Sunteți pe pagina 1din 10

Spanning Tree Protocol

The Spanning Tree Protocol (STP) is a network pro-


tocol that builds a logical loop-free topology for Ethernet
networks. The basic function of STP is to prevent bridge
loops and the broadcast radiation that results from them.
Spanning tree also allows a network design to include
spare (redundant) links to provide automatic backup
paths if an active link fails. This is done without the dan-
ger of bridge loops, or the need for manual enabling or
disabling of these backup links.
As the name suggests, STP creates a spanning tree within
a network of connected layer-2 bridges, and disables
those links that are not part of the spanning tree, leaving
a single active path between any two network nodes. STP
is based on an algorithm that was invented by Radia Perl-
man while she was working for Digital Equipment Cor-
poration.[1][2]
STP was originally standardized as IEEE 802.1D, but
the functionality, spanning tree, rapid spanning tree and
multiple spanning tree previously specied in 802.1D, 1. An example network. The numbered boxes represent bridges
(the number represents the bridge ID). The lettered clouds repre-
802.1w and 802.1s respectively has been incorporated
[3] sent network segments.
into IEEE 802.1Q-2014

1 Protocol operation

A local area network (LAN) can be depicted as a graph


whose nodes are bridges and LAN segments (or ca-
bles), and whose edges are the interfaces connecting
the bridges to the segments. To break loops in the
LAN while maintaining access to all LAN segments, the
bridges collectively compute a spanning tree.[lower-alpha 1]
The spanning tree that the bridges compute using the
Spanning Tree Protocol can be determined using the fol-
lowing rules. The example network at the right, below,
will be used to illustrate the rules.
Select a root bridge. The root bridge of the spanning
tree is the bridge with the smallest (lowest) bridge ID.
Each bridge has a congurable priority number and a
MAC address; the bridge ID is the concatenation of the 2. The smallest bridge ID is 3. Therefore, bridge 3 is the root
bridge priority and the MAC address (E.g., the ID of bridge.
a bridge with priority 32768 and mac 0200.0000.1111
is 32768.0200.0000.1111). The bridge priority default
is 32768 and can only be congured in multiples of est priority and lowest MAC address will be the root.
4096.[lower-alpha 2] When comparing two bridge IDs, the For example, if switches A (MAC=0200.0000.1111)
priority portions are compared rst and the MAC ad- and B (MAC=0200.0000.2222) both have a priority
dresses are compared only if the priorities are equal. The of 32768 then switch A will be selected as the root
switch with the lowest priority of all the switches will be bridge.[lower-alpha 3] If the network administrators would
the root; if there is a tie, then the switch with the low- like switch B to become the root bridge, they must set

1
2 1 PROTOCOL OPERATION

3. Assuming that the cost of traversing any network segment is 1, 5. This diagram illustrates all port states as computed by the
the least cost path from bridge 4 to the root bridge goes through spanning tree algorithm. Any active port that is not a root port or
network segment c. Therefore, the root port for bridge 4 is the a designated port is a blocked port.
one on network segment c.

6. After link failure the spanning tree algorithm computes and


4. The least cost path to the root from network segment e goes spans new least-cost tree.
through bridge 92. Therefore, the designated port for network
segment e is the port that connects bridge 92 to network segment
e.
the root is guaranteed by the following two rules.
Least cost path from each bridge. After the root bridge
its priority to be less than 32768.[lower-alpha 4] has been chosen, each bridge determines the cost of each
Determine the least cost paths to the root bridge. The possible path from itself to the root. The calculation is
computed spanning tree has the property that messages done by comparing the 'root path cost' of the BPDUs that
from any connected device to the root bridge traverse a each bridge gets on each of its ports. The root bridge
least cost path, i.e., a path from the device to the root that sends BPDUs with path cost equal to zero, and once a
has minimum cost among all paths from the device to the non-root bridge gets a BPDU it increments the path cost
root. The cost of traversing a path is the sum of the costs by adding the cost of the incoming link and propagates
of the segments on the path. Dierent technologies have it on the network. The port that gets the BPDU with
dierent default costs. An administrator can congure the smallest path cost (e.g., connecting the switch to the
the cost of traversing a particular network segment. The least-cost path) then becomes the root port (RP) of the
property that messages always traverse least-cost paths to bridge.[4]
1.1 Data rate and STP path cost 3

Least cost path from each network segment. The bridges case, a single bridge may have multiple candidates for its
on a network segment collectively determine which root port. In these cases, candidates for the root port have
bridge has the least-cost path from the network segment already received BPDUs oering equally-low (i.e. the
to the root. The port connecting this bridge to the network best) root path costs and equally-low (i.e. the best)
segment is then the designated port (DP) for the segment. bridge IDs, and the nal tie breaker goes to the port that
Disable all other root paths. Any active port that is not received[6]the lowest (i.e. the best) port priority ID, or
a root port or a designated port is a blocked port (BP). port ID.

