.168.1.113
192.168.1.11 Router 1
When joining only specific sources, hosts dictate to receive any traffic sent to the
group except if it is from a specific set of sources. When an exclude list is used, all
sources in the group are joined except the sources listed.
In this graphic:
• Host 2 is joining multicast group 224.1.1.1 and requests to receive multicast traffic
from any source in the group except source 20.20.20.20.
H1 H2 H3
General Query
to 224.0.0.1 Multicast
Router
192.168.1.11 Router 1
The router multicasts periodic membership queries to the all-hosts group address
(224.0.0.1). All hosts on the wire respond with a membership report that contains
their complete IGMP group state for the interface.
• Rules can be applied statically to only forward multicast traffic to a specific set of ports
R1 SW1
Multicast Traffic
IGMP Snooping
• IGMP snooping allows a Layer 2 switch to maintain a table of host receivers of multicast
traffic
• Ensures the switch only forwards multicast traffic to ports that have requested to join a
multicast group
– Eliminates the default “flooding” behavior
Multicast Multicast
Receiver Receiver
Multicast Multicast
Receiver Receiver
Multicast Traffic
IGMP snooping allows a switch to identify hosts that request multicast traffic and
limit forwarding of multicast addresses to specific ports
• The IGMP v1 or v2 switch examines contents of every IGMP message to determine which
ports to forward the traffic toward
– Can negatively impact performance
• IGMP v3 switch examines only 224.0.0.22 group messages, not general IGMP data traffic
– Minimizes CPU utilization
• PIM is a routing protocol used for forwarding multicast traffic between IP subnets or
network segments
• PIM works independently of any particular routing protocol
– PIM does not create or maintain a multicast routing table
– It uses the unicast routing table, which is also protocol independent, because it can be populated by more
than one protocol
• There are two operating modes for PIM:
– Dense mode
– Sparse mode
• Uses unicast routing table to compare against source of the multicast stream
– Multicast flow is reviewed on ingress
– The port and source address are compared against the unicast routing table
• If the source of the stream matches a routing table entry and the port associated with the route entry, the RPF
check passes and the stream is forwarded out other multicast interfaces
• If it does not match, the stream is dropped 1
Footnote 1: Depending on the multicast routing protocol being used, this may also
result in a “prune” message being sent to the forwarding router. Some multicast
routing protocols use prune messages to instruct the sending router to cease sending
multicast traffic from that source.
• This mode works on the premise that there are multicast stream listeners throughout the
entire network
• PIM-DM builds its multicast tree by flooding traffic from the source to all dense mode
routers in the network
– This will propagate unnecessary traffic for a short time
• Each router checks to see if it has active group members waiting for the data
– If so, the router remains quiet and lets the traffic flow
– If no hosts have registered for that group, the router sends a prune message toward the source, and that
branch of the tree is “pruned” off to stop unnecessary traffic flow
• Trees built with this flood and prune method are called source trees1
• Reverse path forwarding (RPF) checks are used to ensure loop-free topology
PIM-DM Overview
Initial flooding
• Multicast traffic that passes
RPF check continues to be
flooded through the entire
domain
Each router creates its own
Source. Group (S.G) state
Multicast traffic sent by the source is flooded throughout the entire network. RPF
ensures proper traffic flow by avoiding loops. RPF is applied to every multicast packet
received by all routers.
As each router receives the multicast traffic via its RPF interface (the interface in the
direction of the source), it forwards the multicast traffic to all of its PIM-DM
neighbors. This causes traffic to arrive at some routers multiple times via a non-RPF
interface. This is normal for the initial flooding of data and are corrected by the
normal PIM-DM pruning mechanism.
Receiver
Multicast Packets
Prune Messages
In the diagram, two of the routers receive multicast traffic on a non-RPF interface
from a neighboring router, which results in a prune messages sent between them.
The routers with no receivers attached also send prune messages toward the source,
via the RPF interface.
PIM-DM prunes are sent to neighbor routers toward the source on the RPF interface
to stop the flow of unwanted traffic:
• Prunes are sent when the router has no downstream members that need the
multicast traffic.
• Prunes are also sent to shut off the flow of multicast traffic that is received on the
wrong interface (non-RPF interfaces).
• For equal cost paths, router vendors each define their own proprietary method of
pruning down to a single path. Possible methods could be hash-based, source-
based, based on the IP address of the next-hop routers, or the IP addresses of the
receiving interfaces.
Source
Receiver
Multicast Packets
After multicast traffic has been pruned off unnecessary links, this results in a Shortest
Path Tree (SPT) being built from the source to the receiver. At this point, multicast
traffic is no longer flowing to all routers in the network. However, the (S, G) state still
remains in all routers. This (S, G) state will remain until the source stops transmitting.
In PIM-DM, a prune state expires after three minutes. A refresh state message is then
sent up the tree to verify if the source is still active. If it does not receive a response,
the (S, G) entry times out and is dropped.
