SlideShare a Scribd company logo
RSTP (Rapid Spanning Tree Protocol)
In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly
faster spanning tree convergence after a topology change, introducing new convergence behavior and
bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP.
While STP can take 30 to 50 seconds to respond to a topology change, RSTP is typically able to respond
to changes within 3 × Hello times (default: 3 times 2 seconds) or within a few milliseconds of a physical
link failure. The so-called Hello time is an important and configurable time interval that is used by RSTP
for several purposes; its default value is 2 seconds.
Standard IEEE 802.1D-2004 incorporates RSTP and obsoletes the original STP standard.
Rapid Spanning Tree Operation
RSTP adds new bridge port roles in order to speed convergence following a link failure. The number of
states a port can be in has been reduced to three instead of STP's original five.
RSTP Bridge Port Roles
1. Root Port- The port that receives the best BPDU on a bridge is the root port. This is the port that
is the closest to the root bridge in terms of path cost. The STA elects a single root bridge in the
whole bridged network (per-VLAN). The root bridge sends BPDUs that are more useful than the
ones any other bridge sends. The root bridge is the only bridge in the network that does not have
a root port. All other bridges receive BPDUs on at least one port.
2. Designated Port- A port is designated if it can send the best BPDU on the segment to which it is
connected. 802.1D bridges link together different segments, such as Ethernet segments, to
create a bridged domain. On a given segment, there can only be one path toward the root
bridge. If there are two, there is a bridging loop in the network. All bridges connected to a given
segment listen to the BPDUs of each and agree on the bridge that sends the best BPDU as the
designated bridge for the segment. The port on that bridge that corresponds is the designated
port for that segment.
Figure 1 Root Port
RSTP (Rapid Spanning Tree Protocol)
3. Alternate and Backup Port Roles- These two port roles correspond to the blocking state of
802.1D. A blocked port is defined as not being the designated or root port. A blocked port
receives a more useful BPDU than the one it sends out on its segment. Remember that a port
absolutely needs to receive BPDUs in order to stay blocked. RSTP introduces these two roles for
this purpose.
An alternate port receives more useful BPDUs from another bridge and is a port blocked. This is
shown in this diagram:
A backup port receives more useful BPDUs from the same bridge it is on and is a port blocked.
This is shown in this diagram:
This distinction is already made internally within 802.1D. This is essentially how Cisco UplinkFast
functions. The rationale is that an alternate port provides an alternate path to the root bridge
and therefore can replace the root port if it fails. Of course, a backup port provides redundant
Figure 2 Designated Port
Figure 3 Alternate Port
Figure 4 Backup Port
RSTP (Rapid Spanning Tree Protocol)
connectivity to the same segment and cannot guarantee an alternate connectivity to the root
bridge. Therefore, it is excluded from the uplink group.
New Port States
The 802.1D is defined in these five different port states:
1. Disabled
2. Listening
3. Learning
4. Blocking
5. Forwarding
STP (802.1D) Port State
RSTP (802.1w)
Port State
Is Port Included in Active
Topology?
Is Port Learning MAC Addresses?
Disabled Discarding No No
Blocking Discarding No No
Listening Discarding Yes No
Learning Learning Yes Yes
Forwarding Forwarding Yes Yes
RSTP Switch Port States
1. Discarding- No user data is sent over the port.
2. Learning- The port is not forwarding frames yet, but is populating its MAC-address-table.
3. Forwarding- The port is fully operational.
4. Detection of root switch failure is done in 3 hello times, which is 6 seconds if the default hello
times have not been changed.
5. Ports may be configured as edge ports if they are attached to a LAN that has no other bridges
attached. These edge ports transition directly to the forwarding state. RSTP still continues to
monitor the port for BPDUs in case a bridge is connected. RSTP can also be configured to
RSTP (Rapid Spanning Tree Protocol)
automatically detect edge ports. As soon as the bridge detects a BPDU coming to an edge port,
the port becomes a non-edge port.
6. RSTP calls the connection between two or more switches as a "link-type" connection. A port that
operates in full-duplex mode is assumed to be point-to-point link, whereas a half-duplex port
(through a hub) is considered a shared port by default. This automatic link type setting can be
overridden by explicit configuration. RSTP improves convergence on point-to-point links by
reducing the Max-Age time to 3 times Hello interval, removing the STP listening state, and
exchanging a handshake between two switches to quickly transition the port to forwarding state.
RSTP does not do anything differently from STP on shared links.
7. Unlike in STP, RSTP will respond to BPDUs sent from the direction of the root bridge. An RSTP
bridge will "propose" its spanning tree information to its designated ports. If another RSTP
bridge receives this information and determines this is the superior root information, it sets all
its other ports to discarding. The bridge may send an "agreement" to the first bridge confirming
its superior spanning tree information. The first bridge, upon receiving this agreement, knows it
can rapidly transition that port to the forwarding state bypassing the traditional
listening/learning state transition. This essentially creates a cascading effect away from the root
bridge where each designated bridge proposes to its neighbors to determine if it can make a
rapid transition. This is one of the major elements that allows RSTP to achieve faster
convergence times than STP.
8. As discussed in the port role details above, RSTP maintains backup details regarding the
discarding status of ports. This avoids timeouts if the current forwarding ports were to fail or
BPDUs were not received on the root port in a certain interval.