Modications in case of ties. The above rules over- In summary, the sequence of events to determine the best
simplify the situation slightly, because it is possible that received BPDU (which is the best path to the root) is
there are ties, for example, the root bridge may have two
or more ports on the same LAN segment, two or more Lowest root bridge ID - Determines the root bridge
ports on a single bridge are attached to least-cost paths
to the root or two or more bridges on the same network Lowest cost to the root bridge - Favors the upstream
segment have equal least-cost paths to the root. To break switch with the least cost to root
such ties:
Lowest sender bridge ID - Serves as a tie breaker if
Breaking ties for root ports. When multiple paths from a multiple upstream switches have equal cost to root
bridge are least-cost paths, the chosen path uses the neigh-
bor bridge with the lower bridge ID. The root port is thus Lowest sender port ID - Serves as a tie breaker if
the one connecting to the bridge with the lowest bridge a switch has multiple (non-Etherchannel) links to a
ID. For example, in gure 3, if switch 4 was connected to single upstream switch, where:
network segment d instead of segment f, there would be
two paths of length 2 to the root, one path going through Bridge ID = priority (4 bits) + locally assigned
bridge 24 and the other through bridge 92. Because there system ID extension (12 bits) + ID [MAC ad-
are two least cost paths, the lower bridge ID (24) would dress] (48 bits); the default bridge priority is
be used as the tie-breaker in choosing which path to use. 32768, and
Breaking ties for designated ports. When the root bridge Port ID = priority (4 bits) + ID (Interface num-
has more than one port on a single LAN segment, the ber) (12 bits); the default port priority is 128.
bridge ID is eectively tied, as are all root path costs (all
equal zero). The designated port then becomes the port
on that LAN segment with the lowest port ID. Its put into 1.1 Data rate and STP path cost
Forwarding mode while all other ports on the root bridge
on that same LAN segment become non-designated ports The access speeds of the links determine the path cost
and are put into blocking mode.[5] Not all bridge/switch that STP/RSTP assumes. The STP path cost default
manufacturers follow this rule, instead making all root was originally calculated by the formula 1 Gigabit / sec-
bridge ports designated ports, and putting them all in for- ond/bandwidth. When faster speeds became available the
warding mode. A nal tie-breaker is required as noted in default values were adjusted as otherwise speeds above
the section The nal tie-breaker. 1 Gbit/s would have been indistinguishable by STP. Its
When more than one bridge on a segment leads to a least- successor RSTP uses a similar formula with a larger nu-
cost path to the root, the bridge with the lower bridge ID is merator: 20 Terabit / second/bandwidth. These formulas
used to forward messages to the root. The port attaching lead to the sample values in the table below:[7]:154
that bridge to the network segment is the designated port
for the segment. In gure 4, there are two least cost paths
from network segment d to the root, one going through 1.2 Bridge Protocol Data Units
bridge 24 and the other through bridge 92. The lower
bridge ID is 24, so the tie breaker dictates that the desig- Main article: Bridge Protocol Data Unit
nated port is the port through which network segment d
is connected to bridge 24. If bridge IDs were equal, then
The above rules describe one way of determining what
the bridge with the lowest MAC address would have the
spanning tree will be computed by the algorithm, but
designated port. In either case, the loser sets the port as
the rules as written require knowledge of the entire net-
being blocked.
work. The bridges have to determine the root bridge
The nal tie-breaker. In some cases, there may still be and compute the port roles (root, designated, or blocked)
a tie, as when the root bridge has multiple active ports with only the information that they have. To ensure
on the same LAN segment (see above, Breaking ties that each bridge has enough information, the bridges use
for designated ports) with equally low root path costs special data frames called Bridge Protocol Data Units
and bridge IDs, or, in other cases, multiple bridges are (BPDUs) to exchange information about bridge IDs and
connected by multiple cables and multiple ports. In each root path costs.
4 2 EVOLUTIONS AND EXTENSIONS

A bridge sends a BPDU frame using the unique MAC Forwarding - A port receiving and sending data,
address of the port itself as a source address, and a des- normal operation. STP still monitors incoming BP-
tination address of the STP multicast address 01:80:C2: DUs that would indicate it should return to the
00:00:00. blocking state to prevent a loop.
There are two types of BPDUs in the original STP Disabled - Not strictly part of STP, a network ad-
specication[7]:63 (the Rapid Spanning Tree (RSTP) ex- ministrator can manually disable a port
tension uses a specic RSTP BPDU):

To prevent the delay when connecting hosts to a switch


Conguration BPDU (CBPDU), used for Spanning
and during some topology changes, Rapid STP was de-
Tree computation
veloped, which allows a switch port to rapidly transition
Topology Change Notication (TCN) BPDU, used into the forwarding state during these situations.
to announce changes in the network topology

