142
4.7 Spanning Tree Protocol
4.7.1 Theory
The Spanning Tree protocol can be used to detect and disable network loops, and to provide backup links between switches,
bridges or routers. This allows the switch to interact with other bridging devices in your network to ensure that only one route exists
between any two stations on the network, and provide backup links which automatically take over when a primary link goes down.
The spanning tree algorithms supported by this switch include these versions:
STP – Spanning Tree Protocol (IEEE 802.1D)
RSTP – Rapid Spanning Tree Protocol (IEEE 802.1w)
MSTP – Multiple Spanning Tree Protocol (IEEE 802.1s)
The
IEEE 802.1D Spanning Tree
Protocol and
IEEE 802.1w Rapid Spanning Tree
Protocol allow for the blocking of links between
switches that form loops within the network. When multiple links between switches are detected, a primary link is established.
Duplicated links are blocked from use and become standby links. The protocol allows for the duplicate links to be used in the event
of a failure of the primary link. Once the Spanning Tree Protocol is configured and enabled, primary links are established and
duplicated links are blocked automatically. The reactivation of the blocked links (at the time of a primary link failure) is also
accomplished automatically without operator intervention.
This automatic network reconfiguration provides maximum uptime to network users. However, the concepts of the Spanning Tree
Algorithm and protocol are a complicated and complex subject and must be fully researched and understood. It is possible to cause
serious degradation of the performance of the network if the Spanning Tree is incorrectly configured. Please read the following
before making any changes from the default values.
The Switch STP performs the following functions:
Creates a single spanning tree from any combination of switching or bridging elements.
Creates multiple spanning trees – from any combination of ports contained within a single switch, in user specified
groups.
Automatically reconfigures the spanning tree to compensate for the failure, addition, or removal of any element in the
tree.
Reconfigures the spanning tree without operator intervention.
Bridge Protocol Data Units
For STP to arrive at a stable network topology, the following information is used:
The unique switch identifier
The path cost to the root associated with each switch port
The port identifier
Summary of Contents for NS3702-24P-4S
Page 1: ...NS3702 24P 4S User Manual P N 1072832 REV 00 01 ISS 14JUL14 ...
Page 102: ...102 Figure 4 5 4 LACP Port Configuration Page Screenshot ...
Page 119: ...119 Figure 4 6 4 VLAN Membership Status for Static User Page Screenshot ...
Page 124: ...124 Figure 4 6 6 Private VLAN Membership Configuration page screenshot ...
Page 140: ...140 Figure 4 6 21 Group Name to VLAN Mapping Table Page Screenshot ...
Page 164: ...164 Figure 4 8 2 Multicast Flooding ...
Page 184: ...184 Figure 4 8 15 MLD Snooping Port Group Filtering Configuration Page Screenshot ...
Page 204: ...204 Figure 4 9 6 QoS Egress Port Tag Remarking Page Screenshot ...
Page 209: ...209 QoS Class QoS Class value can be any of 0 7 DPL Drop Precedence Level 0 1 ...
Page 251: ...251 Figure 4 11 3 Authentication Method Configuration Page Screenshot ...
Page 286: ...286 Figure 4 11 11 RADIUS Server Configuration Screenshot ...
Page 290: ...290 Figure 4 11 17 Add User Properties Screen Figure 4 11 18 Add User Properties Screen ...
Page 298: ...298 non committed changes will be lost ...
Page 349: ...349 Figure 4 16 2 PoE Configuration Screenshot ...