9. RSTP will revert to legacy STP on an interface if a legacy version of an STP BPDU is detected on
that port.
New BPDU Format
Few changes have been introduced by RSTP to the BPDU format. Only two flags, Topology Change (TC)
and TC Acknowledgment (TCA), are defined in 802.1D. However, RSTP now uses all six bits of the flag
byte that remain in order to perform:
 Encode the role and state of the port that originates the BPDU
 Handle the proposal/agreement mechanism
(Note: Bit 0 (Topology Change) is the least significant bit.)
RSTP (Rapid Spanning Tree Protocol)
Another important change is that the RSTP BPDU is now of type 2, version 2. The implication is that
legacy bridges must drop this new BPDU. This property makes it easy for a 802.1w bridge to detect
legacy bridges connected to it.
New BPDU Handling
1. BPDU are Sent Every Hello-Time.
2. Faster Aging of Information.
3. Accepts Inferior BPDUs.
RSTP Convergence Process
Its convergence Process is divided into 3 steps
1. Proposal– In this step they will exchange their BPDU.
Type 2, Version 2
2. Synchronization– In this step a switch will put its all trunk ports in discarding state. To avoid
possible loops.
3. Agreement– A switch will elect for RP and block port. After election, switch will send a request to
neighbor switch that you should be DP.
In this a switch will decide its own root port and will send a message to its neighbor switch that you
should be a designated port.
Figure 5 New BPDU Format
RSTP (Rapid Spanning Tree Protocol)
RSTP Port Types
 Edge Port Switch to PC/Router/Server
 Point-Point Switch to Switch
 Shared port Switch to Hub (Ethernet Device)
(Note: RSTP (1:1) Single instance for single Vlan.)
Mixed STP and RSTP Networks
RSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your network can consist of bridges running
both protocols. STP and RSTP in the same network can operate together to create a single spanning tree
domain.
The switch monitors the traffic on each port for BPDU packets. When you set the switch to RSTP mode,
all the ports operate in that mode and reject STP BPDU packets. When you set the switch to operate in
STP-compatible mode, the ports can receive either RSTP or STP BPDU packets.
Rapid Spanning Tree Configuration Menu
 Root Port
The active port on the switch that is communicating with the root bridge. If the switch is the root
bridge for the LAN, then there is no root port and the root port parameter will be 0.
Figure 6
RSTP (Rapid Spanning Tree Protocol)
 Root Path Cost
The sum of all the root port costs of all the bridges between the switch’s root port and the root
bridge including the switch’s root port cost.
 Time Since Topology Change
The time in seconds since the last topology change took place. When RSTP detects a change to
the LAN’s topology or when the switch is rebooted, this parameter is reset to 0 seconds and
begins incrementing until the next topology change is detected.
 Topology Change Count
An integer that reflects the number of times RSTP has detected a topology change on the LAN
since the switch was initially powered on or rebooted.
The following parameters refer to the designated root bridge:
 Designated Root
This parameter includes two fields: the root bridge priority and the MAC address of the root
bridge. For example, 1000 00C08F1211BB shows the root bridge priority as 1000, and
00C08F1211BB as the MAC address.
 Hello Time
The hello time. See Hello Time and Bridge Protocol Data Units (BPDUs). This parameter affects
only the root bridge.
 Maximum Age
The maximum amount of time that BPDUs are stored before being deleted on the root bridge.
 Forward Delay
The time interval between generating and sending configuration messages by the root bridge.
The following parameters refer to the switch.
 Bridge ID
The MAC address of the bridge. The bridge identifier is use as a tie breaker in the selection of the
root bridge when two or more bridges have the same bridge priority. You cannot change this
setting.
RSTP (Rapid Spanning Tree Protocol)
 Bridge Hello Time
This is the time interval between generating and sending configuration messages by the bridge.
This parameter is active only when the switch is the root bridge.
 Bridge Maximum Age
The length of time after which stored bridge protocol data units (BPDUs) are deleted by the
bridge.
 Bridge Forward Delay
This is the time interval between generating and sending configuration messages by the bridge.
Topology Information Menu
 Trunk- The trunk of which the port is a member.
 Link- Whether the link on the port is up or down.
 Desig. Root- The designated root bridge to which the switch’s root port is actively connected.
 Desig. Cost- The sum of all the root port costs on all bridges, including the switch, between the
switch and the root bridge.
 Desig. Bridge- An adjacent bridge to which the root port of the switch is actively connected.
 Desig. Port- The root bridge to which the root port of the switch is actively connected.
RSTP Quick Summary
RSTP provides faster convergence than 802.1D STP when topology changes occur.
 RSTP defines three port states: discarding, learning, and forwarding.
 RSTP defines five port roles: root, designated, alternate, backup, and disabled.
RSTP (Rapid Spanning Tree Protocol)
Configuration Instruction
 Step1: Configure SW1, SW2 and SW3 to run Rapid Per-VLAN Spanning Tree Protocol.
SW1(config)#spanning-tree mode rapid-pvst
SW1#show spanning-tree bridge
SW2(config)#spanning-tree mode rapid-pvst
SW2#show spanning-tree bridge
SW3(config)#spanning-tree mode rapid-pvst
SW3#show spanning-tree bridge
 Step 2: Configure SW1 as the ROOT bridge for VLAN 1 and 10. Verify your configuration on SW2.
SW1(config)#spanning-tree vlan 1 root primary
SW1(config)#spanning-tree vlan 10 root primary
SW2#show spanning-tree vlan 1
SW2#show spanning-tree vlan 10
 Step 3: Configure SW2 as the ROOT bridge for VLAN 20. Verify your configuration on SW1.
SW2(config)#spanning-tree vlan 20 root primary
SW1#show spanning-tree vlan 20
 Step 4: Configure SW3 as the ROOT bridge for VLAN 30. Verify your configuration on SW1.
SW3(config)#spanning-tree vlan 30 root primary
SW1#show spanning-tree vlan 30
Figure 7