BPDUs are exchanged regularly (every 2 seconds by 1.3 Bridge Protocol Data Unit elds
default) and enable switches to keep track of network
changes and to start and stop forwarding at ports as re- IEEE 802.1D and IEEE 802.1aq BPDUs have the follow-
quired. ing format:

When a device is rst attached to a switch port, it will


not immediately start to forward data. It will instead go 1. Protocol ID: 2 bytes (0x0000 IEEE 802.1D) 2. Ver-
through a number of states while it processes BPDUs and sion ID: 1 byte (0x00 Cong & TCN / 0x02 RST /
determines the topology of the network. When a host is 0x03 MSTP / 0x04 SPT BPDU) 3. BPDU Type: 1
attached such as a computer, printer or server the port byte (0x00 Cong BPDU, 0x80 TCN BPDU, 0x02 RST
will always go into the forwarding state, albeit after a de- BPDU) 4. Flags: 1 byte bits : usage 1 : 0 or 1 for
lay of about 30 seconds while it goes through the listen- Topology Change 2 : 0 (unused) or 1 for Proposal in
ing and learning states (see below). The time spent in RST/MST/SPT BPDU 3-4 : 00 (unused) or 01 for Port
the listening and learning states is determined by a value Role Alternate/Backup in RST/MST/SPT BPDU 10 for
known as the forward delay (default 15 seconds and set Port Role Root in RST/MST/SPT BPDU 11 for Port Role
by the root bridge). However, if instead another switch Designated in RST/MST/SPT BPDU 5 : 0 (unused) or 1
is connected, the port may remain in blocking mode if it for Learning in RST/MST/SPT BPDU 6 : 0 (unused) or
is determined that it would cause a loop in the network. 1 for Forwarding in RST/MST/SPT BPDU 7 : 0 (unused)
Topology Change Notication (TCN) BPDUs are used to or 1 for Agreement in RST/MST/SPT BPDU 8 : 0 or 1
inform other switches of port changes. TCNs are injected for Topology Change Acknowledgement 5. Root ID: 8
into the network by a non-root switch and propagated to bytes (CIST Root ID in MST/SPT BPDU) bits : usage
the root. Upon receipt of the TCN, the root switch will 1-4 : Root Bridge Priority 5-16 : Root Bridge System ID
set a Topology Change ag in its normal BPDUs. This Extension 17-64 : Root Bridge MAC Address 6. Root
ag is propagated to all other switches to instruct them to Path Cost: 4 bytes (CIST External Path Cost in MST/SPT
rapidly age out their forwarding table entries. BPDU) 7. Bridge ID: 8 bytes (CIST Regional Root ID in
STP switch port states: MST/SPT BPDU) bits : usage 1-4 : Bridge Priority 5-
16 : Bridge System ID Extension 17-64 : Bridge MAC
Blocking - A port that would cause a switching loop Address 8. Port ID: 2 bytes 9. Message Age: 2 bytes in
if it were active. No user data is sent or received 1/256 secs 10. Max Age: 2 bytes in 1/256 secs 11. Hello
over a blocking port, but it may go into forwarding Time: 2 bytes in 1/256 secs 12. Forward Delay: 2 bytes
mode if the other links in use fail and the spanning in 1/256 secs 13. Version 1 Length: 1 byte (0x00 no ver 1
tree algorithm determines the port may transition to protocol info present. RST, MST, SPT BPDU only) 14.
the forwarding state. BPDU data is still received in Version 3 Length: 2 bytes (MST, SPT BPDU only) The
TCN BPDU includes elds 1-3 only.
blocking state. Prevents the use of looped paths.
Listening - The switch processes BPDUs and awaits
possible new information that would cause it to re- 2 Evolutions and extensions
turn to the blocking state. It does not populate the
MAC address table and it does not forward frames.
The rst spanning tree protocol was invented in 1985 at
Learning - While the port does not yet forward the Digital Equipment Corporation by Radia Perlman.[1]
frames it does learn source addresses from frames In 1990, the IEEE published the rst standard for the pro-
received and adds them to the ltering database tocol as 802.1D,[8] based on the algorithm designed by
(switching database). It populates the MAC address Perlman. Subsequent versions were published in 1998[9]
table, but does not forward frames. and 2004,[10] incorporating various extensions.
2.1 Rapid Spanning Tree Protocol 5

Although the purpose of a standard is to promote in- Disabled - Not strictly part of STP, a network ad-
terworking of equipment from dierent vendors, dif- ministrator can manually disable a port
ferent implementations of a standard are not guaran-
teed to work, due for example to dierences in de- RSTP switch port states:
fault timer settings. The IEEE encourages vendors to
provide a "Protocol Implementation Conformance State-
ment", declaring which capabilities and options have been Discarding - No user data is sent over the port
[10]
implemented, to help users determine whether dier-
Learning - The port is not forwarding frames yet,
ent implementations will interwork correctly.
but is populating its MAC-address-table
Also, the original Perlman-inspired Spanning Tree Pro-
tocol, called DEC STP, is not a standard and diers from Forwarding - The port is fully operational
the IEEE version in message format as well as timer set-
tings. Some bridges implement both the IEEE and the RSTP operational details:
DEC versions of the Spanning Tree Protocol, but their
interworking can create issues for the network adminis-
trator, as illustrated by the problem discussed in an on- Detection of root switch failure is done in 3 hello
line Cisco document. [11] times, which is 6 seconds if the default hello times
have not been changed.