• Sparse mode works on the premise that multicast receivers are not positioned in all areas
of the network
• One router is designated as the Rendezvous Point (RP) and is usually located close to the
source in the network
– Receiver routers send join messages to the RP to identify which multicast groups they are interested in
– Source routers send register messages to the RP to identify which groups they are sending
– Multicast traffic from all source routers is sent to the RP for redistribution to the receivers
– This mode is referred to as a shared tree, because all source traffic flows through the RP
Footnote 1: A shared tree is somewhat similar to the source tree, except that instead
of being rooted from the source and growing towards the receivers, it is rooted at a
common point, the Rendezvous Point (RP). Because the source is not necessarily
known to receivers, a (*,G) notation is used to maintain the multicast table between
receivers and the RP. A source tree is maintained only between the multicast source
and the RP.
The tree from the RP to the group members is a subset of the main tree. When
members join a group, the local router forwards the membership report toward the
RP. Each router along the way adds that branch to the shared tree.
Pruning is performed when a group member is removed from the group. Only routers
with active group members join the tree.
PIM-SM Terms
Receiver
(*.G Joins)
• This (*, G) join packet travels to the RP, building a branch of the shared tree1 at each router along the way—
extends from the RP to the last router directly connected to the receiver
• Now group G traffic can flow down the shared tree to
the receiver RP
Receiver
Shared Tree
Sender Registration
• The router local to the source is responsible for registering the source with the RP and building a tree
between them
• A register message is sent from the
source router to the RP RP
Source
Receiver
Shared Tree
Traffic Flow
(S.G) Register
Unicast
Copyright 2018 – ARRIS Enterprises, LLC. All rights reserved
• When the RP receives the register message, it de-encapsulates the multicast data packet
• The RP sends an (S, G) join back toward the source network
• This (S, G) state is created in all RP
the routers along the Shortest
Path Tree, including the RP
Source
Receiver
Shared Tree
Traffic Flow
(S, G) Joins
RP
Receiver
Source Tree
Shared Tree
• Traffic flows through the newly created tree to the member receivers
RP
Source
Receiver
Traffic Flow
• When the SPT is built from the source router to the RP, multicast traffic begins to flow natively from
source S to the RP
• The RP then sends a register-stop message to the source’s local router to stop sending the unicast
register messages
RP
RP sends a Register-Stop
back to the first router
Source
• Multicast traffic from the source now flows along the source tree to the RP and down the
shared tree to the receiver
RP
Source
Receiver
Shared Tree
Source Tree
Traffic Flow
LAB EXERCISE
End of Module 11
Multicast Routing
Module 12
Common Applications and Protocols
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
Management Protocols
SNMP (cont.)
Components
• The SNMP framework includes three key components:
– SNMP Manager
• The system used to control and monitor the activities of network hosts
• The most common managing system is called a Network Management System (NMS)
– SNMP Agent
• The software component within the managed device that maintains the data for the device and reports this data,
as needed, to managing systems
– MIB
• The Management Information Base (MIB) is a virtual information storage database which has a hierarchical
structure with its entries addressed by an object identifier (OID)
SNMP (cont.)
• SNMP gets/sets on MIB variables use User Datagram Protocol (UDP) port 1611
– Within the MIB, there are collections of related objects defined in MIB modules
– MIB modules are written in the SNMP MIB module language, as defined in RFC 2578-2580, RFC 3411 and RFC 3418
Get
getNext
getResponse
Alert(Trap)
SNMP Manager SNMP Agent (MIB)
Footnote 1: Although UDP is the common protocol used for transport, TCP can be
used utilizing the same port as well.
SNMP (cont.)
– GetRequest—Requests information for one or many parameters by including the MIB objects of the
values the application wants to retrieve
– SetRequest—Determines specific data for one or many parameters specified by the administer to be set
on a device
– Trap—Alerts the NMS regarding unplanned events or abnormal conditions using agent-generated
messages and their associated OID values
SNMP Versions
• SNMPv1
– A Full Internet Standard, as defined in RFC 1157
• RFC 1157 replaces earlier versions that were published as RFC 1067 and RFC 1098
– Authentication of clients is performed in clear text using a "community string" (password)
• SNMPv2c1
– Uses a community-string approach and serves as the administrative framework for SNMPv2—the “c” means
“community”
– Internet protocol defined in RFC 3416, RFC3417, and RFC 3418
– Advances the features, operations, and data types of SNMPv2p (SNMPv2 Classic)
– Uses the SNMPv1 community-based security approach
– Offered GetBulkRequest, which is used for retrieving large amounts of management data in a single request
• SNMPv3
– Protocol defined in RFCs 3411 to 34151
– Strengthens security of SNMPv1 and SNMPv2c
– Provides secure access to devices by authenticating and encrypting packets over the network
– The security features provided in SNMPv3 include:
• Encryption of protocol data units (PDUs)
• Authentication of the user who sent the PDU
• Specify users access to tables in a read-only, read-write, or notify role
• The creation of views and associating user groups to various views
• Communication with both authentication and encryption
MIBs (cont.)
• The object ID (OID) is formed by connecting the branch numbers separated by periods
• Object IDs are unique in the SNMP world
• Object ID numbers are registered with the Internet Assigned Numbers Authority (IANA)
• Private organizations can request OIDs containing
information specific to their equipment 1 MIB Objects IDs
iso (1)
org (3)
.1.3.6.1.4.1.25053.2
dod (6)
internet (1)
Each associate OID also has an object name. They are formed by linking the textual
name of the branch and leaf. Many SNMP management programs allow either the
OID or object name to be entered. There are two different ways to reference the
same MIB object: numerically (as shown in the graphic) or using the textual name
(such as Iso.org.dod.internet.private.enterprise).
