66
Colin. J. Quigley Honours Final Project Report Project Title: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance. BSc (Hons) Networking and System Support 2011 Abstract Spanning Tree Protocol (STP (8021.D)) was introduced to Ethernet LANs to overcome the problems of loops forming in networks due to transparent bridging. Ethernet is still the most popular technology used for local area networks, however STP (802.1D) typically has a convergence time of between 30 and 50 seconds and does not scale well, this makes it inadequate for the demands of most modern Ethernet networks, therefore STP (802.1D) has been superseded by newer technologies offering greater scalability and faster convergence time, however businesses with legacy network equipment that does not support the newer technologies may find benefit in tuning STP (802.1D) settings to gain faster convergence times. As a result this project aims to investigate whether or not Spanning Tree Protocol’s (802.1D) convergence time can be improved by tuning the hello, max age and forward delay timers whilst still retaining network stability; the modification of timer parameters will be based on allowable and effective combinations identified in research. This investigation will be carried out using OPNET Modeller to build simulations of real LANs and then simulate link failure and recovery in each. Each LAN model will differ only in STP (802.1D) timer settings and diameter size. Recovery time and convergence state in each model will be measured, the subsequent measurements will be analysed and compared to determine if the network is stable and fully converged and if there is a performance increase or not in convergence time and to identify whether the increase if there is one is significant or not. Submitted for the Degree of BSc (Hons) in Networking & Systems Support, 2010-2011

An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

Embed Size (px)

DESCRIPTION

Spanning Tree Protocol (STP (8021.D)) was introduced to Ethernet LANs to overcome the problems of loops forming in networks due to transparent bridging. Ethernet is still the most popular technology used for local area networks, however STP (802.1D) typically has a convergence time of between 30 and 50 seconds and does not scale well, this makes it inadequate for the demands of most modern Ethernet networks, therefore STP (802.1D) has been superseded by newer technologies offering greater scalability and faster convergence time, however businesses with legacy network equipment that does not support the newer technologies may find benefit in tuning STP (802.1D) settings to gain faster convergence times. As a result this project aims to investigate whether or not Spanning Tree Protocol’s (802.1D) convergence time can be improved by tuning the hello, max age and forward delay timers whilst still retaining network stability; the modification of timer parameters will be based on allowable and effective combinations identified in research. This investigation will be carried out using OPNET Modeller to build simulations of real LANs and then simulate link failure and recovery in each. Each LAN model will differ only in STP (802.1D) timer settings and diameter size. Recovery time and convergence state in each model will be measured, the subsequent measurements will be analysed and compared to determine if the network is stable and fully converged and if there is a performance increase or not in convergence time and to identify whether the increase if there is one is significant or not.

Citation preview

Page 1: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

Colin. J. Quigley

Honours Final Project Report

Project Title: An Investigation into Spanning Tree Protocol (802.1D) timers

and convergence performance.

BSc (Hons) Networking and System Support

2011

Abstract

Spanning Tree Protocol (STP (8021.D)) was introduced to Ethernet LANs to overcome the

problems of loops forming in networks due to transparent bridging. Ethernet is still the most

popular technology used for local area networks, however STP (802.1D) typically has a

convergence time of between 30 and 50 seconds and does not scale well, this makes it

inadequate for the demands of most modern Ethernet networks, therefore STP (802.1D) has

been superseded by newer technologies offering greater scalability and faster convergence

time, however businesses with legacy network equipment that does not support the newer

technologies may find benefit in tuning STP (802.1D) settings to gain faster convergence

times. As a result this project aims to investigate whether or not Spanning Tree Protocol’s

(802.1D) convergence time can be improved by tuning the hello, max age and forward delay

timers whilst still retaining network stability; the modification of timer parameters will be

based on allowable and effective combinations identified in research. This investigation will

be carried out using OPNET Modeller to build simulations of real LANs and then simulate

link failure and recovery in each. Each LAN model will differ only in STP (802.1D) timer

settings and diameter size. Recovery time and convergence state in each model will be

measured, the subsequent measurements will be analysed and compared to determine if the

network is stable and fully converged and if there is a performance increase or not in

convergence time and to identify whether the increase if there is one is significant or not.

Submitted for the Degree of BSc (Hons) in Networking & Systems Support, 2010-2011

Page 2: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

2

Table of Contents

1.0 Introduction 1.1 Background ..................................................................................................... 4

1.1.1 Ethernet Networks .................................................................................. 4

1.1.2 Transparent Bridging ............................................................................. 5

1.1.3 Spanning Tree Protocol (802.1D) .......................................................... 5

1.1.4 STP 802.1D Timers ............................................................................... 6

1.1.5 STP 802.1D Limitations ........................................................................ 7

1.1.6 STP 802.1D Enhancements ................................................................... 7

1.2 Research Question ........................................................................................ . 7

1.3 Hypothesis....................................................................................................... 7

1.4 Justification ................................................................................................... 7

1.5 Project Type .................................................................................................... 8

1.6 Project Aim ..................................................................................................... 9

1.7 Objectives....................................................................................................... 9

1.7.1 Examine the Features and Mechanisms of Ethernet..........................................9

1.7.2 Investigate Transparent Bridging...................................................................... 9

1.7.3 Examine the Mechanisms and Operation of STP (802.1D) ............................. 10

1.7.4 Identify and Analyse STP (802.1D) Timers...................................................... 10

1.7.5 Determine STP (802.1D) Convergence criteria................................................ 10

2.0 Literature Review 2.1 Ethernet Introduction .................................................................................... 11

2.1.1 Ethernet Background ............................................................................. 11

2.1.2 CSMA/CD.............................................................................................. 12

2.1.3 Ethernet Addressing .............................................................................. 12

2.1.4 Transmission Media .............................................................................. 12

2.2 Transparent Bridge Operation......................................................................... 13

2.2.1 Basic Bridge .......................................................................................... 13

2.2.2 Learning Bridge........................................................................................ 14

2.2.3 Address Learning ................................................................................... 14

2.2.4 Frame Forwarding ................................................................................... 14

2.2.5 Frame Flooding......................................................................................... 14

2.2.6 Frame Filtering......................................................................................... 14

2.2.7 Broadcast and Multicast Addresses......................................................... 15

2.2.8 Ageing Time............................................................................................. 15

2.2.9 Bridging Loops ....................................................................................... 15

2.3 Spanning Tree Operation................................................................................. 17

2.3.1 BPDUs ................................................................................................... 17

2.3.2 Selecting Root Bridge............................................................................. 18

2.3.3 Selecting Root Port.................................................................................. 19

2.3.4 Selecting Designated and Non-designated Ports.................................... 20

2.3.5 Topology Maintenance............................................................................ 20

Page 3: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

3

2.4 Timer Parameters........................................................................................... 21

2.4.1 Max Age Timer...................................................................................... 21

2.4.2 Hello Timer............................................................................................. 21

2.4.3 Forward Delay Timer............................................................................. 21

2.4.4 Bridge Diameter..................................................................................... 22

2.4.5 Timer Calculation and Analysis............................................................. 23

3.0 Methods

3.1 Primary Research Methods............................................................................. 26

3.1.1 Simulation Software Justification.......................................................... 26

3.1.2 Simulation Software Environment......................................................... 26

3.1.3 Hypothesis Testing ................................................................................ 26

3.2 Method Approach .......................................................................................... 27

3.2.1 Experiment Environment ....................................................................... 27

3.2.2 Topology of Experiment ......................................................................... 27

3.2.3 Experiment and Variables ...................................................................... 29

3.2.4 Select and Analyse Statistics .................................................................31

4.0 Results 4.1 Group 1 Results ...................................................................................................... 33

4.2 Group 2 Results .................................................................................................. 36

4.3 Group 3 Results......................................................................................................... 39

4.4 Group 4 Results......................................................................................................... 42

5.0 Conclusions 5.1 Group 1 Conclusions................................................................................................. 46

5.2 Group 2 Conclusions................................................................................................. 47

5.3 Group 3 Conclusions................................................................................................. 47

5.4 Group 4 Conclusions................................................................................................. 48

5.5 Overall Conclusions................................................................................................. 49

5.6 Benefit of Research................................................................................................. 50

5.7 Further Research................................................................................................. 50

6.0 Appendices 6.1 References ...................................................................................................... 51

6.2 Bibliography .................................................................................................. 53

6.3 Results (Charts) ......................................................................................................... 54

6.3.1 Group 1 Results........................................................................................ 54

6.3.2 Group 2 Results........................................................................................ 57

6.3.3 Group 3 Results........................................................................................ 59

6.3.4 Group 4 Results....................................................................................... 63

6.3.5 CD Index ................................................................................................. 66

Page 4: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

4

1.0 Introduction

Spanning Tree Protocol (STP (8021.D)) was introduced to Ethernet LANs to overcome the

problems of loops forming in networks due to transparent bridging. Ethernet is still the most

popular technology used for local area networks, however STP (802.1D) typically has a

convergence time of between 30 and 50 seconds and does not scale well, this makes it

inadequate for the demands of most modern Ethernet networks, therefore STP (802.1D) has

been superseded by newer technologies offering greater scalability and faster convergence

time, however businesses with legacy network equipment that does not support the newer

technologies may find benefit in tuning STP (802.1D) settings to gain faster convergence

times. As a result this project aims to investigate whether or not Spanning Tree Protocol’s

(802.1D) convergence time can be improved by tuning the hello, max age and forward delay

timers whilst still retaining network stability; the modification of timer parameters will be

based on allowable and effective combinations identified in research. This investigation will

be carried out using OPNET Modeller to build simulations of real LANs and then simulate

link failure and recovery in each. Each LAN model will differ only in STP (802.1D) timer

settings, recovery time and convergence state in each model will be measured, the subsequent

measurements will be analysed and compared to determine if the network is stable and fully

converged and if there is a performance increase or not in convergence time and to identify

whether the increase if there is one is significant or not.

1.1 Background

1.1.1 Ethernet Networks

As demand for IP traffic continues to increase Ethernet (IEEE 802.3) is still the most popular

technology used for local area networks (LANs), as of 2008 nearly 90% of all data was

Ethernet encapsulated (Faghani, Mirjalily 2008). It is a relatively low cost LAN solution

with wide-scale familiarity and is used by educational establishments, commerce and

industry, furthermore (Huynh, Mohapatra 2006) state that the standardisation of Gigabit

Ethernet (IEEE 802.3z) has seen Ethernet being implemented in larger scale networks, such

as; Metropolitan Area Networks (MANs) and Metropolitan Ethernet Networks (MENs).

Ethernet is an OSI layer 2 technology that is responsible for both the Logical Link Control

(LLC) and the Media Access Control (MAC) sub-layers. Ethernet is responsible for error

detection, flow control, media access, hardware addressing and data encapsulation (Perlman

2000). Ethernet uses a set of protocols called Carrier Sense Multiple Access Collision Detect

(CSMA/CD) which is used to control when a device can access the shared transmission

media and to minimise collision of network traffic, however congestion and collisions

become more frequent as more devices are added to the LAN resulting in one big collision

domain and subsequent degradation of network performance, these media access limitations

in basic LAN bus topologies prevent the network from scaling well (Sakandar, Barnes 2005).

Page 5: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

5

1.1.2 Transparent Bridging

Transparent Bridging (Anon, IEEE 802.1D 1990) is a solution to the scalability limitations of

CSMA/CD networks by allowing LANs to be segmented into two or more collision domains

into extended LANs. Bridges and switches are layer 2 devices that are used to forward

Ethernet frames between collision domains without forwarding the same frames to networks

that they are not intended for, a switch is a multi-port bridge and are synonymous with each

other in the context of this proposal. Each bridge has a content addressable memory (CAM)

table where MAC addresses of network devices are stored, these MAC address are 48 bit

unique physical addresses of devices on the network including switches, bridges and network

interface cards (NICs) installed on nodes, the bridge CAM table also stores the corresponding

port number through which that MAC address can be reached (Backes 1998). There are five

processes of transparent bridging these are; learning, flooding, filtering, forwarding and

aging. The bridges forwards, filters or floods frames out appropriate ports based on this

information in the CAM table.

There is however one inherent problem in the concept of transparent bridging as (Perlman

1985) points out, this is due to the fact that bridges assume that there is only one path

between any two devices in the network, however; this assumption does not account for the

need for redundancy in networks or a cable that has been incorrectly plugged in to a device

creating a physical loop, this is due to frames being sent across both paths, as a result a bridge

receives the frame from both ports and there is confusion as to which port the frame has

originated from, this results in the frames looping round the network until they time out,

however the upper layers keep sending more data which infinitely loop around the network,

this looping will cause severe performance degradation or cause the entire LAN to fail

(Kwok, Mukherjee 1989).

1.1.3 Spanning Tree Protocol (802.1D)

As a solution to the problem of network loops in transparent bridging a spanning tree

algorithm was designed in 1985 by Radia Perlman at Digital Equipment Corporation (DEC)

(Perlman 1985). This algorithm was the basis for the spanning tree protocol (STP) first

standardised by the IEEE 802.1 D standards in 1990 (Anon, IEEE 802.1D 1990) with later

updates in 1998 (IEEE 802.1D 1998) and again in 2004 (IEEE 802.1D 2004). STP (802.1D)

overlays a logical spanning tree topology over the physical topology and blocks traffic on

some links ensuring a loop free network topology, it allows networks to be designed with

redundancy in physical connections, this makes the network more resilient in the event of

device or link failure with a convergence time of between 30 and 50 seconds depending on

location of failed link or device (Sfeir, Pasqualini et al. 2005). STP (802.1D) is controlled by

bridges and is self-configuring with a new spanning tree recalculation when there is a

topology change such as a link or bridge being added or removed (Faghani, Mirjalily 2008).