Ports may be congured as edge ports if they are at-


2.1 Rapid Spanning Tree Protocol tached to a LAN that has no other bridges attached.
These edge ports transition directly to the forward-
In 2001, the IEEE introduced Rapid Spanning Tree Pro-
ing state. RSTP still continues to monitor the port
tocol (RSTP) as 802.1w. RSTP provides signicantly
for BPDUs in case a bridge is connected. RSTP
faster spanning tree convergence after a topology change,
can also be congured to automatically detect edge
introducing new convergence behaviors and bridge port
ports. As soon as the bridge detects a BPDU coming
roles to do this. RSTP was designed to be backwards-
to an edge port, the port becomes a non-edge port.
compatible with standard STP.
While STP can take 30 to 50 seconds to respond to a RSTP calls the connection between two or more
topology change, RSTP is typically able to respond to switches as a link-type connection. A port that
changes within 3 Hello times (default: 3 times 2 sec- operates in full-duplex mode is assumed to be point-
onds) or within a few milliseconds of a physical link fail- to-point link, whereas a half-duplex port (through a
ure. The Hello time is an important and congurable time hub) is considered a shared port by default. This au-
interval that is used by RSTP for several purposes; its de- tomatic link type setting can be overridden by ex-
fault value is 2 seconds.[12][13] plicit conguration. RSTP improves convergence
on point-to-point links by reducing the Max-Age
Standard IEEE 802.1D-2004 incorporates RSTP and ob-
time to 3 times Hello interval, removing the STP lis-
soletes the original STP standard.[14]
tening state, and exchanging a handshake between
two switches to quickly transition the port to for-
2.1.1 Rapid Spanning Tree Operation warding state. RSTP does not do anything dier-
ently from STP on shared links.
RSTP adds new bridge port roles in order to speed con- Unlike in STP, RSTP will respond to BPDUs sent
vergence following a link failure. The number of states a from the direction of the root bridge. An RSTP
port can be in has been reduced to three instead of STPs bridge will propose its spanning tree information
original ve. to its designated ports. If another RSTP bridge re-
RSTP bridge port roles: ceives this information and determines this is the su-
perior root information, it sets all its other ports to
discarding. The bridge may send an agreement to
Root - A forwarding port that is the best port from
the rst bridge conrming its superior spanning tree
non-root bridge to root bridge
information. The rst bridge, upon receiving this
Designated - A forwarding port for every LAN seg- agreement, knows it can rapidly transition that port
ment to the forwarding state bypassing the traditional lis-
tening/learning state transition. This essentially cre-
Alternate - An alternate path to the root bridge. ates a cascading eect away from the root bridge
This path is dierent from using the root port where each designated bridge proposes to its neigh-
bors to determine if it can make a rapid transition.
Backup - A backup/redundant path to a segment This is one of the major elements that allows RSTP
where another bridge port already connects to achieve faster convergence times than STP.
6 2 EVOLUTIONS AND EXTENSIONS