• A networking protocol for clock synchronization that uses UDP port 123 between
master/server and end devices (clients)
• Intended to synchronize all participating systems to within a few milliseconds of
Coordinated Universal Time (UTC)
– Regulates time within tens of milliseconds over the public Internet1
• Time stamps required to maintain accurate logging and support troubleshooting
• NTP server and client can communicate using IPv4 or IPv6 addresses
• Simple Network Time Protocol (SNTP) is a less complex implementation of NTP
– Used in some embedded devices and in applications that do not require highly accurate timing
Footnote 1: In addition to NTP, Precision Time Protocol (PTP) can provide clock
accuracy to the sub-microsecond range and is often used for measurement and
control. Defined originally in the IEEE 1588-2002 standard however was revised in
2008 as a revised standard IEEE 1588-2008 (PTP Version 2). Version 2 provides
improves accuracy, precision however is not backwards compatible with the original
standard.
• NTP is a fault-tolerant protocol that will automatically select the best of several available
time sources to use for synchronization
• NTP is highly scalable; a synchronization network may consist of several reference clocks
that can exchange time information either bidirectionally or unidirectionally
• NTP can select the best candidates to build its estimate of the current time
• Common roles for NTP service:
– Server—Receives time from a verified source (such as a local clock or radio clock) and disseminates that
timestamp to clients when requested
– Peer—Gets time from and provides time to a specific server, when needed
• This establishes a two-way relationship
Client—Receives time from either a primary or secondary time server, but does not
provide time in return to that server
Includes servers that receive time from a server of a lower-numbered stratum
• Broadcaster—Provides time to the specified remote host or to the broadcast
address on a LAN
Broadcasters often provide time to workstation clients on a LAN
• Broadcast client —Listens for time broadcasts from an NTP server and
synchronizes with that time
Includes time server clients on a LAN
NTP uses the concept of a stratum to describe how many NTP hops away a machine
is from an authoritative time source
For example:
• A stratum 1 time server has a radio or atomic clock directly attached to it
• It then sends its time to a stratum 2 time server through NTP, and so on
• A machine running NTP automatically chooses the machine with the lowest
stratum number that it is configured to communicate with using NTP as its
time source
NTP Authentication
• NTP is used to ensure accurate log file timestamp information and can pose a security risk
– Attackers can make a rogue host appear as a valid NTP server and promote false time into the network
• NTP optionally implements an authentication mechanism to prevent this
– NTP authentication verifies the time source rather than the user or recipient
• An MD5 hash of a symmetric key is used
– The authentication can be enabled using the authenticate command, and the set of symmetric keys and
key strings are specified using the authentication-key command
• If authentication is enabled, NTP packets that do not have a valid Media Access Control
address are dropped
Network Protocols
• DNS servers are authoritative resources for the mapping of memorable alphanumeric
names (hostnames) to IP addresses
– For example, www.google.com maps to 173.194.39.78
• Hierarchical authoritative structure organized into zones
– Servers become authoritative over zones and the domain name records it contains
– If a name server is queried for a domain that is not in its database, it might recursively query name servers
higher up in the hierarchy1
• Devices make queries for name resolution to DNS servers via UDP port 53 2
• DNS servers are often provided by Internet service providers (ISPs)
DNS Terminology
• DNS Resource Record— A mapping file with information which associates an IP address or
additional DNS record to a domain name
• DNS Database—A repository of resource records for domain names1
– Common types of resource records include:
• IP addresses (A)
• Pointers for reverse DNS lookups (PTR)
• Domain name aliases (CNAME)
• Domain Name Space—A tree structure for domain names, with each leaf having zero or
multiple resource records
– Tree sub-divides into DNS zones
• DNS Zone—May consist of only one domain or many domains/sub-domains managed by
an authoritative name server
Resolving an IP address
1. If the local DNS server cannot find the requested domain name in its database, it forwards the request
to a root server on the network1
2. The root server sends the IP address of the local DNS server that is responsible for the target resource to
the local DNS server that sent the request
3. The local DNS server of the requester directly queries the local DNS server responsible for the target
Footnote 1: The resolution process is transparent to the requesting user. From the
user’s perspective, the response appears to come directly from the local DNS server.
5. The target’s local DNS server then returns the IP address of the actual resource to the local DNS server
of the requesting browser
7. The local DNS server sends the target’s IP address to the requester
8. The requesting device uses the resolved IP address to contact the target web server, and also caches the
address
Footnote 1: Caching the address saves time if the target resource is requested again.
Note: Important devices such as servers, routers, and switches generally use static IP
addresses
DHCP (cont.)