More Related Content

What's hot

Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
Arash Foroughi
 
IS-IS Protocol Adjacency
IS-IS Protocol Adjacency IS-IS Protocol Adjacency
IS-IS Protocol Adjacency
NetProtocol Xpert
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
Manoj Gharate
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlanskratos2424
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
Swapnil Kapate
 
Link Aggregation Group - LACP
Link Aggregation Group - LACPLink Aggregation Group - LACP
Link Aggregation Group - LACP
PLVision
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLS
Cisco Canada
 
STP Protection
STP ProtectionSTP Protection
STP Protection
Netwax Lab
 
OpenFlow
OpenFlowOpenFlow
OpenFlow
Kingston Smiler
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
NetProtocol Xpert
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
 
Netmanias L2,L3 Training (3) L2, L3 QoS
Netmanias L2,L3 Training (3) L2, L3 QoSNetmanias L2,L3 Training (3) L2, L3 QoS
Netmanias L2,L3 Training (3) L2, L3 QoS
Chris Changmo Yoo
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
Vipin Sahu
 

What's hot (20)

Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
IS-IS Protocol Adjacency
IS-IS Protocol Adjacency IS-IS Protocol Adjacency
IS-IS Protocol Adjacency
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Vlan
Vlan Vlan
Vlan
 
Chapter 3 vlans
Chapter 3   vlansChapter 3   vlans
Chapter 3 vlans
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
Link Aggregation Group - LACP
Link Aggregation Group - LACPLink Aggregation Group - LACP
Link Aggregation Group - LACP
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLS
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
OpenFlow
OpenFlowOpenFlow
OpenFlow
 