As discussed in the port role details above, RSTP Networks. There are two restrictions to the compatibility
maintains backup details regarding the discarding of VSTP:
status of ports. This avoids timeouts if the current
forwarding ports were to fail or BPDUs were not re- 1. VSTP supports only 253 dierent spanning-tree
ceived on the root port in a certain interval. topologies. If there are more than 253 VLANs, it
is recommended to congure RSTP in addition to
RSTP will revert to legacy STP on an interface if a VSTP, and VLANs beyond 253 will be handled by
legacy version of an STP BPDU is detected on that RSTP.
port.
2. MVRP does not support VSTP. If this protocol is in
use, VLAN membership for trunk interfaces must
2.2 Per-VLAN Spanning Tree and Per- be statically congured .
VLAN Spanning Tree Plus
By default, VSTP uses the RSTP protocol as its core
In Ethernet switched environments where multiple spanning-tree protocol, but usage of STP can be forced
Virtual LANs exist, it is often desirable to create mul- if the network includes old bridges .
tiple spanning trees so that trac from dierent VLANs
uses dierent links. Cisco's proprietary versions of Span- For more information about conguring VSTP on Ju-
ning Tree Protocol, Per-VLAN Spanning Tree (PVST) niper Networks switches, see the ocial documentation
and Per-VLAN Spanning Tree Plus (PVST+), create a Understanding VSTP.
separate spanning tree for each VLAN. Both PVST and
PVST+ protocols are Cisco proprietary protocols, and
few switches from other vendors support them. They 2.5 Multiple Spanning Tree Protocol
use a dierent multicast address: 01:00:0C:CC:CC:
CD. Some devices from Force10 Networks, Alcatel- The Multiple Spanning Tree Protocol (MSTP), originally
Lucent, Extreme Networks, Avaya, Brocade Communi- dened in IEEE 802.1s and later merged into IEEE
cations Systems and BLADE Network Technologies sup- 802.1Q2005, denes an extension to RSTP to further
port PVST+.[15][16][17] Extreme Networks does so with develop the usefulness of virtual LANs (VLANs). This
two limitations: Lack of support on ports where the Multiple Spanning Tree Protocol congures a separate
VLAN is untagged/native, and also on the VLAN with Spanning Tree for each VLAN group and blocks all but
ID 1. PVST works only with ISL (Ciscos proprietary one of the possible alternate paths within each Spanning
protocol for VLAN encapsulation) due to its embedded Tree.
Spanning Tree ID. This is the default protocol on Cisco If there is only one Virtual LAN (VLAN) in the network,
switches that support ISL. Due to high penetration of the single (traditional) STP works appropriately. If the net-
IEEE 802.1Q VLAN trunking standard and PVSTs de- work contains more than one VLAN, the logical network
pendence on ISL, Cisco dened an additional PVST+ congured by single STP would work, but it is possible to
standard that is compatible with 802.1Q encapsulation. make better use of the alternate paths available by using
This became the default protocol for Cisco switches when an alternate spanning tree for dierent VLANs or groups
Cisco discontinued and removed ISL support from its of VLANs.
switches. PVST+ can tunnel across an MSTP Region.[18]
MSTP allows formation of MST regions that can run mul-
tiple MST instances (MSTI). Multiple regions and other
STP bridges are interconnected using one single common
2.3 Rapid Per-VLAN Spanning Tree spanning tree (CST).

This is Ciscos proprietary version of Rapid Spanning MSTP is similar to Cisco Systems' Multiple Instances
Tree Protocol. It creates a spanning tree for each VLAN, Spanning Tree Protocol (MISTP), and is an evolution of
just like PVST. Cisco refers to this as Rapid Per-VLAN the Spanning Tree Protocol and the Rapid Spanning Tree
Spanning Tree (RPVST). Protocol. It was introduced in IEEE 802.1s as an amend-
ment to 802.1Q, 1998 edition. Standard IEEE 802.1Q-
2005 now includes MSTP.
2.4 VLAN Spanning Tree Protocol Unlike some proprietary per-VLAN spanning tree
implementations,[19] MSTP includes all of its spanning
In Juniper Networks environment, if compatibility to tree information in a single BPDU format. Not only does
Ciscos proprietary PVST protocol is required, VLAN this reduce the number of BPDUs required on a LAN to
Spanning Tree Protocol (VSTP) can be congured. communicate spanning tree information for each VLAN,
VSTP maintains a separate spanning-tree instance for but it also ensures backward compatibility with RSTP
each VLAN congured in the switch. The VSTP protocol (and in eect, classic STP too). MSTP does this by en-
is only supported by the EX and MX Series from Juniper coding additional region information after the standard
7

RSTP BPDU as well as a number of MSTI messages 2.6.1 System ID Extension


(from 0 to 64 instances, although in practice many bridges
support fewer). Each of these MSTI conguration mes- The bridge ID, or BID, is a eld inside a BPDU packet. It
sages conveys the spanning tree information for each in- is eight bytes in length. The rst two bytes are the bridge
stance. Each instance can be assigned a number of con- priority, an unsigned integer of 0-65,535. The last six
gured VLANs and frames (packets) assigned to these bytes are a MAC address supplied by the bridge. Prior
VLANs operate in this spanning tree instance whenever to IEEE 802.1D-2004, the rst two bytes gave a 16 bit
they are inside the MST region. In order to avoid convey- bridge priority. Since IEEE 802.1D-2004, the rst four
ing their entire VLAN to spanning tree mapping in each bits are a congurable priority, and the last twelve bits
BPDU, bridges encode an MD5 digest of their VLAN to carry the bridge system ID extension. In the case of MST,
instance table in the MSTP BPDU. This digest is then the bridge system ID extension carries the MSTP instance
used by other MSTP bridges, along with other adminis- number. Some vendors set the bridge system ID exten-
tratively congured values, to determine if the neighbor- sion to carry a VLAN ID allowing a dierent spanning
ing bridge is in the same MST region as itself. tree per VLAN, such as Ciscos PVST.
MSTP is fully compatible with RSTP bridges, in that an
MSTP BPDU can be interpreted by an RSTP bridge as
an RSTP BPDU. This not only allows compatibility with 3 See also
RSTP bridges without conguration changes, but also
causes any RSTP bridges outside of an MSTP region to Bridge Protocol Data Unit
see the region as a single RSTP bridge, regardless of the
number of MSTP bridges inside the region itself. In order Distributed minimum spanning tree
to further facilitate this view of an MST region as a single
EtherChannel
RSTP bridge, the MSTP protocol uses a variable known
as remaining hops as a time to live counter instead of the Ethernet Automatic Protection Switching
message age timer used by RSTP. The message age time
is only incremented once when spanning tree informa- Flex links
tion enters an MST region, and therefore RSTP bridges
will see a region as only one hop in the spanning tree. Media Redundancy Protocol
Ports at the edge of an MST region connected to either an
Minimum spanning tree
RSTP or STP bridge or an endpoint are known as bound-
ary ports. As in RSTP, these ports can be congured as TRILL (Transparent Interconnection of Lots of
edge ports to facilitate rapid changes to the forwarding Links)
state when connected to endpoints.
Unidirectional Link Detection

