– 165 –
7
Spanning Tree Algorithm
This chapter describes the following basic topics:
◆
– Configures detection and response to loopback BPDUs.
◆
– Configures global bridge settings for STP, RSTP and
MSTP.
◆
– Configures interface settings for STA, including
priority, path cost, link type, and designation as an edge port.
◆
– Sets the VLANs and associated priority assigned to
an MST instance
◆
– Configures interface settings for MSTP, including
priority and path cost.
Overview
The Spanning Tree Algorithm (STA) can be used to detect and disable network
loops, and to provide backup links between switches, bridges or routers. This
allows the switch to interact with other bridging devices (that is, an STA-compliant
switch, bridge or router) in your network to ensure that only one route exists
between any two stations on the network, and provide backup links which
automatically take over when a primary link goes down.
The spanning tree algorithms supported by this switch include these versions:
◆
STP – Spanning Tree Protocol (IEEE 802.1D)
◆
RSTP – Rapid Spanning Tree Protocol (IEEE 802.1w)
◆
MSTP – Multiple Spanning Tree Protocol (IEEE 802.1s)
STP
– STP uses a distributed algorithm to select a bridging device (STP-compliant
switch, bridge or router) that serves as the root of the spanning tree network. It
selects a root port on each bridging device (except for the root device) which incurs
the lowest path cost when forwarding a packet from that device to the root device.
Then it selects a designated bridging device from each LAN which incurs the lowest
path cost when forwarding a packet from that LAN to the root device. All ports
connected to designated bridging devices are assigned as designated ports. After
determining the lowest cost spanning tree, it enables all root ports and designated
ports, and disables all other ports. Network packets are therefore only forwarded
between root ports and designated ports, eliminating any possible network loops.
Содержание GEL-1061
Страница 14: ...Contents 14...
Страница 28: ...Section I Getting Started 28...
Страница 38: ...Chapter 1 Introduction System Defaults 38...
Страница 40: ...Section II Web Configuration 40...
Страница 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Страница 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Страница 192: ...Chapter 8 Congestion Control Storm Control 192...
Страница 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Страница 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Страница 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Страница 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Страница 450: ...Chapter 16 IP Services Dynamic Host Configuration Protocol 450 Figure 301 Enabling Dynamic Provisioning via DHCP...
Страница 474: ...Section III Appendices 474...
Страница 492: ...Glossary 492...
Страница 500: ...E052016 ST R02 150200001416A...