3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

Size: px
Start display at page:

Download "3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)"

Transcription

1 3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist between two or more systems, which decreases the network efficiency. The existence of two or more parallel paths closes a propagation loop for the MAC frames. Issues related to the unwanted blocking of "unicast" flooding frames, and the avalanche growth of broadcast frames (a phenomenon called "broadcast storm") are determined by the existence of propagation loops. The function of the STP (Spanning Tree Protocol IEEE 802.1D) is precisely the logic level (data link layer) interruption of the propagation loops, without eliminating the physical layer redundancy. Moreover, physical redundancy is required in most telecommunications networks, but the Ethernet propagation should be only one path at a time. The solution adopted in IEEE 802.1D is to find a so called "spanning tree" using a distributed algorithm that works only in active nodes and in the data link layer (switches). Each switch has a unique STP identifier formed by a most significant proportion that can be set up by the network administrator and a least significant part, i.e., the MAC address of the switch, to ensure uniqueness of the identifier. The switch with the lowest ID is elected as the root node of the tree (Root Bridge). ST algorithm is then used (in the data link layer) to obtain the tree with the optimal paths from each network node to root node. The selection of the optimal route is based on a criterion of cost. Thus, each switch chooses a single optimum port on the way to the root (Root Port), which has the minimum cost among all its active ports (in state Designated Port). The exception to this rule is the root switch, which does not need a Root Port and has all the ports in the state Designated Port. As a rule, a loop is always interrupted by two secondary switches (not Root Bridge), where each has at least two paths to the root and which are connected to each other through a direct link. First, one of these two switches is chosen as Designated Bridge that will be placed on the ST hierarchy closer to the root than the other switch. Thus, the selection of the optimal path to the root and the actual interruption of the loop by closing the ports will be made by the switch that was not elected Designated Bridge. The loop interruption will be achieved by interrupting the link between the two secondary switches by blocking the port that belongs to the switch that was not elected as Designated Bridge. Therefore, the switch port belonging to Designated Bridge remains open ( in the state Designated Port or " forwarding") and the port belonging to the other secondary switch is locked (state Non- Designated Port or Alternate Port). The distributed STP mode is implemented by sending from each switch at regular intervals, Bridge Protocol Data Unit (BPDU) packets to neighboring nodes, which contain the following information:

2 What is the root node, specified by its identifier, Root ID; Optimal path cost to the current root switch (minimum cost), Root Path Cost (RPC); Switch ID of the switch that has issued the BPDU, Bridge ID; The identifier of the port issuing the BPDU, Port ID; Values of timers used to control convergence. BPDU packets are transmitted inside the MAC frames, using a single multicast destination address. In the first step of the ST algorithm, each switch will transmit a BPDU specifying Root Bridge ID with the same value as its own Bridge ID. Therefore, the initialization state of each switch considers it as the root of the tree. Therefore, the cost it announces for the optimal connection to the root is zero. Upon receiving such a packet, a switch compares the information packet received values with the values already in its memory to determine the role it will have in the STP topology. Upon receiving a BPDU from a neighboring switch, each switch first checks the relationship between its Root Bridge ID and the value announced by the neighbor. If the root identifier is better than the previously saved value, it starts the calculation of the cost of the new path to the root, by adding to the cost reported by the neighbor, the cost of the local port that the BPDU was received by. If the root path cost already known by the switch is greater than the sum between the cost from the received BPDU and the cost of the receiving port, then the switch adjusts its minimum cost to root properly and assumes that the shortest path to the root is by the port where the BPDU packet has just been received. As discussed above, it is considered that the STP tree is stable (at convergence) when a root switch (specified by Root ID) was elected and each switch has chosen a Root Port (RP), Designated Bridge and one or more multiple Designated Ports (DP). Usually, the decision of a port blocking is taken when the port cost of the path to the root is greater than the cost of any different available path. However, there are situations when you can not only take the decision by means of the cost. Thus, it is possible from a particular switch, in terms of the cost, to have two paths of equal costs to the root. In such situations, the path which includes a non-root switch root having the minimum Bridge ID is always chosen. Sometimes, a switch is connected through multiple ports on the same LAN. If there are situations where the costs are identical, the port with the lower identifier (port ID, PID) is chosen, because the Bridge ID of the first switch to the root has the same value. For this reason, the BPDU packets contain also the emitter switch identifier and the emitting port identifier. Therefore, the decision is taken using the three criteria in order until one of them is satisfied: cost path, Bridge ID, and transmitter Port ID. Port Identifier is useful where a loop is formed between two neighboring switches (the smallest loop possible). When a port is blocked it does not redirect frames of information for users, but still sends and receives BPDU frames. Thus, although the port is not active for data traffic, the switch monitors the STP parameters for the paths determined on this port. Therefore, if the optimal path to the root is interrupted (the one that led to blocking this port), it is required to reactivate the port, as it offers a new optimum path. When the topology changes due to the change status of a port or a link, the root switch sends over the entire tree a message announcing the change of the topology. This procedure allows the