Virtual Link Trunking

2.6 Shortest path bridging


4 Notes
Main article: Shortest Path Bridging
[1] The spanning tree is not necessarily a minimum cost span-
The IEEE approved the IEEE 802.1aq standard May ning tree. A network administrator can reduce the cost of
2012,[20] also known and documented in most books as a spanning tree, if necessary, by altering some of the con-
Shortest Path Bridging (SPB). SPB allows all links to guration parameters in such a way as to aect the choice
be active through multiple equal cost paths, and pro- of the root of the spanning tree.
vides much larger layer 2 topologies, faster conver- [2] Spanning tree incorporated 802.1t, and per 802.1t, uses
gence, and improves the use of the mesh topologies the 4 most-signicant bits of the 802.1d two-octet priority
through increased bandwidth between all devices by al- eld as priority, and the least-signicant 12 bits of that
lowing trac to load share across all paths on a mesh eld as the extended system ID.
network.[21][22] SPB consolidates multiple existing func-
tionalities, including Spanning Tree Protocol (STP), Mul- [3] The original 802.1d envisioned the possibility of the root
bridge having more than one port on the same LAN seg-
tiple Spanning Tree Protocol (MSTP), Rapid Spanning
ment, and in that case, the port with the lowest port ID
Tree Protocol (RSTP), Link aggregation, and Multiple
would become the designated port for that LAN segment,
MAC Registration Protocol (MMRP) into a one link state and put into forwarding mode, while its other ports on that
protocol.[23] SPB is designed to virtually eliminate hu- same LAN segment became non-designated ports put into
man error during conguration and preserves the plug- blocking mode. Not all bridge manufacturers follow that
and-play nature that established Ethernet as the de facto rule, some making all ports designated ports and putting
protocol at Layer 2.[23] them all into forwarding mode.
8 6 EXTERNAL LINKS

[4] Alternatively the network administrator can congure the [14] IEEE 802.1D-2004, IEEE, 2004-06-04, Since the original
spanning tree a root primary/secondary. When congur- Spanning Tree Protocol (STP) has been removed from the
ing the root primary and root secondary the switch will 2004 revision of IEEE Std 802.1D, an implementation of
automatically change the priority accordingly, 24576 and RSTP is required for any claim of conformance for an im-
28672 respectively with the default conguration. plementation of IEEE Std 802.1Q-2003 that refers to the
current revision of IEEE Std 802.1D

[15] Technical Documentation. Force10. Retrieved 2011-


5 References 01-25.

[16] ExtremeXOS Operating System, Version 12.5 (PDF).


[1] Perlman, Radia (1985). An Algorithm for Distributed Extreme Networks. 2010. Retrieved 2011-01-25.
Computation of a Spanning Tree in an Extended LAN.
ACM SIGCOMM Computer Communication Review. 15 [17] BLADE PVST+ Interoperability with Cisco (PDF).
(4): 4453. doi:10.1145/318951.319004. 2006. Retrieved 2011-01-25.

[2] Perlman, Radia (2000). Interconnections, Second Edition. [18] Bridging Between IEEE 802.1Q VLANs. Cisco Sys-
USA: Addison-Wesley. ISBN 0-201-63448-1. tems. Retrieved 2011-01-25.

[19] CiscoWorks LAN Management Solution 3.2 Deploy-


[3] Bridges and Bridged Networks
ment Guide. August 2009. Retrieved 2010-01-25.
[4] Attacking the Spanning Tree Protocol. Cisco Press. N.p., [20] Shuang Yu (8 May 2012). IEEE APPROVES
4 June 2008. Web. 2 Mar. 2016.<http://www.ciscopress. NEW IEEE 802.1aq SHORTEST PATH BRIDGING
com/articles/article.asp?p=1016582> STANDARD. IEEE. Retrieved 2 June 2012.