• Operates based on a client (UDP port 68)/server (UDP port 67) model
• When a device connects to the network, the DHCP software sends a broadcast query
(DHCPDISCOVER message)
• Any DHCP server on the network may then reserve an IP address for the client and make a
lease offer (DHCPOFFER)
• In response, the client replies with a DHCP request, broadcast to the server, requesting the
offered address (DHCPREQUEST)
• The DHCP server sends a packet to the client that includes the lease duration and any
other configuration information that the client might have requested (DHCPACK)
• DHCP is used for both IPv4 and IPv61
Footnote 1: One of the key features to IPv6 is its auto configuration capabilities
(Stateless Address Auto-configuration (SLAAC)) eliminating the need for a DHCP
server however IPv6 addresses can be DHCP assigned when administrators providing
benefits such as:
Provide logging for an organization that wants accounting of edge devices connecting
to their network.
Dynamically assigning DNS server addresses to clients in environments without IPv6
stateless DNS discovery
Assigning other DHCP option provisioned settings such as VLAN and QoS values to a
VOIP phone
• The DHCPACK sent from the DHCP server provides the standard information:
– IP address assignment and subnet mask
– Default Gateway address
– Lease time
– DNS servers
– Domain name
• Many other options can be sent within the DHCPACK message such as:
– Time servers info (NTP)
– Log server
– Host name
DHCP Option 82
• Also known as DHCP relay agent1 information option and provides increased security when
DHCP is used
• Allows DHCP relay agent devices to be verified preventing DHCP client requests from
untrusted sources
• When DHCP option 82 is included in DHCP packets, additional information about the
clients’ identity is included
Footnote 1: Relay agent feature allows for the centralization of a DHCP server instead
of one present in each subnet. Because the request is being forwarded beyond the
broadcast domain and forwarded to the DHCP server additional information such as
the subnet the request came in on needs to be forwarded to the server. This allows
the server to respond with the correct IP address that corresponds the subnet the
new device is connecting to.
Footnote 2: Agent Circuit ID Sub-option encodes an agent-local identifier of the
circuit from which a DHCP client-to-server packet was received. It is intended for use
by agents in relaying DHCP responses back to the proper circuit. This generally is used
to identify the IP subnet the request is received on by the relay agent. Agent Remote
ID Sub-option sub-option MAY be added by DHCP relay agents which terminate
switched or permanent circuits and have mechanisms to identify the remote host end
of the circuit.
RFC 792
• Mechanism used to verify connectivity and send error and control messages about network
problems that are preventing packet delivery
• Located just above Layer 3 (IP) so that it can be routed over the Internet
– ICMP uses IP protocol 1
• Ping and traceroute are common uses of ICMP
• Other message types are used to communicate to the source device of any problems or
failures which can be sent by gateways or destination devices
– Destination Unreachable Message
• Codes are to identify the possible cause of the failed attempt 2
– Time Exceeded Message
• Used when the TTL field is zero
– Parameter Problem Message
• Used when a problem is identified with the header parameters 3
Footnote 1: This message may be sent with the source network in the IP header
source and destination address fields zero (which means "this" network). The replying
IP module should send the reply with the addresses fully specified. This message is a
way for a host to find out the number of the network it is on. Addresses The address
of the source in an echo message will be the destination of the echo reply message.
To form an echo reply message, the source and destination addresses are simply
reversed, the type code changed to 0, and the checksum recomputed. IP Fields: Type
8 for echo message; 0 for echo reply message.
Footnote 2: Destination unreachable messages include codes identifying the reason
for delivery failure. These codes include: 0 = net unreachable; 1 = host unreachable; 2
= protocol unreachable; 3 = port unreachable; 4 = fragmentation needed and DF set;
5 = source route failed.
If, in the destination host, the IP module cannot deliver the datagram because the
indicated protocol module or process port is not active, the destination host may
send a destination unreachable message to the source host. Another case is when a
datagram must be fragmented to be forwarded by a gateway yet the Don't Fragment
flag is on. In this case the gateway must discard the datagram and may return a
destination unreachable message. Codes 0, 1, 4, and 5 may be received from a
gateway. Codes 2 and 3 may be received from a host.
Footnote 3: If the gateway or host processing a datagram finds a problem with the
header parameters such that it cannot complete processing the datagram it must
discard the datagram. One potential source of such a problem is with incorrect
arguments in an option. The gateway or host may also notify the source host via the
parameter problem message. This message is only sent if the error caused the datagram to
be discarded.
Common Applications
RFC 959
• Standard network protocol used to transfer files between hosts using TCP
• FTP was not designed as a secure protocol and has many security weaknesses
– Can be secured with Secure Sockets Layer (SSL)/Transport Layer Security (TLS) as FTP Secure (FTPS)
FTP (cont.)
Footnote 1: Active connections are usually initiated from client port X to server port
21. Data ports established from the server generally use port 20 to client port Z
(client Z port has been supplied by the client).
Footnote 2: Passive mode is often used when the FTP server cannot establish the
data channel. This is common when network firewalls are in the path. While there
might be a firewall rule allowing the establishment of FTP connections outward the
data channel back through your firewall cannot be established. Passive mode solves
this because both channels (control/data) are initiated from the client side.
Footnote 3: Moving text files from one platform to another using regular FTP, the
data will be moved exactly in the format it was in. Programs would not correctly
recognize end of line markers etc. if a text file was moved from UNIX system to a PC.
FTP incorporates some intelligence to handle these different file formatting. The FTP
standard allows the specification of certain details about the file's internal
representation prior to transfer.
