Skip to main content

Device Link Detection Protocol (DLDP)


DLDP Introduction

Sometimes, unidirectional links may appear in networks. On a unidirectional link, one end can receive packets from the other end but the other end cannot. Unidirectional links result in problems such as loops in an STP-enabled network.
As for fiber links, two kinds of unidirectional links exist. One occurs when fibers are cross-connected, as shown in Figure 1-2. The other occurs when one end of a fiber is not connected or one fiber of a fiber pair gets disconnected, as illustrated by the hollow arrows in Figure 1-2.
Figure 1-1 Unidirectional fiber link: cross-connected fiber

Figure 1-2 Unidirectional fiber link: fiber not connected or disconnected

Device Link Detection Protocol (DLDP) can detect the link status of a fiber cable or twisted pair. On detecting a unidirectional link, DLDP can shut down the related port automatically or prompt users to take measures as configured to avoid network problems.

Configuring DLDP

Network Diagram


Networking and Configuration Requirements

l          Device A and Device B are connected through two fiber pairs, in which two fibers are cross-connected, as shown in Figure 1-3.

Configuration Example

l          Device A
#
 dldp enable
 dldp interval 6
 dldp work-mode enhance
 dldp delaydown-timer 2
#
interface GigabitEthernet1/0/50
 dldp enable
#
interface GigabitEthernet1/0/51
 dldp enable
l          Device B

Configuration Guidelines

1)        DLDP can detect unidirectional links only after all links are connected. Therefore, before enabling DLDP, make sure that optical fibers or copper twisted pairs are connected.
2)        DLDP takes effect only when it is enabled both globally and on a port.
3)        Set the interval for sending Advertisement packets to a value not longer than one-third of the STP convergence time. If the interval is too long, STP loops may occur before unidirectional links are torn down, and it takes a long time for the device to detect unidirectional links, thus causing more traffic forwarding errors; if the interval is too short, unnecessary Advertisement packets can be generated to consume bandwidth. Therefore, you are recommended to use the default value.
4)        To enable DLDP to operate properly, make sure the DLDP authentication modes and the passwords of the two sides of a link are the same.
5)        Destination MAC addresses of DLDP packets fall into two types: class A and class B, which is dependent on the software versions running on the device. To ensure that DLDP operates properly, interconnected devices must use destination MAC addresses of the same class. 

Comments

Popular posts from this blog

INSTALL CISCO VPN CLIENT ON WINDOWS 10 (32 & 64 BIT). FIX REASON 442

This article shows how correctly install Cisco VPN Client (32 & 64 bit) on Windows 10 (32 & 64 bit) using simple steps, overcome the ‘ This app can’t run on this PC ’ installation error , plus fix the Reason 442: Failed to enable Virtual Adapter error message . The article applies to New Windows 10 installations or Upgrades from earlier Windows versions and all versions before or after Windows 10 build 1511 .  To simplify the article, we’ve broken it into the following two sections: How to Install Cisco VPN client on Windows 10 (clean installation or upgrade from previous Windows), including Windows 10 build prior or after build 1511 . How to Fix Reason 442: Failed to enable Virtual Adapter on Windows 10 Figure 1. The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10 HOW TO INSTALL CISCO VPN CLIENT ON WINDOWS 10 (NEW INSTALLATIONS OR O/S UPGRADES) The instructions below are for new or clean Windows 10 inst...

Linux File and Directory Permissions

file & directory protection is a essential of any OS and Linux OS is no exception for it! These authorizations allow you to choose exactly who can access your files & directory, providing an overall improved system security. There was one of the major flaws in the older Windows operating-system where, by standard, all users can see each other people's information (Windows 95, 98, Me). For overcoming it, editions of the Windows based computer system such as NT, 2000, XP and 2003 lot more security features added. They fully support file & directory permissions, just as Linux system has since the beginning. Together, we'll now assess a directory listing from our Lab Linux system hosting server, to help us understand the information provided. a simple 'ls' command will give you the file and directory listing within a given directory, including the option  '-l' will display number of new areas that we are going to discuss here:

How to create a Hirens Boot CD 15.2 USB Disk

Hiren’s BootCD (HBCD) is a bootable CD that contains a set of tools that can help users to fix their computer if their system fails to boot. More specifically, HBCD contains hardware diagnostic programs, partition tools, data recovery utilities, antivirus tools and many other tools to fix your computer problems.  I write this article because I use Hiren’s BootCD frequently to troubleshoot computer problems, specially when a computer doesn’t boot anymore due to a virus attack or due to a corrupted file system. In this article you will find instructions on how to put Hiren’s BootCD on a USB flash drive (stick) in order to troubleshoot computer problems in the future.