26
RSTP C
ONFIGURATION
This chapter covers the following topics:
■
STP Overview
■
RSTP Configuration
■
RSTP Configuration Example
STP Overview
Spanning Tree Protocol (STP) is applied in loop networks to block some undesirable
redundant paths with certain algorithms and prune the network into a loop-free tree,
thereby avoiding the proliferation and infinite cycling of the packet in the loop
network.
Implement STP
The fundamental of STP is that the Switches exchange a special type of protocol
packet (which is called configuration Bridge Protocol Data Units, or BPDU, in IEEE
802.1D) to decide the topology of the network. The configuration BPDU contains the
information enough to ensure the Switches to compute the spanning tree.
The configuration BPDU mainly contains the following information:
■
The root ID consisting of root priority and MAC address
■
The cost of the shortest path to the root
■
Designated bridge ID consisting of designated bridge priority and MAC address
■
Designated port ID consisting of port priority and port number
■
The age of the configuration BPDU: MessageAge
■
The maximum age of the configuration BPDU: MaxAge
■
Configuration BPDU interval: HelloTime
■
Forward delay of the port: ForwardDelay.
What are the Designated Bridge and Designated Port?
Figure 159
Designated Bridge and Designated Port
Switch A
Switch C
Switch B
CP2
BP2
CP1
BP1
AP2
AP1
LAN
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...