As described by (Medagliani, Ferrari et al. 2009) each spanning tree must have a root bridge

that is effectively the root of the tree which all paths in the network span out from, the root is

Page 6: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

6

automatically selected by spanning tree based on the lowest MAC address of bridges if

priority settings on bridges are set at default, these configurable priority settings allow an

administrator to set any bridge in the network as root. A designated bridge according to

(Prytz 2008) is responsible for all traffic going to and coming away from the root bridge and

there is only one designated bridge per link allowed. A non-root bridge can be the designated

bridge for more than one link or none, whereas the root bridge is the designated bridge for all

directly connected links. A designated bridge has three port types; root port of which there is

only one and many designated and inactive ports, the root port moves traffic towards the root

bridge and designated ports move traffic away from the root bridge, inactive ports are either

blocked or disabled. Link and path costs are also used in the calculation of the spanning tree,

with high speed links being chosen over lower speed links (Faghani, Mirjalily 2008).

Bridge Protocol Data Units (BPDUs) are periodically transmitted by bridges to compute and

maintain the spanning tree, each BPDU is encapsulated in an Ethernet frame (Anon, IEEE

802.1D 1990) and contains information about the sending bridge, such as; port state, bridge

priority and the path cost from the root to the bridge transmitting the BPDU, there are three

types of BPDUs; configuration BPDU (CBPDU), topology change notification (TCN) and

topology change acknowledgement (TCA), CPBDUs are used to calculate and maintain the

tree, TCNs are used to notify of topology changes and TCAs are used to confirm a topology

change (Prytz 2008). There are five states that bridge ports that are part of the spanning tree

can be in; disabled, blocking, listening, learning and forwarding. A port is disabled when it is

administratively down and does not take part in the spanning tree calculations in a disabled

state no BPDUs are transmitted or received, a port that could cause a loop is in the blocking

state and still listens for BPDUs in case of topology change, a port in listening state starts to

listen for other bridges, however it does not send out BPDUs or learn MAC addresses, in the

learning state the bridge continues to listen for bridges and learns MAC addresses, in

forwarding state traffic is allowed to pass through ports. (Medagliani, Ferrari et al. 2009)

states that there are important steps that spanning tree must take to have converged networks

which are selecting a route bridge, selecting the designated bridges and ports for each link

and maintaining the spanning tree.

1.1.4 STP 802.1D Timers

As (Sfeir, Pasqualini et al. 2005) describes, SPT (802.1D) relies on several timers that control

various aspects regarding how frequently BPDU packets are sent and how long information

can exist before it is dropped from the bridge table these timers are essential to control the

delay needed for all bridges to have the same stable topology. CISCO suggests that only 3 of

the timers should ever be modified; hello, forward delay and max age (Anon, CISCO 2006).

The frequency in which a root bridge sends out a BPDU is by default every 2 seconds and is

known as the hello time (Prytz 2006), this hello time is primarily used to detect topology

changes. The forward delay timer is responsible for the amount of time a port stays in the

listening and learning state before forwarding traffic, the default is 15 seconds, therefore a

Page 7: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

7

delay of twice this default is 30 seconds and is the main reason for a convergence time of

between 30 and 50 seconds (Sfeir, Pasqualini et al. 2005). Max age timer is the period of

time that a bridge will hold BPDU information, which must have a limited lifetime in order to

detect topology changes, the default settings for max age is 20 seconds (Lammle, Quinn

2002).

1.1.5 STP 802.1D Limitations

(Mirjalily, Karimi 2008) state that STP (802.1D) with a convergence time of between 30 and

50 seconds is inadequate for the demands of modern Ethernet networks that now requires a

convergence time of tens of milliseconds to accommodate time critical traffic such as video

and voice. The ineffective timer mechanisms are primarily responsible for the limitations of

STP (802.1D) and in effect limit the maximum number of bridges that can be supported; this

default maximum is based on timers being set to their default values, it is possible to tune

these timers to allow STP (802.1D) to support more bridges, however as the number of

bridges increases so does convergence time, thus if the network exceeds the size allowed for

by the timer settings it will not converge at all, the networks performance may also be limited

due to too much control traffic in form of BPDUs (Medagliani, Ferrari et al. 2009). Whilst

STP (802.1D) may allow for redundancy in Ethernet networks, it does not provide any load

balancing or load sharing using these redundant links.

1.1.6 STP 802.1D Enhancements

There are various solutions to overcome the limitations in STP 802.1D identified earlier,

Rapid Spanning Tree Protocol (RSTP) (Anon, IEEE 802.1w 2001) is the Ethernet standard

that has superseded STP (802.1D) (Pallos, Farkas et al. 2007). RSTP unlike STP (802.1D)

does not rely on timers; instead it uses feedback mechanisms which allow for a much more

speedy transition to the forwarding state resulting in a much better convergence perfomance,

RSTP serves the same purpose as STP (802.1D) in providing a loop free topology with

improved convergence, however; it also has limitations in that it does not provide any load

sharing mechanisms (Huynh, Mohapatra 2007).

Multiple Spanning Tree Protocol (MSTP) is standardised in IEEE 802.1s, and overcomes

some of the limitations of RSTP by allowing multiple instances of RSTP to be run under one

common spanning tree, therefore allowing all links to be utilised and provide basic load

balancing (Anon, IEEE 802.1s 2001). There are other STP (802.1D) enhancements and

alternatives, such as; Per-VLAN Spanning Tree (PVST), Portfast, UplinkFast and

BackboneFast, however; all of these are CISCO propriety and cannot be used on bridges that

do not run the CISCO IOS (Sakandar, Barnes 2005).

As indicated earlier it is possible to change the default size of the STP (802.1D) network, the

default value is 7 and is known as the diameter, however, this is the maximum number of

Page 8: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

8

bridges between any two end points on the network and not the number of bridges in the

network. As detailed by (Anon, IEEE 802.1D 1998), it is possible to change the default value

of 7 to a higher number to allow for a larger network diameter, however changing the value

will have a direct effect on STP (802.1D) timer settings.

Convergence time is longer if we increase the values of max age and forward delay to

increase the network diameter; therefore, theoretically by decreasing these timer values we

will have faster convergence, however as a result the network diameter must also decrease or

the network will not converge, yet decreasing the diameter value also increases the chance of

broadcast storms (Lammle, Quinn 2002).

The hello time value can also be lowered to decrease convergence time, however setting the

hello time value from 2 to 1 will double the amount of control traffic in the form of hello

BPDUs which could cause degradation of network performance (Lammle, Quinn 2002). In

conclusion it may be possible to enhance the convergence time of STP (802.1D) by

modifying timers, however great care must be taken when doing so to ensure a loop free

stable network.

1.2 Research Question

Can modification of Spanning Tree Protocol (802.1D) timers: hello, max age and forward

delay decrease network convergence time whilst maintaining network stability when

simulating link failure and recovery in OPNET?

1.3 Hypothesis

Below are hypotheses that are to be tested throughout the experiment, these hypotheses may

be subject to change as the research into the experiment develops:

Convergence time of STP (802.1D) can be decreased by careful modification of the

timers max age, forward delay and hello time without the network becoming unstable.

Using a network diameter of 7 with the minimum allowable values for timers max age

and forward delay the network will still converge.

Using a network diameter of 9 with the minimum allowable values for timers max age

and forward delay the network will not converge.

1.4 Justification

The results and conclusions of the experiment is the output of the project and will determine

whether or not there is any STP (802.1D) performance benefit in tuning timers.

Tuning STP (802.1D) timers to gain an improvement in convergence time may seem counter-

intuitive, due to the fact that STP (802.1D) has been replaced by superior technologies;

however, small businesses with legacy network equipment will find it very useful, these

Page 9: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

9

small businesses may be hesitant to upgrade equipment due to cost, therefore; fine tuning of

existing legacy equipment could bring network performance benefits for these businesses.

Network administrators and engineers could find it useful as reference material to assist in

fine tuning of networks, administrators and engineers work across many sites and with

varying types and sizes of LANs and it is likely that they may have to modify STP (802.1D)

timers.

1.5 Project Type

An experimental research method will be used to test the projects hypotheses; the

experiments will be conducted using network simulation software which will also produce

statistical results for analysis.

1.6 Project Aim

The project aims to investigate whether or not Spanning Tree Protocol’s (802.1D)

convergence time can be decreased by tuning the hello, max age and forward delay timers

whilst still retaining network stability; the modification of said timer parameters will be based

on allowable and effective combinations of timer parameters identified in research. This

investigation will be carried out by simulating link failure and recovery under different

defined scenarios followed by measurement of convergence time in each scenario, the

subsequent simulation results will be analysed to determine if the network is stable and fully

converged and if there is a performance increase or not in convergence time and to identify

whether the increase if there is one is significant or not.

1.7 Objectives

The objectives below will have to be met to realise the project aim:

1.7.1 Examine the Features and Mechanisms of Ethernet

Ethernet is a popular LAN standard that Spanning Tree (802.1D) runs on, therefore it is

important to understand the mechanisms of Ethernet and how they relate to spanning tree.

1.7.2 Investigate Transparent Bridging

Transparent Bridging allows two or more Ethernet Segments to be interconnected by a

bridge, there are however inherent problems of bridging loops, spanning tree is a solution to

this problem and the relationship between transparent bridging and spanning tree should be

researched.

Page 10: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

10

1.7.3 Examine the Mechanisms and Operation of STP (802.1D)

General literature available on STP (802.1D) fundamentals is widely available, there is also

literature covering the more advanced features of STP (802.1D), both will be needed to

develop a good understanding of STP (802.1D).

1.7.4 Identify and Analyse STP (802.1D) Timers

STP (802.1D) timers is essential to the success of the project and timers should not be

modified arbitrarily, therefore; it is essential to identify literature that can aid in determining

effective and stable STP (802.1D) timer configurations. Establishing criteria for STP

(802.1D) convergence will require a comprehensive knowledge of STP (802.1D), this will

include investigating conditions in which STP (802.1D) will not converge.

1.7.5 Determine STP (802.1D) convergence criteria

Criteria must be identified for the verification and measurement of STP (802.1D)

convergence and appropriate benchmarks/baselines identified.

Page 11: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

11

The secondary research methods use a literature review to meet the objectives identified in

section 1.5. These objectives identified in an initial literature review are further defined

below. The review will cover subjects such as Ethernet, Bridging and Spanning Tree and its

timer parameters.

2.0 Literature Review

2.1 Ethernet Introduction

Local Area Networks (LANs) as stated by (Seifert 1988) have become increasingly important

over the years, providing data communication and access to shared resources, LANs now

pervade through many aspects of society including; large and small industries, commerce,

health, education, government and the home. Ethernet (IEEE 802.3) is one of the most widely

used LAN technologies implemented today offering a simple, popular and cost effective

solution to LAN media access (Abuguba, Moldován 2006). Ethernet is almost ubiquitous in

LANs, it has now evolved from its early days as a technology that provided media access to a

single LAN to a technology with diverse implementations, such as, Campus Networks,

linking multiple LANs in Metropolitan Area Networks (MANs) and Metropolitan Ethernet

Networks (MENs) (Bonada 2007)

The following sections will aim to investigate Ethernet which is the foundation and basis of

the spanning tree algorithm.

2.1.1 Ethernet Background

The concept for Ethernet is derived from the multi-access wireless based ALOHA packet

switching network, developed at the University of Hawaii in the late 1960s, the ALOHA

system used random access and collision detection to allow end-stations to transmit onto a

shared media (Metcalfe, Boggs 1976). This concept was developed further by Xerox at Palo

Alto Research Centre (PARC) in the early 1970s producing the first Ethernet network at

speeds of 3 Mbps (Shoch, Hupp 1980). Ethernet was later standardised by Digital, Intel and

Xerox in 1979 and was known as the DIX or Ethernet II standard and produced speeds of 10

Mbps. In 1982 some modifications to the standard were made and Ethernet was integrated

into the IEEE 802.3 LAN standard (Perlman 1992).

Ethernet is both a Physical and Data-Link layer technology that is responsible for both the

Logical Link Control (LLC) and the Media Access Control (MAC) sub-layers, it is a

broadcast, multi-access technology and provides a solution for multiple end-stations to attach

to a shared medium and communicate with each other and share centralised resources.

Historically the Ethernet LAN was made up of a bus topology, a linear coaxial cable

backbone that was terminated at each end, end-stations connected to the backbone using

Network Interface Cards (NICs), in the early Ethernet LAN only one station at a time was

allowed to broadcast onto the coaxial medium, this contention for access was addressed using

the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) algorithms.

Page 12: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

12

2.1.2 CSMA/CD

Radia Perlman describes mechanisms that must exist for end-stations to transmit onto the

shared medium successfully, these include; each end-station having a fair share of bandwidth,

no marked delay in accessing medium and the overheads of any access control method is

minimal (Perlman 1992). CSMA/CD is a contention scheme where end-stations check first to

see if the medium is being used this is Carrier Sense, if the medium is being used the end-

station waits until it can transmit, if the medium is not being used the end-station will

transmit, two stations could transmit simultaneously and a collision will occur, the end station

will detect this collision and back off for a random period of time before trying to re-transmit,

however, as the length of the coaxial backbone increases so too does the chance of these

collisions, this is due to the fact that one end-station may not detect that another is already

transmitting on the medium due to the time it has taken for the signal to fully traverse the

medium. Adding more end-stations to the LAN segment will increase collisions too; this

shared medium or LAN segment is what is known as a collision domain, therefore these

media access limitations in basic LAN bus topologies prevent the network from scaling well

(Sakandar, Barnes 2005); however transparent bridging overcomes this scalability problem

allowing the LAN to be extended (See Section 2.2). It should also be pointed out that

Ethernet’s CSMA/CD is not the only media access method implemented in LANs today,

however, the application of other solutions such as, Token Ring and Token Bus technologies

are comparatively sparse.

