Podcast
Questions and Answers
A network is experiencing a broadcast storm. Which of the following is the most likely cause?
A network is experiencing a broadcast storm. Which of the following is the most likely cause?
- A faulty network interface card (NIC) is flooding the network with invalid data.
- A misconfigured router is forwarding broadcasts unnecessarily.
- The network is under a denial-of-service attack from an external source.
- There are redundant Layer 2 paths creating a loop in the network. (correct)
What is the primary function of Spanning Tree Protocol (STP) in a network?
What is the primary function of Spanning Tree Protocol (STP) in a network?
- To load balance traffic across multiple available paths.
- To prevent Layer 2 loops by blocking redundant paths. (correct)
- To provide faster routing of packets across different network segments.
- To increase network bandwidth by aggregating multiple physical links.
Why are duplicate unicast frames problematic in a network?
Why are duplicate unicast frames problematic in a network?
- They consume excessive bandwidth and increase network latency.
- Upper layer protocols are typically not designed to handle duplicate transmissions. (correct)
- They lead to IP address conflicts within the network.
- They cause switches to crash due to MAC address table overflows.
In the context of STP, what does it mean for a port to be in a 'blocked' state?
In the context of STP, what does it mean for a port to be in a 'blocked' state?
Which of the following scenarios would most likely trigger STP to recalculate network paths and unblock a previously blocked port?
Which of the following scenarios would most likely trigger STP to recalculate network paths and unblock a previously blocked port?
How does STP maintain redundancy while preventing loops?
How does STP maintain redundancy while preventing loops?
Which of the following might indicate the presence of a Layer 2 loop in a network?
Which of the following might indicate the presence of a Layer 2 loop in a network?
A network administrator discovers that a broadcast storm is originating from a specific VLAN. What is the most effective initial step to mitigate the issue?
A network administrator discovers that a broadcast storm is originating from a specific VLAN. What is the most effective initial step to mitigate the issue?
In Spanning Tree Protocol (STP), what is the primary function of Bridge Protocol Data Units (BPDUs)?
In Spanning Tree Protocol (STP), what is the primary function of Bridge Protocol Data Units (BPDUs)?
Which of the following factors is considered when the Spanning Tree Algorithm (STA) calculates the best path to the root bridge?
Which of the following factors is considered when the Spanning Tree Algorithm (STA) calculates the best path to the root bridge?
What happens during the period when the Spanning Tree Algorithm (STA) is determining which ports to block?
What happens during the period when the Spanning Tree Algorithm (STA) is determining which ports to block?
How is the lowest Bridge ID (BID) determined in Spanning Tree Protocol (STP)?
How is the lowest Bridge ID (BID) determined in Spanning Tree Protocol (STP)?
If a switch receives multiple BPDUs from different paths, how does it determine the best path to the root bridge?
If a switch receives multiple BPDUs from different paths, how does it determine the best path to the root bridge?
What is the purpose of preventing loops in a network that uses the Spanning Tree Protocol (STP)?
What is the purpose of preventing loops in a network that uses the Spanning Tree Protocol (STP)?
After the root bridge is selected, what is the next crucial step in the Spanning Tree Algorithm (STA)?
After the root bridge is selected, what is the next crucial step in the Spanning Tree Algorithm (STA)?
How does the Spanning Tree Protocol (STP) determine the best path to the root bridge?
How does the Spanning Tree Protocol (STP) determine the best path to the root bridge?
What happens if multiple paths to the root bridge have the same overall path cost?
What happens if multiple paths to the root bridge have the same overall path cost?
Which IEEE standard defines the original Spanning Tree Protocol?
Which IEEE standard defines the original Spanning Tree Protocol?
If all best paths go through the same switch, how does STP select a root port?
If all best paths go through the same switch, how does STP select a root port?
Which of the following statements accurately describes the state of ports on the root bridge, according to STP?
Which of the following statements accurately describes the state of ports on the root bridge, according to STP?
A switch has multiple paths to the root bridge. Path A has a cumulative cost of 20, and Path B has a cumulative cost of 20. Path A connects to Switch X, which has a BID of 4096. Path B connects to Switch Y, which has a BID of 8192. Which path will the switch choose as the root port?
