SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Spanning-Tree Protocol
Prepared By:
Hazim O. Alghalayini
Hazim.alghalayini@gmail.com
&
Fayez J. Budear
Fault Tolerance
• How is reliability in a network achieved and downtime
reduced?
• by using reliable equipment
• by designing networks that are tolerant to failures and faults

• Networks should be designed to reconverge rapidly so that a
fault is bypassed
• Fault tolerance is achieved by redundancy

2
What causes switching loops?
• Switches flood traffic out all ports when the traffic is sent to a
destination that is not yet known
• Broadcast and multicast traffic is forwarded out every port,
except the port on which the traffic arrived
• This traffic can be caught in a loop

3
Avoiding Switching Loops
• The Spanning-Tree Protocol is used in switched networks to
create a loop free logical topology from a physical topology
that has loops
Redundant Switched Topologies
• Redundant topologies eliminate single points of failure
• If a path or device fails, the redundant path or device can take
over the tasks of the failed path or device.

A Simple Redundant
Switched Topology
The Solution…
• To allow redundant links in a switched network
topology and avoid:
• Broadcast storms
• Multiple frame transmissions
• MAC database instability (routing loops)

• Spanning-Tree Protocol (STP) to the rescue
Intro to Spanning-Tree Protocol
(STP)
• IEEE 802.1D Spanning-Tree Protocol
• Used by Ethernet bridges and switches to construct a
loop free shortest path network using the spanningtree algorithm

• Shortest path is based on cumulative link costs
• Link costs are based on the speed of the link
Bridge Protocol Data Units
(BPDUs)
• The Spanning-Tree Protocol requires network devices to
exchange messages to help form a loop-free logical topology
• These messages are called Bridge Protocol Data Units (BPDUs)
• Links that will cause a loop are put into a blocking state

• BPDUs continue to be received on blocked ports (ensures that if
an active path or device fails, a new spanning tree can be
calculated)
More on BPDUs…
• BPDUs help switches do the following:
• Select a single switch that will act as the root of the
spanning tree
• Calculate the shortest path from itself to the root switch
• Designate one of the switches as the closest one to the
root, for each LAN segment. This bridge is called the
“designated switch”
• The designated switch handles all communication from that LAN
towards the root bridge.

• Choose one of its ports as a root port (if it is a non-root
switch)
• This is the interface that gives the best path to root switch.

• Select ports that are part of the spanning tree, called
designated ports
• Non-designated ports are blocked
Root Ports, Designated Ports, &
Non-Designated Ports
Information Contained in
BPDUs
Spanning-Tree Operation
• For every switched network the following
elements exist:
•
•
•
•

One root bridge per network
One root port per non root bridge
One designated port per segment
Unused, non-designated ports

• Root ports and designated ports forward data
traffic.
• Non-designated ports discard data traffic
• These ports are called blocking or discarding ports
Selecting the Root Bridge

1. An example network. The numbered boxes
represent bridges (the number represents the bridge
ID). The lettered clouds represent network segments.
Selecting the Root Bridge

2. The smallest bridge ID is 3. Therefore, bridge 3 is the
root bridge.
Selecting the Root Bridge Cont’d
• The root bridge of the spanning tree is the bridge
with the smallest (lowest) bridge ID.
• BPDUs are sent out with the Bridge ID (BID).
• The BID consists of a bridge priority (that defaults to
32768) and the switch base MAC address
• By default BPDUs are sent every two seconds
• All switches see the BIDs sent
Determine the least cost paths to the root bridge

• The computed spanning tree has the property that messages
from any connected device to the root bridge traverse a least
cost path
• The port connecting this bridge to the network segment is
then the designated port (DP) for the segment.
• Disable all other root paths. Any active port that is not a root
port or a designated port is a blocked port (BP).
Continue …

3. Assuming that the cost of traversing any network segment is
1, the least cost path from bridge 4 to the root bridge goes
through network segment c. Therefore, the root port for
bridge 4 is the one on network segment c.
Four Stages of Spanning-Tree Port
States

•A port can also be in a disabled state which occurs when an
administrator shuts down the port or the port fails.
Four Stages of Spanning-Tree Port
States
• Blocking State
• Ports can only receive BPDUs
• Data frames are discarded and no addresses can be learned
• It may take up to 20 seconds to change from this state

• Listening State
• Switches determine if there are any other paths to the root bridge
• The path that is not the least cost path to the root bridge goes back
to the blocked state
• BPDUs are still processed.
• User data is not being forwarded and MAC addresses are not being
learned
• The listening period is called the forward delay and lasts for 15
seconds
Four Stages of Spanning-Tree Port
States
• Learning State
• user data is not forwarded, but MAC addresses are learned
from any traffic that is seen
• The learning state lasts for 15 seconds and is also called the
forward delay
• BPDUs are still processed

• Forwarding state
• user data is forwarded and MAC addresses continue to be
learned
• BPDUs are still processed

• Disabled State (Fifth State)
• can occur when an administrator shuts down the port or
the port fails
Spanning-Tree Recalculation
• A switched internetwork has converged when all the
switch and bridge ports are in either the forwarding
or blocked state
• Forwarding ports send and receive data traffic and BPDUs
• Blocked ports will only receive BPDUs

• When the network topology changes, switches and
bridges recompute the Spanning Tree causing a
disruption of user traffic.