[5] 802.1d-1998 section 8.3.1: The Designated Port for each [21] Peter Ashwood-Smith (24 Feb 2011). Shortest Path
LAN is the Bridge Port for which the value of the Root Bridging IEEE 802.1aq Overview (PDF). Huawei. Re-
Path Cost is the lowest: if two or more Ports have the same trieved 11 May 2012.
value of Root Path Cost, then rst the Bridge Identier
of their Bridges, and their Port Identiers are used as tie [22] Jim Duy (11 May 2012). Largest Illinois healthcare
breakers. system uproots Cisco to build $40M private cloud. PC
Advisor. Retrieved 11 May 2012. Shortest Path Bridging
[6] 802.1d-1998 section 8.3.2 b) A Bridge that receives a will replace Spanning Tree in the Ethernet fabric.
Conguration BPDU on what it decides is its Root Port
[23] IEEE Approves New IEEE 802.1aq Shortest Path Bridg-
conveying better information (i.e. highest priority Root
ing Standard. Tech Power Up. 7 May 2012. Retrieved
Identier, lowest Root Path Cost, highest priority trans-
11 May 2012.
mitting Bridge and Port), passes that information on to all
the LANs for which it believes itself to be the Designated
Bridge.
6 External links
[7] 802.1D IEEE Standard for Local and Metropolitan
Area Networks. Media Access Control (MAC) Bridges
Cisco home page for the Spanning-Tree protocol
(PDF). IEEE. 2004. Retrieved 19 April 2012.
family (discusses CST, MISTP, PVST, PVST+,
[8] LAN/MAN Standards Committee of the IEEE Computer RSTP, STP)
Society, ed. (1990). ANSI/IEEE Std 802.1D. IEEE.
Educational explanation of STP www.cisco.com
[9] LAN/MAN Standards Committee of the IEEE Computer
STP article in the Wireshark wiki Includes a sample
Society, ed. (1998). ANSI/IEEE Std 802.1D, 1998 Edi-
PCAP-le of captured STP trac.
tion, Part 3: Media Access Control (MAC) Bridges. IEEE.
Perlman, Radia. Algorhyme. University of Cal-
[10] LAN/MAN Standards Committee of the IEEE Computer
ifornia at Berkeley. Archived from the original on
Society, ed. (2004). ANSI/IEEE Std 802.1D - 2004: IEEE
Standard for Local and Metropolitan Area Networks: Me-
2011-07-19. Retrieved 2011-09-01.
dia Access Control (MAC) Bridges. IEEE. IEEE Standards
[11] Understanding Issues Related to Inter-VLAN Bridging ANSI/IEEE 802.1D-2004 standard, section
(PDF). Cisco Systems, Inc. 11072. 17 discusses RSTP (Regular STP is no longer
a part of this standard. This is pointed out in
[12] Waldemar Wojdak (March 2003). Rapid Spanning Tree
Protocol: A new solution from an old technology. Com-
section 8.)
pactPCI Systems. Retrieved 2008-08-04. ANSI/IEEE 802.1Q-2005 standard, section
13 discusses MSTP
[13] Understanding Rapid Spanning Tree Protocol (802.1w)".
Retrieved 2008-11-27. RFCs
9

RFC 26741999, proposed standard, De-


nitions of Managed Objects for Bridges with
Trac Classes, Multicast Filtering and Virtual
LAN Extensions
RFC 15251993, - SBRIDGEMIB, proposed
standard, Denitions of Managed Objects for
Source Routing Bridges
RFC 14931993 - BRIDGEMIB, draft stan-
dard, Denitions of Managed Objects for
Bridges
Spanning Tree Direct vs Indirect Link Failures -
CCIE Study
Spanning Tree Protocol Overview
10 7 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