2.1.3 Ethernet Addressing

End-stations must have a unique address on the LAN segment; this is done by a Media

Access Control (MAC) address which allows end-station to uniquely be identified on a LAN

segment at the data link layer. MAC addresses are 48 bits long and are burned-in to the

hardware of the network device; the address is represented by 12 hexadecimal digits (Anon,

IEEE 802.1D 1998). Typically the first 6 digits contain the ID number of the network devices

manufacturer and are assigned by IEEE, the second 6 digits represents the serial number

assigned to the network device by the manufacturer, in later sections we will see examples of

broadcast and multi cast addresses, (see sections 2.2.7 & 2.3.1).

2.1.4 Transmission Media

Ethernet has used a variety of transmission media over the years, starting with variants of

coaxial such as; 10BASE5 (Thicknet) and 10BASE2 (Thinnet), both these media types could

offer speeds of 10 Mbps, 10BASE-FL is an early fibre media also offering 10 Mbps.

CSMA/CD is a half-duplex technology not allowing the transmission media to send and

receive a signal simultaneously, however with the advent of unshielded twisted pair copper

wiring (10BASE-T),capable of full-duplex transmission that allowed an end-station to both

send and receive data simultaneously was now possible, nevertheless full-duplex

communication is only achievable when two end-stations are directly connected to one

another or are connected to an intermediate device such as a bridge but not a hub.

Page 13: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

13

10BASE-T which also offered speeds of 10 Mbps changed the physical topology of the LAN,

the coaxial bus topology had an inherent problem that if the backbone cable broke the whole

network would become inoperative. In 10BASE-T the coaxial backbone was gone and was

replaced by the hub, a device with many ports, with each port connected to an end-station

using 10BASE-T wiring, this now created a physical star topology which was more resilient,

with breaks in wiring only affecting single end-stations, however logically within the hub the

networks are still connected on a bus topology and the connections are still half-duplex, the

speed gained from unshielded twisted pair copper (UTP) wiring has rapidly increased over

the years with 100BASE-T (FastEthernet) offering speeds of 100 Mbps, 1000BASE-T

(GbEthernet) capable of 1000 Mbps, the speed and development of UTP is in parity with that

of single-mode and multi-mode fibre. A wireless variant of Ethernet has been standardised

in IEEE 802.11 to provide wireless media access, Ethernet can also provide high-speed

Internet access in the same way ADSL and cable modems do. The Ethernet standard

amendment IEEE Std 802.3ah-2004 also known as Ethernet in the First Mile (EMF)

describes how the Ethernet protocol can be run over existing single pairs of copper telephone

wires and single strands of single-mode fibre (SMF) providing Ethernet connectivity to

Internet service providers (Frazier, Pesavento 2001).

2.2 Transparent Bridge Operation

As indicated in the previous sections there are limitations in the number of end-stations that

can be added to a LAN Ethernet segment, this scalability problem is due to the fact that as

more end-stations are added to the segment the greater the probability of collisions.

Transparent Bridging as standardised in IEEE 802.1D is a solution that allows two or more

Ethernet Segments to be interconnected by a device called a bridge, therefore, allowing

traffic to pass between Ethernet segments, with the use of bridges collisions are kept isolated

to each segment. (Backes 1988) describes how bridges operate on top of the Medium Access

Control (MAC) sub-layer making the bridge transparent to higher layer protocols.

2.2.1 Basic Bridge

Radia Perlman described the basic bridge as the “No-Frills” bridge (Perlman 1992), these

basic bridges listens to every Ethernet frame on its ports (early bridges typically had two

ports, later bridges with multiple ports are referred to as switches), the bridge then stores

every frame in a buffer until it can be forwarded out of every port other than the port it

arrived on, this basic bridge operation known as Store and Forward allows two end-stations

on different Ethernet segments to simultaneously transmit traffic to each other without

collision (Seifert 1988).The frames traverse across the bridge from one Ethernet segment to

another without being modified in any way, however Ethernet frames could be dropped by

these early bridges once the buffers storing the frames is full.

Page 14: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

14

2.2.2 Learning Bridge

The basic bridge cannot distinguish between frames that can be forwarded and frames that

can be dropped, learning bridges on the other hand have the capabilities of identifying if a

frame is destined for another end-station on the same segment the frame originated from, if

this is the case then the bridge can safely drop this frame if the frames is on the other hand

destined for a different segment than the segment it originated from it can store and forward

this frame to the appropriate segment (Perlman 1992), this process is known as filtering and

is achieved by the bridge learning MAC addresses and port numbers which are stored in a

Content Addressable Memory (CAM) table, further learning bridge processes have been

identified and described below:

2.2.3 Address Learning

As described by (Sakandar, Barnes 2005) when a bridge is first started-up it knows nothing

about the end-stations on the network or how to get to them, at this point the CAM table is

empty, the bridge however learns the senders MAC addresses from every frame received, it

then stores this address and the number of port on which the frame was received on in the

CAM table.

2.2.4 Frame Forwarding

When a bridge receives a frame the destination address contained in the frame is compared to

the information in the CAM table gathered in the address learning process. If the address is in

the CAM table the frame will be forwarded out the port associated with that address.

2.2.5 Frame Flooding

If an end-station has not transmitted, the bridge will not have received a frame originating

from it, therefore, there will be no information on this end-station in the CAM table, as a

result when the bridge receives a frame destined for this end-station it must forward the frame

out every port except the port that it was received on, this is known as flooding and is done

when the switch cannot determine the outgoing port for a frame.

2.2.6 Frame Filtering

Bridges receiving a frame on a port destined for the same segment (i.e. same port) from

which it originated will use the CAM table entries to calculate that both the source and

destination are on the same local segment and drop the frame, however, if the bridge has no

Page 15: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

15

information in the CAM table on the destination the frame will be flooded out all ports except

the port that it was received on as above in Flooding.

2.2.7 Broadcast and Multicast Addresses

A broadcast frame uses a destination MAC address of FF-FF-FF-FF-FF-FF, this is when all

48 bits in the MAC address are set to 1, this enables frames to be broadcast throughout layer

2 of the network, this is achieved due to the fact that when bridges receive a frame with the

broadcast address, it will flood it through all the ports except the receiving port. Multicast

addresses are used by upper layer protocols and use the first 24 bits of the MAC address in

the form 01-00-5E the last 24 bits of the address are used by upper layer protocols, multicast

allows traffic to be directed to groupings of destinations (Sakandar, Barnes 2005).

2.2.8 Ageing Time

Networks are dynamic and end-stations can move about, therefore the information stored in

the CAM table may contain a number of outdated entries and there is a possibility that traffic

will be still be directed to a destination that is no longer at that part of the LAN, furthermore a

large number of these outdated entries would unnecessarily use to much memory resources of

the bridge. To combat this each entry in the CAM table not only contain the senders MAC

address and associated port but also contains an ageing timer that is started when the address

is first learned if the bridge does not hear from the sender in a defined time (This time can be

configured by administrators and is set by default to 5 minutes) the entry is removed from the

CAM table, the timers value is reset every time the bridge forwards or filters a frame from

that particular end-station, a Spanning Tree topology change will also cause the ageing timer

to expire in a shorter period time helping keep the CAM table as up-to-date as possible

(Backes 1988).

2.2.9 Bridging Loops

Transparent bridging as briefly described above may solve the problem of scalability by

allowing the Ethernet LAN to be extended, however this will only work in a loop free

topology this is due to the fact that bridges assume that there is only one path between any

two bridges or LANs in the network. When loops are created through error or when device

and link redundancy is introduced to the network broadcast storms and CAM table corruption

will occur, these are best described with aid of a diagram see Figure 1 on page 16.

When end-station 1 sends a broadcast frame onto LAN segment A, the frame is received by

bridge B1, who identifies it as a broadcast frame and floods it into LAN segment B. When

bridge B2 receives the broadcast frame it will broadcast it out every port except the port it

arrived on, i.e. the frame will be transmitted through port P1 back onto LAN segment A,

Page 16: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

16

bridge B1 will again receive the frame from LAN segment A and again broadcast it out of

every port other than the port it was received this process is repeated endlessly and creates

what is known as a broadcast storm. As described by (Kim, Caesar et al. 2008) a bridge

transparently forwards frames without altering them, therefore a bridge cannot alter the

header to increment the value in a Time-to-Live field (TTL), with no TTL field the frame

does not expire and will continue to loop. These broadcast storms will cause the whole

network to be overwhelmed and fail.

It is not only broadcast frames that are detrimental to a looped network, unicast frames will

also bring the network down, for example, if end-station 1 sends a unicast frame to end-

station 2, both bridges B1 and B2 will receive the frame and add the source address of end-

station 1 to the CAM table and associate it to port P1. However, assuming bridge B1 has no

entry for end-station 2 in its CAM table it will flood the frame onto LAN segment B, bridge

B2 will receive the frame from LAN segment B on port P2 and overwrites the original entry

in the CAM table that identified port P1 as the originating segment for end-station 1, as a

result the CAM table information is incorrectly identifying port P2 as connecting to the

originating segment for end-station 1, this is called CAM table or bridge table corruption

which will cause feedback loops that will also disable the network (Sakandar, Barnes 2005).

B1 B2

P1P1

P2 P2

LAN Segment B

LAN Segment A

1 2

Bridging LoopsFigure 1.

As the above examples show bridging loops should be avoided, (Medagliani, Ferrari et al.

2009) suggest one possible solution would be to physically avoid loops in the network design

stage, however redundancy is useful in the likely event of link or device failure. Spanning

Tree is a loop avoidance algorithm designed for Ethernet networks that overcomes the

inherent problems associated with transparent bridging identified above.

Page 17: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

17

2.3 Spanning Tree Operation

The Spanning Tree algorithm overlays a logical loop free topology over a physical topology

that may or may not contain loops, A root bridge is elected from which the logical tree will

span from, the spanning tree algorithm then uses mechanisms to ensure there is only one path

back to the root bridge from any branch in the tree (Prytz 2008). If there is more than one

path from a branch bridge back to the root bridge spanning tree will calculate the best path

back and block the other path, Figure 2 below shows how the spanning tree algorithm is used

to overcome the problems of the bridging loop example in Figure 1. Assuming bridge B1 is

the root bridge spanning tree will block port P2 on bridge B2 and logically break the loop,

Any end-station on LAN segment A will be able to access bridge B1 and B2 directly, any

end-station on LAN segment B can access bridge B1, however to access bridge B2 it will

have to go via bridge B1 (root bridge).

B1 B2

P1P1

P2P2

LAN Segment B

LAN Segment A

1 2

Spanning TreeFigure 2.

Spanning tree uses various mechanisms to calculate a stable loop free topology, such as root

bridge selection, calculating shortest path to the root bridge and the role of ports in the tree,

the following sections aims to describe these mechanisms of the IEEE 802.1D standardised

Spanning Tree Protocol (STP 802.1D).

2.3.1 Bridge Protocol Data Units

Before going on to discuss spanning tree operation it is important to understand the

importance of the Bridge Protocol Data Unit (BPDU) also known as configuration messages,

spanning tree protocol relies heavily on the exchange of BPDUs between bridges to calculate

and maintain the spanning tree, the BPDU is encapsulated in an Ethernet frame which has the

multicast MAC address of 01-80-C2-00-00-00, the BPDU is not forwarded by bridges,

BPDUs are only exchanged between bridges that are directly connected to each other or are

connected to each other via the same LAN segment, instead information is spread thorough

the tree by bridges relaying information they have received from other bridges. There are

three types of BPDUs; Configuration BPDU (BPDU), Topology Change Notification (TCN)

and Topology Change Acknowledgment (TCA).

Page 18: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

18

Configuration BPBDUs contain information about the transmitting bridge, including; the cost

of the path from this transmitting bridge to the root bridge, ports states, priority values and

the Root Bridge Identifier (RID). As also stated by (Perlman 1992), information inside the

configuration BPDU enables bridges to; elect a single root bridge and calculate the least cost

path to the root bridge, configuration BPDUs allow root ports, designated ports and non-

designated ports to be selected. Table 1 shows the fields of the configuration BPDU, how

these fields relate to spanning tree operation will be discussed further in the following

sections.

Topology Change Notification (TCN) and Topology Change Acknowledgment (TCA) differ

in structure and function from configuration BPDUs; they are 32 bits long and contain only

the first three fields in Table 1, which are Protocol Identifier, Version and Message Type.

TCNs are sent out root port towards the root, TCA are used to acknowledge receipt of the

TCN. The TCN has the least significant bit set in the flag field and TCA has the most

significant bit set in the flag, more details on the operation TCN and TCA are given in section

2.3.5.

