Bandwidth Management and Loop Prevention in Redundant Networks
Bandwidth Management and Loop Prevention in Redundant Networks
Department of Electrical and Electronics Engineering, School of Engineering and Engineering Technology, Federal University of Technology, Akure,
Nigeria
Abstract
The current multimedia applications and services effective functionalities require reliable network connectivity that can be
achieved with the implementation of network redundancy. However, the redundancy may cause broadcast storm which results in
an unstable and congested network because of the network loop. Spanning-Tree Protocol (STP) is a feasible technology for loop
prevention in switched networks. It employs the IEEE 802.1D algorithm to exchange the bridge protocol data unit (BPDU)
messages to detect and prevent the loops by blocking certain redundant interfaces. However, the associated bandwidths of the
blocked interfaces are not being utilized in the network. Therefore, to enhance system performance, physical redundant links can
be logically grouped into one in order to exploit the available bandwidth with the aid of EtherChannel. This paper presents STP
concepts and its implementations in switched networks. Furthermore, how the root bridge election process can be managed in a
network is demonstrated and finally, practical application of an EtherChannel for bandwidth aggregation is presented.
Keywords
STP, BPDU, Protocol, EtherChannel, Bridge ID, Root Bridge
Received: September 10, 2015 / Accepted: October 18, 2015 / Published online: January 11, 2016
@ 2016 The Authors. Published by American Institute of Science. This Open Access article is under the CC BY-NC license.
[Link]
* Corresponding author
E-mail address: compeasywalus2@[Link]
2 Isiaka A. Alimi: Bandwidth Management and Loop Prevention in Redundant Networks
downtime and continuity in the network services [4]. implementation of STP and a practical means of managing the
The continuity of network services in switched networks can root bridge election process are presented. Furthermore, it
demonstrates the application of EtherChannels for bandwidth
be achieved by having redundant links between switches.
aggregation. Some concluding remarks are given in Section 6.
However, the redundancy may result in layer 2 technical
issues such as mislearning MAC addresses, multiple frame
copies, and broadcast storm which is a condition in which the 2. Spanning Tree Protocol
broadcasts continuously circling the network [5]. This results
in network loop in which network frame cycles around the One of the major challenges of a switched network is the way
network infinitely causing a huge volume of traffic from the by which the network loop can be prevented. The loop
broadcast frame and consumes almost all of the possible avoidance approach is a means of preventing the network
network bandwidth. This situation is due to the fact that there frame from cycling around the network as well as optimizing
is more than one active path between two network devices and the network bandwidth. The fundamental approach to prevent
occurrence of multiple active paths results in an unstable and loops is to have a single path between switches in the entire
congested network. The loop can be prevented in a switched network. Conversely, this approach prevents network
network with the aid of Spanning-Tree Protocol (STP). The scalability. Therefore, deployment of redundant paths is
STP is a layer 2 link management protocol that helps in required in a large switched networks. In this type of network,
maintaining network efficiency and preventing network loops the main challenge is controlling the potential loops that could
occurrence when infrastructure devices such as switches and be caused by the redundant paths. The Spanning Tree Protocol
bridges are interconnected via multiple paths [6], [7]. The loop (STP) addresses the issue of potential loops in the entire
avoidance is realized by employing the IEEE 802.1D switched network. To achieve this, redundant paths between
algorithm to exchange the bridge protocol data unit (BPDU) switches are temporarily blocked in a normal operation.
messages between adjacent switches at regular intervals to However, the redundant paths are automatically activated
detect loops in the network and removes the loop by blocking when the primary path goes down [9], [10]. Therefore, the
the selected interfaces [6], [8]. However, the algorithm STP helps in creating fault-tolerant and high availability
permits redundant paths to be automatically activated when internetworks which are the principal service requirement in
the primary path goes down or becomes congested to ensure designing an enterprise network. The plug-and-play property
system availability [9]. as well as ease of configuration of STP have been part of the
fundamental success of the Ethernet [11], [12]. Nonetheless,
This paper investigates loop prevention algorithms and the timer based property of STP results in low convergence
bandwidth management in redundant networks by the time and consequently affects network performance. To
implementation of spanning tree and EtherChannel. The STP achieve faster convergence, there have been several revisions
concepts for switched networks and the standard variants are to the original STP such as, the Rapid Spanning Tree protocol
discussed in the subsequent Section. Moreover, root bridge (RSTP) and the Multiple Spanning Tree Protocol (MSTP) [7],
election process as well as port roles and states are presented [12], [13], [14], [15]. Table 1 presents different STP standards
in Section 3. Section 4 focusses on the EtherChannels and the and protocols.
associated aggregation protocols. In Section 5,
Table 1. STP Standard Variants (Adapted from [16]).