• Convergence on a new spanning-tree topology using
the IEEE 802.1D standard can take up to 50 seconds
Thanks…

Weitere ähnliche Inhalte

Was ist angesagt?

Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Proper spanning tree.pptx
Proper spanning tree.pptxProper spanning tree.pptx
Proper spanning tree.pptxEoin Irwin
 
RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)Netwax Lab
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree ProtocolManoj Gharate
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree ProtocolRamón RS
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)welcometofacebook
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layertmavroidis
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
STP Protection
STP ProtectionSTP Protection
STP ProtectionNetwax Lab
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)Netwax Lab
 

Was ist angesagt? (20)

Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
Proper spanning tree.pptx
Proper spanning tree.pptxProper spanning tree.pptx
Proper spanning tree.pptx
 
RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Ether channel fundamentals
Ether channel fundamentalsEther channel fundamentals
Ether channel fundamentals
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)Layer 2 switching fundamentals(networking)
Layer 2 switching fundamentals(networking)
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 

Andere mochten auch

Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)NetProtocol Xpert
 
Cli en routers y switches cisco
Cli en routers y switches ciscoCli en routers y switches cisco
Cli en routers y switches ciscowolbering
 
Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.Gerald Paciello
 
Лекц 14
Лекц 14Лекц 14
Лекц 14Muuluu
 
Carátula
CarátulaCarátula
Carátula1 2d
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFrooree29
 
CCNP Route - OSPF
CCNP Route - OSPFCCNP Route - OSPF
CCNP Route - OSPFmdyabi
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregationJosue Wuezo
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancyJosue Wuezo
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationVuz Dở Hơi
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyVuz Dở Hơi
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPVuz Dở Hơi
 

Andere mochten auch (20)

Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)Spanning Tree Protocol (STP)
Spanning Tree Protocol (STP)
 
Cli en routers y switches cisco
Cli en routers y switches ciscoCli en routers y switches cisco
Cli en routers y switches cisco
 
Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.Spanning Tree Protocol, from a future CCNA´s perspective.
Spanning Tree Protocol, from a future CCNA´s perspective.
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
STP
STPSTP
STP
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
Лекц 14
Лекц 14Лекц 14
Лекц 14
 
Carátula
CarátulaCarátula
Carátula
 
Cisco Sunumu
Cisco SunumuCisco Sunumu
Cisco Sunumu
 
CCNAS :Multi Area OSPF
CCNAS :Multi Area OSPFCCNAS :Multi Area OSPF
CCNAS :Multi Area OSPF
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
CCNP Route - OSPF
CCNP Route - OSPFCCNP Route - OSPF
CCNP Route - OSPF
 
Chapter 3 link aggregation
Chapter 3   link aggregationChapter 3   link aggregation
Chapter 3 link aggregation
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
CCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link AggregationCCNAv5 - S3: Chapter3 Link Aggregation
CCNAv5 - S3: Chapter3 Link Aggregation
 
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan RedundancyCCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S3: Chapter2 Lan Redundancy
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 

Ähnlich wie Spanning tree protocol

Ähnlich wie Spanning tree protocol (20)

Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
ccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdfccna-day4-switching_1234567890123456.pdf
ccna-day4-switching_1234567890123456.pdf
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 
Bridging ppt
Bridging pptBridging ppt
Bridging ppt
 
Stp defined
Stp definedStp defined
Stp defined
 
Network devices
Network devicesNetwork devices
Network devices
 
Bridging.ppt
Bridging.pptBridging.ppt
Bridging.ppt
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
LAYER 2 SWITCHING
LAYER 2 SWITCHINGLAYER 2 SWITCHING
LAYER 2 SWITCHING
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Networks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshhNetworks-part17-Bridges-RP1.pptjwhwhsjshh
Networks-part17-Bridges-RP1.pptjwhwhsjshh
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
 
How STP works?
How STP works?How STP works?
How STP works?
 