A switch has multiple paths to the root bridge. Path A has a cumulative cost of 20, and Path B has a cumulative cost of 20. Path A connects to Switch X, which has a BID of 4096. Path B connects to Switch Y, which has a BID of 8192. Which path will the switch choose as the root port?
Which of the following is the primary purpose of implementing Spanning Tree Protocol (STP) in a network?
Which of the following is the primary purpose of implementing Spanning Tree Protocol (STP) in a network?
In a network with redundant paths, what is the most likely consequence if Spanning Tree Protocol (STP) is not implemented?
In a network with redundant paths, what is the most likely consequence if Spanning Tree Protocol (STP) is not implemented?
Which of the following scenarios would most likely lead to MAC address table instability in a network?
Which of the following scenarios would most likely lead to MAC address table instability in a network?
How does the absence of a Time-To-Live (TTL) field in Ethernet frames contribute to the problems addressed by Spanning Tree Protocol (STP)?
How does the absence of a Time-To-Live (TTL) field in Ethernet frames contribute to the problems addressed by Spanning Tree Protocol (STP)?
Consider a network with three switches (SW1, SW2, SW3) connected in a triangle. If a broadcast frame originates from SW1, what is the most likely immediate consequence if STP is not enabled?
Consider a network with three switches (SW1, SW2, SW3) connected in a triangle. If a broadcast frame originates from SW1, what is the most likely immediate consequence if STP is not enabled?
In a redundant network design, which of the following is a direct benefit of using Spanning Tree Protocol (STP)?
In a redundant network design, which of the following is a direct benefit of using Spanning Tree Protocol (STP)?
A network administrator notices that a switch's MAC address table is rapidly changing, with the same MAC address being associated with different ports in short intervals. What is the most likely cause of this issue?
A network administrator notices that a switch's MAC address table is rapidly changing, with the same MAC address being associated with different ports in short intervals. What is the most likely cause of this issue?
Consider a scenario where a switch receives a frame on one of its ports. Without STP, what action would perpetuate a loop in a redundant network?
Consider a scenario where a switch receives a frame on one of its ports. Without STP, what action would perpetuate a loop in a redundant network?
If PC1 moves from Switch 1 to Switch 4, how do Switch 2 and Switch 4 initially update their MAC address tables?
If PC1 moves from Switch 1 to Switch 4, how do Switch 2 and Switch 4 initially update their MAC address tables?
Why do switches forward broadcast frames out of all ports except the ingress port?
Why do switches forward broadcast frames out of all ports except the ingress port?
What prevents a broadcast frame from circulating endlessly in a network with multiple switches?
What prevents a broadcast frame from circulating endlessly in a network with multiple switches?
Imagine PC1 initially connected to Switch 1 moves to Switch 4. What is the immediate consequence regarding Switch 1's MAC table?
Imagine PC1 initially connected to Switch 1 moves to Switch 4. What is the immediate consequence regarding Switch 1's MAC table?
When do Switch 2 and Switch 4 update their MAC tables with PC1's information after PC1 has moved?
When do Switch 2 and Switch 4 update their MAC tables with PC1's information after PC1 has moved?
If a switch receives a frame with a destination MAC address that is not in its MAC table, what action will the switch take?
If a switch receives a frame with a destination MAC address that is not in its MAC table, what action will the switch take?
What is the main purpose of a MAC address table in a network switch?
What is the main purpose of a MAC address table in a network switch?
How does a switch initially learn the MAC address of a device connected to one of its ports?
How does a switch initially learn the MAC address of a device connected to one of its ports?
If PC1 sends a frame to PC2, and Switch 1 initially does not have the destination MAC address in its MAC table, how does Switch 1 handle this frame?
If PC1 sends a frame to PC2, and Switch 1 initially does not have the destination MAC address in its MAC table, how does Switch 1 handle this frame?
What could cause a MAC address entry in a switch's table to be removed or updated?
What could cause a MAC address entry in a switch's table to be removed or updated?