2.3.2 Selecting Root Bridge

Each bridge in the spanning tree needs to have knowledge of the network topology, this

achieved by having a central reference point for bridges by electing a root bridge, all path

costs calculated through the network are based on this route bridge. Initially with no

knowledge of other bridges, each bridge elects itself as the root. Each bridge has a Bridge ID

(BID) which is used in the election process; the BID is 64 bits longs and includes 16 bits for

the priority and 48 bits for the MAC address of the bridge, as stated by (Lammle, Quinn

2002) in the IEEE 802.1D versions of spanning tree the default setting for the priority is

32768 which is the mid-point of the 64 bit priority field portion of the BID. The bridges will

start sending out BPDU frames announcing itself as the root within the Root Identifier (RID)

field within the BPDU frame, bridges will then examine the BPDU frames they receive and

compares the BIDs, if the newer BPDU has a lower priority value setting within the BID this

BPDU Fields Field Size

Protocol Identifier 2 Bytes

Version 1 Bytes

Message Type 1 Bytes

Flags 1 Bytes

Root ID (RID) 8 Bytes

Root Path Cost 4 Bytes

Bridge ID (BID) 8 Bytes

Port ID 2 Bytes

Message Age 2 Bytes

Max Age 2 Bytes

Hello Time 2 Bytes

Forward Delay 2 Bytes

Table 1.

Page 19: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

19

will be considered a better root bridge, the bridge now advertises the new BID as the root

bridge within the RID field of its own BPDU frame. The root bridge election process is

completed once all bridges hold the same RID information.

In the event that the priority settings of bridges are the same, this is likely to be the case due

to the 32768 default setting, then the bridge with lowest MAC address is selected as the root

and every other bridge is known as a designated bridge, it is possible to lower the priority

settings and manually choose which bridge will be the root, this is useful due to the fact that

older bridges will have lower MAC addresses, therefore the oldest bridge will become root if

priority settings of all bridges are equal, this is not a good idea as the majority of traffic will

travel through the root and a newer more powerful bridge would be a far better choice for

root. New root bridge elections will be re-triggered in the event of topology change for

example, if the root bridge is removed from the spanning tree or a new bridge with a lower

BID than the current root bridge is added.

2.3.3 Selecting Root Port

After root bridge selection each designated bridge must select a root port, this root port will

be nearest the bridge and will forward traffic towards it, in the event that a bridge has two or

more paths going towards the root bridge the designated bridge will select the port with least

cost path to the root bridge. The path cost is based on the bandwidth of links and Table 2

shows the various link speeds and the associated value specified in IEEE 802.1D (Anon,

IEEE 802.1D 1990). However due to increased use of 10 Gbps links it was necessary for

IEEE to revise the values (Bonada 2007), the new revised values are also shown in Table 2

below:

Link

Speed

Revised

Costs

Original

Costs

10Gbps 2 1

1Gbps 4 1

100Mbps 19 10

10Mbps 100 100

The root bridge sends out a BPDU frame with a root cost path value of 0, when the next

bridge receives the BPDU frame, it adds the path cost of its own port where the BPDU frame

originated, this is done by each bridge in the tree, as a result each prospective root port on a

designated bridge will have a cumulative path cost to the root associated with it. Using this

cumulative total the designated bridge is able to choose the port with least cost path as the

root port, if both ports path costs to the root bridge are equal then the BPDU frame with the

lowest sending BID is selected and the port from where the BPDU frame originated will

become root port, in cases where both prospective root parts are receiving BPDU frames with

the same BID then the port with the lowest port ID is selected as root port, these ports may

have the same sending BID due to the fact that there is more than one link between switches

for redundancy. The port that is selected to be root will then transition from the blocked state

to the listening state and begin to forward frames towards the root.

Table 2.

Page 20: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

20

2.3.4 Selecting Designated and Non-designated Ports

Simultaneously as root ports are selected designated ports are also selected based on the

lowest path cost to the root bridge from a segment connecting two bridges; the path cost to

the root is compared for a particular segment and the port with lowest path cost becomes the

designated port for that segment. If two or more ports have the same path cost, then the

bridge with the lower BID is selected. Designated ports forwards traffic away from the

direction of the root port; in the case of the root bridge every port is designated as all have the

same path cost of 0 back to the root. The port on the segment that has not been selected

designated port will become a non-designated port and will remain in the blocking state in

effect these non-designated ports is where any bridging loops will be broken. In blocking

state a port will not forward any traffic, however it still receives BPDU frames to notify of

any topology changes.

(Anon, CISCO 2006) states the spanning-tree is converged and stable when all the three steps

described above; select root bridge, select root port and select designated and non-designated

ports are completed and all ports are either forwarding traffic or in the blocking state.

2.3.5 Topology Maintenance

After initial convergence the spanning tree still has to be maintained, this maintenance of the

topology is controlled by timers, such as max age, hello time and forward delay. The root

sends hello BPDUs out of all interfaces every 2 seconds by default, neighbouring bridges

relay the information from the hello frames out of their designated ports, these keep the

bridges in the topology informed of the identity and location of the root and the cost to it.

This mechanism helps keep the topology up-to-date (Prytz 2006). In the event of a topology

change due to link or bridge failure or a port transitions to forwarding state, (Sakandar,

Barnes 2005) describes how a port will send a TCN BPDU out the root port towards the root

bridge, the bridge this TCN BPDU was sent to is known as a designated bridge, this designate

bridge replies to the bridge that detected the change with a TCA, this is repeated until the root

bridge receives the TCN and will trigger a tree recalculation. When a topology change occurs

the bridge lowers the ageing time for the entries in the CAM Table (section 2.2.8) from 5

minutes to time of the forward delay timer which is 15 seconds by default this allows the

CAM table to be refreshed during a topology change. Direct link and device failure is

detected when the max age timer expires and the no new BPDUs have been received, the old

BPDU will be invalidated and TCNs will be sent.

Page 21: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

21

2.4 Timer Parameters

SPT (802.1D) relies on several timers that control various aspects regarding how frequently

BPDU packets are sent and how long information can exist before it is dropped from the

bridge table these timers are essential to control the delay needed for all bridges to converge

and have the same stable topology. In Section 2.3.1 we discussed the fields in a BPDU,

within these were three timer fields; max age, hello time and forward delay, there are

however other timers such as maximum bridge transit delay, maximum BPDU transmission

delay, maximum message age increment overestimate and hold time, these timers are used in

calculating the max age, hello time and forward delay and CISCO suggests that they should

not be modified instead recommending careful modification of only the max age, hello time

and forward delay timers (Anon, CISCO 2006). These three timers and their values are

discussed below.

2.4.1 Max Age Timer

The max age timer is the maximum amount of time a bridge port will save its BPDU

information, if a new BPDU has not arrived before the max age time expires, the current

BPDU will be discarded and a topology change will be triggered. The allowable range

specified in IEEE 802.1D is between 6-40 with the default being set to 20 (Anon, IEEE

802.1D 1998).

2.4.2 Hello Timer

The frequency in which a root bridge sends out a BPDU is by default every 2 seconds and is

controlled by the timer settings known as the hello time (Prytz 2006), this hello time is used

in the initial spanning tree calculations, for maintaining a stable topology and to detect

topology changes. The allowable range specified in IEEE 802.1D is between 1-10 with the

default being set to 2 (Anon, IEEE 802.1D 1998).

2.4.3 Forward Delay Timer

The forward delay timer is responsible for the amount of time a port stays in the listening and

learning state before forwarding traffic, the default is 15 seconds, therefore a delay of twice

this default is 30 seconds and is the main reason for a convergence time of between 30 and 50

seconds (Sfeir, Pasqualini et al. 2005). The allowable range specified in IEEE 802.1D is

between 4-30 with the default being set to 15 (Anon, IEEE 802.1D 1998).

Page 22: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

22

2.4.4 Bridge Diameter

The bridge diameter is also a value that can be modified to influence timer settings to a value

that will reflect the network size, (Lammle, Quinn 2002) recommends using the diameter

value when modify timers to decrease convergence, the default value for diameter is 7. IEEE

802.1D specifies that the bridge diameter should not exceed seven (Anon, IEEE 802.1D

1998). The diameter is not determined by the number of bridges in the network, however it is

based on the maximum number of bridges that you cross in order to link any two bridges in

the network, the source and destination are also included in the calculation. If we take the

example in Figure 3 and 4 below, we can see that both examples have seven bridges;

however the physical topology of the network has a direct effect on the diameter. Figure 3 is

a ring topology and has a diameter of seven; B1-B2-B3-B4-B5-B6-B7 is an example. In

Figure 4 the topology is that of a partial mesh and here the diameter is three; an example

being B1-B5-B4.

B1

B2

B3

B4

B5

B6

B7B1

B2

B3

B4

B5

B6

B7

Figure 3. Diameter of 7 Figure 4. Diameter of 3

Page 23: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

23

2.5 Timer Calculation and Analysis

It is possible to carefully modify spanning tree timer settings to decrease convergence time;

with spanning tree timers at their default this convergence time is typically between 30-50

seconds, if there is a direct failure, the bridge will immediately time-out the max age timer, as

the bridge goes through the listening and learning process it must wait 2 x forward delay

which is 30 by default. However if there is an indirect failure the bridge must wait till the

max age timer expires before it can go through the listening and learning process, therefore

the convergence time in this case 2x forward delay + max age = 50 seconds (Menga 2003).

(Anon, IEEE 802.1D 1998) states that the following equations in Table 3 should also be

enforced when modifying spanning tree timers:

Furthermore, (Anon, CISCO 2006) states that to achieve better convergence time, you need

to strictly follow the two equations in Table 4. This equation is used to determine the correct

values for the max age and forward delay timers and is based on the equation in Table 3 and

on the IEEE 802.1D specifications on diameter size equations. In Table 5 the equation has

been recalculated to use the values of the max age and forward delay timers to determine the

diameter.

If we use the default settings of 20 for max age and 15 for forward delay then apply them to

the equations above you get a diameter size of seven. Table 6 shows the recommended max

age and forward delay for each diameter size, this table shows there is scope for improving

convergence time by fine tuning the timers whilst still staying within the IEEE 802.1D

recommendations. Using the topology in Figure 4 as an example, it can be seen the topology

consists of seven bridges which we will assume have their timers set at default values which

as we have shown above corresponds to a diameter size of seven. However it has already

been determined that this topology has a maximum network diameter of three, thus it is

possible set the max age to 12 and the forward delay to 9, these values correspond to the

2 x (forward delay - 1) ≥ max age

max age ≥ 2 x (hello time + 1)

max age = ((4 x hello time) + (2 x diameter)) – 2

forward delay = ((4 x hello time) + (3 x diameter)) / 2

diameter = ((max age + 2 - (4 x hello time)) / 2

diameter = ((2 x forward delay) - (4 x hello time)) / 3

Table 3.

Table 4.

Table 5.

Page 24: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

24

network diameter of 3 in Table 8. Therefore it is theoretically possible the network will now

take between 18-40 seconds to converge instead of between the default 30-50 seconds.

Diameter Max Age Forward Delay Hello Timer

7 20 15 2

6 18 13 2

5 16 12 2

4 14 10 2

3 12 9 2

2 10 7 2

1 8 6 2

It is also theoretically possible to increase the diameter beyond the recommended maximum

of seven, although (Anon, IEEE 802.1D 1998) states that this should not be done, however

this contradicts their own recommended allowable range for timer values. For example if we

use the maximum values from the allowable range for max age which is 40 and 30 for

forward delay and continue to apply the equations in Table 4 and 5, thus, we get a network

diameter of 17, however, convergence time will also increase to between 60-100 seconds.

These values are also within the rules of the IEEE 802.1 D equations in Table 3.

So far we have discussed modifying the max age and forward delay timers, however the hello

timer value can also be lowered to decrease convergence time, Table 9 shows the values of

max age and forward delay if we use the hello timer value of 1 on the equations in Table 4

and 5, therefore the network will theoretically converges in between 26-43 seconds, if we use

the setting for a diameter of 3 from Table 7 and use them on the example in Figure 4 we get a

convergence time of between 14-22 seconds as opposed to a convergence time of between

18-40 seconds in the last example where the hello timer was set to 2. However setting the

value of the hello time from the default value of 2 to 1 will double the amount of control

traffic in the form of hello BPDUs which could cause degradation of network performance

(Lammle, Quinn 2002).

Diameter Max Age Forward Delay Hello Timer

7 17 13 1

6 14 11 1

5 12 10 1

4 10 8 1

3 8 7 1

2 6 5 1

1 4 4 1

Table 6.

Table 7.

Page 25: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

25

It has been show that it is possible to improve the performance in convergence time whilst

staying within the IEEE 802.1D specifications which states the network diameter must also

decrease with any decrease in timers. It could be surmised that the IEEE 802.1D standards

have been conservative in their calculations on the optimum and stable values for timers.

What would happen if took a network with a diameter of 7 and use the timer settings of a

network with a diameter of 5 from Table 6? Theoretically we would get a convergence time

of between 24-40 seconds rather than the default 30-50 seconds; however, will the network

converge and remain stable and if it does how low can we go before the network will not

converge? (Medagliani, Ferrari et al. 2009) offers evidence that it will as they show evidence

that a network with a diameter of 8 and a max age value of 6 and a forward delay value of 4

will converge, however they also produce evidence to show that a network with a diameter of

9 and a max age value of 6 and a forward delay value of 4 will not converge and instead

forms two separate spanning trees. Table 8 shows timer values which were arrived at using

the equation in Table 4 and 5, you will notice it contains the same values as is Table 6,

however there are more increments thus there are more values. You can see that (Medagliani,

Ferrari et al. 2009) used the values in the last row of Table 8, which are the minimum values

allowed in the IEEE 802.1D standard, having a network with a diameter of 7 and using the

lowest recommended settings of 6 for max age and 4 for forward delay, strictly speaking still

meets the IEEE requirements discussed earlier, the network diameter 7 is within the diameter

specification, the timer values of 6 and 4 are within the allowable range and meet IEEE

equation rules in Table 3.