3 adjustment of the information about the best paths already stored in the other swithches in the network. Thus, it recalculates the costs and checks the STP parameters only for the newly announced routes. If the switches allow the formation of virtual LANs (VLAN), then it can work separately one instance of STP for each VLAN protocol. Thus, for each VLAN a root will be selected and carried out in parallel and independently all STP operations. If using one protocol instance for each VLAN, the protocol is called PVST (Per VLAN STP) STP Parameters Since Bridge ID value determines the position switch STP hierarchy identifier must meet two conditions: - Uniqueness - there are two switches that can not occupy the same position in the tree; - Scalability - sometimes the shaft position can be set manually by the administrator and therefore, it must be able to change the value of Bridge ID. At first it seems that the two conditions are mutually exclusive, since uniqueness implies often a static allocation of address values. However, if the STP problem is solved by dividing into two to cuvânului representation Bridge ID value. The most significant bits of the bridge ID ( first 2 bytes ) is the priority field that can be modified by the administrator. In the default (no administrator intervention ) the priority field is set to the value ( 8000H ), which is the decimal value in the mid- range of possible to represent two bytes. The least significant bits ( last 6 bytes ) are represented by the switch MAC address ( unique for each VLAN ). The unique Bridge ID is provided by the MAC address of the least significant because MAC addresses are unique (IEEE ), and scalability is ensured by the head of priority. Without administrator intervention all switches have equal priority and root decision will be based only on the MAC address of the bridge ID (lowest MAC address will cause the Root Bridge). The administrator can set a priority mechanism in the formation of STP topology by providing values for Bridge ID as the default. States one can find a port to the data link layer, a switch that is on the court STP are: - Block ( Blocking, non - Designated Port ) - A port in this state can not redirect the teaching of information for users; however, the port receives BPDU packets seeks to identify the root switch ; - Listening ( Listening ) - a listening port to an alarm only after STP algorithm to determine the optimal tree from the received BPDU packets. At this point, the port can send and receive BPDU packets. If the port forward BPDU packets means that it is preparing to participate in the STP active topology switches and inform neighbors about this. The default time that a port is in listening state (forward delay) is 15 s; - Learning (Learning ) - port in this state prepares to become active traffic information ( to pass the state redirects) by learning MAC addresses. The default time that a port is in learning state (forward delay) is all of 15 s; - Redirection ( Forwarding ) - the port part of the active STP topology, redirects frames of information and transmits / receives BPDU packets ;