In the event of a tie during root port selection, which criterion is used to determine the designated port on a switch?
In the event of a tie during root port selection, which criterion is used to determine the designated port on a switch?
What is the state of a port located at the opposite end of a designated port on a non-root segment?
What is the state of a port located at the opposite end of a designated port on a non-root segment?
What is the default bridge priority value in STP?
What is the default bridge priority value in STP?
In STP, what is the purpose of the Extended System ID?
In STP, what is the purpose of the Extended System ID?
How many bits are reserved for the VLAN ID within the Extended System ID?
How many bits are reserved for the VLAN ID within the Extended System ID?
Which criterion is used as a tiebreaker to determine the root bridge in STP?
Which criterion is used as a tiebreaker to determine the root bridge in STP?
Which of the following is a Cisco enhancement that provides a separate STP instance for each VLAN?
Which of the following is a Cisco enhancement that provides a separate STP instance for each VLAN?
Which spanning tree protocol allows multiple VLANs to be mapped to one STP instance?
Which spanning tree protocol allows multiple VLANs to be mapped to one STP instance?
Which spanning tree protocol is an evolution of STP providing faster convergence?
Which spanning tree protocol is an evolution of STP providing faster convergence?
What is the key difference between PVST+ and Rapid PVST+?
What is the key difference between PVST+ and Rapid PVST+?
Flashcards
Spanning-Tree Protocol
Spanning-Tree Protocol
A network protocol that prevents loops in a network topology.
Redundancy
Redundancy
Eliminating any single point of failure in a network through multiple paths.
Three-tier model
Three-tier model
Core, distribution, and access layers with redundancy attempt to eliminate a single point of failure in the network.
Multiple cabled paths
Multiple cabled paths
Signup and view all the flashcards
Redundancy considerations
Redundancy considerations
Signup and view all the flashcards
Ethernet frame looping
Ethernet frame looping
Signup and view all the flashcards
MAC database instability
MAC database instability
Signup and view all the flashcards
Broadcast storm
Broadcast storm
Signup and view all the flashcards
STP Path Cost
STP Path Cost
Signup and view all the flashcards
Root Port
Root Port
Signup and view all the flashcards
Root Port Selection (Step 1)
Root Port Selection (Step 1)
Signup and view all the flashcards
Root Port Selection (Step 2)
Root Port Selection (Step 2)
Signup and view all the flashcards
Designated Port Selection
Designated Port Selection
Signup and view all the flashcards
Duplicate Unicast Frames
Duplicate Unicast Frames
Signup and view all the flashcards
Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
Signup and view all the flashcards
Purpose of Spanning Tree
Purpose of Spanning Tree
Signup and view all the flashcards
Spanning Tree Algorithm
Spanning Tree Algorithm
Signup and view all the flashcards
Blocked Port
Blocked Port
Signup and view all the flashcards
Bridge Protocol Data Unit (BPDU)
Bridge Protocol Data Unit (BPDU)
Signup and view all the flashcards
Network Redundancy
Network Redundancy
Signup and view all the flashcards
MAC Table
MAC Table
Signup and view all the flashcards
Broadcast
Broadcast
Signup and view all the flashcards
Ingress Port
Ingress Port
Signup and view all the flashcards
Non-ingress Ports
Non-ingress Ports
Signup and view all the flashcards
Broadcast Forwarding
Broadcast Forwarding
Signup and view all the flashcards
Forwarding
Forwarding
Signup and view all the flashcards
Switching loop
Switching loop
Signup and view all the flashcards
Packet Sniffer
Packet Sniffer
Signup and view all the flashcards
Switch
Switch
Signup and view all the flashcards
Spanning Tree Algorithm (STA)
Spanning Tree Algorithm (STA)
Signup and view all the flashcards
Root Bridge
Root Bridge
Signup and view all the flashcards
Bridge ID (BID)
Bridge ID (BID)
Signup and view all the flashcards
Priority Value (in BID)
Priority Value (in BID)
Signup and view all the flashcards
MAC Address (in BID)
MAC Address (in BID)
Signup and view all the flashcards
Port Roles (in STP)
Port Roles (in STP)
Signup and view all the flashcards
Path Cost (in STP)
Path Cost (in STP)
Signup and view all the flashcards
Lowest BID Port
Lowest BID Port
Signup and view all the flashcards
Alternate Port
Alternate Port
Signup and view all the flashcards
MAC Address
MAC Address
Signup and view all the flashcards
STP (IEEE 802.1D - 1998)
STP (IEEE 802.1D - 1998)
Signup and view all the flashcards
PVST+
PVST+
Signup and view all the flashcards
IEEE 802.1D - 2004
