MSTP Overview
245
Implementation of MSTP
MSTP divides a network into multiple MST regions at Layer 2. The CST is
generated between these MST regions, and multiple spanning trees (or, MSTIs)
can be generated in each MST region. As well as RSTP, MSTP uses configuration
BPDUs to generate spanning trees. The only difference is that the configuration
BPDUs for MSTP carry the MSTP configuration information on the switches.
Generating the CIST
Through configuration BPDU comparing, the switch that is of the highest priority
in the network is chosen as the root of the CIST. In each MST region, an IST is
figured out by MSTP. At the same time, MSTP regards each MST region as a switch
to figure out the CST of the network. The CST, together with the ISTs, forms the
CIST of the network.
Generating an MSTI
In an MST region, different MSTIs are generated for different VLANs depending on
the VLAN-to-spanning-tree mappings. Each spanning tree is figured out
independently, in the same way as STP/RSTP.
Implementation of STP algorithm
In the beginning, each switch regards itself as the root, and generates a
configuration BPDU for each port on it as a root, with the root path cost being 0,
the ID of the designated bridge being that of the switch, and the designated port
being itself.
1
Each switch sends out its configuration BPDUs and operates in the following way
when receiving a configuration BPDU on one of its ports from another switch:
■
If the priority of the configuration BPDU is lower than that of the configuration
BPDU of the port itself, the switch discards the BPDU and does not change the
configuration BPDU of the port.
■
If the priority of the configuration BPDU is higher than that of the
configuration BPDU of the port itself, the switch replaces the configuration
BPDU of the port with the received one and compares it with those of other
ports on the switch to obtain the one with the highest priority.
2
Configuration BPDUs are compared as follows:
■
The smaller the root ID of the configuration BPDU is, the higher the priority of
the configuration BPDU is.
■
For configuration BPDUs with the same root IDs, the comparison is based on
the path costs. Suppose S is the sum of the root path cost and the
corresponding path cost of the port. The less the S value is, the higher the
priority of the configuration BPDU is.
■
For configuration BPDUs with both the same root ID and the same root path
cost, the designated bridge ID, designated port ID, the ID of the receiving port
are compared in turn.
3
A spanning tree is figured out as follows:
■
Determining the root bridge
The root bridge is selected by configuration BPDU comparing. The switch with the
smallest root ID is chosen as the root bridge.
■
Determining the root port
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...