Footnote 4: The Image type is generally used for generic binary files (graphical
images/ZIP files) as well as other data that are represented in a universal manner
(standard). It is also often called binary type as well.
FTP Connections
Control Connection
Port 21 Port A
• TFTP allows a client to retrieve files from or place files on a remote host
• Initially standardized in 1981; RFC 1350 contains the current specification
• Simple design makes it the primary protocol for initial stages from network booting
strategies
• Often used to transfer firmware images and configuration files to network devices
like routers, firewalls, and IP phones
• Rarely used for Internet transfers
• Uses UDP port 69 as its transfer protocol making it quicker however less reliable than FTP
Telnet
RFC 854
• Provides reliable connectivity to devices where command line interfaces (CLI) are needed 1
• Generally authentication is performed during connection and all data is transferred in clear
text
– SSH with its security enhancements is quickly replacing telnet for CLI connectivity
Footnote 1: The purpose of the TELNET Protocol is to provide a fairly general, bi-
directional, eight-bit byte oriented communications facility. Its primary goal is to
allow a standard method of interfacing terminal devices and terminal-oriented
processes to each other.
RFC 4253
• The Secure Shell (SSH) is a protocol for secure remote login and other secure network
services over an insecure network
• Provides strong encryption, server authentication, and integrity protection with a key
based cryptography1
• Designed to replace terminal connection protocols like telnet because they send
information (notably passwords) in plaintext, rendering them susceptible to interception
Footnote 1: SSH has been designed to operate with almost any public key format,
encoding, and algorithm (signature and/or encryption).
SSH Connections
RFC 2616
• Underlying protocol of the World Wide Web
– Uses TCP port 80
– Secure version—HTTPS uses TCP port 4431
• Specifies the actions web servers and browsers should take in response to various
commands
– Entering a URL into a browser sends an HTTP command directing the web server to fetch and transmit the
requested web page; Request-Reply model
Footnote 1: Uses secure socket layer (SSL) encryption to provide secure transmission
of data. Standard HTTP is sent in clear text.
HTTP Methods
• PUT—Replaces all current representations of the target resource with the uploaded
content
• DELETE— Requests that the origin server delete the resource identified by the Request-
Uniform Resource Identifier (URI)1
Footnote 1: URIs have been known by many names: WWW addresses, Universal
Document Identifiers, Universal Resource Identifiers, and finally the combination of
Uniform Resource Locators (URL) and Names (URN). As far as HTTP is concerned,
Uniform Resource Identifiers are simply formatted strings which identify--via name,
location, or any other characteristic--a resource.
• DELETE—Requests all current representations of the target resource be removed
• OPTIONS—Requests information about the communication options available with
the target resource
• CONNECT—Requests that a proxy establish a tunnel connection to the target
resource. It converts the connection to a transparent TCP/IP tunnel, often to
facilitate HTTPS
LAB EXERCISE
End of Module 12
Common Applications and Protocols
Module 13
Resiliency and Performance
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
Quality of Service
• Optimizes bandwidth utilization and enforces service-level agreements (SLAs) for different
services and applications
• Helps maintain network availability in the event of denial-of-service (DoS)/worm attacks
– Assigns control/management traffic with high priorities and puts in separate queues
QoS Elements
• Classification
– Traffic is differentiated and handled based on prioritization1
• Policing
– Manages traffic congestion by determining whether packets are conforming to administratively defined
traffic rates and takes action accordingly (passing, remarking, or dropping a packet)2
• Queuing
– QoS values are mapped to various “lanes” on outbound ports
– Segregation of outbound traffic providing opportunity of preferential treatment of forwarding
– Queue congestion avoidance is can be controlled by algorithms such as Random Early Detection (RED) or
Weighted Random Early Detection (WRED)
• Scheduling
– Scheduling determines how the frames or packets in the queues are served
– Examples include weighted round robin (WRR) scheduling algorithm, strict priority scheduling algorithm,
or hybrid of each
• Remarking
– Remarking is typically the last phase of the QoS process
– The remarking engine has the option of rewriting the QoS value of a packet before it is put out onto the
wire
– The QoS values that can be remarked include 802.1p and IP precedence with Differentiated Services Code
Point (DSCP) bits
• 3-bit prioritization field in the 802.1Q header that categorizes network traffic based on
importance
In tagged Ethernet frames, IEEE 802.1Q uses CoS, a subcategory of QoS. CoS is a 3-bit
prioritization field used to categorize network traffic based on importance. Also
referred to as tagging, CoS uses eight categories (0 through 7) to influence traffic. The
most important information is categorized as 7 and the least important is 0. The
lower the priority, the more likely the packet is to be dropped.
CoS ultimately prevents important traffic from being discarded. CoS is leveraged
exclusively on Layer 2. Alternative QoS categorization methods can function on Layer
3, such as IP precedence or DSCP. CoS maintains relatively steady network traffic, but
it does not perform as well as QoS and switches do not always support the use of
CoS.
CoS benefits include:
• The CoS scale can be interpreted by other QoS tagging methods (used by
routers, switches, and other devices).
• This method regulates incoming and outgoing traffic.
• CoS supersedes predetermined priorities or values of frames if needed.