IEEE 802.1D - 2004
Signup and view all the flashcards
Rapid Spanning Tree Protocol (RSTP)
Rapid Spanning Tree Protocol (RSTP)
Signup and view all the flashcards
Rapid PVST+
Rapid PVST+
Signup and view all the flashcards
MSTP (IEEE 802.1s)
MSTP (IEEE 802.1s)
Signup and view all the flashcards
PVST+ Operation
PVST+ Operation
Signup and view all the flashcards
Study Notes
Spanning-Tree Concepts
- The three-tier model(core, distribution, access) with redundancy attempts to eliminate a single point of failure in a network
- Multiple cabled paths between switches provide physical redundancy in a switched network
- Multiple cabled paths between switches improve reliability and availability of the network
- Multiple cabled paths between switches enable users to access network resources, despite path disruption
MAC Database Instability
- Ethernet frames lack a time to live(TTL) attribute
- Frames continue propagating between switches endlessly or until a link is disrupted/breaks the loop
- This results in MAC database instability, caused by broadcast frame forwarding
- Endless loops can result if there is >1 path for a frame to be fowarded
- When a loop occurs, the MAC address table on a switch can constantly change with the updates from broadcast frames, causing MAC database instability
Broadcast Storms
- A broadcast storm happens when too many broadcast frames are caught in a Layer 2 loop, consuming all available bandwidth
- Broadcast storms are also known as denial of service
- Broadcast storms are inevitable on looped networks
- As network devices send more broadcasts, traffic gets caught within the loop, consuming resources which leads to network failure
Duplicate Unicast Frames
- Unicast frames sent onto a looped network can result in duplicate frames arriving at the destination device
- Most upper-layer protocols aren't designed to recognize/cope with duplicate transmissions
- Layer 2 LAN protocols like ethernet lack mechanisms to recognize and eliminate endlessly looping frames
Spanning Tree Algorithm Introduction
- Redundancy is necessary in networks, but can lead to loops and broadcast storms
- Spanning Tree Protocol(STP) ensures there's only 1 logical path between destinations on the network by intentionally blocking redundant paths that could cause a loop
- A port is blocked when user data is prevented from entering or leaving a port, though this excludes Bridge Protocol Data Unit(BPDU) frames used by STP to prevent loops
- Physical paths exist to provide redundancy, but these paths are disabled to prevent loops
- Should failure occur, STP recalculates paths and unblocks necessary ports, activating redundant paths
Spanning Tree Algorithm: Introduction
- The first Spanning Tree Algorithm(STA) step determines which ports to "block" in order to prevent loops
- STA designates a single switch as the root bridge, against which all path calculations are referenced
- All switches in STP send BPDUs(bridge protocol data unit) to determine which switch has the lowest bridge ID (BID)
- The switch with the lowest BID automatically becomes the root bridge
Spanning Tree Algorithm: BPDUs
- A BPDU is a messaging frame exchanged between switches for STP use
- BPDUs contain a Bridge ID(BID) that identifies which switch sent the BPDU
- BID contains the priority value, MAC address of the sending switch, and an optional extended system ID
- Lowest BID is determined as a combination of these three fields
Spanning Tree Algorithm: Port Roles
- After a root bridge is selected, STA calculates the shortest path from it to all switchports in the broadcast domain
- STA considers both path and port costs when determining which path to select as best
- Port costs are determined based on the speed of the link
- Path cost is the sum of all port costs to the root bridge
- STA is used to determine which ports to block and during thids time, traffic cannot be forwarded through network
Spanning Tree Algorithm: Port Roles
- Once STA determines paths to select, it assigns port roles to the participating switch ports
- Port roles describe the relation in a network and whether ports can forward traffic
- Root ports are the switch ports closest to the root bridge in terms of path cost
- Designated ports include all non-root ports still allowed to forward traffic
- The other end of a root port is always a designated port and all ports on the root bridge are designated ports
- Alternate and Backup ports are configured in a blocking state to prevent loops
- Alternate and Backup ports are selected on links where there's no root port with only one end is blocked, allowing faster transition to forwarding when needed
- The original STP used "non-designated" instead of alternate, but alternate is a newer naming convention used by RSTP.