4 - Sleep ( Disabled ) - not part of the active STP topology, thus no redirects frames of information and does not transmit / receive BPDU packets. Meters are used to update information for STP tree. The time counters are used to determine how long a port should switch from one state to another. Also, STP uses timers to determine the availability of the STP tree formation neighboring switches and the maximum storage address MAC address tables ( dynamically learned ). Meanings associated values for these counters are: - Hello time - the interval between the emission of two successive BPDU packets. The default is 2 seconds; - Maximum Age Time - the interval of time that must be a switch (receiver of this BPDU ) blocking state before moving into the state of obedience. The default is 20 seconds; - Forward delay - the interval of time that must be a switch (receiver of this BPDU ) listening state before moving to the state of learning and learning state before forwarding to an alarm. The default is 15 seconds The default values of the these counters are suitable for a wide range of configurations and operating scenarios. However, these values can be modified to determine the optimal operation in a particular case. On the other hand, improper setting of the values of these time values may lead to the network instability. The cost of use of the ST is determined in each switch, calculated independently for the two ends of a connection and depend only on the maximum flow rate of the port. Since the decision is based on the minimum cost of a port is in a relationship and linear reverse flow to port (in Mb / s). Table 3.1 presents the correlation between flow port and STP cost for two protocol variants. D(Mb/s) Cost (IEEE, new version) Cost (IEEE, old version) Tab The relationship between the datarate of a port and its STP cost Example of a STP topology Further, it will be considered a network configuration LAN - Ethernet extended. This wide area network is depicted in Figure 2 and consists of four network LAN star topology with the following components of the interconnection: LAN 1 - switch SW BASE T ports (Fast Ethernet); LAN 2 - switch SW 2 to port 1000 BASE T (Gigabit Ethernet); LAN 3 - switch SW 3 10 BASE T ports (Ethernet);

5 LAN 4 - multiport repeater ports HUB 1000 BASE T (Gigabit Ethernet). These LANs are composed of work stations, servers and other types of terminals as shown in Fig In this configuration, we used the notation "i / j" to identify the switch port j of i. Fig Example of an extended LAN Ethernet, with a loop. Expanded LAN network in Fig. 3.1 there is a closed loop direct links of the 3 switches and HUB. Thus, if a certain PC station A, the LAN 1 emits a frame whose destination station LAN4 PC -C, there are two possible ways of transmission : the first way consists of the sequence of nodes SW1 - SW3 - HUB and the second way consists of SW1 - SW2 - HUB. In view of the fact that the hub does not take part in the formation of STP tree, because it works at the data link layer, when made according to the above notation for the next pair of ports parallel paths resulting from the PC - A to PC - C : 1 / 4-3 / 1-3 / 5 1/5-2/1-2/2. Suppose that switches identifiers ( Bridge ID ) have values in the same order relation as the numbers of switches, BIDSW1 < BIDSW2 < BIDSW3. Costs links between switches are listed in red in Fig. 3.1, the values associated with the maximum flow on each port according to Table 3.1. To simplify the analysis, we assume that the costs involved, and the administrator has not modified any port priorities. Therefore, each switch port

6 identified with a small has a higher priority. We also assume that all three switches have already enabled STP protocol instance. At startup, each switch learns station addresses active on its ports. It will be assumed that all terminals connected to nodes are active. In the example in Fig. 3.1 SW1 root node is selected because it has the minimum ID Bridge. All ports are active switch SW1 in the state Designated Port (Forwarding). The other two switches to root lodging costs will be calculated SW1 and one of them will disable a port to interrupt the loop. Fig The tree (STP) for the network in Fig Along with these calculations is appointed from each of the following switches : Root Port (one for switches SW2 and SW3 ), Designated Port (one for each common bond ) and Nondesignated ( Blocking ) Port (one for each common link here celătalt port on the Connectors 2 /2-3/5 ). Thus, SW2 port 2/1 is the cost Root Port 4 to port 1/5, and the SW3 port 3/1 Root Port is the port cost 100 1/4. In segment 2 /2-3/5 switch SW2 choose Designated Bridge because it has a lower identifier than switch SW3, at the other end of the link. The port 2/2 transitions to state Designated Port, and the decision will lock the switch SW3. Because port 2/2 remains open, the path cost to the root determined port 3/5 is 104. Way switch SW3 SW1 finds two paths to the root, one to port 3/5 via SW2 cost 104 and the other from port 3/1 directly to the root, cost 100. as they choose the path of least cost, port 3/5 is blocked (becomes Nondesignated Port ) and thus end STP tree shown in Fig Further, suppose that the administrator changes the port cost of 3/1 to SW3 104 value. Thus the lock switch SW3 decision may not be based on cost paths to the root because they have equal costs. According to the ST algorithm, where the costs are equal, the decision will be based on the minimum value corresponding ID switches emitting Bridge BPDU. In the case of the network of Fig. 8.1 SW3 seen two ways to root the same cost 104, and the best way to root SW1 is direct from port 3/1 because the path from port 3/5 is achieved via SW2 which has a Bridge ID higher than that of SW1. Thus, as in