2.1. STP Concepts determine the best loop-free path through the switched
network. Through the information, the root bridge election can
The fundamental purpose of implementing the STP is to offer
be accomplished. The election process is determined by the
a loop-free switched network. To achieve this objective, the
bridge priority and the root bridge is the central point in a
topology information of all participating STP switches is first
switched network to determine the best route through the
created and the acquired information is then employed to
network [10]. By this means, the STP defines a specific tree
American Journal of Mobile Systems, Applications and Services Vol. 2, No. 1, 2016, pp. 1-12 3
with a root bridge and also offers a loop-free path from the the bridge discards it. Furthermore, if the bridge is a
root to all infrastructure devices in the network [6]. designated bridge for the LAN from which the inferior BPDU
Furthermore, to determine which port will be in forwarding was received, then the bridge will send a BPDU containing the
up-to-date information stored for that port to that LAN in
state or in the blocking state in a situation where there are two
order to propagate superior information on the network [6].
interfaces on a bridge that are part of a loop, the spanning-tree
port priority and path cost settings are employed [8]. The port 2.3. Bridge ID, Bridge Priority and System
priority value signifies the location of an interface in the ID Extension
network topology while the path cost value represents the
media speed. The redundant data paths in the network are The bridge identity in a network is called the bridge ID. The
forced into a standby (blocked) state by the STP. However, bridge ID is an 8 byte field which consist of a 2-byte bridge
when a network segment in the spanning tree fails, the priority field and a 6-byte MAC address field [17]. Each bridge
algorithm determines the spanning-tree topology again and in a network has unique MAC address, however, the bridge
activates the standby path in the network [6]. priority is configurable. These components of the bridge ID
enable each switch to have a unique bridge ID in a network. The
2.2. STP Topology analysis is illustrated in the upper part of Figure 1.
The spanning-tree topology is determined by elements such as The illustration is for a condition in which a spanning tree
the unique bridge ID which is made up of the bridge priority instance runs for the entire network and it is called Common
and MAC address; the spanning-tree path cost to the Spanning-Tree (CST). However, for a large network that
spanning-tree root bridge and the port identifier which is also implements VLAN, it is essential to run multiple instances of
made up of port priority and MAC address. By default, each STP in order to accommodate each logical and physical
bridge in the network functions as the STP root when the network. The multiple instances of the STP are called Multiple
bridges are powered up. Then, to compute the spanning-tree Spanning Tree (MST), Per-VLAN Spanning Tree (PVST) and
topology, the bridges send configuration BPDUs through the Per-VLAN Spanning Tree Plus (PVST+). Therefore, when the
Ethernet and the radio ports. The BPDUs contain information network is segmented with VLAN, there is need to include
that helps in computing the spanning-tree topology [6], [12]. information about the VLAN in the bridge ID. This is
The superiority of configuration BPDU is determined by accomplished by the Extended System ID field which is 12
lower values of parameters such as the bridge ID and path cost bits of the original bridge priority that accounts for the
[6]. Therefore, when a bridge receives a configuration BPDU respective VLAN participating in the STP [17]. Therefore,
that contains superior information, then the information is summation of the new bridge priority value and the System ID
stored for that port and also forwarded with an update message extension is the original bridge priority that is vital in the Root
to all attached LANs for which it is the designated bridge if the Bridge election process. The analysis is depicted in the lower
BPDU is received on the root port of the bridge. However, part of Figure 1 in which the original format has been
when the received configuration BPDU contains inferior redefined.
information compare to the existing one stored for that port,
each bridge in the network functions as the STP root when the
3. Root Bridge Election Process bridges are powered up. Therefore, each of them claims to be
the root bridge in their advertisement. The bridges
The spanning-tree root is the logical center of the topology.
participating in STP gather information about other bridges in
All undesirable paths to the spanning-tree root from any part
the network through the exchange of BPDU data messages.
of the network are placed in the blocking mode. By default,
This messages exchange leads to actions such as the election
4 Isiaka A. Alimi: Bandwidth Management and Loop Prevention in Redundant Networks
of a unique spanning-tree root for each spanning-tree instance, elected as the root bridge can be manipulated by changing the
the election of a designated bridge for every Local Area bridge priority value for it to have a better chance and higher
Network (LAN) segment and the removal of loops in the probability of being the root if a lower priority value is
network by blocking redundant Layer 2 interfaces. configure on it [6].
Bridges that are initially claiming to be the root bridge will 3.1. STP Port Roles
eventually change their status on receiving a Hello BPDU
with a lower BID. This Hello BPDU then becomes a superior In a switched network, after the election of the root bridge,
BPDU. Consequently, the bridge with the lowest numerical each port of the switches in the network is assigned a role
priority value and lowest BID is elected as the spanning-tree depending on its location within the STP topology. According
root for each VLAN in a segmented network [12]. However, to the 802.1D, roles such as Root Port, Designated Port and
in a situation where there is a tie between two switches having Blocked Port can be played by the ports. However, the 802.1w
the same priority value, then the bridge with the lowest MAC splits the Blocked Port role into Alternate and Backup port
address in the VLAN will eventually become the roles. After the selection of the best path and the allocation of
spanning-tree root bridge [6]. port roles, all ports with the alternate or backup STP roles will
be blocked to prevent loops [10], [13], [18]. Figure 2 depicts
Furthermore, the bridge can be managed by configuring the
the port roles and Table 2 describes different available port
required lower bridge ID on it in order to make it the root. The roles.
bridge priority value is positioned at the most significant bits
of the bridge ID. Hence, the probability of the bridge being
Port Description
The root port is the one that receives the best BPDU on each bridge and it is the selected best path to reach the root bridge by non–root ones in
Root
the network. Moreover, it should be noted that the root bridge is the only bridge that does not have a root port.