Layer 2 switching
Layer 2 switchingLayer 2 switching
Layer 2 switching
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Netmanias L2,L3 Training (3) L2, L3 QoS
Netmanias L2,L3 Training (3) L2, L3 QoSNetmanias L2,L3 Training (3) L2, L3 QoS
Netmanias L2,L3 Training (3) L2, L3 QoS
 
Ether channel fundamentals
Ether channel fundamentalsEther channel fundamentals
Ether channel fundamentals
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 

Viewers also liked

Understanding stp-rstp-convergence
Understanding stp-rstp-convergenceUnderstanding stp-rstp-convergence
Understanding stp-rstp-convergence
Hazhir Yadegari
 
Cisco ASR 1000 Series Testing Results and Analysis
Cisco ASR 1000 Series Testing Results and AnalysisCisco ASR 1000 Series Testing Results and Analysis
Cisco ASR 1000 Series Testing Results and Analysis
Router Analysis, Inc.
 
EIGRP Jayanta
EIGRP Jayanta EIGRP Jayanta
EIGRP Jayanta Jayanta94
 
Cisco hsrp configuration
Cisco hsrp configurationCisco hsrp configuration
Cisco hsrp configuration
Wahyu Nasution
 
Cidr
CidrCidr
Cidr
JCipriano
 
Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)
KHNOG
 
Cidr.ppt
Cidr.pptCidr.ppt
Cidr.ppt
thwayyib
 
CISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBPCISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBP
YACINE MESSAOUI
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
Future Programming
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Netwax Lab
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Netwax Lab
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
Netwax Lab
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
Netwax Lab
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
Netwax Lab
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
Netwax Lab
 

Viewers also liked (17)

Understanding stp-rstp-convergence
Understanding stp-rstp-convergenceUnderstanding stp-rstp-convergence
Understanding stp-rstp-convergence
 
Cisco ASR 1000 Series Testing Results and Analysis
Cisco ASR 1000 Series Testing Results and AnalysisCisco ASR 1000 Series Testing Results and Analysis
Cisco ASR 1000 Series Testing Results and Analysis
 
EIGRP Jayanta
EIGRP Jayanta EIGRP Jayanta
EIGRP Jayanta
 
Cisco hsrp configuration
Cisco hsrp configurationCisco hsrp configuration
Cisco hsrp configuration
 
Cidr
CidrCidr
Cidr
 
Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)
 
Layer 3 redundancy hsrp
Layer 3 redundancy   hsrpLayer 3 redundancy   hsrp
Layer 3 redundancy hsrp
 
Cidr.ppt
Cidr.pptCidr.ppt
Cidr.ppt
 
C I D R
C I D RC I D R
C I D R
 
CISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBPCISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBP
 
Osi model in networking
Osi model in networkingOsi model in networking
Osi model in networking
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
 

Similar to RSTP (rapid spanning tree protocol)

Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelesskratos2424
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
Atakan ATAK
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
ManuelRojas960410
 
Stp defined
Stp definedStp defined
Stp defined
Azeem Ayaz
 
A Critical Note On Ring Flushing
A Critical Note On Ring FlushingA Critical Note On Ring Flushing
A Critical Note On Ring Flushing
CSCJournals
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Dân Chơi
 
RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...
RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...
RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...
CSCJournals
 
Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.
Gerald Paciello
 
Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...
Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...
Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...
CSCJournals
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
darulquthni
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 StpF.l. Yu
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
Rafat Khandaker
 
Spantree
SpantreeSpantree
Spantree1 2d
 
Spantree
SpantreeSpantree
Spantree1 2d
 
Cisco switching and spanning tree protocol (stp) basics
Cisco switching and spanning tree protocol (stp) basicsCisco switching and spanning tree protocol (stp) basics
Cisco switching and spanning tree protocol (stp) basics
IT Tech
 
Alp Stp
Alp StpAlp Stp
Alp Stp
Alp isik
 
Bridging.ppt
Bridging.pptBridging.ppt
Attacking the spanning tree protocol
Attacking the spanning tree protocolAttacking the spanning tree protocol
Attacking the spanning tree protocolAsmadzakirah
 
Configuracion
ConfiguracionConfiguracion
Configuracion1 2d
 
Configuracion
ConfiguracionConfiguracion
Configuracion1 2d
 

Similar to RSTP (rapid spanning tree protocol) (20)

Ch5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wirelessCh5 ccna exploration 3 lan swtching and wireless
Ch5 ccna exploration 3 lan swtching and wireless
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
 
Stp defined
Stp definedStp defined
Stp defined
 
A Critical Note On Ring Flushing
A Critical Note On Ring FlushingA Critical Note On Ring Flushing
A Critical Note On Ring Flushing
 
Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011Ccna 3 chapter 5 v4.0 answers 2011
Ccna 3 chapter 5 v4.0 answers 2011
 
RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...
RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...
RRSTP: A Spanning Tree Protocol for Obviating Count-to-Infinity from Switched...
 
Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.
 
Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...
Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...
Ijcn 114DRSTP: A Simple Technique for Preventing Count-to-Infinity in RSTP Co...
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
 
Packet Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocolPacket Tracer: Cisco, Spanning tree protocol
Packet Tracer: Cisco, Spanning tree protocol
 
Spantree
SpantreeSpantree
Spantree
 
Spantree
SpantreeSpantree
Spantree
 
Cisco switching and spanning tree protocol (stp) basics
Cisco switching and spanning tree protocol (stp) basicsCisco switching and spanning tree protocol (stp) basics
Cisco switching and spanning tree protocol (stp) basics
 
Alp Stp
Alp StpAlp Stp
Alp Stp
 
Bridging.ppt
Bridging.pptBridging.ppt
Bridging.ppt
 
Attacking the spanning tree protocol
Attacking the spanning tree protocolAttacking the spanning tree protocol
Attacking the spanning tree protocol
 
Configuracion
ConfiguracionConfiguracion
Configuracion
 
Configuracion
ConfiguracionConfiguracion
Configuracion
 

More from Netwax Lab

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
Netwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
Netwax Lab
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
Netwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
Netwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
Netwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
Netwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
Netwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
Netwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
Netwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
Netwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
Netwax Lab
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
Netwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
Netwax Lab
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
Netwax Lab
 

More from Netwax Lab (20)

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 

RSTP (rapid spanning tree protocol)

