Free CCNA Training Course | Part 4 - Rapid Spanning Tree

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
The original spanning tree protocol was developed way back in the mid 1982 by Radia Perlman. This was a long time before which is, as we know them today, even existed. What you're seeing here is the original paper published in 1985, outlining how spanning tree works, and it worked well for its time. But back in the early nineties, the demand on networks wasn't what it is today. They didn't connect phones to their network. They didn't have mobile devices or high speed internet. So if it took a whole minute for an interface to come back up, that wasn't considered a big deal. It wasn't long before this needed to change. So one of the improved versions is being tree called rapid spanning tree protocol was released with the aim of improving how quick a network change is detected and handled? So we're going to take a look at what is change in rapid spanning tree and how it achieves this fast convergence. Just because Burning Tree has been improved on doesn't mean we need to throw away everything we've learned. There are a lot of similarities. For instance, there is still a bridge being blues are still sent through the network. Switches still need to find the best path to the bridge and links are still blocked to prevent loops. So then what's changed? Well, for one also, which is actively seen BP use not just the bridge. The BPU format has changed a little to include more information. There are a few new port states to supplement the blocking state. There are improvements to bring ports up quicker, and Cisco have added their own pavilion technology. We're going to take a look at all of these changes in this video. So considering there's a few versions of spanning Tree, how do you know which one use which is running? Once again, we come back to the old show spanning tree command. On this, which we see the way running a version of spanning tree called I Travel. This is the original version of spanning tree. Usually, Cisco switches will run some type of RSVP by default. That means that you can take a brain, you switch out of the box, connect to your network and it will automatically have RSVP protection. But we just can't leave it at that. We still need to know how to tune it to our knees and how to troubleshoot something if it breaks. Let's start by seeing how we can change the version that we're using. We do this with the spanning tree mode command and you'll see there's a few options here. Rapid PVS is Cisco's version of RTP as a Cisco's version, as they have added features that aren't strictly part of the Irish TB standard. Don't worry, we'll cover those a bit more later. Now, if we check the version once again, we can see that it has been changed to RSVP. Now, as usual, this video has plenty of quizzes that you can test yourself out on. And we're starting to get you to think a bit more outside the box. The basic concept of bridge IDs are still the same in RTP. That is, the lowest bridge ID becomes the root bridge. But if you take a look at the bridge priority, you'll notice that something doesn't quite look right. In the last video, we said that the bridge priority was in increments of 4096. But here the value is 61,441, which clearly is not divisible by 4096. So what's happening here? In our step, the BPU message now includes a system wide extension field on a Cisco switch. This is basically the VLAN ID. And that's why we see the breach priority broken down into two parts here. The priority and the suicide. The system I.D. here is one because we're looking at Villa one. You should also notice the Bridge I.D. priority is different to the Route I.D. priority. This tells us that the local switch is not the route bridge. Let's take a look at our other switch. Notice here that it says this bridge is route. This means that the switch we're currently logged on to is the route bridge. Quite simply, if you don't see this. Some others, which is the route bridge. Let's take a look at BP's use again for a minute. In the original spanning tree protocol, only the Root Bridge would generate BP to use and other switches would forward them through the network. The only exception to that is with DCNS, when a switch would use a BPU to notify the network of a topology change. In Irish Ole's, which is Nelson BPT used to their neighbors. These are a type of hollow message to identify themselves and to learn about the other switches they're connected to. Individual BP to use are no longer flooded or forwarded through the entire network. BP to use are now sent only to the immediate neighbor. A significant advantage of this is being able to use BP to use to see if an immediate neighbor is up or down. If three BP use go missing in a row, then the neighbor is considered to be down. Beads are sent out at regular intervals, according to a hollow timer. This is still every two seconds by default. We can change that time or if we want to in configuration mode, we use the spanning tree command. Notice that we have to include a villain. No, this is a Cisco thing. They require configuration to be applied per villain. And we include the hollow time, key word and the time in seconds that we want. Now, a quick architectural question for you. Why would we want to