Max Age Forward Delay Hello Timer

20 15 2

19 14 2

18 13 2

16 12 2

15 11 2

14 10 2

12 9 2

11 8 2

10 7 2

8 6 2

6 4 2

In conclusion, calculations and evidence show that it is possible to enhance the convergence

time of STP (802.1D) by modifying timers, however great care must be taken when doing so

to ensure a loop free stable network.

The next chapter will aim to discuss the primary research methods that will be used to answer

the research question in section 1.2 and testing the hypotheses in section 1.3.

Table 8.

Page 26: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

26

Chapter 3.0 will aim to discuss the primary research methods that will be used to answer the

research question in section 1.2 and for testing the hypotheses in section 1.3. The methods

used in the next section are based on research conducted in chapter 2.

3.0 Methods

3.1 Primary Research Methods

3.1.1 Simulation Software Justification

It has been decided that the experiments should be carried out on a network using an

appropriate network simulator; this method was chosen rather than conducting the

experiment on actual equipment in the network laboratories. This choice was primarily due to

the logistics of real world experiments, in particular laboratory constraints which would

require the experiment to be constructed and dismantled on a daily basis, whereas simulation

requires only a PC and appropriate software, this allows incomplete experiments to be saved

and restarted later. Simulation software also offers features for collecting and presenting

statistical results, whereas in the network laboratory these results may have to be obtained

using third-party applications, furthermore (Małowidzki 2004) states that these statistical

results may be unreliable.

3.1.2 Simulation Software Environment

There are many simulation packages to choose from to conduct the experiment with OPNET

and NS-2 being the most popular with both supporting a range of protocols, NS-2 is freeware,

however; it can be difficult to use and requires a good knowledge of scripting (Guo, Xiang et

al. 2007). In contrast OPNET is expensive and requires a licence, however; it is easier to use

due to its graphical user interface (Flores-Lucio, Paredes-Ferrare et al. 2003).

Although NS-2 supports a wide range of layer 3 protocols there are some layer 2 protocols

not supported, whereas OPNET supports layer 2 protocols such as STP (8021D) (Carmichael,

Ghani et al. 2005).

Furthermore, (Małowidzki 2004) states that OPNET more accurately reflects real world

devices and networks, OPNET also has extensive documentation and tutorials available that

will allow existing knowledge to be updated to allow construction of the experiment.

It has therefore been decided that OPNET should be used to conduct the experiments

simulations.

3.1.3 Hypothesis Testing

The hypothesis identified in section 1.3 will be test throughout the lifetime of the project,

they have already been tested thorough research into spanning tree and its timers as detailed

Page 27: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

27

in Chapter 2, as a result of this research the hypotheses has been slightly modified from the

hypotheses that were identified in the initial proposal.

The first hypothesis states that convergence time of STP (802.1D) can be decreased by

careful modification of the timers max age, forward delay and hello time without the network

becoming unstable. This hypothesis was an original one from the initial proposal and was

arrived at due to ongoing research and calculations of spanning tree timers. The final testing

of the hypothesis will be at the end of the experiment after comparing results.

There are two other hypotheses, the first being that the network will still converge with the

minimum timer values with a network diameter of 7, the second is that the network will not

converge minimum timer values with a network diameter of 9. These hypothesis are new and

have been arrived at due to research detailed in section 2.5. A paper by (Medagliani, Ferrari

et al. 2009) was instrumental at arriving at both these hypotheses. The final testing of both

these hypotheses will also be conducted after comparing results of the final experiments.

3.2 Method Approach

3.2.1 Experiment Environment

As identified in section 3.1.2, OPNET simulation software will be used to construct and

conduct the experiment, this will be carried out at Glasgow Caledonian University one of the

laboratories. These Laboratories contain PCs with Windows XP which has virtual machine

images of another Windows XP installation which contains the latest version OPNET

Modeller, these virtual images are run by VMware Player which is set not to save the current

state of the running XP image, therefore great care must be taken to ensure that any saved

model files and results are removed from the running XP image and saved to a flash drive.

3.2.2 Topology of Experiment

The ring topology was identified through research in section 2.4.4 as the most appropriate

topology for the experiment, the timer values identified and the diameter size recommended

by the IEEE 802.1D standards, it is possible to have a diameter size of 7 without using the

ring topology but this will require a partial mesh network using far more switches, a partial

mesh is more complex and contains more variables, the ring topology is more simplistic with

less variables, this will make it easier to understand gathered statistics.

In the topology in Figure 5 on page 28, switch A is the root, the letters A-G corresponds to

priority value identified earlier in this report, there is equal an equal path cost from the

segment between F-G, as F has a lower priority it will become designated port for that

segment and the port for G on the segment will be in the blocked state. The link failure will

be simulated between switch B-D. This topology will be used for Group 1 and 4 experiments.

Page 28: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

28

ROOT

A

B

D

F G

E

C

Destination 3Source

Topology for Group 1 & 4 ExperimentsFigure 5.

The topology in Figure 6 consists of 8 switches, switch A is the root, the letters A-H

corresponds to priority value identified earlier in this report, there is equal an equal path cost

from switch H, as the port connecting to F has a lower priority it will become root port for

switch H and the connecting to G will be blocking. The link failure will be simulated between

switch B-D. This topology will be used for Group 2 Experiments.

ROOT

A

B

D

F G

E

C

Topology for Group 2 ExperimentsFigure 6.

H

Destination 3

Source

Page 29: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

29

The topology in Figure 7 consists of 9 switches, switch A is the root, the letters A-I

corresponds to priority value identified earlier in this report, there is equal an equal path cost

from the segment between H-I, as H has a lower priority it will become designated port for

that segment and the port for G on the segment will be in the blocked state. The link failure

will be simulated between switch B-D. This topology will be used for Group 3 experiments.

ROOT

A

B

D

F G

E

C

Topology for Group 3 ExperimentsFigure 7.

HDestination 3Source

I

3.2.3 Experiment and Variables

After building the topology in OPNET each switch will be configured; the spanning tree

protocol must be changed from the default RSTP (802.1w) to STP (802.1D) (see Figure 6).

At this point the priority field need to be edited to reflect the topology in Figure 5. The max

age, hello time and forward delay should not be modified until the experiment is completely

built, altering the timers should be done after duplication of master scenario.

Page 30: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

30

The “values per statistics” should also be changed from the default 160 to 500, this will

provide a more accurate results.

There will be 4 groups of experiments, Group 1, 2 and 3 will use the same variables as shown

in Table 9 and will differ only in network size (see section 3.2.2) each of these groups will

consist of 8 scenarios which will be ran for 500 seconds each; each scenario will also be run

10 times, Group 4 will have the same topology as Group 1, however the variables in Table 10

will be used. These variables are based on the calculation and analysis of timers undertaken

in earlier research, see section 2.5, in Table 9 we see the variables for each scenario in group

1, we can see from this table that the only variables between each scenario is the max age and

forward delay timers, the hello timer does not vary from one scenario to the other this is the

same in Table 10, however the hello time does vary between Group 1 and 4, this is due to the

fact that the value of the hello timer has a direct correlation with both the max age and

forward delay therefore each hello timer value produces different values for max age and

forward delay when used with the equations in Table 4 and 5. (Prokkola 2008) suggests that

each scenario should be run several times with different random generator seed values as this

makes the experiment more realistic. It should also be noted that although Scenarios D1 and

D0 relate to a diameter of 1 and 0, it is not physically possible to have a diameter of 1 or 0

and therefore the values are used theoretically to enable calculation of the lower allowable

parameters.

Scenario Max Age Forward Delay Hello Timer

D7 20 15 2

D6 18 13 2

D5 16 12 2

D4 14 10 2

D3 12 9 2

D2 10 7 2

D1 8 6 2

D0 6 4 2

Table 9.

Figure 7.

Page 31: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

31

3.2.4 Select and Analyse Statistics

Before each scenario is duplicated and the variables changed the statistical information that

OPNET will gather during simulation will be selected, primarily the throughput information

of links between switches will allow us determine if the network is converged and how long

it took to converge, throughput is the measurement of traffic passing over a link from one

switch to another and is measured in bits per second and packets per second. The amount of

traffic forwarded by the switch and is also measured in bits per second and packets per

second, BPDU information sent and received by switches which is measured in bits per

second will also be selected, gathering these extra statistics is not essential however they are

useful to give an overall view of the spanning tree mechanisms within the experiment.

OPNET Modeller will process the gathered data the output of the results can be presented in

graph form or in raw data which can be exported into excel or a similar spreadsheet package.

The results will be collected and mean averages will worked out for each scenario set of runs,

there is no variation between convergence time within the ten runs, however there is variance

in the amount of traffic being sent at any given time in the experiment and an average will

still be taken of the traffic being received, this gives the experiment more validity.

Although results have been gathered from all devices in each scenario only the traffic

received by destination 3 will be used in calculating convergence time.

An example in figure 8 shows the traffic received in bps for Group 1 – Scenario D7, the x

axis represents Time in seconds and the y axis represents Traffic received in bits, T1

represents when destination 3 initially starts receiving traffic, F is the point of link failure

(100s) T2 is the point that destination 3 starts receiving traffic after link failure, R is the point

of link recovery (200s) and T3 is the point that destination 3 starts receiving traffic after link

recovery, to obtain the values for convergence times the following equations should be

applied to the chart, T1-0=C1, this initial convergence, T2-F=C2, this is the convergence time

Scenario Max Age Forward Delay Hello Timer

D7 17 13 1

D6 14 11 1

D5 12 10 1

D4 10 8 1

D3 8 7 1

D2 6 5 1

D1 4 4 1

Table 10.

Page 32: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

32

after link failure and T3-R=C3 signifies the convergence time after link recovery. All charts

for every Scenario are included in the appendices and the corresponding raw data in excel

format is included in an attached CD-ROM.

These results will then be analysed and compared and conclusions will be drawn based on

these result and research conducted earlier. It is possible the results do not match the

hypotheses and the experiment may have to be tweaked and carried out again.

0

50000

100000

150000

200000

250000

300000

350000

400000

1 31 61 91 121 151 181 211 241 271 301 331 361 391 421 451 481

Traf

fic

Re

ceiv

ed

(b

its)

Time (seconds)

Grp 1 - D7 - Dest 3 - Traffic received (bps)

Figure 8.

T1 F T2 R T3

Page 33: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

33

4.0 Results

The experiment was split into four groups and the experiment was conducted successfully,

the results from the experiment are presented in the following chapter.

4.1 Group 1 Results

Each of the eight scenarios in the Group 1 experiments consisted of seven switches in a ring

topology (see figure 5), as indicated earlier this provides a network diameter of seven, this is

the optimum diameter recommended by CISCO and the IEEE (see section 2.5), only the

timer settings of Max Age and Forward Delay varied between each scenario. The settings for

each scenario have been calculated using the diameter and the equations in Table 4 & 5.

Table 11 below shows the settings for each scenario and their corresponding results, for

example in scenario D7 the value of 15 for Forward Delay was used (FD), 20 for Max Age

(MA) and 2 for the Hello Timer (HT), these timer settings are all default values and

correspond to a network diameter of 7 (D7). It also shows that in scenario D7 the network

had an initial convergence time of 30 seconds (C1), a convergence time of 45 seconds after

link failure (C2) and a convergence time of 30 seconds after link recovery (C3). As these

results are from the default timer settings and the recommended diameter size they will be

used as a baseline by which results can be compared.

The results from Table 11 for each scenario have been plotted onto three charts, figure 9

represents the initial convergence time (C1), figure 10 represents the convergence time after

link failure at 100 seconds (C2) and figure 11 represents the convergence time after link

recovery at 200 seconds (C2).

In figure 9 the x axis represents the scenarios D7-D0 and the y axis represents the initial

convergence time in seconds, this chart shows that initial convergence time has steadily

decreased as the network diameter (corresponding values) is stepped down. It shows that

Table 11.

Group 1 Settings

Group 1 Results

Scenario FD MA HT

C1 C2 C3

D7 15 20 2

30 45 30

D6 13 18 2

26 39 26

D5 12 16 2

24 35 24

D4 10 14 2

20 29 20

D3 9 12 2

18 25 18

D2 7 10 2

14 19 14

D1 6 8 2

12 15 12

D0 4 6 2

8 9 8

Page 34: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

34

scenario D0 initially converges 22 seconds faster than scenario D7, an overall 73.33%

improvement on the baseline (D7).

In figure 10 the x axis represents the scenarios D7-D0 and the y axis represents the

convergence time after link failure (C2) in seconds, this chart shows C2 steadily decreased as

the network diameter is stepped down. It shows that scenario D0 converges in 9 seconds as

opposed to the 45 seconds in the baseline scenario (D7), this signifies an overall 80%

improvement in convergence time after indirect link failure. The chart also shows that in each

scenario that convergence after indirect link failure took 33.33% longer than the initial

convergence detailed in the chart in figure 9.

30

26 24

20 18

14 12

8

0

5

10

15

20

25

30

35

D7 D6 D5 D4 D3 D2 D1 D0 Init

ial C

on

verg

en

ce t

ime

C1

(se

cs)

Scenario

Grp 1 - Initial Convergence (C1)

C1

Figure 9.

45 39

35

29 25

19 15

9

0

10

20

30

40

50

D7 D6 D5 D4 D3 D2 D1 D0

Co

nve

rge

nce

tim

e a

fte

r lin

k fa

ilure

C2

(sec

s)

Scenario

Grp 1 - Convergence after link failure (C2)

C2

Figure 10.