  • 1. RSTP (Rapid Spanning Tree Protocol) In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly faster spanning tree convergence after a topology change, introducing new convergence behavior and bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP. While STP can take 30 to 50 seconds to respond to a topology change, RSTP is typically able to respond to changes within 3 × Hello times (default: 3 times 2 seconds) or within a few milliseconds of a physical link failure. The so-called Hello time is an important and configurable time interval that is used by RSTP for several purposes; its default value is 2 seconds. Standard IEEE 802.1D-2004 incorporates RSTP and obsoletes the original STP standard. Rapid Spanning Tree Operation RSTP adds new bridge port roles in order to speed convergence following a link failure. The number of states a port can be in has been reduced to three instead of STP's original five. RSTP Bridge Port Roles 1. Root Port- The port that receives the best BPDU on a bridge is the root port. This is the port that is the closest to the root bridge in terms of path cost. The STA elects a single root bridge in the whole bridged network (per-VLAN). The root bridge sends BPDUs that are more useful than the ones any other bridge sends. The root bridge is the only bridge in the network that does not have a root port. All other bridges receive BPDUs on at least one port. 2. Designated Port- A port is designated if it can send the best BPDU on the segment to which it is connected. 802.1D bridges link together different segments, such as Ethernet segments, to create a bridged domain. On a given segment, there can only be one path toward the root bridge. If there are two, there is a bridging loop in the network. All bridges connected to a given segment listen to the BPDUs of each and agree on the bridge that sends the best BPDU as the designated bridge for the segment. The port on that bridge that corresponds is the designated port for that segment. Figure 1 Root Port
  • 2. RSTP (Rapid Spanning Tree Protocol) 3. Alternate and Backup Port Roles- These two port roles correspond to the blocking state of 802.1D. A blocked port is defined as not being the designated or root port. A blocked port receives a more useful BPDU than the one it sends out on its segment. Remember that a port absolutely needs to receive BPDUs in order to stay blocked. RSTP introduces these two roles for this purpose. An alternate port receives more useful BPDUs from another bridge and is a port blocked. This is shown in this diagram: A backup port receives more useful BPDUs from the same bridge it is on and is a port blocked. This is shown in this diagram: This distinction is already made internally within 802.1D. This is essentially how Cisco UplinkFast functions. The rationale is that an alternate port provides an alternate path to the root bridge and therefore can replace the root port if it fails. Of course, a backup port provides redundant Figure 2 Designated Port Figure 3 Alternate Port Figure 4 Backup Port
  • 3. RSTP (Rapid Spanning Tree Protocol) connectivity to the same segment and cannot guarantee an alternate connectivity to the root bridge. Therefore, it is excluded from the uplink group. New Port States The 802.1D is defined in these five different port states: 1. Disabled 2. Listening 3. Learning 4. Blocking 5. Forwarding STP (802.1D) Port State RSTP (802.1w) Port State Is Port Included in Active Topology? Is Port Learning MAC Addresses? Disabled Discarding No No Blocking Discarding No No Listening Discarding Yes No Learning Learning Yes Yes Forwarding Forwarding Yes Yes RSTP Switch Port States 1. Discarding- No user data is sent over the port. 2. Learning- The port is not forwarding frames yet, but is populating its MAC-address-table. 3. Forwarding- The port is fully operational. 4. Detection of root switch failure is done in 3 hello times, which is 6 seconds if the default hello times have not been changed. 5. Ports may be configured as edge ports if they are attached to a LAN that has no other bridges attached. These edge ports transition directly to the forwarding state. RSTP still continues to monitor the port for BPDUs in case a bridge is connected. RSTP can also be configured to
  • 4. RSTP (Rapid Spanning Tree Protocol) automatically detect edge ports. As soon as the bridge detects a BPDU coming to an edge port, the port becomes a non-edge port. 6. RSTP calls the connection between two or more switches as a "link-type" connection. A port that operates in full-duplex mode is assumed to be point-to-point link, whereas a half-duplex port (through a hub) is considered a shared port by default. This automatic link type setting can be overridden by explicit configuration. RSTP improves convergence on point-to-point links by reducing the Max-Age time to 3 times Hello interval, removing the STP listening state, and exchanging a handshake between two switches to quickly transition the port to forwarding state. RSTP does not do anything differently from STP on shared links. 7. Unlike in STP, RSTP will respond to BPDUs sent from the direction of the root bridge. An RSTP bridge will "propose" its spanning tree information to its designated ports. If another RSTP bridge receives this information and determines this is the superior root information, it sets all its other ports to discarding. The bridge may send an "agreement" to the first bridge confirming its superior spanning tree information. The first bridge, upon receiving this agreement, knows it can rapidly transition that port to the forwarding state bypassing the traditional listening/learning state transition. This essentially creates a cascading effect away from the root bridge where each designated bridge proposes to its neighbors to determine if it can make a rapid transition. This is one of the major elements that allows RSTP to achieve faster convergence times than STP. 8. As discussed in the port role details above, RSTP maintains backup details regarding the discarding status of ports. This avoids timeouts if the current forwarding ports were to fail or BPDUs were not received on the root port in a certain interval. 9. RSTP will revert to legacy STP on an interface if a legacy version of an STP BPDU is detected on that port. New BPDU Format Few changes have been introduced by RSTP to the BPDU format. Only two flags, Topology Change (TC) and TC Acknowledgment (TCA), are defined in 802.1D. However, RSTP now uses all six bits of the flag byte that remain in order to perform:  Encode the role and state of the port that originates the BPDU  Handle the proposal/agreement mechanism (Note: Bit 0 (Topology Change) is the least significant bit.)