control where the bridges within our topology? When it comes to ports, some things change and some things remain the same. The report, for example, is the same. There is still one report per switch, and it still points out the best to the average. The only exception, of course, is the river itself, which does not have any reports. All ports on the bridge are always designated ports. Speaking of designated ports, they're the same two. These are ports that point away from the bridge and can still forward regular traffic, each network segment can only have one designated port. If there were more than one, there would be a loop. What do I mean, though, when I say network segment? In nearly all cases these days, this is a link between two switches. The segment is the link itself, and there are only two devices on this segment. But a more complicated scenario is where you might have an old fashion hub or a dumb switch or something like that in a case like this. More than one device can connect to the single segment. This is rare these days, though we shouldn't be seeing hubs anymore, but it is still possible, so be aware of it. If this does happen, if you do find a hub in your network, be aware that you can only have one designated port for the entire segment. If there was more than one, we would definitely have a look. Therefore, one of these ports would need to be blocking instead. The blocking port is where things get interesting. Blocking ports can now be categorized as either alternate ports or backup ports. Any type of blocking port will block regular traffic, but still allow BP to use. In fact, a port must be receiving BP to use to be in a blocking state. Of course, you might wonder why this is the case. first, remember that all switches in bpd use used their neighbors. If a port is not receiving BP to use, then it is not connected to another, which is probably connected to something like a PC, a printer, a server or some other end device. We can't create loops on interfaces connected to these devices, so these ports do not need to be blocking. As I just mentioned, blocking ports can be alternate or backup, an alternate port is one that has received a superior BPU from a different switch in the same network segment. The network segment in this case is just that link between the two switches. This here is an alternate port, as is an alternate path to the bridge. It's ready to take over if the current report fails. Back up ports come into play when there is a shared segment that is something like a hub that allows two or more switches to connect to each other. In our example, once, which has two links, one link on this, which becomes designated on the other switch the port is blocking, this would be an alternate port, as we just discussed. Now, back on the switch with two links, something interesting will happen. The switch will see its own BP use that is, each port will send BP to use and the other port will receive them. Only one of these can be designated, though, so the other must be blocking. But because the Switch receives a BPU from itself, the blocking port will be a backup port. It's called a backup port as it's the backup to this segment. Just remember, as we previously said, that jobs are rare, so you are unlikely to see back at ports, if you do see backup ports in your network, you probably have a hub somewhere and you should probably take steps to replace them. We can examine the output of show spanning tree to see these port types here, we can see the role which would be route designated alternate or back backup. The status which can be forwarding or blocking, and of course, the cost which we spoke about last video. The cost is determined by the speed of the port. There may be times when we want to override this, though perhaps we want to make traffic flow over a different path for troubleshooting purposes to do this. We can figure an interface and then we enter the spanning tree cost command. The cost is any numerical value. Of course, you should verify our change with show spanning tree and you'll see here that the cost has changed. This has in effect changed which ports are route and which are alternate. So have a look at this topology. Can you figure out what would happen from a spanning tree point of view if the Red Link were to break? In the original spanning tree port needs to work through the blocking, listening, learning and forwarding states all up, it would take about 50 seconds report to come online, which is far too long in a modern network. RSVP addresses this issue by changing the states to discarding learning and forwarding the old blocking and listening states have effectively been combined into discarding. But the big change is how all these work. They don't have time is anymore. Instead, they have a negotiation procedure. As before, when an interface first comes up, it is in the blocking state, so a loop can't form before it's detected. For example, imagine that we're adding a new switch into the network. There's no loop here, but spanning three doesn't know that yet. The switches will start setting BP to use, which starts a negotiation process called async. This gets a bit complicated, but basically they use new fields in the BPU message to share information. They negotiate the link to the bridge first and