7 the previous case, port 3/5 is locked (Port is Nondesignated) and the shaft end STP is the same (see Fig. 3.2), with the observation made on costs. To illustrate another possibility of Ports closure decision we will consider the following changes are made to the network in Fig. 3.1: cost of port 3/1 is changed to the value 105 and port 1/6 of SW1 connects directly to port 2/6 of SW2, both being used in Fig So close a new loop is formed by links 1/5-2/1 to 2/6-1/6. Configuration at after these two changes is illustrated in Fig Fig Example of an extended LAN with two loops. Loops formed by parallel connection of equal cost between two switches can be interrupted only by port identifiers as and Bridge ID transmitter is the same. In the case of the example in Fig. 3.3, the switch SW2 can see two ways to root SW1, both cost 4 with the same bridge ID for the switch emitter (here even root SW1) and therefore the only way to choose a Root Port SW2 is based at Port minimum ID SW1 emitting ports: ports fifth and sixth. Considering that Port ID identifiers have the same priority, then the port will be closed is 2/6, because the other end has a port ID (1/6) higher than the other link. In parallel, large loop is interrupted by closing port 3/1 due to the high cost (value 105). In this case, the final STP tree shown in Fig. 3.4.

8 Fig The tree (STP) for the network in Fig. 3.3.

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee Lecture (06) STP (I) By: Dr. Ahmed ElShafee CS IT Problem statement If your network consists of layer 2 switches that allow computers connect and exchange data, you will need to consider the design that

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Configuring Spanning Tree

Configuring Spanning Tree CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast

More information

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38 Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Redundancy in a converged network Spanning-Tree Protocol (STP) STP Operation

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Objectives. 1. Introduction:

Objectives. 1. Introduction: University of Jordan Faculty of Engineering & Technology Computer Engineering Department Advance Networks Laboratory 0907529 Exp.5 Spanning-Tree Protocol (STP) Objectives 1. Explain the role of redundancy

More information

Table of Contents 1 MSTP Configuration 1-1

Table of Contents 1 MSTP Configuration 1-1 Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction

More information

Spanning Tree Protocol

Spanning Tree Protocol For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1

More information

EIGRP Features and Operation

EIGRP Features and Operation EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as

More information

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 34, 2014/02/17 14:41:48) Monday, February 17, 2014 Bridge loops Two bridges

More information

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 18.4, 2018/11/16 13:23:04) Friday, November 16, 2018 Bridge loops Two bridges

More information

Spanning Tree Configuration

Spanning Tree Configuration Using the Console Interface Spanning Tree Configuration The Spanning Tree Configuration Menu screen (Figure 3-29) allows you to view spanning tree parameters and configure individual switch ports to participate

More information

Configuring STP and Prestandard IEEE 802.1s MST

Configuring STP and Prestandard IEEE 802.1s MST 20 CHAPTER This chapter describes how to configure the Spanning Tree Protocol (STP) and prestandard IEEE 802.1s Multiple Spanning Tree (MST) protocol on Catalyst 6500 series switches. Note The IEEE 802.1s

More information

4 Spanning Tree Protokoll 802.1D-2004

4 Spanning Tree Protokoll 802.1D-2004 Computernetze 1 (CN1) 4 Spanning Tree Protokoll 82.1D-24 Prof. Dr. Andreas Steffen Institute for Information Technologies and Applications Steffen/Stettler, 6.1.213, 4-SpanningTree.pptx 1 What happens

More information

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5

Implement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5 Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of redundancy in a converged

More information

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 44, 2015/02/18 12:55:30) Thursday, February 19, 2015 Bridge loops Two bridges

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Agenda» What Problem is Solved by STP?» Understanding STP Root Bridge Election» BPDU Details and Pathcost» Understanding STP Root and Designated Port Election» Understanding and

More information

Chapter 5: STP. * What is STP? How does STP work?