Page 35: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

35

In figure 11 the x axis represents the scenarios D7-D0 as in the previous charts; however the

y axis represents convergence time after link recovery (C3) in seconds, this chart shows that

convergence time after link recovery has steadily decreased as the network diameter is

stepped down. It shows that scenario D0 initially converges 22 seconds faster than scenario

D7, an overall 73.33% improvement on the baseline (D7). These convergence times mirror

exactly the initial convergence times in figure 9.

The chart in figure 12 represents the traffic received in bits per second by destination 3 for

scenario D0, the x axis signifies the Time in seconds and the y axis signifies the amount of

traffic received in bits. The chart shows that the network initially converges at 8 seconds (C1),

the traffic is received at an average rate of 206866 bps until the link fails at 100 seconds, at

this point no traffic is received for 9 seconds (C2) until 109 seconds when the traffic

continues to be received at an average rate of 209705 bps, this continues until link recovery at

200 seconds at this point no traffic is received for 8 seconds (C3) until 209 seconds when

traffic is then received at an average rate of 206255 bps until the end of the experiment at 500

seconds. Figure 12 shows that scenario D0 successfully converged and remained stable whilst

using the lowest allowable parameters of 6 for Max Age and 4 for Forward Delay as defined

by IEEE (Anon, IEEE 802.1D 1990). The charts detailing the Traffic received in bps by

destination 3 for all other Group 1 scenarios are included in the appendices in section 6.3.1.

30

26 24

20 18

14 12

8

0

5

10

15

20

25

30

35

D7 D6 D5 D4 D3 D2 D1 D0

Co

nve

rge

nce

tim

e a

fte

r lin

k re

cove

ry C

3

(sec

s)

Scenario

Grp 1 - Convergence after link recovery (C3)

C3 (sec)

Figure 11.

Page 36: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

36

4.2 Group 2 Results

Group 2 experiments consisted of 8 switches (see figure 6), rather than 7 as in Group 1, all

other parameters are the same as in Group 1 including timer parameters, all scenarios have a

network diameter of eight, this is outside the diameter size of 7 recommended by CISCO and

the IEEE (see section 2.5). The settings and results for each scenario are detailed in Table 12.

The results from Table 12 for each scenario have been plotted onto three charts, figure 13

represents the initial convergence time (C1), figure 14 represents the convergence time after

link failure at 100 seconds (C2) and figure 15 represents the convergence time after link

recovery at 200 seconds (C2).

In figure 13 the x axis represents the scenarios D7-D0 and the y axis represents the initial

convergence time in seconds, this chart shows that initial convergence time has steadily

decreased as the network diameter is stepped down. It shows that scenario D0 initially

0

50000

100000

150000

200000

250000

300000

350000

400000

1 31 61 91 121 151 181 211 241 271 301 331 361 391 421 451 481

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 1 - D0 - Dest 3 - Traffic received (bps)

08

10

9

20

8

Figure 12.

Table 12.

Group 2 Settings

Group 2 Results

Scenario FD MA HT

C1 C2 C3

D7 15 20 2

30 44 30

D6 13 18 2

28 38 26

D5 12 16 2

27 34 24

D4 10 14 2

25 28 20

D3 9 12 2

24 24 18

D2 7 10 2

22 18 14

D1 6 8 2

21 14 21

D0 4 6 2

19 8 19

Page 37: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

37

converges 11 seconds faster than scenario D7, an overall 36.66% improvement on the

baseline (D7).

In figure 14 the x axis represents the scenarios D7-D0 and the y axis represents the

convergence time after link failure in seconds, this chart shows convergence time has steadily

decreased as the network diameter is stepped down. It shows that scenario D0 converges in 8

seconds as opposed to the 44 seconds in the baseline scenario (D7), this signifies an overall

81.81% improvement in convergence time after indirect link failure. The chart also shows

that in scenario D7 convergence after indirect link failure took 31% longer than the initial

convergence of D7 detailed in the chart in figure 9. This is similar for scenario D6, D5 and

D4 in these scenarios convergence after indirect link failure all took longer than the initial

convergence, however in scenario D3 convergence after indirect link failure was the same as

the initial convergence of D3, in contrast to the other scenarios, in scenario D2, D1 and D0

convergence after indirect link failure was actually faster than the initial convergence.

30 28 27

25 24 22 21

19

0

5

10

15

20

25

30

35

D7 D6 D5 D4 D3 D2 D1 D0 Init

ial C

on

verg

en

ce t

ime

C1

(se

cs)

Scenario

Grp 2 - Initial Convergence (C1)

C1

Figure 13.

Page 38: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

38

In figure 15 the x axis represents the scenarios D7-D0 and the y axis represents convergence

time after link recovery (C3) in seconds, this chart shows convergence times mirror Group 1s

convergence time after link recovery in figure 11, until scenario D1 when it instead increases

from 14 seconds to 21 seconds and decreases again to 19 seconds in scenario D0

Figure 15 also shows that scenario D2 converges 16 seconds faster than scenario D7, an

improvement of 53.33% on the baseline (D7) however this improvement drops to 30-33% in

scenario D1 & D0.

44

38 34

28 24

18 14

8

0

10

20

30

40

50

D7 D6 D5 D4 D3 D2 D1 D0

Co

nve

rge

nce

tim

e a

fte

r lin

k fa

ilure

C2

(sec

s)

Scenario

Grp 2 - Convergence after link failure (C2)

C2

Figure 14.

30

26 24

20 18

14

21 19

0

5

10

15

20

25

30

35

D7 D6 D5 D4 D3 D2 D1 D0 Co

nve

rge

nce

tim

e a

fte

r lin

k re

cove

ry C

3

(sec

s)

Scenario

Grp 2 - Convergence after link recovery (C3)

C3

Figure 15.

Page 39: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

39

The chart in figure 16 represents the traffic received in bits per second by destination 3 for

Group 2 scenario D0, the x axis signifies the Time in seconds and the y axis signifies the

amount of traffic received in bits. The chart shows that the network initially converges at 19

seconds (C1), the traffic is received at an average rate of 207568 bps until the link fails at 100

seconds, at this point no traffic is received for 8 seconds (C2) until 108 seconds when the

traffic continues to be received at an average rate of 209578 bps, this continues until link

recovery at 200 seconds at this point no traffic is received for 19 seconds (C3) until 219

seconds when traffic is then received at an average rate of 203537 bps until the end of the

experiment at 500 seconds. Figure 16 shows that scenario D0 successfully converged and

remained stable despite using 8 switches and the lowest allowable parameters of 6 for Max

Age and 4 for Forward Delay. The charts detailing the Traffic received in bps by destination

3 for all other Group 2 scenarios are included in the appendices in section 6.3.2.

4.3 Group 3 Results

Group 3 experiments consisted of nine switches (see figure 7), rather than seven or eight as in

Group 1 and 2, all other parameters are the same as in Group 1 and 2 including timer

parameters, all scenarios have a network diameter of nine, this is two greater than the

diameter size of seven recommended by CISCO and the IEEE (see section 2.5). The settings

and results for each scenario are detailed in Table 13. Scenario D0 results highlighted in red

has no values as the network failed to converge in this scenario.

0

50000

100000

150000

200000

250000

300000

350000

400000

1 31 61 91 121 151 181 211 241 271 301 331 361 391 421 451 481

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 2 - D0 - Dest 3 - Traffic received (bps)

19

10

8

21

9

Figure 16.

Page 40: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

40

Table 13.

Group 3 Settings

Group 3 Results

Scenario FD MA HT

C1 C2 C3

D7 15 20 2

30 43 30

D6 13 18 2

28 37 26

D5 12 16 2

27 33 24

D4 10 14 2

25 27 20

D3 9 12 2

24 23 18

D2 7 10 2

22 17 22

D1 6 8 2

21 13 21

D0 4 6 2

_ _ _

In figure 17 the x axis represents the scenarios D7-D0 and the y axis represents the initial

convergence time in seconds, this chart shows that initial convergence time has steadily

decreased as the network diameter is stepped down from D7 to D1 and shows that scenario

D1 initially converges 9 seconds faster than scenario D7, providing a 30% improvement on

the baseline (D7). However the network in scenario D0 has failed to converge and has a value

of 0.

In figure 18 the x axis represents the scenarios D7-D0 and the y axis represents the

convergence time after link failure (C2) in seconds, this chart shows C2 steadily decreased as

the network diameter is stepped down from D7 to D1. It shows that scenario D1 converges in

13 seconds as opposed to the 43 seconds in the baseline scenario (D7), this signifies an

overall 69.76% improvement in convergence time after indirect link failure. The chart also

shows that scenario D0 has a value of 0 due to the fact that scenario D0 failed to converge.

30 28 27

25 24

22 21

0 0

5

10

15

20

25

30

35

D7 D6 D5 D4 D3 D2 D1 D0 Init

ial C

on

verg

en

ce t

ime

C1 (

secs

)

Scenario

Grp 3 - Initial Convergence (C1)

C1

Figure 17.

Page 41: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

41

In figure 19 the x axis represents the scenarios D7-D0 and the y axis represents convergence

time after link recovery (C3) in seconds, this chart closely resembles the chart in figure 15.

Convergence time steadily decreases until scenario D2 when it instead increases from 18

seconds to 22 seconds and decreases again to 21 seconds in scenario D1. Convergence times

after link recovery in scenarios D2, D1 mirror exactly the initial convergence times of the

same scenarios. Scenario D0 has failed to converge and has a value of 0.

The greatest performance increase was with the settings of scenario D3 which provided a

40% decrease in convergence time compared to scenario D7.

43

37 33

27 23

17 13

0 0

5

10

15

20

25

30

35

40

45

50

D7 D6 D5 D4 D3 D2 D1 D0

Co

nve

rge

nce

tim

e a

fte

r lin

k fa

ilure

C2

(sec

s)

Scenario

Grp 3 - Convergence after link failure (C2)

C2

Figure 18.

30

26 24

20

18

22

21

0 0

5

10

15

20

25

30

35

D7 D6 D5 D4 D3 D2 D1 D0

Co

nve

rge

nce

tim

e a

fte

r lin

k re

cove

ry C

3

(sec

s)

Scenario

Grp 3 - Convergence after link recovery (C3)

C3

Figure 19.

Page 42: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

42

The chart in figure 20 represents the traffic received in bits per second by destination 3 for

Group 3 scenario D0, the x axis signifies the Time in seconds and the y axis signifies the

amount of traffic received in bits. The chart shows that the network has failed to converge

and no traffic is being received by destination 3 for the period between 75 seconds and 500

seconds.

4.4 Group 4 Results

Each of the seven scenarios in the Group 1 experiments consisted of seven switches in a ring

topology (see figure 5), as indicated earlier this provides a network diameter of seven, this is

the optimum diameter recommended by CISCO and the IEEE (see section 2.5). In this group

of experiments the Hello Timer has been lowered from the default value of 2 to 1. The

settings for each scenario have been calculated using the diameter and the equations in Table

4 & 5. The settings and results for each scenario are detailed in Table 14.

Table 14.

Group 4 Settings

Group 4 Results

Scenario FD MA HT

C1 C2 C3

D7 13 17 1

28 37 26

D6 11 14 1

24 30 22

D5 10 12 1

22 26 20

D4 8 10 1

18 20 16

D3 7 8 1

16 16 14

D2 5 6 1

12 10 12

D1 4 4 1

_ _ _

0

20000000

40000000

60000000

80000000

100000000

120000000

1 31 61 91 121 151 181 211 241 271 301 331 361 391 421 451 481

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D0 - Dest 3 - Traffic received (bps)

Figure 20.

Page 43: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

43

In figure 21 the x axis represents the scenarios D7-D1 and the y axis represents the initial

convergence time in seconds, this chart shows that initial convergence time has steadily

decreased as the network diameter is stepped down from D7 to D2 and shows that scenario

D2 initially converges 18 seconds faster than scenario D7, and provides a 60% improvement

on the baseline (Group 1 Scenario D7). However the network in scenario D1 has failed to

converge and has a value of 0.

In figure 22 the x axis represents the scenarios D7-D1 and the y axis represents the

convergence time after link failure (C2) in seconds, this chart shows C2 steadily decreased as

the network diameter is stepped down from D7 to D2. It shows that scenario D2 converges in

10 seconds as opposed to the 45 seconds in the baseline scenario (Group 1 Scenario D7), this

signifies an overall 77.77% improvement in convergence time after indirect link failure. The

chart also shows that scenario D0 has a value of 0 due to the fact that scenario D0 failed to

converge.

28

24 22

18 16

12

0 0

5

10

15

20

25

30

D7 D6 D5 D4 D3 D2 D1

Init

ial C

on

verg

en

ce t

ime

C1

(se

cs)

Scenario

Grp 4 - Initial Convergence (C1)

C1

Figure 21.

Page 44: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

44

In figure 23 the x axis represents the scenarios D7-D1 and the y axis represents convergence

time after link recovery (C3) in seconds. Convergence time steadily decreases until scenario

D2. It shows that scenario D2 converges in 12 seconds as opposed to the 30 seconds in the

baseline scenario (Group 1 Scenario D7), this signifies a 60% improvement in convergence

time after link recovery. Scenario D1 has failed to converge and has a value of 0.

37

30

26

20

16

10

0 0

5

10

15

20

25

30

35

40

D7 D6 D5 D4 D3 D2 D1 Co

nve

rge

nce

tim

e a

fte

r lin

k fa

ilure

C2

(sec

s)

Scenario

Grp 4 - Convergence after link failure (C2)

C2

Figure 22.