enable that link at this point, the downstream links are still blocked. Once which will propose which links would be forwarding and which should be blocked, the same process then completes four downstream switches and the appropriate links transition to forwarding. Yeah, I have very much oversimplified this process. The point to remember is that RCP takes a much more active approach in bringing up the interfaces. There are no timers, which means interfaces come up faster. This approach means RCP can respond very quickly to changes in the network. But don't take my word for it. Let's see it in action. first, we're changing a flavor of spanning tree to PVC. This is one of Cisco's versions of the original Spring Tree Standard. I'll get to why this is called BVA later. Next, I'm enabling spanning tree general and event debugging. So in case you've forgotten or you haven't come across debug yet, debugging is getting extra logging information from us, which so we can use it for troubleshooting. I have a separate video on that if you want to review on how that works. If we're on the console port, which I am, we will see all debug logs in real time. However, if you're connecting to a switch with S.H. or Telnet, you need to run the Terminal Monitor command first. What this does is sends a logs directly to your terminal session so you can see them. You know, so we're already getting a few logs as there's always something happening. I'm now going to bring up a new link on Gigabit zero to. Notice that we can see the interface going through the various states. first listening. And learning. And finally forwarding. As you can see, it takes too long for a port to transition to 40. I'm now going to shut that port down so we can try and RSVP. Of course, we'll get a few more debug logs along the way. Now we'll change your RCP mode. This in itself will generate a lot of logs. We'll just wait until they're finished. OK, that looks stable now. And now I'm going to bring up gig zero slash two again. And that's done. See how much faster that was with Iris TPY. We can't go back and look at a few of the steps that it took, such as selecting designated as the port role and sending the RSVP proposal. Of course, you should always remember to disable any bugs when you're done troubleshooting. Got another quiz question for you. But I don't think you'll find this one very hard. When we think of spanning tree topologies, we can think about different ways that ports can behave. So far, we've mainly talked about the links between switches. As far as RCP is concerned, these are either point to point ports, which is a direct connection between two switches or shared ports, which connect to a shared segment like having a hub in your network. We've looked at both of these already, but there's a third type we haven't looked at called an edge port. This is where edge devices connect. These are devices like PCs, printers, routers, basically anything that's not connecting switches together. Why is this important, because spanning tree is there to stop loops? And where do loops occur in devices that forward layer two frames? So basically, Hobson switches edge devices do not forward frames, so they do not cause loops. So as you can see, there's no reason to worry about BP to use port states blocking ports, that sort of thing. When we have an edge device connected now in the old days, that would be a problem because even if we're connected to an edge device, it would still take 50 seconds for that port to come online. And that's just waste of time to address this. But even before RCP was invented, Cisco created a feature called Port Fast. It was such a good feature that when RCP was released, it became a built-in part of the standard, which we now know as the edge port. When we know that certain ports are for edge devices only, we can configure them with port fast. So let's see how it's done. Under interface configuration, we enter the spanning tree port fast command. Despite being part of the vendor neutral RSVP, we still call it port fast when using Cisco switches. Just remember that other vendors will call it an edge port. Notice that we're given a warning. We have authorized a switch to bypass many of the spanning tree procedures on this port in order to get it to perform better. This is fine, but be aware that connecting a switch here, while Port Fast is active may introduce a loop into the network. If we look at the spending details again, we can see that this interface is now listed as an export. It also goes straight into the forwarding mode, bypassing the discarding, learning and forwarding states. It's also worth noting that if this port goes up or down, it will not trigger a tsien to others, which is. Practically, though, what happens if someone plugs a switch into an airport, whether it's malicious or accidental, this can happen. By default, this might introduce a loop into the network, which is, of course, very bad. Does this mean that port fast is just too risky to use? Not necessarily. There's another feature that came along with Port Fast called BPU God. Now, as far as I know, this is not on the exam, but I feel it's too important not to mention it, at least briefly. So imagine we have configured an edge port with port fast and we connect a workstation to be