  • 5. RSTP (Rapid Spanning Tree Protocol) Another important change is that the RSTP BPDU is now of type 2, version 2. The implication is that legacy bridges must drop this new BPDU. This property makes it easy for a 802.1w bridge to detect legacy bridges connected to it. New BPDU Handling 1. BPDU are Sent Every Hello-Time. 2. Faster Aging of Information. 3. Accepts Inferior BPDUs. RSTP Convergence Process Its convergence Process is divided into 3 steps 1. Proposal– In this step they will exchange their BPDU. Type 2, Version 2 2. Synchronization– In this step a switch will put its all trunk ports in discarding state. To avoid possible loops. 3. Agreement– A switch will elect for RP and block port. After election, switch will send a request to neighbor switch that you should be DP. In this a switch will decide its own root port and will send a message to its neighbor switch that you should be a designated port. Figure 5 New BPDU Format
  • 6. RSTP (Rapid Spanning Tree Protocol) RSTP Port Types  Edge Port Switch to PC/Router/Server  Point-Point Switch to Switch  Shared port Switch to Hub (Ethernet Device) (Note: RSTP (1:1) Single instance for single Vlan.) Mixed STP and RSTP Networks RSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your network can consist of bridges running both protocols. STP and RSTP in the same network can operate together to create a single spanning tree domain. The switch monitors the traffic on each port for BPDU packets. When you set the switch to RSTP mode, all the ports operate in that mode and reject STP BPDU packets. When you set the switch to operate in STP-compatible mode, the ports can receive either RSTP or STP BPDU packets. Rapid Spanning Tree Configuration Menu  Root Port The active port on the switch that is communicating with the root bridge. If the switch is the root bridge for the LAN, then there is no root port and the root port parameter will be 0. Figure 6
  • 7. RSTP (Rapid Spanning Tree Protocol)  Root Path Cost The sum of all the root port costs of all the bridges between the switch’s root port and the root bridge including the switch’s root port cost.  Time Since Topology Change The time in seconds since the last topology change took place. When RSTP detects a change to the LAN’s topology or when the switch is rebooted, this parameter is reset to 0 seconds and begins incrementing until the next topology change is detected.  Topology Change Count An integer that reflects the number of times RSTP has detected a topology change on the LAN since the switch was initially powered on or rebooted. The following parameters refer to the designated root bridge:  Designated Root This parameter includes two fields: the root bridge priority and the MAC address of the root bridge. For example, 1000 00C08F1211BB shows the root bridge priority as 1000, and 00C08F1211BB as the MAC address.  Hello Time The hello time. See Hello Time and Bridge Protocol Data Units (BPDUs). This parameter affects only the root bridge.  Maximum Age The maximum amount of time that BPDUs are stored before being deleted on the root bridge.  Forward Delay The time interval between generating and sending configuration messages by the root bridge. The following parameters refer to the switch.  Bridge ID The MAC address of the bridge. The bridge identifier is use as a tie breaker in the selection of the root bridge when two or more bridges have the same bridge priority. You cannot change this setting.
  • 8. RSTP (Rapid Spanning Tree Protocol)  Bridge Hello Time This is the time interval between generating and sending configuration messages by the bridge. This parameter is active only when the switch is the root bridge.  Bridge Maximum Age The length of time after which stored bridge protocol data units (BPDUs) are deleted by the bridge.  Bridge Forward Delay This is the time interval between generating and sending configuration messages by the bridge. Topology Information Menu  Trunk- The trunk of which the port is a member.  Link- Whether the link on the port is up or down.  Desig. Root- The designated root bridge to which the switch’s root port is actively connected.  Desig. Cost- The sum of all the root port costs on all bridges, including the switch, between the switch and the root bridge.  Desig. Bridge- An adjacent bridge to which the root port of the switch is actively connected.  Desig. Port- The root bridge to which the root port of the switch is actively connected. RSTP Quick Summary RSTP provides faster convergence than 802.1D STP when topology changes occur.  RSTP defines three port states: discarding, learning, and forwarding.  RSTP defines five port roles: root, designated, alternate, backup, and disabled.
  • 9. RSTP (Rapid Spanning Tree Protocol) Configuration Instruction  Step1: Configure SW1, SW2 and SW3 to run Rapid Per-VLAN Spanning Tree Protocol. SW1(config)#spanning-tree mode rapid-pvst SW1#show spanning-tree bridge SW2(config)#spanning-tree mode rapid-pvst SW2#show spanning-tree bridge SW3(config)#spanning-tree mode rapid-pvst SW3#show spanning-tree bridge  Step 2: Configure SW1 as the ROOT bridge for VLAN 1 and 10. Verify your configuration on SW2. SW1(config)#spanning-tree vlan 1 root primary SW1(config)#spanning-tree vlan 10 root primary SW2#show spanning-tree vlan 1 SW2#show spanning-tree vlan 10  Step 3: Configure SW2 as the ROOT bridge for VLAN 20. Verify your configuration on SW1. SW2(config)#spanning-tree vlan 20 root primary SW1#show spanning-tree vlan 20  Step 4: Configure SW3 as the ROOT bridge for VLAN 30. Verify your configuration on SW1. SW3(config)#spanning-tree vlan 30 root primary SW1#show spanning-tree vlan 30 Figure 7