Chapter 5: STP. * What is STP? How does STP work? Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between

More information

Implement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008

Implement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 Implement Spanning Tree Protocols-PART-I LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you

More information

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking Maintaining Specific VLAN Identification Specifically developed for multi-vlan interswitch communications Places a unique identifier in each frame Functions at Layer 2 2003, Cisco Systems, Inc. All rights

More information

Implementing Spanning Tree Protocol

Implementing Spanning Tree Protocol Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.

More information

Understanding and Configuring STP

Understanding and Configuring STP CHAPTER 14 This chapter describes how to configure the Spanning Tree Protocol (STP) on a Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes

More information

RSTP Configuration. RSTP Configuration

RSTP Configuration. RSTP Configuration RSTP Configuration Contents 16. STP Configuration...1 1.1 STP Overview...1 1.1.1 Function of STP... 1 1.1.2 Protocol Packets of STP... 1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree Interface States...

More information

Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration?

Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? Volume: 629 Questions Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? A. Root switch B. Slave switch C. Non-root switch

More information

STP (Spanning Tree Protocol) - Step by Step Configuration Tutorial

STP (Spanning Tree Protocol) - Step by Step Configuration Tutorial STP (Spanning Tree Protocol) - Step by Step Configuration Tutorial Introduction: Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on switches. It was first introduced as CST (Common Spanning

More information

Chapter 5. Spanning Tree Protocol (STP) Part I

Chapter 5. Spanning Tree Protocol (STP) Part I Chapter 5 Spanning Tree Protocol (STP) Part I CCNA3-1 Chapter 5-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

RSTP Configuration. Page 1 of 26

RSTP Configuration. Page 1 of 26 RSTP Configuration Page 1 of 26 Content Chapter 1 STP Configuration... 1 1.1 STP Overview... 1 1.1.1 Function of STP...1 1.1.2 Protocol Packets of STP...1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree

More information

Table of Contents Chapter 1 MSTP Configuration

Table of Contents Chapter 1 MSTP Configuration Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation

More information

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers

More information

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard. CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on

More information

Introduction to OSPF

Introduction to OSPF Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license

More information

MSTP Technology White Paper

MSTP Technology White Paper MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Chapter 4 Configuring Switching

Chapter 4 Configuring Switching Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under

More information

CIS 83 Lab Assignment

CIS 83 Lab Assignment CIS 83 Lab Assignment Open the Packet Tracer Scenario STP Configuration Lab-1.pkt. Before proceeding, save as STP Configuration Lab-1-working.pkt. To demonstrate completion of the lab you will be asked

More information

Transparent Bridging and VLAN

Transparent Bridging and VLAN Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.

More information

Layer 2 Engineering Spanning Tree

Layer 2 Engineering Spanning Tree Layer 2 Engineering Spanning Tree Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Lab 6 Spanning Tree Protocol

Lab 6 Spanning Tree Protocol RES 84 Claude Chaudet Claude.Chaudettelecom-paristech.fr Lab 6 Spanning Tree Protocol RES 84 October 23 Introduction In this lab, you will discover the Spanning Tree Protocol, which is specified in the

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol

More information

Configuring Optional Spanning-Tree Features

Configuring Optional Spanning-Tree Features CHAPTER 20 This chapter describes how to configure optional spanning-tree features on the Catalyst 3750-E or 3560-E switch. You can configure all of these features when your switch is running the per-vlan