7 Text and image sources, contributors, and licenses


7.1 Text
Spanning Tree Protocol Source: https://en.wikipedia.org/wiki/Spanning_Tree_Protocol?oldid=760343809 Contributors: Bryan Derksen,
Aldie, MadSurgeon, B4hand, Michael Hardy, Chris-martin, Dominus, Pnm, Ixfd64, Ghewgill, Timwi, Dysprosia, Echoray, Populus, Elwoz,
AaronSw, Jeq, Altenmann, Zigger, Everyking, Alvestrand, HorsePunchKid, CALR, Wfaulk, Jkl, Discospinster, Arnaud~enwiki, Pmac-
cabe, Wk muriithi, ESkog, Plugwash, RJHall, Kb, Jeroenr, Evyn, Giraedata, Yellowking, Krellis, Anthony Appleyard, Guy Harris, Stephan
Leeds, Suruena, Boscobiscotti, Nuno Tavares, Bellenion, Ilario, Kgrr, Triddle, Miken32, LimoWreck, BD2412, Pmj, Harshilvyas, Rjwilmsi,
Palthainon, BartonM, Alvin-cs, Tofergregg, FrankTobia, Sceptre, Michael Slone, Baccala@freesoft.org, Gardar Rurak, Friday, Grafen,
Dfgriggs, Mcicogni, EAderhold, Abune, Habbie, SmackBot, Davepape, KelleyCook, Ohnoitsjamie, Eug, Rafterman~enwiki, Joseanes,
Emurphy42, DRahier, JonHarder, Yidisheryid, Easwarno1, Weirdy, Dirk gently~enwiki, Radagast83, Nickfox, Minna Sora no Shita, Ro-
manSpa, Dicklyon, The emm, Redfearnb, Negrulio, Kvng, Tigey, Lee Carre, CmdrObot, Jesse Viviano, FlyingToaster, Pgr94, Danrok, Un-
cleBubba, Thijs!bot, Epbr123, Frank, Tkteun, Dawnseeker2000, Apps123, Alphachimpbot, Apjha, MER-C, Chares, Bellhead, Blatkin-
son, Bongwarrior, Miketubby, Tinucherian, ForthOK, David Eppstein, Edurant, Atigala2003, Conquerist, P00r, Andre.holzner, CableCat,
RockMFR, J.delanoy, Skier Dude, Mincebert, Wlgrin, Stagira, VolkovBot, ABF, Wrev, Philip Trueman, TXiKiBoT, Rednectar.chris,
BotKung, Bstpierre, Tfdb, AdrianSuter, Oklahoman, Phisches, SieBot, Reinderien, Cialo, Android Mouse Bot 3, Lightmouse, Seanx820,
Ngrieth, PsyberS, ClueBot, Kai-Hendrik, The Thing That Should Not Be, Skandha101, Stryqx, Pdpatil, SeanDague, Abrech, Sand-
dune00, Lhmathies, SchreiberBike, Irmatov, 7, Mchaddock, XLinkBot, Pgallert, GhosT, Shahid789, Kbdankbot, Addbot, Ghettoblaster,
DOI bot, Mickday, Yuma, Glass Sword, Salems19, Enduser, Ellery, Luckas-bot, Yobot, AnomieBOT, Galoubet, Bergonz, Materialscientist,
RobertEves92, Citation bot, Xqbot, Capricorn42, , Marchash, GliderMaven, N3rV3, FrescoBot, Geek2003, MLD7865 Auto, Citation
bot 1, I dream of horses, Os87, Serols, Banej, Mmeerman~enwiki, FoxBot, Lotje, Sricciar, Aaron.hebert, EmausBot, John of Reading,
Dewritech, RenamedUser01302013, Jasonanaggie, Fabriciodosanjossilva, Donner60, ChuispastonBot, ClueBot NG, Jeac, Movses-bot,
Snotbot, Vlhsrp, Ant1357, Silverwindx, BG19bot, Scobra77, Tonkie, AvocatoBot, J991, Kaushal.shakya, BattyBot, CrashJunkie, Pratyya
Ghosh, Lingathoor, Hendersonnv, Sriharsh1234, Dave Braunschweig, Aztk14, Ilweran, Indrapal.rathor, WikiJackool, Danilocresti, Jp-
netsec, Therealmikemaze, Paul1307, Houston-IT12, WPSJon, Marirsg, Ralpha9, CYM(PHIL)151403-IEEE, GreenC bot, Guilleboxx,
Lpstudy and Anonymous: 331

7.2 Images
File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: PD Contributors: ? Origi-
nal artist: ?
File:Spanning_tree_protocol_at_work_1.svg Source: https://upload.wikimedia.org/wikipedia/commons/d/d7/Spanning_tree_
protocol_at_work_1.svg License: CC BY 3.0 Contributors: self-made, based on en:User:Ngriffeth's en:Image:STP1.jpg Original artist:
GhosT
File:Spanning_tree_protocol_at_work_2.svg Source: https://upload.wikimedia.org/wikipedia/commons/a/a9/Spanning_tree_
protocol_at_work_2.svg License: CC BY 3.0 Contributors: self-made, based on en:User:Ngriffeth's en:Image:STP2.jpg Original artist:
GhosT
File:Spanning_tree_protocol_at_work_3.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/74/Spanning_tree_
protocol_at_work_3.svg License: CC BY 3.0 Contributors: self-made, based on en:User:Ngriffeth's en:Image:STP3.jpg Original artist:
GhosT
File:Spanning_tree_protocol_at_work_4.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/77/Spanning_tree_
protocol_at_work_4.svg License: CC BY 3.0 Contributors: self-made, based on en:User:Ngriffeth's en:Image:STP4.jpg Original artist:
GhosT
File:Spanning_tree_protocol_at_work_5.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/bb/Spanning_tree_
protocol_at_work_5.svg License: CC BY 3.0 Contributors: self-made, based on en:User:Ngriffeth's en:Image:STP5.jpg Original artist:
GhosT
File:Spanning_tree_protocol_at_work_6.svg Source: https://upload.wikimedia.org/wikipedia/commons/2/21/Spanning_tree_
protocol_at_work_6.svg License: CC BY 3.0 Contributors: self-made, based on en:User:Ngriffeth's en:Image:STP5.jpg Original artist:
GhosT

7.3 Content license


Creative Commons Attribution-Share Alike 3.0

S-ar putea să vă placă și