• 802.1p functions at Layer 2 as part of the 802.1Q VLAN marking, sharing a portion of the
16-bit field
• 3-bit Class of Service (CoS) value in 802.1Q header allows for eight levels of QoS
Footnote 1: Routing and switching devices use up to eight hardware queues that
provide varying levels of service. Internal mappings within the devices will classify
packets by these traffic classes and assign them to a queue for servicing.
7 6 5 4 3 2 1 0
Standard IPv4
IP Precedence Unused
DSCP IP ECN DiffServ Extensions
A default DSCP decode table is used to derive a 3-bit priority value and a 2-bit drop
precedence value for incoming packets.
The input and outputs are:
The input to this table is a DSCP value.
The outputs of this table are a priority value (0 to 7) and a drop precedence value
(0 to 3) for the packet.
The user can also define a decode DSCP policy map that takes precedence over the
default DSCP decode table.
Note: Explicit Congestion Notification (ECN) occupies the least-significant 2 bits of the
IPv4 ToS field and IPv6 traffic class field.
When a device receives a packet, it has several options about how to treat that
packet. Based on the properties of each packet, the router can decide to:
• Honor the Layer 2 or Layer 3 markings and transmit normally
• Ignore the priority labels and drop the packet
• Change the IP precedence of the packet, depending on the administrator’s
preference
sFlow
• Industry standard system for collecting information about traffic flow patterns and
quantities for a set of devices
• Provides continuous statistics on any protocol, so all network traffic can be monitored
sFlow (cont.)
• sFlow Agent — Software process embedded in devices that combines interface counters
and flow samples into sFlow datagrams sent via UDP port 6343 to the IP address of a
collector
• sFlow Collector — Centralized software process that analyzes sFlow datagrams to produce
a network-wide view of traffic flows
sFlow
sFlow Collector
sFlow
sFlow
sFlow Agents
sFlow (cont.)
• sFlow samples packets, but performs traffic analysis on a separate machine (typically a
server)—this allows for real-time responsiveness
• The sampling rate is the ratio of the number of packets incoming on an sFlow-enabled port
to the number of flow samples taken from those packets
• The sample data is collected from inbound traffic on ports enabled for sFlow, but both
traffic directions are counted for byte and packet counter statistics, which are then sent to
the collector
• Configuration considerations:
– The sampled sFlow data sent to the collectors includes an agent_address field, which identifies the router-
id of the device that sent the data
OpenFlow 1.3
• Protocol that allows network controllers to determine the path of network packets
• Separates control plane from data plane to provide more sophisticated traffic management
• Packets that do not match a flow table entry may be sent to the controller or dropped
– Controller then determines whether to change existing flow table rules or to generate new rules
• Enabler of software-defined networking (SDN)
• OpenFlow is layered on top of TCP and can use Transport Layer Security (TLS)
• A protocol that very rapidly detects faults between two adjacent routers connected by a link
• Must be enabled at the interface and routing protocol levels
• Two modes:
– Asynchronous—Both routers periodically send hello packets to each other; if a number of packets are not
received, the session is considered down
– Demand—Hello packets are not sent and the routers have another way to verify connectivity
• With Echo function, one router sends a stream of Echo packets that the other router returns via its data plane
• If a fault is detected, an action is triggered within a routing protocol (severing a session or adjacency)
• BFD has low overhead because it runs on the data plane (not the control plane)
• The BFD protocol is defined in RFC 5880
BFD provides a rapid forwarding path failure detection service to a routing protocol.
BFD provides rapid detection of the failure of a forwarding path by checking that the
next-hop device is alive. Without BFD enabled it can take from 3 to 30 seconds (based
on typical routing protocol dead timers) to detect that a neighboring device is not
operational, causing packet loss due to incorrect routing information at a level
unacceptable for real-time applications such as VOIP and video over IP.
Using BFD, you can detect a forwarding path failure in 300 milliseconds or less,
depending on your configuration.
• Allows a transmit port to notify the remote port when light is no longer being received
– Transmit LEDs on both ends are disabled when a fault is detected
– Only supported on 1 Gb/s Ethernet fiber ports1
No Signal
Tx Rx
Link down Disable LED
Footnote 1: This feature is part of the IEEE 802.3 auto-negotiation specification for
Gigabit Ethernet.