According to the 802.1D, designated port is chosen because it can send the best BPDU on a specific switched segment. Therefore, it is
Designated considered as the best path to the segment. Also, there can only be one designated port per network segment and all the ports on the root bridge
are designated.
According to its name, it is the alternate path to the root bridge. The alternative port transits to the forwarding state when there is a failure on
Alternate
the root port in order to become the new root port. Furthermore, it receives more useful BPDUs from another bridge than the one that it is on.
The backup port provides another path to the designated port and take over the designated port role if the current designated port fails.
Backup
Additionally, it receives more useful BPDUs from the same bridge it is on.
American Journal of Mobile Systems, Applications and Services Vol. 2, No. 1, 2016, pp. 1-12 5
3.2. STP Port States forwarding or blocking state [6]. However, there are only three
port states in Rapid Spanning Tree Protocol (RSTP) - IEEE
The ports that are enabled on the network switches participate 802.1w that correspond to the three possible operational states.
in spanning-tree topology and they go through a process of The 802.1D disabled, blocking, and listening states are
interface states before being allowed to forward traffic [10]. merged into a unique 802.1w discarding state. The sequence
This is due to the fact that interface transition directly from of 802.1D interface states is shown in Figure 3 while Table 3
nonparticipation in the spanning-tree topology to the compares the 802.1D and 802.1w port states. It should be
forwarding state creates temporary data loops. Consequently, noted that STP removes redundant links by disabling the ports
switch interfaces have to wait for new topology information to which the redundant links are connected and to bring the
propagation through the LAN before starting to forward links up in case of failure leads to convergence issues. Also,
frames. In essence, they have to let the frame lifetime expires the associated bandwidths of the blocked ports are not being
for forwarded frames that have used the old topology [6]. utilized in the network. Therefore, to enhance system
When the 802.1D STP standard is enabled on the bridge, the performance, physical redundant links can be logically
Ethernet as well as the radio interfaces pass through the grouped into one, thereby, exploiting the available bandwidth
blocking state and the transitory states of listening and with the aid of EtherChannel [5].
learning. The STP then stabilizes each interface at the
Table 3. Comparison of Port States in the 802.1D and 802.1w (Adapted from [18], [19]).
STP (802.1D) Port State RSTP (802.1w) Port State Is the Port Included in Active Topology? Is the Port Learning MAC Addresses?
Blocking Discarding
No
Listening Discarding
Learning Learning
Yes
Forwarding Forwarding
Disabled Discarding No
Figure 4. (a) System with Bandwidth Aggregation, (b) System without Bandwidth Aggregation.
4.1. Port Aggregation Protocol and Link such as the hardware, administrative, and port parameter
Aggregation Protocol constraints [20]. Moreover, for channel establishment, switch
interfaces have to be in compatible modes.
The Port Aggregation Protocol (PAgP) and Link Aggregation
Control Protocol (LACP) enable automatic creation of 4.2. PAgP and LACP Modes
EtherChannels through dynamic exchange of packets between
the switch Ethernet interfaces. PAgP is a Cisco-proprietary The switch interfaces exchange either the PAgP packets with
protocol while LACP is defined in IEEE 802.3AD which is the partner interfaces configured in the auto or desirable modes
industry standard implementation [5]. Besides, PAgP and only or LACP packets with partner interfaces configured in
LACP are not compatible, so, both ends of a channel must use the active or passive modes only. This enables the interfaces to
the same protocol for a functional EtherChannel establishment. determine EtherChannel establishment based on criteria such
Furthermore, another way of configuring the Etherchannel is as interface speed, trunking state and VLAN numbers for
through the manual channel configuration without using any Layer 2 (L2) EtherChannels. Therefore, an EtherChannel can
form of negotiation. be established between interfaces in as much as they are in
compatible modes. However, interfaces that are configured in
With the aid of PAgP and LACP, the switch is able to learn the ON mode do not exchange PAgP or LACP packets [20].
about the identity of partners that are capable of supporting Table 4 shows the EtherChannel Modes and their descriptions
either of the protocol as well as the capabilities of their while Table 5 illustrates conditions for channel establishment.
interfaces. Subsequently, similarly configured interfaces are
dynamically groups into a single logical link based on factors
Switch 1
Will an EtherChannel be established?
Desirable Auto Active Passive ON
Desirable Yes Yes No No No
Auto Yes No No No No
Switch 2 Active No No Yes Yes No
Passive No No Yes No No
ON No No No No Yes
Figure 9. Switch D Bridge Priority Configuration with Port Role and State.
10 Isiaka A. Alimi: Bandwidth Management and Loop Prevention in Redundant Networks