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters

More information

Spanning Trees and IEEE 802.3ah EPONs

Spanning Trees and IEEE 802.3ah EPONs Rev. 1 Norman Finn, Cisco Systems 1.0 Introduction The purpose of this document is to explain the issues that arise when IEEE 802.1 bridges, running the Spanning Tree Protocol, are connected to an IEEE

More information

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay 6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may

More information

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more

More information

Data Communications. Connecting Devices

Data Communications. Connecting Devices Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use

More information

Troubleshooting Transparent Bridging Environments

Troubleshooting Transparent Bridging Environments CHAPTER Troubleshooting Transparent Bridging Environments Transparent bridges were first developed at Digital Equipment Corporation (Digital) in the early 1980s and are now very popular in Ethernet/IEEE

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Principles Broadcast

More information

PrepKing. PrepKing

PrepKing. PrepKing PrepKing Number: 350-001 Passing Score: 800 Time Limit: 180 min File Version: 9.3 http://www.gratisexam.com/ PrepKing 350-001 Sections 1. Section 1.00 - Implement Layer 2 2. Section 2.00 - Implement IPv4

More information

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)

802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) 13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................

More information

MSTP Configuration. Page 1 of 24

MSTP Configuration. Page 1 of 24 MSTP Configuration Page 1 of 24 Contents Chapter1 Configuring MSTP... 3 1.1 Brief Introduction to MSTP...3 1.2 BPDU...3 1.2.1 Basic Concepts in MSTP... 4 1.2.2 Roles of Ports... 6 1.3 Algorithm Implementation...9

More information

Understanding Issues Related to Inter VLAN Bridging

Understanding Issues Related to Inter VLAN Bridging Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical

More information

Managing Network Spanning Trees

Managing Network Spanning Trees CHAPTER 8 This chapter describes, the IEEE 802.1d Spanning Tree Protocol (STP), and how to use and configure Cisco s proprietary spanning-tree protocols, Per VLAN Spanning Tree (PVST), Multiple Spanning

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end

More information

MSTP Configuration. Configuration

MSTP Configuration. Configuration MSTP Configuration Contents 1. Configuring MSTP...2 1.1 Brief Introduction to MSTP... 2 1.2 BPDU... 2 1.2.1 Basic Concepts in MSTP...2 1.2.2 Roles of Ports...4 1.3 Algorithm Implementation... 7 1.3.1 MSTP

More information

isco Understanding Spanning Tree Protocol Topology Chan

isco Understanding Spanning Tree Protocol Topology Chan isco Understanding Spanning Tree Protocol Topology Chan Table of Contents Understanding Spanning Tree Protocol Topology Changes...1 Interactive: This document offers customized analysis of your Cisco device...1

More information

Layer 2/3 Configuration Guide, Cisco IOS XE Release 3.6E (Catalyst 3850 Switches)

Layer 2/3 Configuration Guide, Cisco IOS XE Release 3.6E (Catalyst 3850 Switches) Layer 2/3 Configuration Guide, Cisco IOS XE Release 3.6E (Catalyst 3850 Switches) First Published: June 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information

More information

Cisco Exam Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ]

Cisco Exam Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ] s@lm@n Cisco Exam 200-101 Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ] Topic break down Topic No. of Questions Topic 1: LAN Switching Technologies 18 Topic 2:

More information

Improving network convergence with Multiple Spanning Tree Protocol

Improving network convergence with Multiple Spanning Tree Protocol CEAI, Vol.15, No.1 pp. 79-87, 2013 Printed in Romania Improving network convergence with Multiple Spanning Tree Protocol Roxana Stănică SC Civitas Systems S.R.L., Craiova, Romania (e-mail: roxana_batm@yahoo.com)

More information

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2

Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating

More information

Figure 7-1 Unicast Static FDB window

Figure 7-1 Unicast Static FDB window 7. Layer 2 Features FDB VLAN Spanning Tree Loopback Detection Link Aggregation L2 Multicast Control LLDP FDB Static FDB Unicast Static FDB This window is used to view and configure the static unicast forwarding