device# show interface ethernet 1/1/10 10GigabitEthernet1/1/10 is down (remote fault), line protocol is down Hardware is 10GigabitEthernet, address is 0000.0027.79d8 (bia 0000.0027.79d8) Configured speed 10Gbit, actual unknown, configured duplex f
• A protocol that enables1 communication between two 10 Gb/s (or higher) Ethernet devices
– When configured, the port can detect and report fault conditions on transmit and receive ports
LFS has detected a link fault
on the remote side
device# show interface ethernet 1/1/10
10GigabitEthernet1/1/10 is down (remote fault), line protocol is down
Hardware is 10GigabitEthernet, address is 0000.0027.79d8 (bia 0000.0027.79d8)
Configured speed 10Gbit, actual unknown, configured duplex fdx, actual unknown
Member of L2 VLAN ID 1, port is untagged, port state is BLOCKING
BPDU guard is Disabled, ROOT protect is Disabled
Link Fault Signaling is Enabled, Link Error Dampening is Disabled
STP configured to ON, priority is level0
Flow Control is disabled
mirror disabled, monitor disabled
<Truncated for brevity...>
• Provides redundancy to default gateways servicing hosts on the same subnet (RFC 5798)
– Allows an alternate router path for a host without changing the IP address or MAC address of its gateway
– Reliability is achieved by advertising a virtual router as the default gateway
– Two or more physical routers are configured to host a virtual router, with only one doing the actual routing at any
given time
Virtual Router
VRRP Router Virtual IP 192.53.5.1 VRRP Router
Master Virtual MAC 00-00-5E-00-01-01 Backup
WAN WAN
Host 1
Default Gateway
192.53.51
VRRP Terminology
• Virtual router: An object managed by VRRP that acts as a default gateway for hosts on a
shared LAN and consists of:
– Virtual Router Identifier
– Virtual IP address (VIP)
– Virtual MAC address
• VRRP router: A router running the Virtual Router Redundancy Protocol
– May be a participant in one or more virtual router instances1
• Virtual Router Identifier (VRID): Used to identify each virtual router in the subnet
– Supported decimal range is 1 to 255
– There is no default
Footnote 1: A VRRP router can host more than one virtual router and thus backs up
the VRID and VIP associated with each virtual router.
• Virtual MAC: The first five octets are a multicast standard MAC prefix for VRRP and the last
octet is the VRID1
• IP address owner: The VRRP router that has the same real interface IP address as the
virtual router's IP address
– When healthy, this router always becomes the master
Footnote 1: The first five octets of the address are the standard multicast MAC prefix
for VRRP packets, as described in RFC 2338. The last octet is the VRID. The VRID
number becomes the final octet in the virtual MAC address associated with the
virtual router.
When you configure a VRID, the software automatically assigns its MAC address.
When a VRID becomes active, the master router broadcasts a gratuitous Address
Resolution Protocol (ARP) request containing the virtual router MAC address for each
IP address associated with the virtual router.
In this figure, the switch sends a gratuitous ARP with MAC address 00-00-5E-00-01-01
and IP address 192.53.5.1. Hosts send the virtual router’s MAC address in routed
traffic to their default IP gateway (in this example, 192.53.5.1).
• Master: The VRRP router responsible for forwarding packets for the VIP associated with
the virtual router
– Creates and responds to ARP requests for the VIP
• Backup: The set of VRRP routers available to assume forwarding responsibility for a virtual
router should the current master fail
• VRRP priority: Each router has a priority set for each VRID it hosts to determine which
router becomes the master
– 255 is reserved for the IP address owner to guarantee it always becomes the master
– Priority can be set from 3 to 254 (255 is the highest priority)
– Priorities from 3 to 254 are used for backups (default value for backups is 100)
– Priorities 1 and 2 are reserved for track port failure
• All VRRP routers send multicast VRRP advertisements called hellos to determine the master
– Owner: The router with an interface IP address that matches the VIP address; the default priority is 255,
which causes the owner to become the default master
– Master: Sends hellos as a keepalive and responds to ARP and ICMP requests (such as ping)
WAN WAN
Ping
Host 1
Default Gateway
192.53.51
VRRP Failover
– Backup routers use the dead interval to track the last hello from the master
– If the dead interval expires before the hello is received, the backup router with the highest priority
becomes the master
– New master sends gratuitous ARP (GARP) to update MAC tables in the LAN
• A track port is one or more egress interface(s) on the router that is configured to be
monitored
– The track priority value is set to a lower value than the VRRP priority
• The default track priority for the IP address owner is 2
• The default track priority for backup routers is 1
Revision 1215 13 – 29
RSP 100 Resiliency and Performance
LAB EXERCISE
End of Module 13
Resiliency and Performance
Module 14
Security Features and Protocols
Legal Disclaimer
All or some of the products detailed in this presentation may still be under development and
certain specifications, including but not limited to, release dates, prices, and product
features, may change. The products may not function as intended and a production version
of the products may never be released. Even if a production version is released, it may be
materially different from the pre-release version discussed in this presentation.
Nothing in this presentation shall be deemed to create a warranty of any kind, either express
or implied, statutory or otherwise, including but not limited to, any implied warranties of
merchantability, fitness for a particular purpose, or non-infringement of third-party rights
with respect to any products and services referenced herein.
The Ruckus, Ruckus Wireless, Ruckus logo, Big Dog design, BeamFlex, ChannelFly, Xclaim,
ZoneFlex and OPENG trademarks are registered in the U.S. and other countries. Ruckus
Networks, MediaFlex, FlexMaster, ZoneDirector, SpeedFlex, SmartCast, SmartCell, and
Dynamic PSK are Ruckus trademarks worldwide. Other names and brands mentioned in this
document or website may be claimed as the property of others. 18-1-B
Objectives
Authentication Protocols
• Designed to regulate access to a network using authentication as set by the IEEE 802.1
working group
• Uses the Extensible Authentication Protocol (EAP) (RFC 2284) to support centrally
administered authentication and defines EAP encapsulation of LANs (EAPOL)
Footnote 1: Supplicant devices (end devices) must be running 802.1x client software
providing the communication and authentication processes.
802.1X (cont.)