26

22 20

16 14

12

0 0

5

10

15

20

25

30

D7 D6 D5 D4 D3 D2 D1

Co

nve

rge

nce

tim

e a

fte

r lin

k re

cove

ry C

3

(sec

s)

Scenario

Grp 4 - Convergence after link recovery (C3)

C3

Figure 23.

Page 45: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

45

The chart in figure 24 represents the traffic received in bits per second by destination 3 for

Group 4 scenario D1, the x axis signifies the Time in seconds and the y axis signifies the

amount of traffic received in bits. The chart shows that the network has failed to converge

and no traffic is being received by destination 3 for the period between 55 seconds and 500

seconds.

0

20000000

40000000

60000000

80000000

100000000

120000000

1 31 61 91 121 151 181 211 241 271 301 331 361 391 421 451 481

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D1 - Dest 3 - Traffic received (bps)

Figure 24.

Page 46: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

46

5.0 Conclusions

5.1 Group 1 Conclusions

The results of Group 1 showed that the initial convergence time in all Group 1 scenarios could be

equated to 2xFD=C1 where FD is forward delay and C1 is initial convergence time, in the case of

convergence time after link recovery (C3) the equation 2xFD=C3 applies, therefore in Group 1

C1=C3, however in the convergence time after indirect link failure (C2) this equation does not apply

and the Max Age (MA) and Message Age (Mage) values must be factored in. The Message Age (Mage)

value is not fixed and is incremented every time a BPDU is forwarded by a switch, therefore the

network diameter will directly affect convergence time after indirect link failure, as a result the

following equation applies; 2xFD+MA-Mage=C2, for example if we apply this equation to the settings

in Group 1 Scenario D7 we get 2x15+20-5=45, the Message Age value of 5 does not reflect the

network diameter of 7, but is instead calculated from the root to the point of link failure which equals

5 hops in the Group 1 experiment, resulting in a Message Age of 5. If we apply this to Scenario D0

we get 2x4+6-5=9.

The Group 1 experiment was within the confines of the CISCO and IEEE recommended diameter

value of seven and using the equations specified by the IEEE (see tables 4 & 5), the results show that

convergence times can be safely lowered from the defaults in Scenario D7 of between 30-45 seconds

to between 8-9 seconds in Scenario D0, this is an overall average of 75.55% improvement in

convergence performance. Although the network converged successfully in scenario D0,

there is not much time for the network to stabilise, IEEE states that the following statement

must be true for a network to converge; MA>Mage, in scenario D0 this is true as 6>5, this

however leaves only 1 second (6-5) before a BPDU received by the furthest switch from the

root is expired causing a topology recalculation, furthermore if another switch was added to

the topology the network would not converge with the lowest settings. Therefore it would not

be advisable to lower the timers to their lowest default values of 4 for FD and 6 for MA.

Setting MA=10 and FD=7 as in scenario D2 would still bring 66% performance increase

whilst ensuring the network remains stable (MA-Mage=5).

Group 1 experiments tested the following hypotheses initially identified in section 1.3:

Convergence time of STP (802.1D) can be decreased by careful modification of the

timers max age, forward delay and hello time without the network becoming unstable.

Using a network diameter of 7 with the minimum allowable values for timers max age

and forward delay the network will still converge.

These hypotheses have been proven true by Group 1 experiments which showed that STP

(802.1D) convergence time can be decreased whilst still remaining stable, furthermore the

network did remain stable whilst using the with the minimum allowable values for timers

max age and forward delay.

Page 47: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

47

5.2 Group 2 Conclusions

Group 2 experiments differed only in that another switch was added to the topology, this gave the

network a diameter of eight, this value is out with the confines of the CISCO and IEEE recommended

diameter value of seven (see section 2.5), when applying the diameter of eight to the equation in (see

tables 4 & 5) the following values are calculated; FD=16 and MA=22, however the Group 2

experiment shows that convergence times can still be decreased in a networks with a diameter of

eight.

In the initial convergence in scenario D7 the equation of 2xFD=C1 identified in Group 1 results still

applies, however in all other scenarios the network took longer than 2xFD to converge, in scenario

D0 the network converged in 2xFD+11, despite this there was still a decrease in initial convergence

time of 36.66% between scenario D7 and D0. In convergence after indirect link failure (C2); the

equation 2xFD+MA-Mage=C2 is true in all scenarios and showed an 81.88% decrease in convergence

time between scenario D7 and D0.

The results for convergence time after link recovery (C3) showed that the equation of 2xFD=C3 was

true in all scenarios except scenarios D1 and D0, where convergence time increased.

This increase at scenario D1 represents the networks instability at lower timer settings causing longer

convergence times, this was also true of initial convergence times (C1), the fact that the network takes

longer than 2xFD shows instability in the calculation of the initial tree. In conclusion, with 8 switches

the network becomes unstable when timers are lowered to MA=8 and FD=6.however, despite this the

network did converge in all scenarios and with the timers at their lowest settings of MA=6 and FD=4.

5.3 Group 3 Conclusions

Group 3 experiments consisted of nine switches (see figure 7) this gives the network a diameter of

nine, this value is out with the confines of the CISCO and IEEE recommended diameter value of

seven (see section 2.5), when applying the diameter of nine to the equation in (see tables 4 & 5) the

following values are calculated; FD=18 and MA=24, however the Group 3 experiment shows that

convergence times can still be decreased in a networks with a diameter of nine.

The formula 2xFD=C1 identified earlier for initial convergence, as in Group 2 only applies to

Scenario D7 in Group 3, scenarios D6, D5, D4, D3, D2 and D1 have all took longer than 2xFD to

initially converge, scenarios D7-D1 mirror exactly the results for initial convergence in Group 2.

Convergence time after indirect link failure for scenarios D7-D1 followed the equation 2xFD+MA-

Mage=C2 for example scenario D1 converged in 13 seconds due to 2x6+8-7=13. However scenario D0

failed to converge.

In convergence after link recovery the formula 2xFD=C3 applied for scenarios D7-D3, as in Group 2

the convergence time then increases, the difference between Group 2 and Group 3 is that in Group 3

this increase happened a scenario earlier, In Group 2 the network started to become unstable in

scenario D1 with the settings MA=8 and FD=6, however in Group 3 instability started in scenario D2

with settings MA=10 and FD=7, this shows the direct effect of adding another switch to the network,

Page 48: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

48

from this it could be surmised that a network with a diameter of 10 would become unstable when the

timer settings are lowered to MA=12 and FD=9.

Scenario D0 which had the lowest allowable timer settings of MA=6 and FD=4 failed to converge, the

rule MA>Mage is not true in scenario D0, the values of 6 for Max Age and 7 for Message Age,

therefore MA<Mage is true, this causes the BPDU from the furthest switch to expire before the

network has stabilised, therefore STP 802.1D will never reach a stable state and the network

will not converge.

Group 3 experiments tested the following hypotheses initially identified in section 1.3:

Using a network diameter of 9 with the minimum allowable values for timers max age

and forward delay the network will not converge.

In conclusion Group 3 results show that convergence performance can be improved in a

network with a diameter of nine, however setting timer values below MA=12 and FD=9 will

cause the network to become unstable and setting them as low as MA=6 and FD=4 the network will

not converge at all, therefore Group 3 experiments has successfully tested the above hypothesis and

found it to be true.

5.4 Group 4 Conclusions

Group 4 used the same network topology as Group 1, however different timer settings were used,

these timer settings are based on the equations in table 4 & 5 (see table 7), these new timer settings

values differ due to factoring in a reduced Hello Timer (HT) value of 1, therefore allowing FD and

MA timers settings to be lowered for each scenario, for example in Group 1 Scenario D7, the timers

values are as follows MA=20, FD=15 and HT=2 (see Table 6), however for Group 4 when we factor

in the new Hello Timer of 1 we get MA=17, FD=13 and HT=1, both sets of parameters correspond to

a diameter of 7, it is possible to apply a Hello Time of 1 to each of the values in table 6, however this

would not provide any improvement on initial convergence time (C1) or on convergence time after

link recovery (C3) and there would however be a 1-2 second improvement on convergence after link

failure due to the fact that the failure would be discovered quicker due to the decreased Hello Time.

The results show that Group 4 Scenarios D7 to D2 initially converged 2 seconds faster than the

corresponding Scenarios in Group 1 an improvement of 6.66% in each. Group 1 initial convergence

was equated to 2xFD=C1, however in Group 4 initial convergence equates to 2xFD+2=C1.

In convergence after indirect link failure there was a 9 second improvement by Group 4 Scenarios D7

to D2 over corresponding Scenarios in Group 1. Group 1 and 4 equated to 2xFD+MA-Mage=C2

In convergence after link recovery (C2) the network converged in 2xFD in Group 4 Scenarios D7 to

D3, however scenario D2 converged in 2xFD+2, this shows that although that scenario D2 did

converge it took proportionally slightly longer than the others this suggests instability where

Diameter=7 and FD=7, MA=8 and HT=1. In scenario D1 the network failed to converge at all, this is

due to the Max age being set to 4, this again results in the Message Age being a larger number than

Page 49: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

49

Max Age (MA<Mage), additionally the value of 4 set for MA in scenario D1 is below the lowest

allowable parameters of 6 as defined by IEEE in (Anon, IEEE 802.1D 1990)

Although there was convergence time improvement by Group 4 Scenarios D7 to D2 compared to the

corresponding Scenarios in Group 1, this is on a scenario by scenario basis, if we measure overall

performance we find that Group 4 scenario D2 was on average a 65% improvement on the baseline

(Group 1 scenario D7), however Group 1 scenario D0 was on average a 75% improvement on the

baseline, there is no overall improvement over Group 1 by Group 4, furthermore in Group 4 there is

double the amount of control traffic in the form of BPDUs, which could be detrimental in a network

whose bandwidth is being fully utilised, this could negate any convergence performance increase

achieved by lowering Hello Timers.

5.5 Overall Conclusions

There were 31 individual experiments carried out, each with different variable of those 31

experiments only 2 failed to converge; Group 3 Scenario D7 and Group 4 Scenario D1, on both

occasions the Message Age value was greater than the Max Age resulting in an unstable network.

Research literature has identified that in initial convergence (C1) and in convergence after link

recovery (C3) that the convergence time should be 2xFD, in the case of the Group 1 experiments with

a network diameter of 7 this is indeed the case showing that an average 75% performance increase can

be safely achieved without losing any network stability, this is also true of convergence after indirect

link failure (C2) which should converge in 2xFD+MA-Mage. However when the diameter is increased

to 8 or 9, the equations 2xFD=C1 and 2xFD=C3 do not apply this suggest that the network is taking

longer to stabilise and when the lower setting are applied to the diameter of 8 and 9, the results show

that the convergence time will increase or the network will not converge at all. Whilst there is indeed

benefit in lowering the FD and MA timers in a network diameter of 7, it is suggested that networks

with a diameter of 8 or 9 should be left at the default switch values of MA=20, FD=15 and HT=2, if

the network diameter was to increase further than 9 it would be recommended to increase MA and FD

to a higher value than the default values based upon the equation in table 4 & 5, the results of Group

4 has also shown that there is no overall stable performance benefit in lowering the Hello Timer.

The initial research question in section 1.2 asked “Can modification of Spanning Tree Protocol

(802.1D) timers: hello, max age and forward delay decrease network convergence time whilst

maintaining network stability when simulating link failure and recovery in OPNET?”

After carrying out the experiments it can now be confidently said that by careful modification

of Hello, Max Age and Forward Delay timers, network convergence time can be significantly

decreased without compromising network stability, however great care should be taken when

modifying timers following closely the equations and recommendations from the IEEE and

CISCO in section 2.5

Page 50: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

50

5.6 Benefit of Research

As first identified in section 1.4 small businesses with legacy network equipment may find

the results beneficial, they would be most beneficial to a small business with a network that is

a diameter of 7 or less and fine tuning of existing legacy equipment could bring network

performance benefits for these businesses. Network administrators and engineers could find it

useful as reference material to assist in fine tuning of networks. The report may also be of

benefit to students studying the mechanisms of STP (802.1D).

5.7 Further Research

Whilst this experiment explored convergence performance within networks with a diameter

of 7, 8 and 9, and fully tested the initial hypotheses and answered the research question, the

research project itself did not fully investigate STP (802.1D) convergence. To have a

comprehensive understanding of convergence performance all diameters should be fully

tested based on the equations in table 4 & 5, using these equations and the maximum

allowable range we get a network diameter of 17 using MA=40, FD=30 and HT=2, therefore

testing all diameters up to 17 is essential in order to obtain a fuller representation of STP

(802.1D) convergence performance.

Page 51: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

51

6.0 Appendices

6.1 References

Backes, F., (1988), "Transparent bridges for interconnection of IEEE 802 LANs", IEEE Network, vol.

2, no. 1, pp. 5-9.

Bonada, E. (2007), Characterization of the Spanning Tree Protocol .

Carmichael, L.S., Ghani, N., Rajan, P.K., O'Donoghue, K. & Hott, R., (2005) "Characterization and

comparison of modern layer-2 Ethernet survivability protocols", Proceedings of the Thirty-Seventh

Southeastern Symposium on System Theory, 2005. SSST '05. IEEE, , pp. 124.

CISCO, (2006) “Understanding and Tuning Spanning Tree Protocol Timers” [online], Available at:

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094954.shtml,

Document ID: 19120, [accessed on 28/10/2010]

Faghani, F. & Mirjalily, G., (2008) "Selecting the best spanning tree in metro Ethernet networks using

Genetic algorithm", IJCSNS, vol. 8, no. 6, pp. 106.

Frazier, H. & Pesavento, G. (2001), "Ethernet takes on the first mile", IT Professional, vol. 3, no. 4,

pp. 17-22.