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined

More information

Agenda. Spanning-Tree Protocol. Spanning Tree Protocol (STP) Introduction Details Convergence Some more details

Agenda. Spanning-Tree Protocol. Spanning Tree Protocol (STP) Introduction Details Convergence Some more details Agenda Spanning-Tree Protocol Spanning Tree Protocol (STP) Introduction Details Convergence Some more details Rapid Spanning Tree Protocol (RSTP) Cisco PVST, PVST+ Multiple Spanning Tree Protocol (MSTP)

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Catalyst Switch Operations. 2000, Cisco Systems, Inc. 6-1

Catalyst Switch Operations. 2000, Cisco Systems, Inc. 6-1 Catalyst Switch Operations 2000, Cisco Systems, Inc. 6-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Describe Layer 2 switching (bridging) operations Describe

More information

Bridging Transmitting Non-IP Traffic or Merging Two Networks

Bridging Transmitting Non-IP Traffic or Merging Two Networks 10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................

More information

Configuring MST Using Cisco NX-OS

Configuring MST Using Cisco NX-OS This chapter describes how to configure Multiple Spanning Tree (MST) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About MST, page

More information

Configuring MSTP CHAPTER

Configuring MSTP CHAPTER CHAPTER 16 Configuring MSTP This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the Catalyst 2960 switch. Note The multiple spanning-tree (MST) implementation

More information

VLAN Configuration. Understanding VLANs CHAPTER

VLAN Configuration. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Spanning Tree Protocol (IEEE 802.1D 1998), Rapid STP (IEEE 802.1D 2004), Cisco PVST+, MSTP Page 07-1 Agenda Spanning Tree Protocol (STP) Introduction Details Convergence Some more

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER 7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN

More information

Configuring Flex Links

Configuring Flex Links CHAPTER 18 This chapter describes how to configure Flex Links in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master

More information

Communication Redundancy User s Manual

Communication Redundancy User s Manual User s Manual Fifth Edition, June 2015 www.moxa.com/product 2015 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN

More information

CCNA Layer 2 switching. Revision no.: PPT/2K605/03

CCNA Layer 2 switching. Revision no.: PPT/2K605/03 CCNA 640-801 Layer 2 switching Revision no.: PPT/2K605/03 What is Switching? It breaks the Collision Domain It takes the packet and forwards to destined port without any modification. Network still remains

More information

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C

More information

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda Why Packet Switching on LN? Packet Switching on L2 (LN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing LN was primarily designed for shared media

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Interconnection Layer 2: bridges and VLANs Prof. Andrzej uda duda@imag.fr http://duda.imag.fr 1 Contents Transparent bridges Spanning Tree Protocol (STP) Rapid Spanning Tree

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets? Nguyen The Nhat - Take Exam Exam questions Time remaining: 00: 00: 51 1. Which command will give the user TECH privileged-mode access after authentication with the server? username name privilege level

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Characterization of the Spanning Tree Protocol

Characterization of the Spanning Tree Protocol Characterization of the Spanning Tree Protocol Eduard Bonada Master thesis submitted in partial fulfillment of the requirements for the degree: Master Program in Information, Communication and Audiovisual

More information

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54

Index. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54 Index Numerics 802.1p priority (QoS) 802.1Q VLAN standard 5-7 802.1w as a region 5-54 A active path 5-5 address IP 7-8 advertisement 3-3 applicable products 1-ii ARP age setting 7-10 cache 7-4 cache table

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

Configuring Interfaces and Circuits

Configuring Interfaces and Circuits CHAPTER 5 This chapter describes how to configure the CSS interfaces and circuits and how to bridge interfaces to Virtual LANs (VLANs). Information in this chapter applies to all CSS models, except where

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

material. For more information on how to get additional questions, please see

material. For more information on how to get additional questions, please see Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn a. You

More information

Exam Questions

Exam Questions Exam Questions 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) https://www.2passeasy.com/dumps/200-105/ 1.At which layer of the OSI model is RSTP used to prevent loops? A. physical

More information