02_Layer2_Network_Design.ppt
02_Layer2_Network_Design.ppt02_Layer2_Network_Design.ppt
02_Layer2_Network_Design.ppt
 

Kürzlich hochgeladen

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Spanning tree protocol

  • 1. Spanning-Tree Protocol Prepared By: Hazim O. Alghalayini Hazim.alghalayini@gmail.com & Fayez J. Budear
  • 2. Fault Tolerance • How is reliability in a network achieved and downtime reduced? • by using reliable equipment • by designing networks that are tolerant to failures and faults • Networks should be designed to reconverge rapidly so that a fault is bypassed • Fault tolerance is achieved by redundancy 2
  • 3. What causes switching loops? • Switches flood traffic out all ports when the traffic is sent to a destination that is not yet known • Broadcast and multicast traffic is forwarded out every port, except the port on which the traffic arrived • This traffic can be caught in a loop 3
  • 4. Avoiding Switching Loops • The Spanning-Tree Protocol is used in switched networks to create a loop free logical topology from a physical topology that has loops
  • 5. Redundant Switched Topologies • Redundant topologies eliminate single points of failure • If a path or device fails, the redundant path or device can take over the tasks of the failed path or device. A Simple Redundant Switched Topology
  • 6. The Solution… • To allow redundant links in a switched network topology and avoid: • Broadcast storms • Multiple frame transmissions • MAC database instability (routing loops) • Spanning-Tree Protocol (STP) to the rescue
  • 7. Intro to Spanning-Tree Protocol (STP) • IEEE 802.1D Spanning-Tree Protocol • Used by Ethernet bridges and switches to construct a loop free shortest path network using the spanningtree algorithm • Shortest path is based on cumulative link costs • Link costs are based on the speed of the link
  • 8. Bridge Protocol Data Units (BPDUs) • The Spanning-Tree Protocol requires network devices to exchange messages to help form a loop-free logical topology • These messages are called Bridge Protocol Data Units (BPDUs) • Links that will cause a loop are put into a blocking state • BPDUs continue to be received on blocked ports (ensures that if an active path or device fails, a new spanning tree can be calculated)
  • 9. More on BPDUs… • BPDUs help switches do the following: • Select a single switch that will act as the root of the spanning tree • Calculate the shortest path from itself to the root switch • Designate one of the switches as the closest one to the root, for each LAN segment. This bridge is called the “designated switch” • The designated switch handles all communication from that LAN towards the root bridge. • Choose one of its ports as a root port (if it is a non-root switch) • This is the interface that gives the best path to root switch. • Select ports that are part of the spanning tree, called designated ports • Non-designated ports are blocked
  • 10. Root Ports, Designated Ports, & Non-Designated Ports
  • 12. Spanning-Tree Operation • For every switched network the following elements exist: • • • • One root bridge per network One root port per non root bridge One designated port per segment Unused, non-designated ports • Root ports and designated ports forward data traffic. • Non-designated ports discard data traffic • These ports are called blocking or discarding ports
  • 13. Selecting the Root Bridge 1. An example network. The numbered boxes represent bridges (the number represents the bridge ID). The lettered clouds represent network segments.
  • 14. Selecting the Root Bridge 2. The smallest bridge ID is 3. Therefore, bridge 3 is the root bridge.
  • 15. Selecting the Root Bridge Cont’d • The root bridge of the spanning tree is the bridge with the smallest (lowest) bridge ID. • BPDUs are sent out with the Bridge ID (BID). • The BID consists of a bridge priority (that defaults to 32768) and the switch base MAC address • By default BPDUs are sent every two seconds • All switches see the BIDs sent
  • 16. Determine the least cost paths to the root bridge • The computed spanning tree has the property that messages from any connected device to the root bridge traverse a least cost path • The port connecting this bridge to the network segment is then the designated port (DP) for the segment. • Disable all other root paths. Any active port that is not a root port or a designated port is a blocked port (BP).
  • 17. Continue … 3. Assuming that the cost of traversing any network segment is 1, the least cost path from bridge 4 to the root bridge goes through network segment c. Therefore, the root port for bridge 4 is the one on network segment c.
  • 18. Four Stages of Spanning-Tree Port States •A port can also be in a disabled state which occurs when an administrator shuts down the port or the port fails.
  • 19. Four Stages of Spanning-Tree Port States • Blocking State • Ports can only receive BPDUs • Data frames are discarded and no addresses can be learned • It may take up to 20 seconds to change from this state • Listening State • Switches determine if there are any other paths to the root bridge • The path that is not the least cost path to the root bridge goes back to the blocked state • BPDUs are still processed. • User data is not being forwarded and MAC addresses are not being learned • The listening period is called the forward delay and lasts for 15 seconds
  • 20. Four Stages of Spanning-Tree Port States • Learning State • user data is not forwarded, but MAC addresses are learned from any traffic that is seen • The learning state lasts for 15 seconds and is also called the forward delay • BPDUs are still processed • Forwarding state • user data is forwarded and MAC addresses continue to be learned • BPDUs are still processed • Disabled State (Fifth State) • can occur when an administrator shuts down the port or the port fails
  • 21. Spanning-Tree Recalculation • A switched internetwork has converged when all the switch and bridge ports are in either the forwarding or blocked state • Forwarding ports send and receive data traffic and BPDUs • Blocked ports will only receive BPDUs • When the network topology changes, switches and bridges recompute the Spanning Tree causing a disruption of user traffic. • Convergence on a new spanning-tree topology using the IEEE 802.1D standard can take up to 50 seconds