Guo, J., Xiang, W. & Wang, S., (2007) "Reinforce networking theory with opnet simulation", Journal

of Information Technology Education, vol. 6, , pp. 215-226.

Huynh, M. & Mohapatra, P., (2006) "Etherlay: An Overlay Enhancement for Metro Ethernet

Networks", IEEE International Conference on Communications, ICC '06, pp. 2675.

Huynh, M. & Mohapatra, P., (2007) "A Scalable Hybrid Approach to Switching in Metro Ethernet

Networks", 32nd IEEE Conference on Local Computer Networks, LCN 2007, pp. 436.

IEEE 802.1D-1990, IEEE Standards for Local and Metropolitan Area Networks: Media Access

Control (MAC) Bridges.

IEEE 802.1D-1998, IEEE Standard for Information Technology- Telecommunications and

Information Exchange Between Systems- Local and Metropolitan Area Networks- Common

Specifications Part 3: Media Access Control (MAC) Bridges.

IEEE 802.1s-2002, IEEE Standards for Local and Metropolitan Area Networks--- Virtual Bridged

Local Area Networks--- Amendment 3: Multiple Spanning Trees.

IEEE 802.1w-2001, IEEE Standard for Local and Metropolitan Area Networks - Common

Specification. Part 3: Media Access Control (MAC) Bridges - Amendment 2: Rapid Reconfiguration.

Kim, C., Caesar, M. & Rexford, J. (2008), "Floodless in Seattle: A Scalable Ethernet Architecture for

Large Enterprises", Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication,

,pp. 3.

Kwok, C.K. & Mukherjee, B. (1989) "On transparent bridging of CSMA/CD networks",

Communications Technology for the 1990s and Beyond. GLOBECOM '89., pp. 185.

Lammle, T. & Quinn, E. (2002) CCNP: Switching Study Guide, 2nd edn, SYBEX Inc. Alameda.

Page 52: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

52

Lucio, G.F., Paredes-Farrera, M., Jammeh, E., Fleury, M. & Reed, M.J., (2003) "Opnet modeler and

ns-2: Comparing the accuracy of network simulators for packet-level analysis using a network

testbed", WSEAS Transactions on Computers, vol. 2, no. 3, pp. 700-707.

Małowidzki, M. (2004) "Network simulators: A developer’s perspective", Proc.Int.Sym.Performance

Evaluation of Computer and Telecommunication Systems (SPECTS’04), pp. 1–9.

Medagliani, P., Ferrari, G., Germi, G. & Cappelletti, F. (2009), "Simulation-assisted analysis and

design of STP-based networks", Simutools '09: Proceedings of the 2nd International Conference on

Simulation Tools and Techniques, ICST, pp. 1.

Menga, J., (2003) CCNP Practical Studies: Switching (CCNP self-study), Cisco Press.

Metcalfe, R.M. & Boggs, D.R. (1976) "Ethernet: Distributed packet switching for local computer

networks", Communications of the ACM, vol. 19, no. 7, pp. 395-404.

Mirjalily, G., Karimi, M.H., Adibnia, F. & Rajai, S. (2008) "An approach to select the best spanning

tree in Metro Ethernet networks", 8th IEEE International Conference on Computer and Information

Technology, 2008. CIT 2008., pp. 634.

Pallos, R., Farkas, J., Moldovan, I. & Lukovszki, C. (2007) "Performance of rapid spanning tree

protocol in access and metro networks", 2nd International Conference on Access Networks &

Workshops, 2007. AccessNets '07. pp. 1.

Perlman, R. (1985) "An algorithm for distributed computation of a spanning tree in an extended

LAN", ACM SIGCOMM Computer Communication Review, vol. 15, no. 4, pp. 44-53.

Perlman, R. (1992) Interconnections: Bridges and Routers, Addison-Wesley, Wokingham.

Perlman, R. (2000) Interconnections: Bridges, Routers, Switches, and Internetworking Protocols,

Addison-Wesley, Wokingham.

Prytz, G. (2006) "Redundancy in Industrial Ethernet Networks", IEEE International Workshop on

Factory Communication Systems, pp. 380.

Prytz, G. (2007) "Network recovery time measurements of RSTP in an ethernet ring topology", IEEE

Conference on Emerging Technologies and Factory Automation, 2007. ETFA. pp. 1247.

Sakandar, B. & Barnes, D. (2005), Cisco LAN Switching Fundamentals, Cisco Press, Indianapolis.

Seifert, W.M. (1988) "Bridges and routers", Network, IEEE, vol. 2, no. 1, pp. 57-64.

Sfeir, E., Pasqualini, S., Schwabe, T. & Iselt, A. (2005) "Performance evaluation of ethernet resilience

mechanisms", Workshop on High Performance Switching and Routing. HPSR, pp. 356.

Shoch, J.F. & Hupp, J.A. (1980) "Measured performance of an Ethernet local network",

Communications of the ACM, vol. 23, no. 12, pp. 711-721.

Steinke, S. (March 1998). “Interconnections: Bridges and Routers”. Network Magazine.

Page 53: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

53

6.2 Bibliography

Abuguba, S., Moldován, I. & Lukovszki, C. (2006) "Verification of RSTP convergence and

scalability by measurements and simulations", Proceedings BroadBand Europe 2006 .

CISCO, (2005) “Spanning Tree Protocol Problems and Related Design Considerations” [online],

Available at: http://www.cisco.com/warp/customer/473/16.html, Document ID: 10566,

[accessed on 21/10/2010]

Chiruvolu, G., Ge, A., Elie-Dit-Cosaque, D., Ali, M. & Rouyer, J. (2004) "Issues and approaches on

extending Ethernet beyond LANs", IEEE Communications Magazine, vol. 42, no. 3, pp. 80-86.

Forouzan, B.A., (2007) Data Communications and Networking, 4th edn, McGraw-Hill, Boston.

Wang, G., Liu, J., Wu, L. & Yao, H. (2009) "Three-Rings Redundancy Industrial Ethernet Based on

RSTP", 2009 International Conference on Signal Processing Systems , pp. 228.

IEEE 802.1D-2004, IEEE Standard for Local and Metropolitan Area Networks Media Access

Control (MAC) Bridges.

IEEE 802.1Q-2003, IEEE Standards for Local and Metropolitan Area Networks. Virtual Bridged

Local Area Networks.

Mahajan, U., Mellacheruvu, R. & Jain, P. (2009), Value-added features for the spanning tree protocol.

Thacker, C. (1986) "Personal distributed computing: the Alto and Ethernet hardware", Proceedings of

the ACM Conference on The history of personal workstationsACM, , pp. 87.

Thacker, C.P., McCreight, E.M., Lampson, B.W., Sproull, R.F. & Boggs, D.R., (1979) Alto: A

personal computer, Xerox, Palo Alto Research Center,.

Wojdak, W. (2003) "Rapid Spanning Tree Protocol: A new solution from an old technology",

Performance Technologies, March 2003.

Zeng, A., Hu, Y. & Di, Z. 2009, "Optimal tree for both synchronizability and converging time",

Europhysics Letters, EPL, vol. 87, , pp. 48002.

Perlman, R. (1992) Interconnections: Bridges and Routers, Addison-Wesley, Wokingham.

Page 54: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

54

6.3 Results (Charts)

6.3.1 Group 1 Results

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D7 - Dest 3 - Traffic received (bps)

see CD \GRP1_D7.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D6 - Dest 3 - Traffic received (bps)

see CD \GRP1_D6.xls

Page 55: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

55

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D5 - Dest 3 - Traffic received (bps)

see CD \GRP1_D5.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D4 - Dest 3 - Traffic received (bps)

see CD \GRP1_D4.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D3 - Dest 3 - Traffic received (bps)

see CD \GRP1_D3.xls

Page 56: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

56

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D2 - Dest 3 - Traffic received (bps)

see CD \GRP1_D2.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D1 - Dest 3 - Traffic received (bps)

see CD \GRP1_D1.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 1 - D0 - Dest 3 - Traffic received (bps)

see CD \GRP1_D0.xls

Page 57: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

57

6.3.2 Group 2 Results

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2 - D7 - Dest 3 - Traffic received (bps)

see CD \GRP2_D7.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2 - D6 - Dest 3 - Traffic received (bps)

see CD \GRP2_D6.xls

Page 58: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

58

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2- D5 - Dest 3 - Traffic received (bps)

see CD \GRP2_D5.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2 - D4 - Dest 3 - Traffic received (bps)

see CD \GRP2_D4.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2- D3 - Dest 3 - Traffic received (bps)

see CD \GRP2_D3.xls

Page 59: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

59

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2 - D2 - Dest 3 - Traffic received (bps)

see CD \GRP2_D2.xls

0

50000

100000

150000

200000

250000

300000

350000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2 - D1 - Dest 3 - Traffic received (bps)

see CD \GRP2_D1.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Group 2 - D0 - Dest 3 - Traffic received (bps)

see CD \GRP2_D0.xls

Page 60: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

60

6.3.3 Group 3 Results

0

50000

100000

150000

200000

250000

300000

350000

400000 1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

seco

nd

s)

Time (seconds)

Grp 3 - D7 - Dest 3 - Traffic received (bps)

see CD \GRP3_D7.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D6 - Dest 3 - Traffic received (bps)

see CD \GRP3_D6.xls

Page 61: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

61

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D5 - Dest 3 - Traffic received (bps)

see CD \GRP3_D5.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D4 - Dest 3 - Traffic received (bps)

see CD \GRP3_D4.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D3 - Dest 3 - Traffic received (bps)

see CD \GRP3_D3.xls

Page 62: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

62

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D2 - Dest 3 - Traffic received (bps)

see CD \GRP3_D2.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D1 - Dest 3 - Traffic received (bps)

see CD \GRP3_D1.xls

0

20000000

40000000

60000000

80000000

100000000

120000000

1 31 61 91 121 151 181 211 241 271 301 331 361 391 421 451 481

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 3 - D0 - Dest 3 - Traffic received (bps)

see CD \GRP3_D0.xls

Page 63: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

63

6.3.4 Group 4 Results

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D7 - Dest 3 - Traffic received (bps)

see CD \GRP4_D7.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D6 - Dest 3 - Traffic received (bps)

see CD \GRP4_D6.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D5 - Dest 3 - Traffic received (bps)

see CD \GRP4_D5.xls

Page 64: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

64

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D4 - Dest 3 - Traffic received (bps)

see CD \GRP4_D4.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D3 - Dest 3 - Traffic received (bps)

see CD \GRP4_D3.xls

0

50000

100000

150000

200000

250000

300000

350000

400000

1

21

41

61

81

10

1

12

1

14

1

16

1

18

1

20

1

22

1

24

1

26

1

28

1

30

1

32

1

34

1

36

1

38

1

40

1

42

1

44

1

46

1

48

1

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D2 - Dest 3 - Traffic received (bps)

see CD \GRP4_D2.xls

Page 65: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

65

0

20000000

40000000

60000000

80000000

100000000

120000000

1 31 61 91 121 151 181 211 241 271 301 331 361 391 421 451 481

Traf

fic

rece

ive

d (

bit

s)

Time (seconds)

Grp 4 - D1 - Dest 3 - Traffic received (bps)

see CD \GRP4_D1.xls

Page 66: An Investigation into Spanning Tree Protocol (802.1D) timers and convergence performance

66

6.3.5 CD Index

The excel files for the raw data for all charts in Sections 6.31-4 can be found in the root

folder of the CD named “Results – Raw Data” these files are indexed below:

Group 1 - Scenario D7 Results

GRP1_D7.xls

Group 1 - Scenario D6 Results

GRP1_D6.xls

Group 1 - Scenario D5 Results

GRP1_D5.xls

Group 1 - Scenario D4 Results

GRP1_D4.xls

Group 1 - Scenario D3 Results

GRP1_D3.xls

Group 1 - Scenario D2 Results

GRP1_D2.xls

Group 1 - Scenario D1 Results

GRP1_D1.xls

Group 1 - Scenario D0 Results

GRP1_D0.xls

Group 2 - Scenario D7 Results

GRP2_D7.xls

Group 2 - Scenario D6 Results

GRP2_D6.xls

Group 2 - Scenario D5 Results

GRP2_D5.xls

Group 2 - Scenario D4 Results

GRP2_D4.xls

Group 2 - Scenario D3 Results

GRP2_D3.xls

Group 2 - Scenario D2 Results

GRP2_D2.xls

Group 2 - Scenario D1 Results

GRP2_D1.xls

Group 2 - Scenario D0 Results

GRP2_D0.xls

Group 3 - Scenario D7 Results

GRP3_D7.xls

Group 3 - Scenario D6 Results

GRP3_D6.xls

Group 3 - Scenario D5 Results

GRP3_D5.xls

Group 3 - Scenario D4 Results

GRP3_D4.xls

Group 3 - Scenario D3 Results

GRP3_D3.xls

Group 3 - Scenario D2 Results

GRP3_D2.xls

Group 3 - Scenario D1 Results

GRP3_D1.xls

Group 3 - Scenario D0 Results

GRP3_D0.xls

Group 4 - Scenario D7 Results

GRP4_D7.xls

Group 4 - Scenario D6 Results

GRP4_D6.xls

Group 4 - Scenario D5 Results

GRP4_D5.xls

Group 4 - Scenario D4 Results

GRP4_D4.xls

Group 4 - Scenario D3 Results

GRP4_D3.xls

Group 4 - Scenario D2 Results

GRP4_D2.xls

Group 4 - Scenario D1 Results

GRP4_D1.xls