safe. We also configure BP to you guard. Then someone comes along, disconnects the workstation and connects a switch. When the news which is connected, it will start sending BP to use. The original switch will see this, and it will think, hang on, that's not right. There must be a switch connected. The port will then loses edge port status and it will become a regular port. In this way, our network is still protected from loops. I have a couple of trivia questions for you this time. You might need to do some of your own research on these ones, but don't worry, it'll be time well-spent. The original spanning tree known as or two to one day has quite a few drawbacks in the modern network. We've looked at a few of them in this video. Over time, there have been a few improvements to the original protocol and a few new variants of spanning tree. Not all of which are shown here. Cisco even had a few proprietary versions which only worked with other Cisco switches. There have also been vendor neutral versions that work on all switches like R.S.V.P.. To be honest, these take a lot of Cisco's improvements, like better time as port roles and other features, and they make them standards. So our step is the vendor neutral improvement on spanning tree Cisco's implementation of this is called pavilion rapid spanning tree. This means that Cisco's enhanced version of RCP is aware of VLANs, while the official version of RCP is not. Another version of speeding treacle Ms Adobe is the vendor neutral option that is available in a way. OK, so what do I mean when I say velan away or pavilion? Well, traditionally the spanning tree topology is the same for the entire switching domain. If a port is the root port, it's the report for all villains. If a port is blocked, it is blocked for all villains. In the pavilion model, there is a separate spanning tree instance for each feeling. Take this topology, for example. We have two villains, ten and 20. We can configure different priorities, bridges and link costs for each feeling. This means that the switch selected to be the regional villain ten may be entirely different to the switch selected to be Root Bridge for Villain 20. There are pros and cons of this approach, of course. In a traditional model, some links would still be blocked. These links would be then sitting there idle all the time, essentially being wasted in our pavilion model. A link may be blocked for Valentin and a different link is blocked for Velan 20. This means that we're utilizing all our links, on the other hand, the switch needs to maintain a separate instance for every villain, even if they have the same configuration. If you have a lot of villains, then your switch will have a lot of spending tree processes. This puts more load on this, which is hardware mzgee that's multiple spanning tree is a reasonable alternative in this case, but that's outside the scope of a county level video. Let's see how this looks on a switch. first, we're creating a two villains, ten and 20. We want this which to be the bridge for Valentin, but not for villain 20. This is done by changing the bridge priority, as we saw in the last video. This time, I'm going to show you a shortcut. We're going to run spanning Tree Valentin Route Primary. This is a macro or shortcut on Cisco Switches that sets the Bridge ID for us. So this which will become the route by specifying Valentin this change will only happen for the violent end spanning three instance. We can do the same for VLAN 20 using the secondary keyword. This will set a bridge party that's a little worse than the current route bridge, but still better than other switches. So either Route Bridge fails this, which will be the next in line to take over. We can now take a look at the result with show spanning Tree Valentin. This is the same as show spanning tree command we've been using. It's just limiting the output to volunteer any information only. We can indeed see that this is the bridge for the U.S. in. Let's do the same for Velan 20. You can see here that some other which is the bridge for Velan 20, the local bridge party is a little worse than the bridge. Question ten, here is the big one I want you to think about. I have this question in the real world, and it's likely that you will too. You will need to put in some additional research to find the answer. We have a two part lab today, in the first part, you need to implement RCP and add general enhancements. In Part two. Someone has broken down network. You need to find the fault and repair it. We're now going to move on from spanning tree head over to the next video, which looks at bundling multiple links into a single ether channel.
Info
Channel: Network Direction
Views: 1,866
Rating: undefined out of 5
Keywords: Network direction, Networking, Ccna, Free, Cisco, 200-301, primer, Spanning-tree, Vlan, Rstp, Rapid, Radia perlman, Convergence, Loop, Root bridge, Bpdu, Per-vlan, Rapid-pvst, Priority, Sys-id-ext, System id extension, Cst, Hello-time, Show spanning-tree, Designated, Root, Backup, Alternate, Forwarding, Blocking, Discarding, Learning, SYNC, Edge, Portfast, BPDUGuard, Mstp, Root primary, Root secondary
Id: p2tYG_wVBV4
Channel Id: undefined
Length: 23min 34sec (1414 seconds)
Published: Tue Sep 14 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.