Spanning Tree Algorithm: Root Bridge
- Every STP instance elects one root bridge
- All switches the broadcast domain participate in the election
- After a switch boots, it broadcasts BPDUs every 2 seconds which contain switch BID and the root ID(BID of the root bridge)
- In the beginning, all switches assume they are root bridge
- If the RID from a received BPDU is lower than the RID on the current switch, the switch updates its RID
Spanning Tree Algorithm: Path Cost
- After the root bridge has been selected, the STA needs to determine best path to the root bridge from each destination in the broadcast domain
- Path costs are determined by summing up the individual port costs along the path from the destination to root bridge
- Individual port costs have default values and these values change over time as faster technologies become available
Spanning Tree Algorithm: Root Ports
- Select the port with the lowest overall path cost to the root bridge and each switch can have only one root port
- If multiple paths with the same cost exists, select the port connected to switch advertising the lowest BID( priority, MAC, EID)
- If all paths go through the same switch, the local port receiving the lowest port ID (port priority, port number) is selected
- Customizable port priority is used first and if priority is default, the lowest sending port ID is used
Spanning Tree Algorithm: Root Ports
- The other end of a root port is always designated
- All ports on root bridge are designated
- Steps for selecting a designated port include selecting the port on the switch with the lowest accumulated path cost to root bridge.
- If there is a tie, select the port on the switch with the lowest BID
Bridge Priority
- Defaults to 32,768 and is configurable in increments of 4096
- The lowest priority determines the root bridge
Extended System ID
- Added to support separate STP instances for different VLANs
- Twelve bits are reserved for VLAN ID and the leftmost four bits are used for priority
- Priority plus extended system ID are added together to identify the VLAN; VLAN 1 priority would be 32768+1
MAC Address
- Used as tiebreaker to determine root bridge
List of Spanning Tree Protocols
- STP/IEEE 802.1D-1998 provides original iteration with one STP instance for the whole network
- PVST+ is a Cisco enhancement that provides separate instances for each VLAN
- IEEE 802.1D-2004 is an enhanced version of STP incorporating 802.1w
- Rapid Spanning Tree Protocol(RSTP) or IEEE 802.1w is an evolution of STP providing faster convergence
- Rapid PVST+ is a Cisco enhancement of 802.1w providing a separate instance of RSTP per VLAN
- Multiple Spanning Tree Protocol(MSTP)/IEEE 802.1s is an IEEE standard that maps multiple VLANS to one STP instance
PVST+
- Network can run an independent IEEE 802.1D STP instance for each VLAN
- It's possible to load balance traffic at layer 2 by blocking one trunk port for one VLAN while allowing it for another
- One spanning-tree instance for each VLAN maintained can waste CPU cycles for all switches in the network
PVST+ Operation
- Switch port transitions through five states to learn about the entire STP topology.
- This ensures no loops
Repairing STP Problems
- One way to correct Spanning Tree problems is to manually remove redundant links in the switched network either physically or through configuration, eliminating all loops from the topology.
- Before restoring the redundant links, determine and correct the cause of spanning-tree failure
- Ensure the problem is fixed by carefully monitoring the network
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This lesson covers the causes and effects of network loops, including broadcast storms and duplicate unicast frames. It explains the primary function of Spanning Tree Protocol (STP) in preventing loops and maintaining network redundancy. Key concepts include STP port states, BPDU usage, and path calculation.