• Provides the ability for dynamically applying VLAN and IP ACL or MAC address filtering to a
port, based on information received from the Authentication Server
– If client is not authorized options to drop traffic from the client, or to place the port in a “restricted” VLAN
are available
• Provides authentication for multiple devices connecting to a single port such as a Wireless
LAN (WLAN)
Footnote 1: A physical port on the device used with 802.1X port security has two
virtual access points: a controlled port and an uncontrolled port. The controlled port
provides full access to the network. The uncontrolled port provides access only for
EAPOL traffic between the Client and the Authentication Server. When a Client is
successfully authenticated, the controlled port is opened to the Client.
Before a Client is authenticated, only the uncontrolled port on the Authenticator is
open. The uncontrolled port allows only EAPOL frames to be exchanged between the
Client and the
Authentication Server. The controlled port is in the unauthorized state and allows no
traffic to pass through.
During authentication, EAPOL messages are exchanged between the Supplicant PAE
and the Authenticator PAE, and RADIUS messages are exchanged between the
Authenticator PAE and the Authentication Server. If the Client is successfully
authenticated, the controlled port becomes authorized, and traffic from the Client
can flow through the port normally.
802.1X (cont.)
• Authentication Server
– Accepts and responds to authentication requests
• Authenticator Port Access Entity (PAE)
– Acts as a RADIUS client
• Supplicant PAE
– Supplies client information to Authenticator PAE
– Can initiate authentication procedure
• EAPOL messages are passed between the PAEs
802.1X-enabled
Supplicant
Device
Authenticator
RADIUS EAPOL
Messages Messages
Authenticator Supplicant
PAE PAE
Authentication Server
to them.
• When a Client that supports 802.1X attempts to gain access through a non-802.1X-enabled port, it
sends an EAP start frame to the authenticator PAE device. When the device does not respond, the
Client considers the port to be authorized, and starts sending normal traffic.
• RFC 6733
• Framework for granular control of access to resources, enforcing policies, auditing usage,
and providing a record
– Authentication: Identifying the user
– Authorization: Verifying that the user is allowed to take a requested action
– Accounting: Maintains records showing that an action has occurred, time spent, resource consumption
which can be used for capacity and trend analysis and possibly billing
• Combined these processes provide effective network management and security
• Protocols used for authentication and collection of services:
– RADIUS
– Terminal Access Controller Access Control System Plus (TACACS+)
TACACS+
• RFC 2865/2866
• RADIUS provides centralized AAA management for users connect and use a network
service via a client/server model
• User Datagram Protocol (UDP) port 1812/1645 for authentication/authorization (these are
bundled together)
• Network access devices usually contain a RADIUS client component that communicates
with the RADIUS server
• Often used by enterprises to manage access (802.1x) and for other authentication
purposes
Copyright 2018 – ARRIS Enterprises, LLC. All rights reserved
1. The user or resource sends a request for access to the Network Access Server (NAS) with
their credentials
Footnote 1: ACLs in their simplest form can be used for security or traffic
management. They can also however be used to identify unique traffic allowing it to
be manipulated or adapted based on the admins preference. Often they are used in
route maps and prefix lists which are topics beyond the scope of this class.
• Types of ACLs:1
– Standard ACLs filter packets based on source addressing
– Extended ACLs filter packets based on source and destination data2
ACL Example:
access-list 1 deny host 209.157.22.26 log
access-list 1 deny host 209.157.29.12 log
access-list 1 deny host 209.157.29.72 log
access-list 1 permit any
209.157.29.72
209.157.29.12
Denied Packets
209.157.22.26 209.157.22.26
Internet 209.157.29.12
209.157.29.72
• Note: Generally the number range for extended ACLs is 100 to 199
In this example, the first and second entries deny ICMP pings, and the third entry
permits all other ICMP traffic (such as redirects and destination unreachable
messages from hosts in the 209.157.22. x network to hosts in the 209.157.21. x
network). The fourth entry denies IGMP traffic from the host device named
“jrsmith.example.com” to any network. This stops the user from running multicast
and generates syslog entries for denied traffic. The fifth entry permits all packets that
are not explicitly denied by the other entries. Without this entry, the ACL denies all
traffic not explicitly permitted. After the ACL 102 has been created, it is applied to
interface Ethernet 1/1/1.
• Allows a single device, such as a router, to act as an agent between the Internet (a public
network) and a local (or private) network
• Maps private IP addresses to global (public) addresses that are routable across the Internet
Source: Source:
10.11.100.1030 144.49.210.99:16891
NAT Destination:
Destination: 144.49.210.99:16891
10.11.100/8 10.11.100.1030
Server
Source: Source:
10.11.200.1031 144.49.210.99:16411
Intranet Internet 63.96.4.55
Destination
Destination: 144.49.210.99:16411
10.11.200/8 10.11.200.1031
NAPT Table
Packet from Host A to Server Way Before NAT After NAT
Packet from Server to Host A Outbound 10.11.100.1030 144.49.210.99.16891
Packet from Host B to Server
Packet from Server to Host B Inbound 144.49.210.99.16891 10.11.100.1030
Outbound 10.11.200.1031 144.49.210.99:16411
Inbound 144.49.210.99:16411 10.11.200.1031
NAT (cont.)
LAB EXERCISE
End of Module 14
Security Features and Protocols